Accelerating Business Service Management (BSM) Adoption to Impact

Eveline Oehrlich - Senior Analyst, Forrester Research, Inc.
Accelerating Business Service Management (BSM) Adoption to Impact the Bottom Line
Jun 2 2010
55 mins
Accelerating Business Service Management (BSM) Adoption to Impact
Join us for this summit:
More from this community:


Webinars and videos

  • Live 1 and recorded (1883)
  • Upcoming (61)
  • Date
  • Rating
  • Views
  • In this session, we’ll introduce our cloud desktop offering and discuss how businesses are using this technology to drive down support costs, improve security, and create business agility. Additionally, we will discuss some best practices around planning and implementing a cloud desktop strategy.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Presented by:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderated by:
    Ashwin Viswanath, Informatica Cloud
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Präsentiert von:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderiert von:
    Ashwin Viswanath, Informatica Cloud
  • This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

    Join this webinar on Data Protection and learn about:
    • The key features of Data Protection and how it can provide you with the security you need
    • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
    • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
    • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Channel
  • Channel profile
Up Down
  • Five Best Practices for Application-aware Network Performance Management (AANPM) Recorded: Apr 7 2014 59 mins
    Despite the fact that organizations and the network infrastructures that support them continue to grow in size and complexity, expectations regarding application performance are not being relaxed. One effective response is to establish clear and definitive visibility of application and service activity and from the network perspective.

    Application-aware Network Performance Management (AANPM) practices and products are designed specifically for such purposes, providing detailed insights into exactly who is using which resources, what quality of experience is taking place, and where to look when things go wrong. Such information can significantly improve planning, monitoring, and troubleshooting efforts.
  • End User Experience Monitoring - Real Time and Back in Time in Just a Few Clicks Recorded: Feb 12 2014 44 mins
    It’s no longer enough to understand just the health of your endpoints or even the flow of traffic across them. As the demands on IT have increased, so has the importance of understanding the true end user experience when managing and monitoring the performance of both your infrastructure and your applications. When users experience poor performance it’s crucial to have visibility into that users actual experience. Watch this on-demand webinar to learn how you can gain insight into individual user and even the individual transaction from a passive, agentless, network perspective.
  • Mitigating the Complexity of Packet Analysis in the Data Center Recorded: Jan 15 2014 60 mins
    In this on-demand webinar, we examine the challenges faced by Network Engineers when they are tasked with troubleshooting problems in the data center. At times, applications and network servers suffer poor performance and quality, requiring root cause analysis. Due to the complexity of these systems, this often requires packet-level visibility. The intermittent behavior of many of these performance problems requires 24/7 capture. The "Big Data and growing" nature of the data center makes finding network and application problems at the packet level like looking for a needle in a haystack.
  • Tips for Tackling Bandwidth Management Recorded: Dec 11 2013 34 mins
    In this 30 min. on-demand webcast you will learn about the concepts noted below and see a live demo showing how Visual TruView tackles Capacity Planning in just a few mouse clicks:

    -Understand Bandwidth Resources and Performance Tradeoffs – Bad performance does not necessarily mean that bandwidth is not sufficient. Knowing how busy links are, and for how long,is key to gauging the correlation between bandwidth and performance.

    -Use the Right Tools for the Job – Trying to detect over-utilization of bandwidth can be difficult when the tools are not well suited to the job. The key questions to answer are, has the link been over-utilized, for how long, and by what application and what end-user?

    -Account for Business Hours – Having a combination of real-time and back-in-time views allows IT to see what is happening more quickly, solve problems faster, and move on to more strategic initiatives efficiently.

    -Determine if is Bandwidth Being Used for Business? – There are two types of traffic, business and recreational. Obviously, business has priority, so it is important to know why a busy link is busy. Is it usage of a business application? Is it the breaking news story everyone is streaming to the desktop? Even if it is a business application causing congestion, does that application really need to consume that much bandwidth?

    -Streamline the Process – With networks growing quickly, the job of understanding what links are busy, when and why, gets more complex and time consuming. The amount of time taken to perform proactive capacity planning is the main reason why the job does not get done
  • El Futuro de Certificación de Cableado Estructurado Recorded: Nov 14 2013 64 mins
    Fluke Networks realizó recientemente un estudio de mercado con encuestados en todo el mundo para ver lo que realmente está pasando en las carreras y las mentes de los profesionales de cableado estructurado. Los resultados son claros: La industria está cambiando y sin pruebas y las herramientas de gestión adecuadas, dueños de negocios, gerentes de proyecto, y los instaladores de cableado caerás detrás de los tiempos. Si usted está experimentando:

