378 Results Found
How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more agile? The answer is to use program management that is designed to be agile.
Business and IT alignment is not a one-and-done thing. On the contrary, business strategies and goals continually evolve and cascade down to more specific needs throughout the enterprise — including IT. To stay aligned with the business, the IT side of the house should consistently ensure that it and the business both understand what outcomes are desired in strategic, tactical, and operational contexts. At the same time, IT should build up the disciplines required to enable — and ultimately track — those outcomes.
Creativity is the “due diligence” of effective problem analysis. It is through creativity that the best possible solution for a problem is discovered. Without creativity, decisions are often one-dimensional, superficial, and near-sighted.
Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”
Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?
A brief introduction to the basics of penetration testing.
When a decision matters, there are certain steps you will want to follow. In this white paper, we provide guidelines for approaching decisions. The steps in this white paper are a series of interconnected techniques used in problem analysis and decision making.
Company reputation damage, financial loss and compromised intellectual property are just a few of the major issues that need to be conveyed and clearly understood. Collaboration and education throughout an organization are key to facing and overcoming the devastating effects of a data breach. Learn the issues, how to educate employees companywide and help your leaders move forward quickly with a cybersecurity action plan.
The methods we have used in the past to secure our networks won’t work for tomorrow’s networks. Cloud-based applications and multi-tenant environments require greater scalability, agility and control. Software-defined networking (SDN), such as that provided by VMware NSX, can deliver a new platform that transforms networking and provides for much more specific control of the security of your data and networked applications. In this white paper, author Bill Ferguson describes the microsegmentation of security and illustrates how you can use NSX to provide security that works on today’s and tomorrow’s networks.
Understand the two training options to prepare for the CCNA Routing and Switching certification - traditional and accelerated. Global Knowledge allows you to learn at your pace. The traditional training path features two courses, ICND1 and ICND2, and ten days of training. The accelerated training path combines the content found in ICND1 and ICND2 into a single 5 day course, the CCNAX Routing and Switching Boot Camp. Learn which option is best for you.