<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://web.resource.org/cc/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" version="2.0">

  <channel>
    <atom:link href="https://rss.libsyn.com/shows/35847/destinations/91054.xml" rel="self" type="application/rss+xml"/>
    <title>ITS Partner's Video Podcast</title>
    <pubDate>Mon, 01 Dec 2025 13:00:50 +0000</pubDate>
    <lastBuildDate>Mon, 01 Dec 2025 13:00:50 +0000</lastBuildDate>
    <generator>Libsyn RSSgen 1.0</generator>
    <link>http://www.itsdelivers.com</link>
    <language>en</language>
    <copyright>Copyright 2019©  ITS Partners, LLC. All rights reserved.  ITS and the ITS Logo are trademarks or registered trademarks of ITS Partners, LLC.  All product information is subject to change without notice.</copyright>
    <docs>http://www.itsdelivers.com</docs>
    <itunes:summary>Hello. We're ITS. We believe that the best IT advisors to work with are practitioners who have lived in your customer’s shoes. People who know their stuff. People who will get their hands dirty. People who care about outcomes. That’s the team we’ve built at ITS. We are seasoned ITAM and Security professionals working with platform consultants and developers. More at www.itsdelivers.com</itunes:summary>
    <image>
      <url>https://static.libsyn.com/p/assets/c/9/d/2/c9d2879fea3ececabafc7308ab683e82/Profile_Picture.png</url>
      <title>ITS Partner's Video Podcast</title>
      <link><![CDATA[http://www.itsdelivers.com]]></link>
    </image>
    <itunes:author>ITS Partners</itunes:author>
		

    <itunes:image href="https://go.itsdelivers.com/hubfs/ITS-Partners.png"/>
    <itunes:explicit>no</itunes:explicit>
    
    <description><![CDATA[We're an IT consulting company.  But we specialize in helping large IT organizations that are trying to meet the service demands of a highly consumerized workforce but find themselves bogged down in the mundane, time-consuming side of IT management. We created a maturity model we call Productive IT Management that helps large organizations get to a higher level of productivity in key IT functions under Service Management, Asset Management, Endpoint Management, & Risk Management.]]></description>
    
    <itunes:type>episodic</itunes:type>
    

    <itunes:keywords>ITS,Partners,Partners,Symantec,Altiris,ServiceNow,Fritz,Byam,Josh,Bernson,Troy,Whittaker,Chad,Dupin,Asset,Management,CMDB,Security,Consulting,IT,Information,Technology</itunes:keywords>

    

    
    <podcast:locked owner="info@itsdelivers.com">no</podcast:locked>
    
    
    
    
    
    <itunes:subtitle>ITS Partners</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"><itunes:category text="Business News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:owner><itunes:email>cdupin@itsdelivers.com</itunes:email><itunes:name>ITS Partners</itunes:name></itunes:owner><item>
      <title>HAMx Visibility; Reporting on Hardware Assets for Everyone from Analysts to CEOs</title>
      <itunes:title>HAMx Visibility; Reporting on Hardware Assets for Everyone from Analysts to CEOs</itunes:title>
      <pubDate>Wed, 25 Aug 2021 16:30:19 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d658150b-72e1-430f-97ed-46a795d17b90]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/hamx-visibility-reporting-on-hardware-assets-for-everyone-from-analysts-to-ceos]]></link>
      <description><![CDATA[<p>Reporting is the backbone of any business initiative, and Hardware Asset Management is no exception. This video will discuss how HAMx reporting with ServiceNow gives organizations essential performance metrics that support a proactive, optimized Hardware Asset Management (HAM) practice.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Reporting is the backbone of any business initiative, and Hardware Asset Management is no exception. This video will discuss how HAMx reporting with ServiceNow gives organizations essential performance metrics that support a proactive, optimized Hardware Asset Management (HAM) practice.</p>]]></content:encoded>
      
      
      <enclosure length="269667657" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webinar_-_082521_-_HAMx_Logo_Sting.mp4?dest-id=91054"/>
      <itunes:duration>21:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/9/3/e/e93e731ab7fed707e5bbc093207a2619/Screen_Shot_2021-08-25_at_12.21.52_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Ben LaChance</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Reporting is the backbone of any business initiative, and Hardware Asset Management is no exception. This video will discuss how HAMx reporting with ServiceNow gives organizations essential performance metrics that support a proactive, optimized Hardware Asset Management (HAM) practice.</itunes:subtitle><itunes:summary>Reporting is the backbone of any business initiative, and Hardware Asset Management is no exception. This video will discuss how HAMx reporting with ServiceNow gives organizations essential performance metrics that support a proactive, optimized Hardware Asset Management (HAM) practice.</itunes:summary></item>
    
