maturity model

Results 26 - 50 of 63Sort Results By: Published Date | Title | Company Name

A Maturity Model for Delivering Proactive Customer Service

Published By: Service Now     Published Date: Jan 26, 2018
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
Service Now

TDWI Self-Service Analytics Maturity Model Guide

Published By: MicroStrategy     Published Date: Mar 15, 2018
xxx
Tags : 
    
MicroStrategy

Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives

Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle

Insuring a Digital Future

Published By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : 
digital future, digital revolution, data integration, positioning
    
Kofax

Analytics Maturity Infographic

Published By: Looker EMEA     Published Date: Sep 27, 2017
What is your Analytics Maturity? An 'Army of Analysts' can be very powerful. The problem, of course, is that as your organisation scales, and more data requests come in, you’ll constantly be hiring more analysts (and that gets expensive!). Download this infographic to discover what your analytics maturity is, and how to move from an 'Army of Analysts' to a more efficient, scalable model.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Looker EMEA

The BDD Maturity Model

Published By: Tricentis     Published Date: Nov 15, 2018
The following maturity model is designed to help you assess your team’s progress on the journey to BDD maturity. This guide will give you a framework for understanding where your team is now on the road to BDD maturity and help you chart a direct course for taking it to the next level. The transition to BDD often comes with significant bumps in the road, but in our experience it is well worth the effort. Teams with mature BDD practices report higher levels of collaboration across functions and also tend to be more advanced in their DevOps release processes. By shifting testing left with BDD, these teams are delivering faster without sacrificing quality. By downloading this ebook, you will learn: o Five BDD maturity levels based on the adoption patterns we’ve seen among our user base and the industry at large o Strategies for achieving the significant process changes that BDD requires, both within and outside the QA team o Where your team is today and the milestones that will get you
Tags : 
    
Tricentis

A Privileged Access Management Maturity Model for Digital Transformation and Automation at Scale

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA

Privileged access management maturity model per la digital transformation

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA

Data Modeling: A Necessary and Rewarding Aspect of Data Management

Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group, business analytics
    
Burton Group

Keeping Your Head Above the Cloud: Seven Data Center Challenges to Consider Before Going Virtual

Published By: F5 Networks Inc     Published Date: Nov 20, 2008
One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center.
Tags : 
virtualization maturity, vdc maturity model, virtual data center stock, data center, iscsi, enterprise applications, storage, storage virtualization, server virtualization
    
F5 Networks Inc

Integrating Compliance with Business Strategy: The Skillsoft Compliance Maturity Model

Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft

IDC Market Spotlight - Maturity Model

Published By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
    
ServiceNow

Surfacing Critical Cyber Threats Through Security Intelligence

Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
Tags : 
cyber security, security intelligence, best practices, technology, security, business analytics, business intelligence, business technology
    
LogRhythm

The Cyber Threat Risk – Oversight Guidance for CEOs and Boards

Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control, anti spam, anti spyware, anti virus, application security, authentication, compliance, identity management, intrusion detection, intrusion prevention
    
Logrhythm

Information Quality Management (IQM): Assessing Your IQM Practice

Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements, digital universe, data hygiene best practices, data standards, data monitoring, business intelligence, application integration, data quality, content management system, data warehousing
    
Trillium Software

The LANDesk ITBM Maturity Model

Published By: LANDesk     Published Date: Jun 02, 2009
A proven framework for delivering business alignment and implementing best practices for IT service management.
Tags : 
landesk, avocent, itsm, it business management, itbm, maturity model, service management, cobit, capability maturity model integration, cmmi, cmdb, kpi, sla, business management, itil, productivity, project management, desktop management
    
LANDesk

Measuring The Value of IT Service Management, EMA Whitepaper

Published By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : 
avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla, service management
    
LANDesk

Service Management Integration - Completing the Jigsaw

Published By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : 
avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla, return on investment, web service management
    
LANDesk

Introducing A Capacity Management Maturity Model

Published By: TeamQuest     Published Date: Aug 21, 2012
The recent adoption of virtualization technologies lowers the amount of hardware required and reduces power consumption to some extent. But it also raises management complexity since there is no longer a permanent and exclusive relationship between physical resources and the software that runs on it. If you then choose to implement a Service Oriented Architecture (SOA) on top of that, the increase in complexity multiplies.
Tags : 
teamquest, capacity management. maturity model, business technology
    
TeamQuest

The Information Governance Maturity Model: A Foundation for Responding to Litigation

Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices, business intelligence
    
ARMA

Endpoint Detection and Response: Automatic Protection Against Advanced Threats

Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike

Uponor case study: On the road to marketing maturity with the Sitecore® Experience Platform™

Published By: Sitecore     Published Date: Sep 11, 2015
Download now to learn how Uponor tackled these challenges by leveraging The Sitecore® Experience Platform™ and using the Sitecore’s Customer Experience Maturity Model to create a custom marketing roadmap plan that creates extraordinary customer experiences.
Tags : 
marketing maturity, uponor, sitecore, crm, customer experience, digital presence, sitecore, content management system, information management, search engines, cloud computing, content management
    
Sitecore

Seven steps to achieving better requirements engineering in your organization

Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications, business management, business process management, customer relationship management
    
IBM

Decrease Costs, Streamline Maintenance, and Operate Efficiently

Published By: IBM     Published Date: Nov 08, 2012
This ESG white paper outlines the Virtualization Maturity Model, how virtualization can decrease costs, its impact on storage, and what challenges comes with it.
Tags : 
server virtualization, ibm stormwize, v7000, ibm stormwize, server, data management, business technology, virtualization, cloud computing
    
IBM
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.