content it microsoft information technology cloud agile strategy ibm mobile security technology cio cio business vision research drp collaboration service management data hp infrastructure project management ppm compliance mcafee sharepoint analytics it operations governance change management management itil development audit bcp cisco oracle virtualization testing symantec project portfolio management resource management implementation communication big data team alignment project telephony sophos process email mdm byod vdi disaster recovery service desk integration retention disaster recovery plan risk bpm ecm project manager automation information security scrum pmo planning business intelligence reporting data integration optimization waterfall workflow deployment social sap product owner emc steering committee architecture business process management risk management metrics data security outsourcing vmware barracuda availability infrastructure management training stakeholder infor performance application integration crm sdlc emm data audit data management help desk data quality crisis management business continuity management business continuity plan bcm business continuity blackberry google ai project prioritization scrum master vendor landscape facebook costs desktop virtualization vendor selection linkedin prevention data leakage prevention portfolio management analysis program blogging web content filtering data warehouse enterprise mobility management people social media communication plan application iaas outsource storage restore business contingency plan documentum platform business strategy contingency plan service catalog policy controls internal controls regulation data governance risk assessment kpi consolidation check point blog bi burndown chart application development it infrastructure problem management social-media implement deploy sprint feedback backup citrix erp innovation cms data compliance disruptive technology teamware applications co-location requirements service plan communications budget trend micro portfolio systems management fortinet monitoring ios prioritization trustwave upgrade it strategy ivr endpoint protection enterprise service bus ciso server management enterprise risk management project management office team-collaboration knowledgebase twitter interface hybrid business-continuity-plan instrumentation threat disaster recovery it budget policies web native consumerization business analysis business disaster-planning disaster-recovery-planning data stewardship self-service enterprise applications application performance management resilience apm websense asset management service level agreement sam b2b cmdb cloud security engagement content-management data trust android uc charter data availability allocation bpms managed services continuous integration resourcing api network management vendor management infrastructure as a service data-center tco review middleware eai esb collaboration-tools ca technologies cobit service-oriented architecture apps dell secure the cloud regression testing incident management data integration vendor integration project etl appraisal enterprise application integration salesforce simulation application rationalization it-strategy vulnerability capacity planning dashboard records-management knowledge management trends application lifecycle intrusion internet of things assure compliance sarbanes oxley regulatory requirements idps external compliance pci dss sox organizational structure pci spear phishing web-2 tape offsite-storage downtime disk bulk licensing customer relationship management clearswift consumer-technology leadership colocation human resources information ea decision making spam intake email security phishing customer-relationship-management seg esg security analytics opentext master data management autonomy budgeting customer-experience process automation technology content management virtual desktop infrastructure alm itsm enterprise architecture operating model hyper-v customer experience exchange process automation cots consolidate disasters brm pair programming email gateway application portfolio stakeholder buy-in business-continuity pilot security email gateway software testing system center juniper business-continuity-planning forms virtual vsphere framework social-computing developer information security risk management voip asset disaster-recovery unified-communications sharepoint-2010 bmc performance management business-analyst moss data strategy mobile device management e-mail it director mobile platforms application virtualization roadmap network security contract vendor relationship data center disaster-plan marketing enterprise-content-management social-networking business value kanban refactoring hr sage dynamics windows collective ownership strategic-planning disaster-recovery-plan variance test driven development incident social-network device data flow visual-studio programming linq customization resource-planning problem resolution tco-assessment enterprise-resource-planning annual-audit tco-calculator resource nuxeo enterprise-resources personal-mobile mobile-platforms iphone •ecm mobile-management personal-devices apple alfresco part time banking time flex time off job sharing personal days vacation flexible hours telework telecommuting compressed work week flex time reduced hours flexible work arrangement phased retirement floater days flex hours shift swaps flexible works benefits fwa customize customer next-generation firewall anti-malware hcm security information and event management business requirements consulting intrusion detection and prevention anti-virus workforce management extreme programming (xp) vcloud virtual machine private cloud hypervisors