    <item>
      <title>Service Graph Success with Armis and ITS</title>
      <itunes:title>Service Graph Success with Armis and ITS</itunes:title>
      <pubDate>Tue, 17 Aug 2021 12:43:36 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1d81db7a-d71e-40c3-996a-3a3b9170bae9]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/service-graph-success-with-armis-and-its]]></link>
      <description><![CDATA[<p>Service Graph Connectors are the new best practice for populating your ServiceNow CMDB, but many factors in your environment could hinder their success. In this video, we'll use the Service Graph Connector for Armis as an example, present common pitfalls that can hinder successful imports, and we'll demonstrate the ITS Service Graph Readiness Tool as a way to report those issues and make them easier to remediate.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Service Graph Connectors are the new best practice for populating your ServiceNow CMDB, but many factors in your environment could hinder their success. In this video, we'll use the Service Graph Connector for Armis as an example, present common pitfalls that can hinder successful imports, and we'll demonstrate the ITS Service Graph Readiness Tool as a way to report those issues and make them easier to remediate.</p>]]></content:encoded>
      
      
      <enclosure length="112104773" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webinar_-_081721_-_Armis__ITS_Youtube.mp4?dest-id=91054"/>
      <itunes:duration>12:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/e/1/1/3e118618921cb1f8d959afa2a1bf1c87/Screen_Shot_2021-08-17_at_8.35.48_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Jay Wigard</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Service Graph Connectors are the new best practice for populating your ServiceNow CMDB, but many factors in your environment could hinder their success. In this video, we'll use the Service Graph Connector for Armis as an example, present common pitfalls that can hinder successful imports, and we'll demonstrate the ITS Service Graph Readiness Tool as a way to report those issues and make them easier to remediate.</itunes:subtitle><itunes:summary>Service Graph Connectors are the new best practice for populating your ServiceNow CMDB, but many factors in your environment could hinder their success. In this video, we'll use the Service Graph Connector for Armis as an example, present common pitfalls that can hinder successful imports, and we'll demonstrate the ITS Service Graph Readiness Tool as a way to report those issues and make them easier to remediate.</itunes:summary></item>
    
    <item>
      <title>The Unsung Hero, How HAMx can improve the life of an Asset Manager</title>
      <itunes:title>The Unsung Hero, How HAMx can improve the life of an Asset Manager</itunes:title>
      <pubDate>Thu, 17 Jun 2021 15:55:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d1f2bab3-e1ed-4ee3-a033-68d44d49d8df]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/the-unsung-hero-how-hamx-can-improve-the-life-of-an-asset-manager]]></link>
      <description><![CDATA[<p>As an Asset Manager, are you competing for time or investment with others in your organization? Can you collect accurate information to secure the ITAM investment you need? HAMx will allow you to operate with agility, control cost and risk and gain complete visibility. We know how to get you back on track! HAMx is best practice.</p> <p>Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Check out to see how HAMx can improve the life of an Asset Manager.</p> <p>Featured speakers:</p> <ul> <li>Chelsea Parker, Business Process Consultant</li> <li>Eric Pett, Business Process Consultant</li> <li>India Tellkamp, Partner Relationship Manager</li> </ul>]]></description>
      
      <content:encoded><![CDATA[<p>As an Asset Manager, are you competing for time or investment with others in your organization? Can you collect accurate information to secure the ITAM investment you need? HAMx will allow you to operate with agility, control cost and risk and gain complete visibility. We know how to get you back on track! HAMx is best practice.</p> <p>Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Check out to see how HAMx can improve the life of an Asset Manager.</p> <p>Featured speakers:</p> <ul> <li>Chelsea Parker, Business Process Consultant</li> <li>Eric Pett, Business Process Consultant</li> <li>India Tellkamp, Partner Relationship Manager</li> </ul>]]></content:encoded>
      
      
      <enclosure length="113464149" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_061721_HAMx_Webinar_Asset_Manager_Persona.mp4?dest-id=91054"/>
      <itunes:duration>13:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/b/3/4/9b34cdfb024036c8e5bbc093207a2619/Screen_Shot_2021-06-17_at_11.44.17_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Chad Dupin</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>As an Asset Manager, are you competing for time or investment with others in your organization? Can you collect accurate information to secure the ITAM investment you need? HAMx will allow you to operate with agility, control cost and risk and gain complete visibility. We know how to get you back on track! HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Check out to see how HAMx can improve the life of an Asset Manager. Featured speakers: Chelsea Parker, Business Process Consultant Eric Pett, Business Process Consultant India Tellkamp, Partner Relationship Manager</itunes:subtitle><itunes:summary>As an Asset Manager, are you competing for time or investment with others in your organization? Can you collect accurate information to secure the ITAM investment you need? HAMx will allow you to operate with agility, control cost and risk and gain complete visibility. We know how to get you back on track! HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Check out to see how HAMx can improve the life of an Asset Manager. Featured speakers: Chelsea Parker, Business Process Consultant Eric Pett, Business Process Consultant India Tellkamp, Partner Relationship Manager</itunes:summary></item>
    
    <item>
      <title>HAMx in Action, A Demo of ITS' newest Hardware Asset Management program</title>
      <itunes:title>HAMx in Action, A Demo of ITS' newest Hardware Asset Management program</itunes:title>
      <pubDate>Wed, 05 May 2021 18:04:59 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[fbbe69a9-2a7c-4970-9aef-c9419e406b27]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/hamx-in-action-a-demo-of-its-newest-hardware-asset-management-program]]></link>
      <description><![CDATA[<p>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Watch our On-Demand recording to see HAMx in Action: A Demo of ITS' newest Hardware Asset Management program.</p> <p> </p> <p>HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Watch our On-Demand recording for a live demo of HAMx! Featured speakers:</p> <ul> <li>Paul Dixon, Vice President of Sales</li> <li>Ben LaChance, Technical Consulting Manager</li> </ul> <p>more at www.itsdelivers.com/hamx</p>]]></description>
      
