service management

Results 351 - 375 of 1389Sort Results By: Published Date | Title | Company Name
Published By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: Sage People     Published Date: Nov 02, 2017
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers, data management, data center
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : 
service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management
    
newScale
Published By: newScale     Published Date: Jan 30, 2008
Many organizations implementing ITIL as part of their IT Service Management framework begin with the Configuration Management Database (CMDB). While a CMDB is a key piece of any successful ITIL implementation, there are several traps that are easily fallen into when implementing one.
Tags : 
change management, cmdb, service catalogue, service catalog, service management, itil, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management
    
newScale
Published By: newScale     Published Date: Jan 30, 2008
This white paper outlines the challenges associated with IT Request Management and ten best practices that represent the hard-won knowledge from dozens of successful Service Request Management projects. By following these guidelines, your IT organization can provide more responsive service delivery, increase operational efficiency, and improve internal customer satisfaction.
Tags : 
itil, service catalog, service catalogue, itil service catalogue, it service catalogue, best practices, service management, customer service, customer satisfaction, newscale, request fulfillment, it management
    
newScale
Published By: newScale     Published Date: Jan 30, 2008
This white paper is intended to share some of those lessons learned and suggesting ways you can achieve success by avoiding the most common pitfalls. But before we talk about the typical mistakes in creating a Service Catalog, let’s briefly review its purpose.
Tags : 
service catalog, service management, newscale, customer service, itil, v.3, itil v3, itil v.3, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management
    
newScale
Published By: newScale     Published Date: Feb 25, 2009
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) white paper introduces the Service Catalog and Service Portfolio Management processes and discusses the selection criteria for Service Catalog and Service Portfolio software solutions.Learn more today!
Tags : 
newscale, itil, cmdb, adoptability, scalability, service marketing, sla, it management
    
newScale
Published By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : 
avaya, social media, contact center, customer service, customer concern, cem, customer experience management, software development, it management, wireless, data center
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
Seven Trends Driving Effectiveness in the Contact Center
Tags : 
avaya, contact center, mobile, social media, customer service, cem, customer experience management, it management
    
Avaya
Published By: Avaya     Published Date: Dec 18, 2013
Contact Center Consumer Preference eBook
Tags : 
avaya, ebook, consumer interaction, customer. customer service, cem, performance management, it management
    
Avaya
Published By: CA SM     Published Date: Jun 02, 2008
The potential benefits of adopting a Knowledge Management strategy are significant and have far-reaching implications for a business when implemented correctly. The correct use of Knowledge Management techniques and technology makes a company agile and more responsive to the needs of the customer, resulting in enhanced business performance and greater return on investment.
Tags : 
ca sm, ca service management, service management, knowledge management, custoer service, return on investment, roi, best practices, it support
    
CA SM
Published By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : 
ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence
    
CA SM
Published By: CA SM     Published Date: Jun 02, 2008
According to industry experts, organizations that systematically manage the life cycle of their IT assets will reduce the cost per asset by as much as 30% in the first year alone. Yet today, many organizations have little or no insight into exactly what assets they own, let alone how they can optimize assets throughout their life cycle, from requisition to disposal. The same holds true for major IT investments.
Tags : 
ca service management, ca sm, asset management, it asset management, it management
    
CA SM
Published By: CA SM     Published Date: Jun 02, 2008
IT Asset Management (ITAM) is a cornerstone of IT Service Management (ITSM) yet is often omitted from existing ITSM implementations or initiatives. Version 3 of the Information Technology Infrastructure Library (ITIL) expands the processes, functions and roles in the service life cycle. However, it still does not provide enough details on key process and functional integration points for ITAM.
Tags : 
ca service management, service management, asset management, it asset management, itil
    
CA SM
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management
    
CA WA 2
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee