Are you an IT service management professional interested in developing your knowledge and improving your job performance? Join the IT service management community to access the latest updates from industry experts. Learn and share insights related to IT service management (ITSM) including topics such as the service desk, service catalog, problem and incident management, ITIL v4 and more. Engage with industry experts on current best practices and participate in active discussions that address the needs and challenges of the ITSM community.
•SaaS is becoming the dominate platform of choice for customers in many areas – including IT Service Management (ITSM). If your service management team is evaluating ITSM solutions in the cloud then you must know what are some the important criteria and topics to evaluate before signing that contract for ITSM SaaS. Senior Forrester Analyst, Amy DeMartine, will share with you what you and your team need to consider and answer questions to help you avoid the pitfalls of moving your ITSM implementation to the cloud.
A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.
Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.
During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.
With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.
This webcast will include a live demo and Q&A session.
Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:
*The facts on enterprise adoption of Windows 10
*Planning considerations for your Windows 10 migration project
*Three distinct approaches to performing device replacements—and the pros and cons associated with each
About the speaker:
Aimee Simpson, Product Marketing Manager – Code42
Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
La gestión nativa de proyectos Agile, de Pruebas, integrada con herramientas de integración continua como Jenkins o Puppet, y repositorios Git, permite gestionar de forma completa todo el ciclo de vida DevOps, desde un marco único e integrado.
De esta forma la implantación de practicas DevOps se hace de forma natural e intuitiva, guiando a todo el personal en cada uno de los pasos de la metodología.
Serem presenta un caso practico sobre la plataforma ServiceNow para ilustrar paso a paso cada uno de estos conceptos: Gestión de la demanda Agile, Cascada, no regresión, integración continua,...
- Conceptos y demostración:
+gestión de la demanda,
+gestión de proyecto y programas,
+recursos y finanzas,
+Proyectos Agile, pruebas.
- práctica: Ciclo de vida completo de un proyecto DevOps
More and more organizations are using the shift-left approach to support, bringing more complex work down to Level 1 and moving more repetitive work out into self-service. Likewise, more customers are seeking to solve their own problems before contacting support. With Level 1 work becoming more complex and more urgent for customers, remote support teams must optimize their processes and rethink their customer support strategies.
In this webinar, HDI’s senior analyst, Roy Atkinson, will tell you why organizations are shifting left. You’ll discover how robust remote tools are enabling support teams in high-performing organizations to provide quick resolution to half or more of their issues.
What you’ll learn:
* Industry expert tips on how to run a more efficient, more cost-effective support center
* Best practices for identifying when, where, and how to shift left
* Actionable advice on leveraging remote support to improve the delivery of support across the support center and desktop support
* Effective use cases for deploying technology to enhance the support teams value and optimize their role in a shift-left world
Who should attend:
* Support center managers seeking to improve the performance of their support centers
* Desktop support managers seeking to familiarize themselves with the latest practices and tools
* Anyone in technical service and support seeking a better understanding of remote support capabilities
How can you take minutes, not weeks, to develop projects and detect and fix issues? For Saint-Gobain, one of the world’s top 100 companies and a leader in Building Distribution and Construction Products, they achieved success rapidly and effectively by following some key tips.
Join Jason Goodwill, Solutions Architect at Saint-Gobain Building Distribution Sector, UK, with Andrew Davey, Solutions Consultant, MuleSoft as they share how they began optimizing their data integration strategy and accelerated the abstraction of data from key systems in a matter of minutes, instead of weeks.
Attendees will learn:
- How Saint-Gobain quickly transformed its IT operations to relieve operations and drive greater agility by modernizing core processes
- How Saint-Gobain is spearheading digital transformation by building autonomous skills in-house to enable the wider DevOps integration strategy
- Top tips and pitfalls to look out for when approaching your integration strategy
Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.
Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.
Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.
Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
Q&A will follow at the end of the session.