      <content:encoded><![CDATA[<p>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Watch our On-Demand recording to see HAMx in Action: A Demo of ITS' newest Hardware Asset Management program.</p> <p> </p> <p>HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Watch our On-Demand recording for a live demo of HAMx! Featured speakers:</p> <ul> <li>Paul Dixon, Vice President of Sales</li> <li>Ben LaChance, Technical Consulting Manager</li> </ul> <p>more at www.itsdelivers.com/hamx</p>]]></content:encoded>
      
      
      <enclosure length="846237925" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_050521_HAMx_Demo.mp4?dest-id=91054"/>
      <itunes:duration>25:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/8/c/c/88cc56229100fc66a04421dee9605cbd/Screen_Shot_2021-05-05_at_11.50.47_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Ben LaChance</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Watch our On-Demand recording to see HAMx in Action: A Demo of ITS' newest Hardware Asset Management program.   HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Watch our On-Demand recording for a live demo of HAMx! Featured speakers: Paul Dixon, Vice President of Sales Ben LaChance, Technical Consulting Manager more at www.itsdelivers.com/hamx</itunes:subtitle><itunes:summary>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Watch our On-Demand recording to see HAMx in Action: A Demo of ITS' newest Hardware Asset Management program.   HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Watch our On-Demand recording for a live demo of HAMx! Featured speakers: Paul Dixon, Vice President of Sales Ben LaChance, Technical Consulting Manager more at www.itsdelivers.com/hamx</itunes:summary></item>
    
    <item>
      <title>Turn your hardware asset chaos into bottom line impact with HAMx</title>
      <itunes:title>Turn your hardware asset chaos into bottom line impact with HAMx</itunes:title>
      <pubDate>Wed, 31 Mar 2021 00:04:43 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c677145c-1686-4f97-a57c-4b55c0fd2e1f]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/turn-your-hardware-asset-chaos-into-bottom-line-impact-with-hamx]]></link>
      <description><![CDATA[<p>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation.</p> <p>Join ITS, as we introduce HAMx; a rapid, modular Hardware Asset Management program built on ServiceNow. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Join us to learn more!</p> <p>Featured speakers:</p> <ul> <li>Josh Bernson, Chief Technology Officer</li> <li>Paul Dixon, Vice President of Sales</li> <li>Yvette Mathews, Vice President of Services</li> </ul> <p>more at <a href= "https://www.itsdelivers.com/hamx">www.itsdelivers.com/hamx</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation.</p> <p>Join ITS, as we introduce HAMx; a rapid, modular Hardware Asset Management program built on ServiceNow. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Join us to learn more!</p> <p>Featured speakers:</p> <ul> <li>Josh Bernson, Chief Technology Officer</li> <li>Paul Dixon, Vice President of Sales</li> <li>Yvette Mathews, Vice President of Services</li> </ul> <p>more at <a href= "https://www.itsdelivers.com/hamx">www.itsdelivers.com/hamx</a></p>]]></content:encoded>
      
      
      <enclosure length="120296198" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/033121_HAMx_Webcast_Final.mp4?dest-id=91054"/>
      <itunes:duration>10:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/c/7/f/3c7f2a9ee803e100/Screen_Shot_2021-03-30_at_7.55.54_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Josh Bernson</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Join ITS, as we introduce HAMx; a rapid, modular Hardware Asset Management program built on ServiceNow. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Join us to learn more! Featured speakers: Josh Bernson, Chief Technology Officer Paul Dixon, Vice President of Sales Yvette Mathews, Vice President of Services more at www.itsdelivers.com/hamx</itunes:subtitle><itunes:summary>Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Join ITS, as we introduce HAMx; a rapid, modular Hardware Asset Management program built on ServiceNow. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Join us to learn more! Featured speakers: Josh Bernson, Chief Technology Officer Paul Dixon, Vice President of Sales Yvette Mathews, Vice President of Services more at www.itsdelivers.com/hamx</itunes:summary></item>
    