    •Diversos niveles de habilidad con sus técnicos
    •Los instaladores que utilizan varios probadores y equipos para administrar las pruebas y la certificación de los trabajos
    •Establecer crece en complejidad, y sin un experto en los riesgos de instalación cometer errores costosos
    •La falta de familiaridad con los tipos de instalaciones o las normas de cableado
    Entonces usted entiende que es necesario que haya una mejor manera. El seminario web de Fluke Networks le guiará a través de nuestra investigación de la industria y proponer una solución.
  • Taking Network Testing, Troubleshooting and Documentation to the next level Recorded: Oct 8 2013 15 mins
    Learn how to take network testing, troubleshooting and documentation to the next level with the portable OptiView XG Network Analysis Tablet. See why over 157,457 people have recommended this product to their peers.
  • The Mandate for Application Awareness in Network Management Recorded: Jul 24 2013 56 mins
    For most IT organizations, the health of the network is dependent on recognizing and eliminating performance degradation. Understanding how applications are behaving on the network is critical. Often times application performance data commonly comes from disparate tools and technologies, and bringing that data together effectively is too difficult to be practical, until now. In this session we’ll focus on the needs of the network engineers, managers, and operators that must be able to recognize, characterize, troubleshoot, and communicate details of how applications and services perform as they transit the network.
  • Tired of War Room Problem Solving? Learn how to get to root cause pain free Recorded: Jun 6 2013 49 mins
    Learn how successful IT teams are gaining actionable visibility to solve network and application performance problems fast, making the “War Room” a thing of the past.

    Whether you call it a war room, tiger team or just your regular weekly meeting, IT organizations struggle to understand and agree on problem domain and root cause of application performance issues when faced with uncorrelated data, confrontation and hidden agendas. The toxic war room environment makes it difficult to solve problems quickly and efficiently and breeds long-term cooperation issues between IT teams.

    Join Fluke Networks and Chris Greer, Network and Application Analyst at Packet Pioneer who will share how correlated performance analytics and portable instrumentation that analyzes the wired and wireless infrastructure allows organizations to minimize lost revenues from performance degradation and solve problems faster by fostering collaboration across IT silos and eliminate those pesky war room meetings once and for all.
  • Are Intermittent Network Problems Playing Peek-a-boo with You Recorded: May 21 2013 30 mins
    Get a leg up on intermittent problems, watch this webinar to learn how OptiView XG v10 can inject test traffic to measure network performance, examine the traffic's impact on infrastructure, spot ongoing problems, expose intermittent issues, and map out exactly where problems are located.
  • Who Needs CSI When You’ve Got Flow Forensics to Find Performance Issues Recorded: May 21 2013 5 mins
    When a business rolls out IT systems to run its operations, the basic foundation on which the system is built is the network that carries the traffic. To be able to solve problems in such a complex environment, it's vitally important to know what is happening on the network. Whether it's the behavior of the applications, behavior of the users or rogue elements that interfere with application delivery, knowing what is going on is half the battle of solving the problem.

    This short video will discuss why having a well-designed workflow for identifying suspect traffic patterns and finding even the smallest volume of interesting data can make the difference in finding the culprit of pesky performance problems.
  • End User Experience Monitoring - Not as hard as you might think Recorded: May 9 2013 6 mins
    From infrastructure routers/switches/firewalls to load balancers, core distribution/access layers, firewalls, and multi-tier application environments, it becomes more apparent that gaining insight into how a user performs against that of their peers seems daunting.

    This short video will introduce you to the multiple embedded technologies within TruView that provide cause and affect visibility helping you to visualize end user experience.
  • 10 Gbps Performance and usability Evaluation of Visual Truview™ Recorded: Mar 6 2013 53 mins
    Fluke Networks commissioned Tolly to evaluate the effectiveness and performance of Visual TruView performance monitoring and troubleshooting at 10Gbps full line rate as well as overall usability of the solution in real-world scenarios.

    This session will review the detail of the Tolly test and performance results and include and overview demonstrating how TruView leverages key data sets such as stream-to-disk packet storage, application response time, transactional decode, IPFIX (NetFlow), and SNMP to present analytics through a single reporting interface.

    TruView watches over your global, regional, or even local groups of sites and users 24/7 by monitoring end-user experience enterprise-wide, and then visually depicting when and where problems occur.
  • Best Practices for Converging Network and Application Performance Monitoring Recorded: Feb 27 2013 63 mins
    Join Enterprise Management Associates Managing Research Director, Jim Frey, and Fluke Networks Director of Product Strategy, Doug Roberts, for a free Webinar that will examine the driving factors, objectives, requirements, and best practices surrounding converged network and application performance management.

    You will learn:
    * Ways to leverage converged data for improved efficiency and workflows
    * How advanced analytics can be even more powerful on converged data sets
    * Using converged data for more effective cross-team communication and collaboration
    * TCO benefits of converged approaches
    * And more…
  • Maintaining visibility on saturated 10Gbps link to verify app performance Recorded: Aug 14 2012 44 mins
    VoIP, Video, New Application and Virtualization all help to drive more traffic onto the network. At the same time, users are being more dispersed with their mobile devices. To ensure today’s application is operating at high performance, it is essential to know how application transverse through the network while ensuring high ROI from tools deployed. During this session, Fluke Networks introduce to you methods to effectively gain visibility of application on your saturated 10Gbps link and other parts of your network, and how the information could help you understand root cause of application problem, VoIP, Video or data, so that you could get your application performance up to the level that you and your user expect all the time even when you need to go back in time.
  • The Next Generation of Application Performance for the Cloud Recorded: Jul 11 2012 59 mins
    The cloud frees your company from the burdens of building IT infrastructure but not from the responsibility of ensuring it all works. You will still get the call when customers can’t buy products off your website or finance can’t close the quarter in your ERP system. What will you do next?