Have you been wondering: What’s the difference between Scrum and Kanban? Or do you think they are the same thing? In reality, these two ideas are quite different and understanding these differences is key to choosing the path that will work best for your organization.
Join us on Thursday, March 16, 10am PT / 1pm ET, for our webinar, where Christen McLemore will dig into this topic. During this webinar, we’ll:
• Explore the key dimensions of Scrum and Kanban through Principles, Artifacts, Ceremonies, Roles and Metrics
• Understand the key differentiators between the two development styles
• Gain knowledge to better advise others on when each model is more suited
IDC predicts that one of every four people on Earth will be affected by a data breach by 2020. Yet a recent Nasdaq report found that “91% of Board Members at the most vulnerable companies can't interpret a cybersecurity report.” Given that breaches doubled in 2016, the knowledge gap between executives and IT must be bridged.
Companies have responded to these attacks with various tools, such as anti-virus, malware and other endpoint protection, intrusion detection and prevention systems, and others. But despite these additions, data breaches have been increasing steadily over the past five years. This means that either the attackers are improving faster than multibillion dollar security vendors, or that traditional security mechanisms aren’t enough to protect enterprise data. Without direct visibility into the IT environment, non-technical executives can only trust in their technical leadership, who in turn must trust their technicians, who in turn must trust the technology itself, a trust that without hard data is at best an educated guess.
About the presenter:
Jon is an IT security and cyber risk evangelist at UpGuard. He doesn't *like* like risk, he just likes talking about it. More importantly, he likes talking about how it intersects with business risk, and how an accurate picture of cyber risk is one of the most important steps organizations can take toward proper cyber resilience.
Enterprises are facing an ever growing demand for mobile applications. To create and manage meaningful and sustainable mobility programs, while keeping up with the pace of this demand, enterprises should seek solutions that help them conquer the top challenges in large scale mobility programs by providing:
•Security across apps, data, users & devices
•Reducing cost & increasing the speed of development
•Seamless connectivity to multiple systems including legacy and home grown environments
•Holistic & consistent experience across mobile & web channels
•Deployment of applications to customers, partners, employees and vendors
•Streamlined post launch operations by providing real time monitoring abilities
We will discuss these challenges and look at how one of the next generation mobile platforms is simplifying enterprise mobility and addressing these key challenges.
SAP Indirect Usage costs are no longer just theory. A milestone judgement in the UK courts has confirmed SAP’s right to charge customers for Indirect Usage. But what is Indirect Usage? How big is the risk of unbudgeted costs? And what can you do about it? SAP licensing experts from Snow Software will explore the recent legal ruling and what it means for SAP customers around the world, providing insight and a simple five-step plan on how to optimize SAP access and licensing before it’s too late.
A partir de una caso real, en este webinar descubriréis como hacer un inventario automático de activos, y como éste, a su vez, alimentará sin esfuerzo la CMDB con el fin de obtener diversos beneficios:
- Reducir costes eliminando duplicidades innecesarias.
- Tener un mayor nivel de seguridad al detectar vulnerabilidades en la infraestructura.
- Y además tener mayor rapidez en caso de que fuera necesaria la restauración del servicio.
- Cómo realizar un inventario automático de activos
- Dashboards Gestión de Activos de Software
- Cómo alimentar automáticamente los CIs tecnológicos de la CMDB
- La CMDB como imagen completa de la infraestructura TI de su organización
Service Integration And Management (SIAM) is a way of ensuring seamless delivery of service to your end users by utilising multiple IT service providers, working to a common framework.
But what is it? Where did it come from? Does it work? What, when you get right down to it, is it?
Join Peter Hubbard from Pink Elephant as he provides an overview of SIAM, how it works, how it integrates with other bodies of ITSM knowledge such as ITIL, and tips and tricks for successfully implementing it.
Today’s competitive business and regulatory climate requires an intelligent, integrated platform to dramatically reduce costs and eliminate regulatory risk. A new single system of record offers real-time visibility into your company’s physical assets, contractual obligations and software licensing agreements.
