Business Service Management

Identity Management Standards

A Ciso Guide to Modern Security Architecture

Implementing a Fabric Architecture to Secure the Entire Organization, Meet the Demands of Compliance and Governance, and Proactively Manage Risk

Practicing Enterprise Change Management

Managing Change in Enterprise Conten

Managing Change in System Configurations

Managing Change in the Software Development Lifecycle

Examining the Nature of Enterprise Change Managemen

Enterprise Change Management

Effective Service Availability Management and Capacity Planning

Active Directory Security

Trends in Internet Access Protection for Business Integrity and Compliance

The Evolving Landscape of Protecting Internet Access

Protecting Business Internet Usage

Applying the Provisioning Technology

User Management

Provisioning and the Management of Users

Protection at the Client Level

Email Content Dangers

A Primer on BSM

Integrating BSM with ITIL and Six Sigma

Achieving IT Value

Achieving Operational Value

Achieving Management Value

End User Experience Monitoring

Implementing Business Service Management

IT Service Management Evolution

The Alignment of IT and Business

The Power of Business Service Management

Communications for the Modern Workplace

Additional Azure Services

What is Power BI?

Enterprise Automation Brings Confidence and Control to Managing File Transfers

Implementing a Sender Validation Solution in Your Company

Sender Validation Solutions

Spam and Spam Filtering Methods

Communications-Enabled Business Processes for Service and Solution Providers

Communications-Enabled Business Processes in the Enterprise Environment