public affairs community outreach measurement socially responsible business environmentally friendly charity csr corporate social responsibility shortlist preparation csr strategy adp extra-organizational units workshop capabilities shadow organizations strategic partner it challenges transition plan organizational design email calculator proofpoint email analysis email acceptable use hyland laserfiche perceptive process workers email requirements call center hris contact center csm talent management multichannel customer service representative customer service agent case management user interface kronos apache hadoop hive reprimand manager praise performance performance management coach trainer manager training career coaching coachable moments grow model counsel goals counseling learning coachee coaching operations management uptime root cause analysis stack proactive problem management system management byon byoe ceridian byoa identity human resources management end point vendor selection tool display protocol desktops desktop refresh igel payroll chippc hypervisor ncomputing vendor 10zig vendor selection criteria thin clients pig flume mapreduce time and attendance hdfs sqoop individually-liable-devices simpana security-policy security-incident policy-management policy-development data-security-standards policy-implementation policy-writing acceptable-use-policy contingency-plans it-security contingency security-incident-management employee-policy data-security policy-enforcement contingency-plan incident-reporting 64-bit med-v vista desktop-virtualization ips ids intrusion-prevention intrusion-detection-system intrusion-detection idp intrusion-prevention-system arcserve rto data-protector netbackup rgo evaluate deduplication rpo commvault data-protection-manager select backup-exec networker infopath eforms lincdoc forms-services chat discussion-forums instant-messaging im pattern web-conferencing video subscription web-20 lotus weblog social-networks blogs byoc mobile-workers ipad eod software-deployment microsoft-windows windows-xp windows-7 windows-vista 32-bit drp-test disaster-recovery-team disaster-back-up disaster-backup dr-planning forms-automation process-automation acrobat -livecycle business-forms liquidoffice business-process formatta perfectforms pdf build-vs-buy co-location-vendor-selection friendster email-marketing e-mail-marketing myspace micro-blogging volume-licensing microsoft-licensing enterprise-agreement microsoft-volume-licensing licensing-agreements select-agreement subscription-licensing open-agreement licensing-agreement windows-sharepoint-server online-collaboration 37-signals collaborate real-time-collaboration collaboration strategy enterprise social collaboration social collaboration microsoft licensing microsoft contract social media and customer social media and business data-center-co-location co-location-site-visit-checklist co-location-vendor-selection-criteria data-center-backup co-location-site-visits data-center-co-location-rfp build-server-room build-or-buy co-location-vendors co-location-rfp buy-vs-build build-versus-buy data-center-availability co-location-selection-tool zimbra email-storage gordano crm-vendor-selection customer-analytics customer-data customer-experience-management customer-loyalty customer-care customer-data-integration-mobile-crm crm-vendors customer-relationship customer-master-data customer-information-management xenapp presentation-virtualization terminal-services xendesktop virtual-desktop session-virtualization virtualization-licensing quickr collaborative-technologies teaming jive-software dr recovery-objective recovery-time-objectives recovery-point-objective recovery-objectives recovery-point-objectives continuity email-switching email-deployment lotus-notes e-mail-migration email-system-integrators email-migration-strategy google-apps webex email-platform vista-upgrade project-management-benefits project-management-planning-and-monitoring-tool project-management-tool project-manager it-project-management project-management-tools project-managers it-project-managers project-management-maturity project-management-methodologies project-management roi ipt telecom voice-over-ip ip-telephony business-case telecommunications functional-testing-tools manual-testing business-activity-monitoring web-content documents records electronic-document-management content-management-system records-retention data-retention document-management office-xp application-upgrade upgrades adoption microsoft-office-2007 ms-office office-suites ooxml office-open-xml paperless-office microsoft-office office-2010 internal-cloud utility-infrastructure virtual-machine-manager red-hat esx analytics-tools virtual-desktops predictions 2011 mobile-devices control information-architecture portal file-system sharepoint-2007 information-management extranet govern intranet rim smart-mobile-devices software-testing quality-assurance-testing performance-testing integration-testing usability-testing acceptance-testing qa types-of-testing functional-testing regression-testing automated-functional-testing-tool automated-functional-testing system-integration-testing unit-testing qa-testing esxi rhel xen hyperv server-virtualization essentials evaluation it-skills employee-performance job-skills performance-assessment steering-committees membership steering-committee it-steering-committee council strategic planning-council project-prioritization steering-group project-teams evaluation-team mandate strategies help-desk-assessment help-desk-management help-desk-maturity scalix smartphone bring-your-own tablet employee-owned contact-center mobile-applications customer-interaction-management support call-center customer-service