    For years enterprises have worked with network providers based on clear physical demarcation points, segmenting responsibility. That is no longer possible in today’s virtual world. We need Virtual Demarcations and the Enterprise needs a toolset to provide overall performance visibility.

    During this discussion noted industry analyst Dr. Jim Metzler will review current industry trends and best practices in managing application and network performance in a Cloud or Virtualized environments. This will be followed by an overview from Mr. Doug Roberts who will share the newest technologies that provide visibility that reaches across groups and various network infrastructure components allowing for increased IT efficiency.
  • Troubleshooting "IT" Recorded: Mar 28 2012 33 mins
    Troubleshooting ‘IT’ on the network can be complex and confusing to NOC personnel. This presentation will cover the necessary steps to be checked in order to isolate the owner of ‘IT’ and provide root cause analysis with actionable data on ‘IT.’

    Identifying the owner of what the problem is half the battle. Is ‘IT’ the Local Exchange Carrier (LEC), the Service Provider, the Client, the Application, the VoIP team, the CoS settings, or are you just bursting on the network?

    Whether you are deploying VoIP, Video, a new application, virtualization, optimization, cloud, or a new network, having a real time monitoring solution on the network as a demarcation point for segmentation of problems will set your IT department apart; and accelerate new technologies while increasing end user acceptance and satisfaction. Application monitoring tools on the network that work and can be used by many NOC personnel will allow your business to do what ‘IT’ does best…. Join me and learn how to “Troubleshoot IT.”
  • Three Places to Start Improving Application Troubleshooting in Your Company Recorded: Dec 14 2011 42 mins
    The issues IT professionals face are pretty consistent, but solving them is usually anything but easy.

    Everyone’s bandwidth is stretched to the limit and adding more resources is a tough sell. So where can you start to improve your approach to application troubleshooting?

    Join us for this 45 minute webcast where David Oliver, Senior Product Manager for Visual Network Systems will share what those critical areas are to start with AND how to get started.

    During this session learn –

    - How to look at reducing your MOOSE (cost of operating and sustaining IT)
    - Best practices for delivering projects on time and budget
    - How to better align yourself with the business (and improve the perception of IT in the process)
  • NetFlow and the Right Approach to Reporting Recorded: Nov 30 2011 53 mins
    Is Bandwidth really the name of the game?

    When troubleshooting infrastructure that impacts the NRTT component of application response time, there are several factors to consider -

    - Available bandwidth being consumed
    - QOS/COS misconfigurations
    - The number of conversations on the network that impacts devices

    During this session we will look at why NetFlow is so versatile and how to use a 'best practice' reporting structure to quickly isolate root cause and speed MTTR.
  • NetFlow und die unterschiedlichen Ansatze fur das Reporting Recorded: Nov 10 2011 30 mins
    Bandbreite ist die Frage, oder? Bei der Fehlersuche in der Infrastruktur nach der Auswirkung der NRTT Komponente auf die Antwortzeit der Anwendungen sind verschiedene Faktoren zu berucksichtigen. Auch wenn die verfugbare Bandbreite haufig die Ursache ist, gibt es andere Moglichkeiten. Falsche Konfiguration der QoS/CoS Werte konnen den Anwender stark beeinflussen. Zu viele Konversationen auf dem Netzwerk konnen Router/Switches storen. Wir werden sehen, warum NetFlow so vielseitig ist und wie wir unser Reporting nutzen konnen, um schnell die Quelle von gemeldeten Performance Problemen zu identifizieren.
  • Netflow y las diferentes formas de realizar informes de tráfico Recorded: Nov 8 2011 45 mins
    Habitualmente se considera el ancho de banda un factor clave, ¿verdad? Pero cuando se trata de resolver una incidencia relacionada con la latencia de red, hay que considerar también otros elementos. Si bien el consumo de ancho de banda a menudo es la principal causa del incremento de la latencia de red, existen otras posibles causas que hay que analizar. Por ejemplo un error de configuración de la asignación de las clases de servicio QOS/COS pueden tener un más que notable impacto sobre los usuarios. También, una elevada tasa de conversaciones (que no es lo mismo que un elevado consumo de ancho de banda), puede afectar a la electrónica de red. Durante esta sesión descubriremos por qué NetFlow es tan versátil y cómo utilizar los informes para identificar rápidamente por qué los usuarios están sufriendo problemas de rendimiento.
Fluke Networks Brand support IT professionals responsible for delivering critical business services by managing end-to-end user experience of enterprise-wide application, network and VoIP performance on both wired and wireless networks.

Fluke Networks distributes our products in more than 50 countries. More information can be found by visiting Visual Network Systems web site at:
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Accelerating Business Service Management (BSM) Adoption to Impact
  • Live at: Jun 2 2010 7:00 pm
  • Presented by: Eveline Oehrlich - Senior Analyst, Forrester Research, Inc.
  • From:
Your email has been sent.
or close
You must be logged in to email this