    <item>
      <title>Remote-User Asset Management with AMI and ITS Partners</title>
      <itunes:title>Remote-User Asset Management with AMI and ITS Partners</itunes:title>
      <pubDate>Fri, 19 Mar 2021 14:54:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[77d35fd4-9d51-4ea5-88d8-468bae18203c]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/remote-user-asset-management-with-ami-and-its-partners]]></link>
      <description><![CDATA[<p>Join ITS and AMI as they host a discussion around how to automate tracking in ServiceNow to have employees attest to what they have and what can be returned! Many asset managers are struggling with hardware assets that went home during the pandemic. Not only do they not know what they have or where it is, but they also don't know what or how to manage it.</p> <p>This webinar will help you know what your employees have, where it is, and what you need to manage the hardware life cycle. Tom Watson, CEO and founder of AMI, and Yvette Mathews, VP of Services at ITS, will demonstrate how asset managers can automate tracking in ServiceNow to have employees attest to what they have and also know what can be returned, or even what to do to get ready for the return to the office. This adds process control to your asset management and data & analytics that can help manage compliance requirements.</p> <p>Featured speakers:</p> <ul> <li>Yvette Mathews, ITS Partners, Vice President of Services</li> <li>Tom Watson, AMI, CEO & Founder</li> </ul> <p>More at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Join ITS and AMI as they host a discussion around how to automate tracking in ServiceNow to have employees attest to what they have and what can be returned! Many asset managers are struggling with hardware assets that went home during the pandemic. Not only do they not know what they have or where it is, but they also don't know what or how to manage it.</p> <p>This webinar will help you know what your employees have, where it is, and what you need to manage the hardware life cycle. Tom Watson, CEO and founder of AMI, and Yvette Mathews, VP of Services at ITS, will demonstrate how asset managers can automate tracking in ServiceNow to have employees attest to what they have and also know what can be returned, or even what to do to get ready for the return to the office. This adds process control to your asset management and data & analytics that can help manage compliance requirements.</p> <p>Featured speakers:</p> <ul> <li>Yvette Mathews, ITS Partners, Vice President of Services</li> <li>Tom Watson, AMI, CEO & Founder</li> </ul> <p>More at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="250700531" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webinar_031821_Final.mp4?dest-id=91054"/>
      <itunes:duration>26:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/a/a/b/aaab4172c00c54ea/Screen_Shot_2021-03-17_at_11.14.42_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Yvette Mathews</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Join ITS and AMI as they host a discussion around how to automate tracking in ServiceNow to have employees attest to what they have and what can be returned! Many asset managers are struggling with hardware assets that went home during the pandemic. Not only do they not know what they have or where it is, but they also don't know what or how to manage it. This webinar will help you know what your employees have, where it is, and what you need to manage the hardware life cycle. Tom Watson, CEO and founder of AMI, and Yvette Mathews, VP of Services at ITS, will demonstrate how asset managers can automate tracking in ServiceNow to have employees attest to what they have and also know what can be returned, or even what to do to get ready for the return to the office. This adds process control to your asset management and data &amp; analytics that can help manage compliance requirements. Featured speakers: Yvette Mathews, ITS Partners, Vice President of Services Tom Watson, AMI, CEO &amp; Founder More at www.itsdelivers.com</itunes:subtitle><itunes:summary>Join ITS and AMI as they host a discussion around how to automate tracking in ServiceNow to have employees attest to what they have and what can be returned! Many asset managers are struggling with hardware assets that went home during the pandemic. Not only do they not know what they have or where it is, but they also don't know what or how to manage it. This webinar will help you know what your employees have, where it is, and what you need to manage the hardware life cycle. Tom Watson, CEO and founder of AMI, and Yvette Mathews, VP of Services at ITS, will demonstrate how asset managers can automate tracking in ServiceNow to have employees attest to what they have and also know what can be returned, or even what to do to get ready for the return to the office. This adds process control to your asset management and data &amp; analytics that can help manage compliance requirements. Featured speakers: Yvette Mathews, ITS Partners, Vice President of Services Tom Watson, AMI, CEO &amp; Founder More at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Reduce IT Spend with ServiceNow Asset Management Solutions</title>
      <itunes:title>Reduce IT Spend with ServiceNow Asset Management Solutions</itunes:title>
      <pubDate>Wed, 17 Feb 2021 21:17:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[cb1f9ccd-bfd7-4803-a66c-95b25fda3f12]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/reduce-it-spend-with-servicenow-asset-management-solutions-0]]></link>
      <description><![CDATA[<p>Watch ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your Enterprise Organization. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video, you will learn how:</p> <ol> <li>To reduce IT cost</li> <li>To minimize risk by increasing visibility into cloud-based and physical assets</li> <li>The Content Service Library can assist with the automation of models and product lifecycles</li> <li>To quickly gain a return on investment for your organization using out of the box ServiceNow solutions with HAM and SAM applications</li> </ol> <p>more at <a href="https://www.itsdelivers.com/hamx" target= "_blank" rel="noopener">www.itsdelivers.com/hamx</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>Watch ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your Enterprise Organization. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video, you will learn how:</p> <ol> <li>To reduce IT cost</li> <li>To minimize risk by increasing visibility into cloud-based and physical assets</li> <li>The Content Service Library can assist with the automation of models and product lifecycles</li> <li>To quickly gain a return on investment for your organization using out of the box ServiceNow solutions with HAM and SAM applications</li> </ol> <p>more at <a href="https://www.itsdelivers.com/hamx" target= "_blank" rel="noopener">www.itsdelivers.com/hamx</a></p>]]></content:encoded>
      