Asset management is about cost savings, risk, and audit than ever before. Learn how thousands of companies saved millions last year by:
Dramatically reduce software licensing and hardware costs
- Avoid regulatory headaches
- Get real visibility into your entire asset lifecycle – and identify the assets your firm actually owns and uses
With AI powering the latest trends in cyber attacks, organizations are looking to automate their security incident response. Join this session to learn about the essential capabilities for an effective enterprise threat response architecture.
Viewers will learn about:
• Why incident response automation projects are finally making CISOs’ short lists
• Why Incident response is “growing up”, leaving behind manual processes and home-grown software
• The essential functionality for an effective enterprise security response platform
• The future: Moving from reactive to proactive incident response
Containers are being used to revolutionize how software is developed, tested, and delivered from inception to launch. Join Jeanne Morain and special guest Earl Greer from Connection and Rahul Tripathi from HPE. Earl Greer will provide an overview on how containers are transforming DevOps journey. Rahul will discuss the journey that HPE Software is taking to modernize the IT Operations Management portfolio, moving beyond traditional monolithic software delivery to a more agile approach, incorporating microservices and containers. Find out how HPE is progressing on this journey to accelerate IT to run at the speed of DevOps.
Con el avance de la tecnología, y el incremento en las tasas de transferencia el mantenimiento de redes WiFi puede ser complicado. Cuando comenzamos con afirmaciones vagas de los usuarios como “el WiFi está lento”, o “no me puedo conectar” identificar la causa raíz que provoca su malestar puede ser costoso y consumir mucho tiempo. Examinaremos métodos básicos de atención de problemas usando lo último en equipos de prueba para reducir tiempo y costo de corrección de fallas. Estoy incluye nuevas mejoras en el flujo de trabajo para equipos de trabajo distribuidos entre diferentes locaciones.
Acompáñenos en esta sesión para conocer sobre las mejores prácticas para mantenimiento de redes inalámbricas.
The promise of the cloud computing in healthcare is clear; delivering on that promise, less so. Security and HIPAA compliance challenges, combined with the technical difficulty of configuring on-premise EHR systems to co-exist with modern cloud integration platforms, have delayed cloud adoption in the industry.
This webinar will share how Anypoint Platform’s unique combination of data integration and API lifecycle management can help power the rapid, secure adoption of Salesforce and other modern healthcare cloud applications. It will also showcase how PwC has leveraged the MuleSoft platform to develop innovative solutions for its healthcare clients, and feature a demo of PwC's Smart Agent.
Attendees will learn:
- Common pitfalls healthcare organizations face in migrating to the cloud, and how they can be addressed with a hybrid integration model
- How APIs can be used to increase the security and governance of health data
- How PwC leverages MuleSoft’s platform to drive business outcomes in healthcare
While not particularly high-visibility, a well-managed Configuration Management Database (CMDB) provides organizations with tremendous value. Along with this value, a CMDB requires an organization to take responsibility for keeping it fit-for-purpose. Hewlett Packard Enterprise (HPE) sponsored a leading analyst firm to poll 100 IT executives on CMDB and discovery tools. This video reviews the most interesting findings on CMDB challenges.
The Conference of Bank Supervisors (CSBS), a national consortium of state banking regulators, has released its recommendations on how banks can best institute practices which meet or exceed the legal standard for cybersecurity. With bank executives accountable for ensuring these standards are met, CISOs working in the financial sector must have a clear understanding of how they can fulfill these regulatory requirements.
A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there
The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.
Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
En la actualidad, diversas compañías están elaborando estrategias para adaptarse a la transformación digital, la cual no solo afecta a la TI, sino también a otras área del Negocio.
En este Webinar se hará énfasis en las nuevas tendencias relacionadas con la Gestión de Incidencias, de Problemas y de Cambios. Experimentándolas sobre una herramienta real (EasyVista), a modo de ejemplo.
