ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ServiceNow

  • Revolutionizing the Employee Service Experience at Arrow Electronics

    Arrow Electronics had recently experienced a steady period of growth and needed an HR service delivery upgrade. They decided to implement the Employee Service Delivery solution from ServiceNow. Learn about Arrow’s experience and the benefits they realized with ServiceNow in this case study.

  • Deliver high-performance business services with visibility and AIOps

    Poke around this resource center from SearchITOperations to read, watch, and learn more about how AIOps delivers intelligent operational capabilities and enhanced visibility to once traditional IT operations.

  • Your Third-party Risk Management Best Practices Need Updating

    Traditional best practices for third-party risk management are leaving organizations vulnerable. In this e-guide, learn how to improve accuracy of security questionnaires, interview third-party employees about risk and rethink third-party risk management best practices in this changing threat landscape.

  • The Top 9 ITSM Offerings Stacked Up: Who's Leading the Pack?

    In this analyst report, find out how the top nine ITSM tools on today's market stack up against one another. Explore the strengths, cautions, and adoption trends around each offering to get a better idea which one matches the needs of your I&O team – and which ones to avoid.

  • Combining GRC programs with BC and DR

    In this e-guide, explore the tools used for gathering critical data and discover why Governance, risk management and compliance (GRC) and Business continuity (BC) teams should collaborate to concentrate their efforts in order to build a comprehensive data privacy program.

  • Configuration Management: Addressing GRC Challenges

    Configuration management enables security teams to configure, update and patch systems more efficiently. In this e-guide, dive deeper into configuration management to learn some the key features, benefits, and how it can improve governance, risk management and compliance (GRC).

  • ServiceNow adds mobile app to 'New York' Now Platform

    ServiceNow rolled out the latest version of its flagship Now Platform highlighted by a mobile application that allows remote users to access core capabilities of the enterprise workflow product. Learn about it in this expert guide.

  • Why is Third-party Risk Management Essential to Cybersecurity?

    With organizations increasing their reliance on third-party service providers, developing a security strategy that extends beyond their immediate network perimeter is essential to a strong defense. In this e-guide, learn the basics of third-party risk management and what organizations can do meet these challenges.

  • Risk Management: 3 Security Changes to Consider for Cloud Adoption

    According to Nemertes Research, this is the year most workloads will be in the cloud versus in on-premises data centers. While the benefits of cloud services can’t be overlooked, these changes also present a security risk. In this e-guide, uncover the 3 changes IT professionals should consider in order to manage third-party risk.

  • The New Era of Personal Data Privacy Policy

    GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.

  • Leaving Legacy ITSM Kits is Easier Than You Might Think

    Old-school ITSM tools can be inflexible and inefficient, resulting in clunky and highly siloed service workflows. Find out how to start taking steps to ditch your organization’s legacy ITSM tool for one that supports organization-wide digital transformation objectives.

  • Making it #EasyForEmployees: Voice of Customer II

    In this eBook, ServiceNow highlights companies around the world defining the digital employee experience in their organization.

  • The Employee Experience Imperative (Research Report)

    Download ServiceNow’s latest research report, “The Employee Experience Imperative,” which is the most comprehensive study to date on the topic – to learn about employees’ perceptions of their experience at work.

  • Using AIOps and Cognitive Patterns to Optimize Operations

    As IT operations teams continually find themselves weighed down by increased service complexity, AIOps might be the secret to keep everyone’s head above water. Flip through this info-brief from IDC to learn where AIOps tools and practices come into play within typical ITOps silos.

  • Using SAM to Build Your CMDB

    Jump inside this guide to learn how to use the architecture of SAM platforms as a framework for the creation and maintenance of a CMDB – and as IT asset volume grows, how to keep it as scalable and accurate as possible.

  • Using ITAM to Improve Strategic Stakeholder Management

    As a practice, IT asset management (ITAM) is gaining momentum. Inside this 23-page guide, step through the profiles of key ITAM stakeholders to find best practices and suggestions to help earn their engagement.

  • Building a Strong and Effective Incident Response Plan

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • Accelerating Security Response

    While financial institutions have always been aware and working on reducing threats, new challenges continue to emerge, making it ever harder to keep managing risks and resources in this critical area. In this white paper, learn about some of these new challenges and how financial institutions are leveraging ServiceNow to address them.

  • Efficient Threat Remediation with Check Point and ServiceNow

    Discover how security administrators can create, orchestrate, and efficiently process block list requests for malicious sites using ServiceNow Security Operations and Check Point Next Generation Threat Prevention Gateways.

  • How to Improve Your Security Incident Response Process

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • How to Modernize Your Vulnerability Management Program

    Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.

  • Protect Against Phishing with Microsoft Exchange and ServiceNow

    With the widespread use of phishing as a method of attack, SOC teams struggle to identify true phishing emails that have slipped through to users’ mailboxes and contain the threats they create. In this solution brief, discover how to protect against phishing with Microsoft Exchange and ServiceNow.

  • SOAR vs. SIEM: Commonalities and Differences

    While some IT shops could get away with using a SIEM or a SOAR tool, they are best deployed as complementary products. Although these tools have major commonalities, they also have distinct differences. In this e-guide, learn all about the key similarities and differences in SIEM and SOAR.

  • How AIOps Can Help IT be a Better Partner to the Business

    Meeting SLA's, addressing outages and service degradations are crucial to building and sustaining the trust of the business in the IT organization. Read this paper to learn how AIOps can help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.