      
      <enclosure length="358609428" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/021721_Webinar_Final_Production.mp4?dest-id=91054"/>
      <itunes:duration>30:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>10</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/a/c/7/dac78647f4a54676/Screen_Shot_2021-02-17_at_3.38.08_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Kathleen Bailey</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Watch ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your Enterprise Organization. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video, you will learn how: To reduce IT cost To minimize risk by increasing visibility into cloud-based and physical assets The Content Service Library can assist with the automation of models and product lifecycles To quickly gain a return on investment for your organization using out of the box ServiceNow solutions with HAM and SAM applications more at www.itsdelivers.com/hamx</itunes:subtitle><itunes:summary>Watch ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your Enterprise Organization. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video, you will learn how: To reduce IT cost To minimize risk by increasing visibility into cloud-based and physical assets The Content Service Library can assist with the automation of models and product lifecycles To quickly gain a return on investment for your organization using out of the box ServiceNow solutions with HAM and SAM applications more at www.itsdelivers.com/hamx</itunes:summary></item>
    
    <item>
      <title>Reduce IT Spend with ServiceNow Asset Management Solutions</title>
      <itunes:title>Reduce IT Spend with ServiceNow Asset Management Solutions</itunes:title>
      <pubDate>Thu, 12 Nov 2020 00:48:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0812e762-ffa5-4a29-bc1b-cc639dfe8438]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/reduce-it-spend-with-servicenow-asset-management-solutions]]></link>
      <description><![CDATA[<p>ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your enterprise.</p> <p>Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise.</p> <p>In this video you will learn how to:</p> <ol> <li>Reduce IT Cost.</li> <li>Reduce risk by increasing Visibility into digital and physical assets.</li> <li>Automate the Full Life Cycle Management of digital and physical assets.</li> </ol> <p>Learn more at www.itspartners.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your enterprise.</p> <p>Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise.</p> <p>In this video you will learn how to:</p> <ol> <li>Reduce IT Cost.</li> <li>Reduce risk by increasing Visibility into digital and physical assets.</li> <li>Automate the Full Life Cycle Management of digital and physical assets.</li> </ol> <p>Learn more at www.itspartners.com</p>]]></content:encoded>
      
      
      <enclosure length="545244336" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webinar20-2011112020-20Asset20Management.mp4?dest-id=91054"/>
      <itunes:duration>41:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>12</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/4/f/4/24f44137dc755d36/Webinar_111120_Video.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Yvette Mathews</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your enterprise. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video you will learn how to: Reduce IT Cost. Reduce risk by increasing Visibility into digital and physical assets. Automate the Full Life Cycle Management of digital and physical assets. Learn more at www.itspartners.com</itunes:subtitle><itunes:summary>ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your enterprise. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video you will learn how to: Reduce IT Cost. Reduce risk by increasing Visibility into digital and physical assets. Automate the Full Life Cycle Management of digital and physical assets. Learn more at www.itspartners.com</itunes:summary></item>
    
    <item>
      <title>How to quickly achieve measurable and sustainable results from your ServiceNow VR Program</title>
      <itunes:title>How to quickly achieve measurable and sustainable results from your ServiceNow VR Program</itunes:title>
      <pubDate>Wed, 14 Oct 2020 18:43:25 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b29ab758-106d-4777-9b04-0d4fed62d95a]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/how-to-quickly-achieve-measurable-and-sustainable-results-from-your-servicenow-vr-program]]></link>
      <description><![CDATA[<p><strong>Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time.</strong></p> <p>Vulnerability remediation is an arduous process, from tracking progress through spreadsheets and hunting for patches, to manually grouping threats and validating successful remediations - managing your vulnerability response is a pain. After years of helping organizations overhaul their VR, ITS Partners looked at the top qualities of our most successful VR projects. We began to ask, "What is the essential VR workflow that would help IT and SecOps departments rapidly optimize their vulnerability response?"</p> <h4>The answer is ITS Partners' Prescriptive Vulnerability Response™ </h4> <p>The team from ITS Partners discusses our new offering, Prescriptive Vulnerability Response™ (PVR). Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. It sets the stage for future advances in VR maturity. We use our years of experience in vulnerability management to thoughtfully craft a prescriptive VR implementation that eliminates the guesswork and delivers results, fast.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time.</p> <p>Vulnerability remediation is an arduous process, from tracking progress through spreadsheets and hunting for patches, to manually grouping threats and validating successful remediations - managing your vulnerability response is a pain. After years of helping organizations overhaul their VR, ITS Partners looked at the top qualities of our most successful VR projects. We began to ask, "What is the essential VR workflow that would help IT and SecOps departments rapidly optimize their vulnerability response?"</p> The answer is ITS Partners' Prescriptive Vulnerability Response™ <p>The team from ITS Partners discusses our new offering, Prescriptive Vulnerability Response™ (PVR). Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. It sets the stage for future advances in VR maturity. We use our years of experience in vulnerability management to thoughtfully craft a prescriptive VR implementation that eliminates the guesswork and delivers results, fast.</p>]]></content:encoded>
      