1.- Introducción a la Plataforma EasyVista
2.- EasyVista Service Apps - Capa de Presentación al consumidor
3.- EasyVista Service Manager - Plataforma completa de Gestión de Servicios
Las organizaciones definen SLAs para especificar los niveles de servicio que prestan a sus clientes externos/internos. También para evaluar a los proveedores que les prestan servicio.
Sin embargo, muchas veces este cálculo es manual, subjetivo y centrado en el análisis histórico.
En este webinar se presentan las principales técnicas para definir y cuantificar automáticamente los niveles de servicio, tanto en tiempo real como históricos. A modo de ejemplo, se utiliza la plataforma OBSIDIANsoft como agregador de indicadores provenientes de herramientas de monitorización, service desk, ERPs, etc.
¿Cuenta su organización con una herramienta de service desk? ¿Y con herramientas de monitorización? Por supuesto, tendrán también un ERP y otras aplicaciones de negocio.
Con los datos proporcionados por este tipo de herramientas es posible modelar los servicios de TI de una organización siguiendo las buenas prácticas de ITIL y los requisitos de la ISO 20000, definir las dependencias entre servicios y automatizar la generación de dashboards e informes de cumplimiento de nivel de servicio.
In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
Join us for a live webcast, “Applying Lean Practices to Healthcare IT Processes" on March 23rd. Seasoned ITSM experts from Pink Elephant and Cherwell will demonstrate how Lean principles are critical in healthcare organizations for better process flow, improved patient care, and lower costs. Additionally, they will map out the connection between Lean, Agile Software Development, and DevOps, how they relate to principles of IT Service Management, and the methods to accelerate business value generation.
Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?
If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).
During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:
- It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
- It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
- It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
- It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
Learn best practices for maximizing the security of your PCoIP Zero Client and PCoIP Management
Join this informative session where our security experts will cover:
•Security in a PCoIP deployment
•Securing your PCoIP and management connections
•Setting up profile settings for hardening PCoIP Zero Clients
•Hardening PCoIP Management Console
oPerforming OS security updates in CentOS
Other best security maintenance practices
Q&A will follow at the end of the session.
Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?
In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.
Watch this 30-minute webinar to learn:
*The benefits and challenges associated with Tableau’s mixed device environment
*How Tableau performs data migrations for users who are switching platforms
*Recommendations and considerations for offering Macs to your users
Matt Peterson,Technical Support Specialist,Tableau
Aimee Simpson, Product Marketing Manager, Code42
Tad Johnson, Solutions Architect, Jamf
Adam Mason, one of Acorio's Vice Presidents, will walk you through Customer Service Management business challenges - All you need to do is enjoy your pizza!
Additionally, within this webinar, we will showcase a demo of ServiceNow’s unique power to address these challenges.
- The Problem: Getting Customer Service Wrong is Expensive
- Here's What you can Achieve Doing it Right
- Deadly Sins of Customer Servie Management
- Not Contextual
- Major Benefits
- What do we mean by Light Speed?
- The Next Level: Mining Customer Support to Drive Revenue (Account Insight, Upsell Cross Sell, New Products and Upgrades)
Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips. Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.
Invest an hour to attend, The Blueprint for Managing Small Business Cybersecurity Risk, on March 30th at 11:00 am EDT as we cover the following topics:
- Current cyberthreats facing small businesses
- Case study of a recent attack that took a business down for 1 week
- The blueprint your business can follow to manage cybersecurity risk
- Actionable steps you can start taking immediately
- Resources to help you perform a risk assessment
Automation in Security. Is your organization doing it? And if so, how much is really being automated? Where does good automation end – giving way to unsafe choices that can spiral out of control? Where should enterprises draw the line?
Tools designed to enable automatic blocking or isolate a compromised system have been known to inadvertently take down critical business applications, leaving security operations teams wary of "automation." However, there are security tasks that can be safely automated without putting systems or jobs at risk. With more precious time back, security analysts can spend more time hunting and responding to threats.