performance-assessments it-staff-performance-metrics relationship skills employee-performance-evaluation-program forced-ranking staff-performance-metrics poor-performance performance-manager performance-improvement-plan greenhouse-gas green-it carbon-footprint carbon green cooling energy-efficiency hvac carbon-emissions crac ghg measuring sustainability business-requirements gathering-requirements success business-analysts barriers bam business-process-modeling business-process-management help-desk help-desk-turnover help-desk-capacity-deskside help-desk-triage help-desk-staffing-ratio help-desk-metrics help-desk-staffing help-desk-tenure help-desk-performance exchange-server-2003 microsoft-exchange-server-2003 exchange-2003 microsoft-exchange exchange-server microsoft-exchange-server exchange-server-2007 microsoft-exchange-2007 exchange-2007 microsoft-exchange-server-2007 microsoft-exchange-2010 exchange-2010 security as a service new security solutions internet of things security new threats software defined resourcing new technology kaseya kace manageengine footprints techexcel sysaid remedyforce zendesk samanage agiloft architecture principles business technology principles guiding principles enterprise architecture principles enterprise principles ea principles test plan test maturity test effectiveness quality assurance test training test strategy test efficiency defect prevention it planning imperatives corporate initiatives understand the business corporate objectives decode the corporate strategy botnet cyber insurance secure future bring your own technology encryption vulnerability open source vulnerability ddos attack point of sale attacks emergency response plan desk staff application disposition renovate agile charter migration replatform impact analysis technical complexity retire mobileiron soti airwatch mcm smartphones good technology tablets merger merger and acquisition corporate merger m&a due diligence plans crisis crisis management plan emergency response standard operating procedure infrastructure operations service transition cab change advisory board dw data modelling data model warehouse modelling information management mis benefits benefits delivery it benefits benefits management benefits realization benefits realization management project benefits sop target cost capital cost financial budget presentation annual budget data integration tool master data management solution master data data integration solution data integration tools data sharing data integration software data integration suites data dictionary mdm solution data migration elt mapping global data synchronization knowledge transfer lifecycle disciplined agile delivery safe dad scalable agile framework stakeholders optimize printing printer cost consolidate printers printers printer consolidation reduce printing end user survey unified communications devops operations continuous delivery project costs cost reduction forecasting cost tracking operating cost succession prioritize communicate update awareness make the case assess policy suite enforce nist iso 27001 develop it skills structure organizational sketch span of control design business-it alignment stakeholder analysis org design strategic growth roles and responsibilities data roles and responsibilities data health data sources project capacity agile portfolio sprint planning project portfolio network network management vendor vendor relations multi-sourcing network services paas secure paas cloud vendor relationship secure iaas cloud risk profile cloud vendor management platform as a service cloud security governance policy management policy lifecycle management internal control service level vendor sla service level management sla slm prepare contain recover use case analyze eradicate operate post-mortem response detect skype dirsync o365 office lync active directory federation services 365 business innovation chief innovation officer it innovation specialization data center integration service alignment business unit cost-to-serve service provider shared services business unit focus competency-based center project portfolio manager project reporting demand cost optimization capacity resource planning resource optimization supply resource strategy service level expectation three sixty five ticket incendent cherwell ad hoc file transfer managed file transfer mft secure file transfer file share server to server infotech info-tech applications department cto productivity employee engagement security budget service manager infrastructure and applications managers software agreements bpi next generation soc ad fs office 365 adfs radware huawei corero intel security detection indicators value metrics program it training security training security education training program cyber security security awareness security awareness training frontrange servicenow landesk omninet it security people management wireless lan wi-fi wireless network lan network refresh wifi staffing hiring learning and development workforce location-based services nfc augmented reality mobile smart object hippa confirm compliance full-scale ttx passive testing disaster recovery testing preparedness data policies business plan acquisition mergers action plan merger & acquisition mergers and acquisitions buy-in mergers & acquisitions acquisitions leadership brand motivation inspiration leadership skills conflict resolution people leadership strategic time management talent time management leading roi on leadership meetings emergency response plan failover bicc organization structure bicoe cost and benefit analysis and application functionality stakeholder management resource capacity approval request strategic alignment sa visio software asset management