      
      <enclosure length="244074934" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/On-Demand_PVR_Webcast.mp4?dest-id=91054"/>
      <itunes:duration>23:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>11</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/6/5/e/b65ef0d06c8ceeca/Screen_Shot_2020-10-14_at_2.28.35_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Josh Bernson</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. Vulnerability remediation is an arduous process, from tracking progress through spreadsheets and hunting for patches, to manually grouping threats and validating successful remediations - managing your vulnerability response is a pain. After years of helping organizations overhaul their VR, ITS Partners looked at the top qualities of our most successful VR projects. We began to ask, "What is the essential VR workflow that would help IT and SecOps departments rapidly optimize their vulnerability response?" The answer is ITS Partners' Prescriptive Vulnerability Response™  The team from ITS Partners discusses our new offering, Prescriptive Vulnerability Response™ (PVR). Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. It sets the stage for future advances in VR maturity. We use our years of experience in vulnerability management to thoughtfully craft a prescriptive VR implementation that eliminates the guesswork and delivers results, fast.</itunes:subtitle><itunes:summary>Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. Vulnerability remediation is an arduous process, from tracking progress through spreadsheets and hunting for patches, to manually grouping threats and validating successful remediations - managing your vulnerability response is a pain. After years of helping organizations overhaul their VR, ITS Partners looked at the top qualities of our most successful VR projects. We began to ask, "What is the essential VR workflow that would help IT and SecOps departments rapidly optimize their vulnerability response?" The answer is ITS Partners' Prescriptive Vulnerability Response™  The team from ITS Partners discusses our new offering, Prescriptive Vulnerability Response™ (PVR). Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. It sets the stage for future advances in VR maturity. We use our years of experience in vulnerability management to thoughtfully craft a prescriptive VR implementation that eliminates the guesswork and delivers results, fast.</itunes:summary></item>
    
    <item>
      <title>Elite Security Intelligence for Smarter Vulnerability Management</title>
      <itunes:title>Elite Security Intelligence for Smarter Vulnerability Management</itunes:title>
      <pubDate>Thu, 23 Jul 2020 15:18:56 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7b1d3fe9-2c90-4bfd-ba53-be72f3ae86d5]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/elite-security-intelligence-for-smarter-vulnerability-management]]></link>
      <description><![CDATA[<p><span class="style-scope yt-formatted-string" dir="auto">In this video Recorded Future's Senior Partner Architect, Wendy Swank, and ServiceNow's Manager, Solution Consulting ITx, Security & Risk Manager, Syra Arif, will demonstrate how to:</span></p> <ul> <li><span class="style-scope yt-formatted-string" dir= "auto">Prioritize vulnerabilities quickly and accurately with unprecedented intelligence</span></li> <li><span class="style-scope yt-formatted-string" dir= "auto">Automate vulnerability threat data collection</span></li> <li><span class="style-scope yt-formatted-string" dir="auto">Use risk scores to focus patching efforts and prevent attacks</span></li> <li><span class="style-scope yt-formatted-string" dir="auto">Reduce risk by monitoring relevant vulnerabilities</span></li> <li><span class="style-scope yt-formatted-string" dir="auto">Set up alerts for vulnerabilities that affect your tech stack</span></li> <li><span class="style-scope yt-formatted-string" dir= "auto">Transforming all sources into actionable intelligence</span></li> <li><span class="style-scope yt-formatted-string" dir= "auto">Vulnerability enrichment</span></li> <li><span class="style-scope yt-formatted-string" dir= "auto">Minimize expensive off-cycle patches.</span></li> </ul> <p><span class="style-scope yt-formatted-string" dir="auto">Want to more about how ITS Partners, Recorded Future, and ServiceNow™ can help your organization? Reach out to us at</span> <a class= "yt-simple-endpoint style-scope yt-formatted-string" dir="auto" spellcheck="false" href= "https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbm0wOGVkNmZ5MzI4MDMtYzI4YWFGX0RyUklPQXxBQ3Jtc0tuWlpybnIxUVo2LVJiaVZCNk5zYnZTZTFaQmt2bTdubVJXZnJEUFN6OWtoN3g2MnJMVTBBSzBpcDNlTnBoaXZxSzJpWFpGcFQ5SDB3NHlzWFMtd1Z6Rk9Obnc2R05zeFc1X3F6c3daMXAzaUNJSzRvYw%3D%3D&q=https%3A%2F%2Fwww.itsdelivers.com%2Fcontact&v=Nkia4ugjAog" target="_blank" rel= "nofollow noopener">https://www.itsdelivers.com/contact</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video Recorded Future's Senior Partner Architect, Wendy Swank, and ServiceNow's Manager, Solution Consulting ITx, Security & Risk Manager, Syra Arif, will demonstrate how to:</p> <ul> <li>Prioritize vulnerabilities quickly and accurately with unprecedented intelligence</li> <li>Automate vulnerability threat data collection</li> <li>Use risk scores to focus patching efforts and prevent attacks</li> <li>Reduce risk by monitoring relevant vulnerabilities</li> <li>Set up alerts for vulnerabilities that affect your tech stack</li> <li>Transforming all sources into actionable intelligence</li> <li>Vulnerability enrichment</li> <li>Minimize expensive off-cycle patches.</li> </ul> <p>Want to more about how ITS Partners, Recorded Future, and ServiceNow™ can help your organization? Reach out to us at <a class= "yt-simple-endpoint style-scope yt-formatted-string" dir="auto" spellcheck="false" href= "https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbm0wOGVkNmZ5MzI4MDMtYzI4YWFGX0RyUklPQXxBQ3Jtc0tuWlpybnIxUVo2LVJiaVZCNk5zYnZTZTFaQmt2bTdubVJXZnJEUFN6OWtoN3g2MnJMVTBBSzBpcDNlTnBoaXZxSzJpWFpGcFQ5SDB3NHlzWFMtd1Z6Rk9Obnc2R05zeFc1X3F6c3daMXAzaUNJSzRvYw%3D%3D&q=https%3A%2F%2Fwww.itsdelivers.com%2Fcontact&v=Nkia4ugjAog" target="_blank" rel= "nofollow noopener">https://www.itsdelivers.com/contact</a></p>]]></content:encoded>
      