Join Harold Byun and Piero DePaoli, security operations product leaders at ServiceNow, as they discuss and demonstrate approaches to no‑risk automation that can help you dramatically improve the effectiveness of your security response program.
Viewers will learn:
- Why automation is critical for efficient enterprise security response
- A short‑list of repetitive, but necessary tasks that are prime candidates for automation
- Steps to getting started
The HDI Service Improvement Award recognizes an organization that has successfully implemented or improved one or more service offerings. Attend this webinar to learn how the 2016 award winner, CGI Federal, implemented world-class service improvements. Shane Knipschild and Tom Wible will share:
* The state of the organization before CGI Federal launched its service improvement initiative
* The strategy for CGI Federal's service improvement initiative
* The outcome, including lessons learned and the impact on CGI Federal
The mandate for applications to change is nothing new. Pushing those changes from design to production in hours, however, is something traditional software delivery models can't handle. DevOps practices have emerged as a viable approach to enabling this speed with quality for increased application performance and better architectures.
In this webinar, we will highlight how DevOps practices and tooling can be applied with Anypoint Platform when implementing and managing an API.
Attendees will learn:
- How (and why) to create a DevOps pipeline with Anypoint Platform
- Setting up a Maven project in Anypoint Studio
- Connecting Mule projects with a Git repository
- Creating automated tests with MUnit and JUnit
- Deploying Mule applications automatically with Jenkins
Explore how architecting a modern security visibility network infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security system investments, and enhance uptime and availability to drive business assurance.
As security threats grow in scope and volume, you increasingly need to ensure complete and timely security visibility down to the packet level. Join Chad Russell, a leading cyber security expert and author of the 2017 “Security Visibility at Scale for Dummies,” as we review the critical highlights from this popular guide.
Attend the webinar to:
* Understand security visibility basics
* Learn the difference between supporting inline and out-of-band systems
* Find out what’s involved in optimizing packet flows
* Review security visibility use cases
The webinar is designed for network & security architects, network operations, and network security specialists.
Chad Russell has been in the cyber security business for over 15 years. He leads and conducts security risk assessments for customers throughout North America. Chad has held numerous certifications including CISSP, CCNP, MCSE, and MCDBA. Connect with him on LinkedIn.
The era of the megabreach is upon us. And it's had a seismic effect on global businesses. Many name‑brand organizations are spending millions dealing with the aftermath of losing customer data or intellectual property, and others are working as hard as they can to avoid the type of media attention that no one wants.
The core issue is that security teams are overwhelmed and lack the speed and agility to effectively stop a breach. The only way to make security teams more effective at stopping breaches is to automate security incident response processes.
Join guest speaker Joseph Blankenship, Forrester Senior Analyst, and Piero DePaoli, Senior Director from ServiceNow's Security Operations team, in this on‑demand webinar as they discuss and demonstrate the following.
•The need for rules of engagement to defend against breaches
•Defining policies and workflows to automate much of incident response
•Best practices for creating a response index
•Six game‑changers for efficient security incident response ‑ in action
Information governance (IG) is a hard nut to crack in organizations, where it often lacks proper definition and eludes common user interfaces. As organizations pursue digital transformation and create, collect and use data to determine strategy and command performances, IG makes playbooks for how a modern workforce should appropriately use and consume data assets. This webinar discusses IG as a discipline, framework and collection of technologies to identify, assess and protect information assets and respond to regulatory and litigation risks and global privacy concerns.
In the United States, the Department of Veterans Affairs is responsible for providing healthcare and other services for over 21 million veterans. Currently, veteran data and health records are housed in a variety of distinct, complex systems, each holding discrete records of veteran interactions with military, community, and VA health teams.
The Digital Health Platform (DHP) strategy, developed in partnership with the Veterans Health Administration (VHA), calls for a cloud-based technology platform integrating Veteran data from VA, military and commercial electronic health records (EHRs), applications, devices and wearables to a Veteran’s healthcare team in real-time.
