ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ServiceNow

  • Next-Generation ITAM

    Based on global research and industry expertise, find out what technology choices, processes, and policy shifts are giving front-running ITAMs the ability to keep pace with the latest digital assets.

  • Normalize Discovered Software for Effective Software Asset Management

    Software asset management (SAM) can be a frustrating process, especially when it comes to the inevitable – and painfully manual – process of normalizing inconsistent discovery tool data. Open up this best practices guide to learn more about the SAM normalization process – and why your discovery tools might be failing you.

  • The Ultimate Outage Prevention Tool – a CMDB?

    Unplanned service outages can be catastrophic, with potential costs soaring into the millions. A healthy CMDB strategy can act as a counter-measure – but how? Learn more inside.

  • 5 Steps to Successfully Deploying a Healthy CMDB

    A healthy, high-functioning CMDB doesn't happen by chance – instead, it requires some serious planning. Flip through five CMDB best practices for planning, executing, and sustaining a configuration management strategy that matches your enterprise's needs.

  • The Total Economic Impact Of ServiceNow Governance, Risk, and Compliance

    ServiceNow GRC helps organizations modernize and advance their management of corporate governance, risk, and compliance. In this Forrester Total Economic Impact study, examine the potential ROI your enterprise may realize by deploying ServiceNow GRC.

  • Security Operations Use Case Guide

    ServiceNowReacting too slowly to a critical incident can have drastic consequences. In this guide, learn how you can benefit from the workflows and automation of this SOAR platform for faster security response.

  • Today's State of Vulnerability Response: Patch Work Demands Attention

    As hackers ramp up their attacks and turn to advanced technologies such as artificial intelligence, it is essential that cybersecurity teams keep pace, fending off attacks and keeping sensitive data secure. In this research report, find a pragmatic roadmap for reducing data breaches.

  • Implementing Agile Security Response

    Data breaches constantly threaten enterprises today. The biggest challenge that organizations face is coordinating incident response across the organization. Download this resource for access to an essential security operations solution checklist to help your organization better respond to security threats and vulnerabilities.

  • The Total Economic Impact of ServiceNow IT Business Management

    Download this total economic impact study from Forrester to learn about the potential ROI of ServiceNow IT Business Management (ITBM) software and explore the benefits, costs, and risks associated with and ITBM investment.

  • 4 Transformative Best Practices for Future-Ready Customer Service Experiences

    In this analyst report from Aberdeen, discover what the best-in-class customer service organizations are doing to stay ahead. Download now to learn more about the top challenges impacting successful CX, and uncover the 4 transformational techniques to take your customer service to the next level.

  • On the Radar: ServiceNow provides unified vendor risk management with its Now Platform

    Access this paper to learn how ServiceNow's Now Platform has evolved to become a solution that can enable and support employees across an entire business with capabilities that can help them work more efficiently.

  • Transform your Business with HR Tools from ServiceNow

    Watch this brief webcast to learn about ServiceNow's HR tools, which can help you increase employee satisfaction by making it easy to get the HR services you—and your employees—need.

  • Now on Now: Governance, Risk, and Compliance

    Learn how ServiceNow uses its own GRC product to reduce 66% of Sarbanes-Oxley (SOX) administrative burden.

  • Increase Service Visibility: Single System of Record

    This e-book enables you to find out if you are dealing with limited service visibility. You will also see what a service visibility framework looks like, and get best practices to move from a manual approach to comprehensive, automated service reporting.

  • Wayfair speeds up DevOps CI/CD pipeline, cutting integration times by 95%

    Wayfair, a leading online retailer, relies on a DevOps team to deliver over 300 releases every day – or an average of one every five minutes. In this case study, learn about the monitoring tool Wayfair used to gain complete end-to-end visibility into its pipeline and operations.

  • ServiceNow Vendor Risk Management

    Download this white paper to learn about ServiceNow's Vendor Risk Management tool, which provides a means to facilitate stakeholder interactions, drive transparency and accountability, and effectively monitor vendor-related risks.

  • Plan Your Successful CMDB Deployment

    A configuration management database (CMDB) is a time-tested method for organizing configuration resources and minimizing IT downtimes. In this guide, you'll find a collection of in-depth best practices for planning, executing, and sustaining a CMDB that matches your enterprise's needs.

  • Service Visibility Best Practices

    In this white paper, learn best practices for building a configuration management database (CMDB) strategy that better aligns with business goals – and why the first step is gaining service visibility. Reading further, you'll also get a glimpse into how digital entertainment firm UbiSoft increased their own ITOM performance.

  • ServiceNow Governance, Risk, and Compliance

    Learn how your organization can identify business risks in real-time, automate third-party risks, optimize internal audit productivity, and improve strategic planning and decision making with ServiceNow's GRC approach.

  • Eliminate Business Service Outages by Moving to Service Aware IT Operations

    In this guide, find out how combining IT operations management (ITOM) and IT service management (ITSM) models can break down heavy operational siloes, giving IT teams more clarity into operations, infrastructure, and ultimately, their business impact.

  • CMDB Best Practices: From Set Up to Automated Discovery

    As if thorough infrastructure visibility wasn't hard enough to come by, many organizations are letting their CMDBs collect dust in the corner – inadvertently making infrastructure management and configuration that much tougher. In this best practices guide, learn how to keep your CMDB as current and reliable as possible.

  • How 1 Company Transformed Their HR service delivery

    Watch this webcast to learn how Hitachi Vantara eliminated their home-grown case management tools (Emails, SharePoint, etc.) and manual outdated HR processes, and provided their employees with a modernized Employee Service Center where they can get all the HR services they need in one place.

  • Hitachi Vantara Automates HR Service Delivery

    Information technology leader Hitachi Vantara suffered from a poor HR services model, lack of standard processes and documentation, and no self-service functionality. In this case study see how they used an HR platform to automate HR service delivery, allow additional enterprise-wide automation services, and more.

  • Magellan Health Deploys an Employee Service Center

    Magellan Health is known for its use of data and technology to improve healthcareand quality of life. When it came to serving its own employees, however, Magellan's HR team was not living up to employee expectations. Download this case study to discover Magellan's 12-week program for implementing an employee service center.

  • Transforming the Employee Service Experience

    This e-book provides insights collected from customers who use a ServiceNow platform to lay the groundwork for their workforce, providing a modernized way for employees to make and access HR requests. Read on to find out why businesses such as Dell, Magellan Health and United Airlines have turned to ServiceNow.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.