In this session Richard Josey will explore the key considerations when implementing or adapting a Change Management process. The following key questions will be addressed:
How do we make sure our change management process is appropriate?
How do we get the intended benefits from our Change Management Process?
How do we embed Change Management in our organization?
What else do we need to consider? How does Change relate to other processes, such as Configuration Management.
Why can’t we still be more successful in rooting out issues and getting them fixed for good? We still talk about Problem management being the great opportunity to step up and improve overall service quality – why don’t more organisation make this happen successfully?
Maybe its about how we view what problem management actually is and what is need to do it. The key word here is Management – ie not just process or procedure. We need to understand the key element required for delivery in order to make this successful and this session provides practical guidance on how to identify and deliver these things.
Problem Management is a game changer. It is critical in developing real quality in service delivery. However, very few organisations actually get this aspect of ITSM working well.
This fourth session in the ITSM Goodness series will look at how we spend too much time focussing on efficient ‘fire-fighting’ (Incident Management), rather than looking at avoiding recurrence or eradicating faults altogether - ultimately a better solution for customer and provider alike. Often there are some simple misunderstandings around what Problem Management is or what is required to make it work. Also it can be difficult to find the right people to make Problem Management happen, particularly as it is not a simple linear process that can be ‘industrialised’ like Incident Management. This session provides simple clear guidelines on what is needed and how to make Problem Management work well for your organisation.
This 8-part monthly series is designed to provide real-time value to newcomers and take to the next level those already familiar with the approach.
ITSM Goodness is an approach created by Barclay Rae to deliver practical, proven, successful and accessible advice and guidance for ITSM and IT professionals. The focus is clear and simple – on achieving the right business outcomes from IT, and how this is delivered, via the Customer Experience.
Watch Gartner VP and Distinguished Analyst, Mark Beyer, along with Informatica VP of Product Marketing, Awez Syed, as they discuss big data management.
Big data offers new opportunities and new challenges. Gartner has stated, “Through 2018, 70% of Hadoop deployments will fail to meet cost savings and revenue generation objectives due to skills and integration challenges.” But a new class of big data management solutions is enabling organizations to consistently and reliably meet business demands and deliver business value. Capabilities like self-service data preparation combined with common sense approaches to data security, data governance, and metadata management can enable organizations to turn big data into big value.
Join this webinar to learn some of the opportunities of big data management with Gartner’s Mark Beyer and learn how Informatica’s Big Data Management solution can help your organizations turn more data into business value without more risk from Informatica's Awez Syed.
Efficiency, speed and accuracy are critical capabilities for any help desk service manager. And while there is no doubt your staff is intelligent, that needs to be paired with service desk software that allows them to be intelligent super heroes. Learn why cognitive intelligence can assist IT and business users to complete tasks faster and improve productivity and agility throughout the service management processes and experiences. Important capabilities such as virtual chat, smart recorder, knowledge article checks and categorization proposals are essential components to be intelligent software that supports your intellectual workforce.Read more >
If you are finding it difficult to convince your upper management that knowledge management done well will benefit your organization, then this 45-minute webinar is a MUST-ATTEND event for you and your team!Read more >
Your journey to cloud can take many forms. For example, you may move your whole data center or just single applications and databases. You may move existing solutions or build new green-field ones on the cloud, such as Hadoop implementations and data lakes. And you may evolve into a cloud-only architecture or one that’s a hybrid mix of multiple platforms on clouds and on premises. All of these journeys involve a migration of massive amounts of diverse data, and so require substantial data management infrastructure, tools, and best practices, during both development and production. TDWI’s Philip Russom will tell you what data management best practices to pack for success in your journey to cloud, regardless of the path you take.Read more >
As companies grow and change in today’s dynamic business and technical environment the need to control and manage application(s) investment and usage is increasingly critical to an organization’s success. How to get this control and management becomes a pressing issue for many companies whether their applications are on site or cloud based.
Using a tailored enterprise specific approach, EmpoweredAPM expands CA PPM to provide clients with deep insight into how their application portfolios are performing, including an application’s business capabilities, value, health, risks, inter-relationships/dependencies, supporting products, total cost of associated services, and other key information related to their current and future software applications.
Please join us for a webinar on Wednesday, October 28th where EmpoweredAPM will demonstrate how enterprises can leverage CA PPM (Clarity) to provide effective application portfolio management through the integration of control and management.
At the end of the Webinar, you will be able to answer the question: How can your business achieve control, management, and cost effectiveness or your suite of applications, now and in the future to reduce you total cost of services supported by SW Applications?
Take your digital strategy to the next level with new API management capabilities.
Leading analysts have recognized that robust API management is now fundamental to the delivery of a modern digital platform. To reflect this, Gartner released its first-ever Magic Quadrant for Full Life Cycle API Management in October 2016 to replace the existing Magic Quadrant for Application Services Governance. Clearly, the role of API management has grown both in prominence and scope.