core cal software assurance negotiation server sql server purchase volume licensing innovator it-led innovation parallel tabletop exercise tabletop planning failback active testing pass audit downgrade findings remit findings hipaa auditor architect capability togaf virtual desktop workspace desktop as a service desktop daas implement desktop virtualization gap analysis head of bi bi operating model passwords smart cards multi-factor authentication soft tokens two-factor authentication biometrics landline calls physical tokens sms salesforce.com customer service data issues stale data invalid data data conflict / conflicting data data duplication poor data incomplete data endpoint encryption kaspersky lumension endpoint anti-malware google sites program management project success jd edwards nav sage 500 gp epicor peoplesoft unit4 sage 300 enterprise resource planning ax oracle peoplesoft cloud erp microsoft dyamics hana oracle ebs workday one time passwords out of band passphrases arkoon cost saving artifact infrascale filelocker accellion citrix sharefile hightail dropbox google drive yousendit cloud file sharing enterprise collaboration egnyte box microsoft onedrive cfs sugarsync file sharing file transfer service management implementation implementation planning service management planning service management roadmap stormshield srx fortigate ngfw palo alto asa 5500-x series ngfw e-nsa series ng firewall watchguard sonicwall pa series next generation firewall nsa series data exchange business-to-business protocols data types b2b standards transparency it-business relationship business expectations reliability software development life cycle service management plan requirements gathering requirements management elicitation standard operating procedures validation rational pro babok business analyst requirements optimization center of excellence user authentication advanced threat reduction advanced endpoint profiling network access control post admission rechecking nac aruba help desk and self-service remediation location restrictions endpoint baselining extreme mobile centric controls filenet m-files tool bi standardization bi strategy deployment management release and deployment release management scope business goals organizational objectives parametric estimation cocomo ii delphi bottom-up expert estimation software maintenance budget top-down pricing to win true planning slim lines of code bradford artificial intelligence futurism robotics wearable technology virtual assistants swot wearable devices nanotechnology disruption wearables mobility windows phone mobile device bid vendors purchasing procurement rfp rfi rfq submission project failure security event management arcsight security incident event management netiq log collector security incident management solarwinds sem splunk rsa logrhythm collection aggregation tibco sim service operations service restoration critical incidents service resolution msp managed service providers 3d printing mitigation law evaluation of internal controls integrity coverage data theft asset security data leakage dlp data loss protection asset protection data protection data loss prevention data privacy privacy cybersecurity digital asset security data control absolute software swg web content filters secure web gateway access management adminitrative investment application maintenance reactive maintenance triage proactive maintenance ineffective resourcing adaptive maintenance system integration corrective maintenance end exit outsourcing terminate agreement terminate outsourcing improvement self-organization scalability iteration user story confidentiality web monitoring customer-centric customer alignment borland automated seapine parasoft issue tracking qa wizard pro unit testing micro focus visual studio test generation ide saas software change and configuration management subversion sccm application lifecycle management rational configuration management system configuration management database configuration management zscaler web filtering web control blue coat gateway wcf it asset software asset eam ham licesing itam workflows bpm solutions select and implement it and customer align it with the real end customer prototypes end users customers solution design customer feedback innovate organizational change manage change resistance data analysis performance measurement data mining sprout social attensity sysomos customer engagement social media management platform adobe sas lithium social media management platforms instagram viralheat smmp security testing functional testing memory testing survivability testing microsoft excel implementation roadmap tool css html meap languages javascript hosted application security software as a service saas security cloud contract data center capacity infrastructure-as-a-service downsize condense data architecture data management strategy data virtualization change managing change organizational change management ocm test lab bpm strategy business process improvement process improvement process optimization continuous process improvement business workflows bpm tools service catalog implementation service catalog design service record catalog service catalogue catalogue insurance policy scoping business process metadata 2014 tags: outsourcing services hide details published: june 28 costing 2013 last revised: september 5 gesture testing load testing network testing battery testing responsiveness testing interruption testing compatibility testing test automation scalability testing recovery testing ebola ebola virus disease evd personal cloud user groups workforce computing bring your own device devices stage gate application portfolio management pitfalls execution cost model
See more