Display search results for ** instead (317 products)
16 Oct 2001  |  Global
Obtaining Business Value: A Critical Assessment of the TeleManagement Forums - Telecom Operations Map (TOM) and eTOM
01 Oct 2004  |  North America
10 Dec 2004  |  North America
26 Mar 2007  |  North America
The IT Infrastructure Library (ITIL) was developed in the 1980s by the Office of Government Commerce (OGC) in the United Kingdom as a business-driven approach for the governance of IT operations. The ITIL began as a set of standardized IT terminologies that are now widely accepted and used by IT organizations and vendors in many industries worldwid...
05 Oct 2007  |  North America
In this SPIE, Stratecast will examine a representative sample of recent provider developments that speak to this trend of expanding yet integrated security solution strategies. Our selected sample of providers that exemplify this strategy includes Cisco, Websense, Array Networks, and Citrix.
17 Dec 2007  |  North America
This SPIE examines a product-attached managed services solution example and Cisco's new Managed Services Channel Program as success enablers for Ciscos certified Managed Services partners.
08 Feb 2008  |  North America
09 Mar 2008  |  North America
In this SPIE, Stratecast will describe these contributing factors. We will also project how this security solution category will evolve. As attackers continue to hunt for new windows of opportunities to exploit security vulnerabilities in web applications, and enterprises seek solutions that return the best protection ROI (Return on Investment), ad...
31 Mar 2008  |  North America
Stratecast will identify the hypothetical attributes of each scenario, and characterize the causes and ongoing effects of each scenario. Stratecast's objective in analyzing the economic environment, also referred to as the remote external operating environment, is to help our clients gain early and accurate indications of which scenario more closel...
14 Jul 2008  |  North America
In this bulletin, Stratecast will describe why traditional client-based pattern matching must change to remain an effective means to protect end-user devices and the information contained within these devices. Tightly related, we will also spotlight Trend Micro's recently announced evolution in its client-based security approach to a new cloud-clie...