Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Automate SOX/PCI Breach Detection with UCMDB-CM How to Automate SOX/PCI Breach Detection with UCMDB-CM Brian Wong, Configure Consulting; Justin Harrison, Configure Consulting Recorded: Jun 27 2013 7:05 pm UTC 39 mins
    • In today’s dynamic corporate world, validating compliance requirements can be a challenge. Organizations are mandated to ensure IT compliance with an ever-growing number of internal and external requirements. Standardizing IT configurations, streamlining visibility and automating alerts can reduce time and costs associated with remediating compliance breaches. Oversights can be costly, and that’s why it is so important to choose a trustworthy and easy solution.

      This webinar will be geared to help organizations understand how they can leverage their existing CMS investments to create a single pane of glass for establishing, managing and enforcing compliance breaches across SOX, PCI and other requirements.

      You will learn how to:

      Reduce time, effort and costs associated with managing compliance requirements
      Leverage existing investment in UCMDB/DDMa/UD to help manage IT compliance requirements
      Standardize IT environment and drive changes from those standards
      Automate remediation of compliance breaches

      Read more >
    • Establishing CM on a Newly Deployed Application Environment Establishing CM on a Newly Deployed Application Environment John Hardesty, Change Manager, Ricoh Europe PLC Recorded: May 19 2010 10:00 am UTC 45 mins
    • The establishment of a Change Management process can be very complex and involved when the scope includes a newly implemented Application environment for a company.

      The transition from a project oriented management structure to a support oriented management structure for a new application environment – including the systems that provide support to the application environment – always has an interesting impact on the Change Management.

      The case study described the establishment of a Change Management process onto a new Application that is supported both by internal and external – 3rd party vendors – and all of the related issues that occur.

      John Hardesty has been fulfilling the role of IT Change Manager for different organisations since July 2002. Each company role has been a challenge and involved different areas of IT Operations.

      Read more >
    • Why ITSM needs ITAM (and vice versa!) Why ITSM needs ITAM (and vice versa!) Leslie June, Strategic Business Process Consultant, ITAM, Linium Recorded: Apr 21 2015 4:00 pm UTC 46 mins
    • The classic ITIL model includes a process function for SACM – Service Asset and Configuration Management, but what does SACM include? What is the scope of Configuration Management? What is the scope of IT Asset Management? Where is the overlap? What are the dependencies? Most importantly, how does ITAM strengthen ITSM and how does ITSM strengthen ITAM?

      - ITAM / CM Information Consumers and Providers - The 5-box model
      - When is a single instance of hardware or software an asset? A CI? Both? Neither?
      - What informational attributes provide value for the IT asset? For the CI?
      - Where does the information (data) come from and how does it get into the asset record? CI?
      - The cradle to grave lifecycle of hardware and software in the business environment
      - Communication 101
      - Keys to success – How do we exceed our expectations for ITAM / CM?

      Read more >
    • Introducing the Cloud Agent Platform Introducing the Cloud Agent Platform Alex Au Yeung, Director of Product Management, Qualys Recorded: Apr 29 2015 5:00 pm UTC 58 mins
    • Webcast highlights include learning how to:

      - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

      - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)

      Read more >
    • Corporate IT Series: IT Configuration Management in the Cloud made easy Corporate IT Series: IT Configuration Management in the Cloud made easy Chris Brightwell, Senior Engineer, Kaseya Recorded: Jul 16 2013 10:00 am UTC 34 mins
    • Register today for a new Kaseya Corporate IT Webinar and learn how a state-of-the-art configuration management (CM) system in the cloud helps you establish and maintain consistency of your IT estate in order to get the best performance out of your IT department. Learn how a CM system on the cloud gives you greater control and visibility of your systems and assets in your IT department and reduce time and resources invested in individual machines. A modern, virtualised CM tool helps corporates control IT assets and deliver a superior internal service to the rest of the company.