      
      <enclosure length="392331718" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Elite_Security_Intelligence_for_Smarter_Vulnerability_Management.mp4?dest-id=91054"/>
      <itunes:duration>32:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>10</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/4/7/5/0475977d13ae11da/Elite_Security_Intelligence_for_Smarter_Vulnerability_Management_1920x1080.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video Recorded Future's Senior Partner Architect, Wendy Swank, and ServiceNow's Manager, Solution Consulting ITx, Security &amp; Risk Manager, Syra Arif, will demonstrate how to: Prioritize vulnerabilities quickly and accurately with unprecedented intelligence Automate vulnerability threat data collection Use risk scores to focus patching efforts and prevent attacks Reduce risk by monitoring relevant vulnerabilities Set up alerts for vulnerabilities that affect your tech stack Transforming all sources into actionable intelligence Vulnerability enrichment Minimize expensive off-cycle patches. Want to more about how ITS Partners, Recorded Future, and ServiceNow™ can help your organization? Reach out to us at https://www.itsdelivers.com/contact</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video Recorded Future's Senior Partner Architect, Wendy Swank, and ServiceNow's Manager, Solution Consulting ITx, Security &amp; Risk Manager, Syra Arif, will demonstrate how to: Prioritize vulnerabilities quickly and accurately with unprecedented intelligence Automate vulnerability threat data collection Use risk scores to focus patching efforts and prevent attacks Reduce risk by monitoring relevant vulnerabilities Set up alerts for vulnerabilities that affect your tech stack Transforming all sources into actionable intelligence Vulnerability enrichment Minimize expensive off-cycle patches. Want to more about how ITS Partners, Recorded Future, and ServiceNow™ can help your organization? Reach out to us at https://www.itsdelivers.com/contact</itunes:summary></item>
    
    <item>
      <title>Quickly put out fires with an​ exposure assessment using ServiceNow's SecOps &amp; SAM Modules</title>
      <itunes:title>Quickly put out fires with an​ exposure assessment using ServiceNow's SecOps &amp;amp; SAM Modules</itunes:title>
      <pubDate>Wed, 17 Jun 2020 21:32:44 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6da184ed-3330-424a-adf6-69f581dbc466]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/quickly-put-out-fires-with-an-exposure-assessment-using-servicenows-secops-sam-modules]]></link>
      <description><![CDATA[<p>In this video, the teams from ITS Partners and ServiceNow will discuss using ServiceNow's SecOps and SAM modules to put out fires with an exposure assessment.</p> <p>With the COVID-19 landscape becoming the "new normal", attacker groups have been quick to capitalize on the chaos. Targeted campaigns are exploiting high-risk vulnerabilities, masked under the guise of the Centers for Disease Control (CDC) and the World Health Organization (WHO).</p> <p>How should you react?<br /> Does your security team immediately go into a fire-fighting mode?<br /> You're not alone. Organizations may take up to 3-4 weeks to scan the entire network to even know the risk exposure – with severe threats on the horizon, that's too much lost time.</p> <p>Eric Roberts, Business Process Consultant, Jeff Tomsik, Pre Sales Consultant at ITS, Ray Chung, Advisory Solutions Consultant at ServiceNow, and Joe Pizzo, Senior Advisory Solution Architect at ServiceNow, will explain how your team can utilize the ServiceNow Vulnerability Response & Software Asset Management modules to quickly find vulnerable systems and address risk, ahead of your attackers.</p> <p>more at: www.itspartners.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video, the teams from ITS Partners and ServiceNow will discuss using ServiceNow's SecOps and SAM modules to put out fires with an exposure assessment.</p> <p>With the COVID-19 landscape becoming the "new normal", attacker groups have been quick to capitalize on the chaos. Targeted campaigns are exploiting high-risk vulnerabilities, masked under the guise of the Centers for Disease Control (CDC) and the World Health Organization (WHO).</p> <p>How should you react? Does your security team immediately go into a fire-fighting mode? You're not alone. Organizations may take up to 3-4 weeks to scan the entire network to even know the risk exposure – with severe threats on the horizon, that's too much lost time.</p> <p>Eric Roberts, Business Process Consultant, Jeff Tomsik, Pre Sales Consultant at ITS, Ray Chung, Advisory Solutions Consultant at ServiceNow, and Joe Pizzo, Senior Advisory Solution Architect at ServiceNow, will explain how your team can utilize the ServiceNow Vulnerability Response & Software Asset Management modules to quickly find vulnerable systems and address risk, ahead of your attackers.</p> <p>more at: www.itspartners.com</p>]]></content:encoded>
      