Delivering on their vision required the adoption of a composable architecture, using APIs to abstract away complexity from EHRs into discrete units of business capabilities, represented via microservices. In this webinar, the DHP team will present methodology and technology insights drawn from the public-private collaboration that built the proof-of-concept, and share the role MuleSoft’s Anypoint Platform helping enable this vision.
Attendees will learn:
- Why EHRs on their own are insufficient to meet modern interoperability requirements
- How APIs can be used to unlock and orchestrate healthcare data for cloud application consumption
- Why microservices can increase IT agility for both government agencies and private sector companies
- How the Digital Health Platform leverages MuleSoft’s Anypoint Platform to improve care delivery for veterans
- What organizations outside healthcare or government can learn from this digital transformation approach
Mobility connects your most critical assets - your people to your cloud resources. Often times Mobility is an after thought of the bigger Cloud or Transformation strategy versus an integral part. As companies focus on a user in versus a technology approach to transformation - they need to put their mobility cloud strategy at the front and center. Join Jeanne Morain and special guests Jamie MacQuarrie (founder of Appivo) and Harish Sathisan (Director Mobility Avnet) for a lively discussion and insight on what a mobile first strategy means. The trio will provide best practices and prescriptive guidance on how mobility will/should affect your transformation efforts. They will give the top challenges and solutions to overcome them in the enterprise.
As the gateway to IT for most end users, service and support is the biggest driver of customer satisfaction and can generate a tremendous return on investment. IT leaders and managers who ignore these facts do so at their own peril, for the simple truth is this: the success and longevity of an IT management team are directly tied to the success of service and support. In this session, Jeff Rumburg will use benchmarking data and case studies to demonstrate the untapped value of all service and support organizations.
Digital transformation is, undoubtedly, a hot topic and an area of significant interest to organizations across the globe. It's important to remember that digital transformation means different things to different organizations and encompasses many different themes and considerations. There are, however, common areas that are imperative to any digital transformation effort. This webinar will draw upon Ovum data and analyst insights and discuss the digital transformation elements deemed important by businesses and how ITSM capabilities can help support them.
In this webcast you will learn about:
•What does it mean to digitally transform and why is it such a hot-topic at present?
•What are organizations prioritizing when it comes to digital transformation?
•How ITSM can support organizations in executing against digital transformation objectives.
•Why ITSM capabilities and practices are becoming more widely embraced in other business areas.
Many IT organizations are still struggling to achieve self-service success. Well, to be more precise, they are still struggling with end user adoption of their newly deployed self-service capability.
Why? Some causes relate to not truly understanding end user wants and needs, and issues with organizational change management (or the lack of it). But IT self-service, and every other offered service, is not provided in a vacuum - with end users’ expectations increasingly influenced by their often-superior consumer-world experiences. These consumer-world-driven expectations also apply to other organizational service providers, such as HR and facilities, making the approach to self-service capability delivery a company-wide issue whether part of an enterprise service management strategy or not.
This webinar will talk to the state of self-service success, the common issues experienced with IT self-service initiatives and what can you do to avoid them, and other good practices to employ both pre- and post-self-service go-live.
The convergence of tools and processes has been instrumental in making agile and DevOps successful. The roles and re-structuring of the organization that lead to changes in behavior are just as important, if not more so, than agile process and automated tools. Large enterprises will continue to be multi-speed/hybrid environments. In this session we examine how to make the agile and DevOps cultural change succeed in real companies.
Blue Hill recently conducted a study on the true cost of not acting on a managed mobile policy for the Enterprise. The results of this study provide a wake-up call for large enterprises that continue to approach mobile through a status-quo policy without considering the full costs from a financial, technical, logistical and strategic perspective. In our webinar we will reflect on each of these points of view as they relate to mobile, and provide an actionable plan to help you overcome what we term "Mobile Paralysis" or the barriers to implementing a truly holistic mobile policy for your organization.