      Register for this webinar and learn about:

      •Best practices for identifying, assessing/approving, implementing, testing/releasing IT assets, processes and software
      •The processes and goals of IT Asset Management and Life Cycle Management
      •Improving time to market and reducing risk in operational and application changes
      •Uncovering savings through process improvement and support for strategic decision-making
      •Designing reports and releasing audits to ensure highest efficiency
      •Improving stakeholder collaboration for quicker changes and higher success rate

      Read more >
    • New! Introducing Ascentis Express 5 um HPLC Columns with Fused-Core Technology New! Introducing Ascentis Express 5 um HPLC Columns with Fused-Core Technology R. A Henry Recorded: Sep 21 2012 3:00 pm UTC 53 mins
    • Core-type particles are competing strongly with small porous particles to improve the speed and resolution of HPLC and UHPLC experiments. The pioneering Ascentis Express column with Fused-Core® 2.7µm particles has exploded in popularity because it operates more ruggedly at much lower pressure than current sub-2µm porous particles, yet delivers the same ultra-high performance. This unique performance has been largely attributed to very narrow particle size distribution. Fused-Core® design advantages have also become popular for LC-MS because Ascentis Express columns surpass performance of columns with 3µm porous particles and operate ruggedly at higher velocities and similar pressures.

      With new, narrow-distribution 5µm Fused-Core® particles, the same design advantages can now be realized over traditional 5µm and 3µm porous particles that remain very popular for HPLC columns. An Ascentis Express 5µm column brings 3µm performance and extreme ruggedness at 5µm pressures to your laboratory. Like Ascentis Express 2.7µm particles, the 5µm particles show flatter van Deemter plots than same-size porous particles and allow separation speed to be maximized with minimal loss of resolution. Extremely high plates per pressure are observed. The core-type 5µm design should replace porous 5µm columns in routine HPLC applications with traditional instruments, and should also compete with porous 3µm columns in many LC-MS applications. Performance will be compared to 5µm and 3µm particle columns, and examples of method transfer will be shown. Ascentis Express 5µm will be available in the same phase modifications as the original Ascentis Express 2.7µm ultra-high performance column. Highly stable columns are available in various IDs and lengths up to 25cm.

      Read more >
    • Service Catalog - 4 Decisions For Execution Success Service Catalog - 4 Decisions For Execution Success Ivanka Menken, Founder, The Art of Service Recorded: Nov 16 2011 7:00 am UTC 47 mins
    • What does it really take to make the execution of a service catalog a success? And what is it that the ITIL framework doesn't tell you?

      Find out in this practical and useful webinar with Ivanka Menken. Ivanka has authored over one hundred books including of some of the bestselling IT Service Management books of recent years. She writes a highly popular IT Service Management blog and is the founder of The Art of Service, a fast-growing IT Service Management education company.

      In October 2010, the itSMF USA Awarded Ivanka with the highest Professional Recognition for IT Service Management: Distinguished Professional in Service Management (DPSM CM).

      Her irrepressible speaking style and no-holds-barred blog have helped her create a large following around the world.

      Read more >
    • Is Continuity Worth It? ROI tells the story Is Continuity Worth It? ROI tells the story Phil Lambert, President, Continuity Leadership Recorded: Mar 23 2011 3:30 pm UTC 62 mins
    • Establish and demonstrate that continuity activities contribute value to a company's day to day operations.

      We do BC, DR and CM every day. We complete everything on time and within budget. We make it easy and fun for the business units to work with us. We build plans. We test plans. We train people. We empower people. But when do we measure our results? How can we measure the results? How can I create a substantially defensible measurement system that accurately conveys the value our continuity efforts are contributing to the company’s day to day operations? AND the progress we are making towards a more resilient organization?

      Every executive needs to know what the company gains by any investment they make. And one of the hardest investments to evaluate is the business continuity program. If there is a way to prove that there is indeed a return on their investment, how much more significant would our program be? Phil will explore the possibilities about whether there actually is a return on investment when investing time, energy and money in a continuity program.

      In this webinar, we will explore:
      -what is measurement, what can you measure
      -learn to discover and measure the value of intangibles
      -the difference between ROI and ROO
      -a breakthrough the measurement maze with a six step process
      -how to leverage reports to increase budgets and activity levels
      -how to continually justify the company’s investment in continuity efforts.

      Read more >