Join this webinar to learn:
- What “full life cycle API management” means to your organization
- Why expanding the role of API management delivers more business value
- How to evaluate the new capabilities of full life cycle API management
All viewers will also benefit from a complimentary copy of Gartner’s Magic Quadrant for Full Life Cycle API Management, in which CA Technologies was named a leader and achieved the highest overall position for its ability to execute.
Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud.
Customers need to know if there is a consistent way to handle this across all their cloud services.
In this webinar Adrian Lane (Securosis) and Peter Galvin (Thales e-Security) will discuss challenges specific to multi-cloud key management and why customers may need something different than the native encryption options offered by their cloud providers. They will help you select the right strategy from the many possible combinations, how each customer requirement maps to different deployment options, and what to look for in a key management system.
Financial institutions are constantly seeking to better serve their customers and maintain a competitive edge through new technology innovations and digital transformation initiatives, yet they often fall behind on delivering these new innovations into production.
Network and security operations teams are often hampered by manual, slow and error-prone security policy change management processes, and the ever-increasing demands of industry regulations. It often takes several days, or even weeks to process a single change across a complex enterprise environment, which often needs hundreds of these changes each month, directly impacting time-to-market.
Geared towards the specific challenges of financial institutions, this webinar will provide technical best practices for managing network security policy changes while reducing risk and enforcing compliance and will cover:
•Key industry metrics that compare security environments in and outside the finance industry.
•The state of network security and management challenges
•How to overcome security management complexity with automation
•How to address the ever-increasing demands of the financial industry regulations
In part three of our “Digital Ready” series, we will discuss the trends we are seeing in the marketplace and the strategic changes needed to create a Digital Service Organization that is ready to compete in this new environment.
During our session we will review the results from our recent Digital Readiness Survey and discuss the implications for 2016. We will also discuss how, if, and where the SMACK stack is relevant and what are the essential Digital Service Management systems that are needed to excel in the new world of digital. And we will close by previewing the Unisys People Computing Productivity Index which allows you to benchmark yourself in 4 key areas to understand where you are at today in providing support in the new Digital Generation Era and the people who make it go.
Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.
Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
• How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
• Dealing with Windows 10 cumulative updates
• Handle large updates in bandwidth constrained environments
• Support for AWS Marketplace, Mac application metering and profile management
• Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
• Enhanced support for Ghost Solution Suite
• Network discovery support via Simple Network Management Protocol v3
• Off-box data migration and much more
We look forward to having you for this live session.
Discover how Channel Data Management (CDM) can help you increase revenue and reduce costs!Read more >
Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.
Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.
In this technical webinar Edy will focus on:
•Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
•Mapping security vulnerabilities to their applications to assess and prioritize risk
•Enable SOC engineers to tie cyber-attacks to business processes
•Migrating Firewall policies between firewall brands
•Performing a fully automated, zero-touch security policy change
Major incidents are characterized by a high level of complexity and high priority to the business. The resolution of these mandates a team of specialists with diverse skills and extensive communication both within the team of resolvers and with the users. If you have the right set of people, processes and technology in place, a major incident need not result in confusion and chaos. The true essence of major incident management lies in not only in quick and efficient resolution of major incidents, but also in creating and delivering value within the team and outside it. In this engaging webinar, Richard Josey, Service Management Architect, discusses the operational and psychological dimensions of major incident management and highlights the key areas that organizations need to work on to ensure that they have efficient mechanisms in place to tackle major incidents.Read more >
In part two of our series on “Being Digital Ready,” we take a look at the traditional service management disciplines of Incident and Problem Management and how you can take advantage of latest technologies and expertise to increase your ability to support, restore, and prevent interruptions to your service portfolio.
Join us as we discuss the new Unisys Service Desk Optimization package for ServiceNow with Jeff Petti, Sr. Offering Architect, Unisys ServiceNow Solutions. We will dive in to what these features provide to both the end users as well as level 1 support teams in requesting, handling, and managing incidents on the ServiceNow Enterprise Cloud Platform.
We will then progress and discuss Problem Management as a “best practice” with Eva Csongradi of the Unisys Service Management Office, on the importance of a dedicated Problem Management Practice and the associated benefits.
We will conclude our discussion by taking Problem Management to the predictive phase with Edward Chavis, of the Big Data Analytics Practice, where we will discuss the potential for Predictive Problem Management and anticipating and resolving issues before they become incidents.
We interviewed Jackson Shaw; Senior Director, Product Management, Identity & Access Management at Dell and delved further into the topic of Privileged Access Management.Read more >
Learn how to reduce risk and add value to the business through effective Change Management implementation. Troy DuMoulin, ITIL Expert with Pink Elephant, and Carlos Bernal, ITSM Leader with Cherwell, will provide practical advice on how successful IT organizations establish effective Service Transition processes such as Change & Release Management, while balancing both risk and speed.Read more >
Have you ever wondered how people view your CMDB? CMDBs have many users from different groups all with their own needs and perspectives. The better these needs are served the higher the value of your Configuration Management process and CMDB is to your organization.
This session will explore the different stakeholders in Configuration Management and how this affects your process and CMDB design.