      
      <enclosure length="274244289" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webcast_061720.mp4?dest-id=91054"/>
      <itunes:duration>28:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>9</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/a/7/9/9a7998b7b20d5e15/Screen_Shot_2020-06-17_at_5.16.58_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video, the teams from ITS Partners and ServiceNow will discuss using ServiceNow's SecOps and SAM modules to put out fires with an exposure assessment. With the COVID-19 landscape becoming the "new normal", attacker groups have been quick to capitalize on the chaos. Targeted campaigns are exploiting high-risk vulnerabilities, masked under the guise of the Centers for Disease Control (CDC) and the World Health Organization (WHO). How should you react? Does your security team immediately go into a fire-fighting mode? You're not alone. Organizations may take up to 3-4 weeks to scan the entire network to even know the risk exposure – with severe threats on the horizon, that's too much lost time. Eric Roberts, Business Process Consultant, Jeff Tomsik, Pre Sales Consultant at ITS, Ray Chung, Advisory Solutions Consultant at ServiceNow, and Joe Pizzo, Senior Advisory Solution Architect at ServiceNow, will explain how your team can utilize the ServiceNow Vulnerability Response &amp; Software Asset Management modules to quickly find vulnerable systems and address risk, ahead of your attackers. more at: www.itspartners.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video, the teams from ITS Partners and ServiceNow will discuss using ServiceNow's SecOps and SAM modules to put out fires with an exposure assessment. With the COVID-19 landscape becoming the "new normal", attacker groups have been quick to capitalize on the chaos. Targeted campaigns are exploiting high-risk vulnerabilities, masked under the guise of the Centers for Disease Control (CDC) and the World Health Organization (WHO). How should you react? Does your security team immediately go into a fire-fighting mode? You're not alone. Organizations may take up to 3-4 weeks to scan the entire network to even know the risk exposure – with severe threats on the horizon, that's too much lost time. Eric Roberts, Business Process Consultant, Jeff Tomsik, Pre Sales Consultant at ITS, Ray Chung, Advisory Solutions Consultant at ServiceNow, and Joe Pizzo, Senior Advisory Solution Architect at ServiceNow, will explain how your team can utilize the ServiceNow Vulnerability Response &amp; Software Asset Management modules to quickly find vulnerable systems and address risk, ahead of your attackers. more at: www.itspartners.com</itunes:summary></item>
    
    <item>
      <title>Support Macs Remotely from ServiceNow with ITS Jamf Integration</title>
      <itunes:title>Support Macs Remotely from ServiceNow with ITS Jamf Integration</itunes:title>
      <pubDate>Fri, 01 May 2020 01:04:09 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b2cc1b2c-a1e0-4d1f-92f2-14cfb144efa1]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/support-macs-remotely-from-servicenow-with-its-jamf-integration]]></link>
      <description><![CDATA[<p>As remote workforces grow, so does the demand for safe and remote delivery of IT services.</p> <p>For many, this is drawing attention to the fact that Macs still tend to be managed differently than Windows at the enterprise level. With the introduction of version 1.2 of our ITS Jamf Integration, compatible with Orlando and all recent ServiceNow versions, we aim to close that gap with automation and make it easier to deliver services remotely from ServiceNow to your Mac population.</p> <p>The ITS Jamf Integration has been able to automate the import of hardware and software data from Jamf to the ServiceNow CMDB since its initial release – Version 1.2 now also enables remote software delivery (and removal) for Macs from the ServiceNow Service Catalog. Just import policies from Jamf and use our simple wizard to convert them to catalog items. Your end-users get an easy, familiar online shopping experience for software; when they check out, the integration gathers approvals if needed and the user is automatically moved into the Jamf policy that installs the software.</p> <p>As economic uncertainty mounts, cutting costs is more important than ever. This is another area where we can help – the Integration can monitor software usage and remotely uninstall software that isn't meeting usage requirements. This allows you to redistribute underused licenses instead of purchasing more, saving up to 22% on IT software spending. The software data imported by the integration also gives you great data into compliance as software audits become more common, and Cybersecurity insights into the risk profile of your end-user software vulnerabilities.</p> <p>In this video, we'll demonstrate:</p> <p>1) Automated import of CMDB Hardware and Software Install data from Jamf and how that can support your teams<br /> 2) Automated Software Delivery from ServiceNow Service Portal<br /> 3) Automated Software Reclamation of underutilized or blacklisted software</p> <p>How do your teams benefit?:</p> <p>1) Cybersecurity can leverage the integration to better analyze software vulnerabilities and remotely remove problematic software<br /> 2) Software Asset Managers get accurate data to stay in compliance and reduce software spending during economic uncertainty - these SAM processes can save up to 20% on IT Software spending<br /> 3) IT Help Desk becomes more efficient with up-to-date info on user assignments and hardware configuration.<br /> 4) Automated Software Delivery frees your Help Desk from email requests and repetitive fulfillment tasks, increasing their bandwidth.</p>]]></description>
      
      <content:encoded><![CDATA[<p>As remote workforces grow, so does the demand for safe and remote delivery of IT services.</p> <p>For many, this is drawing attention to the fact that Macs still tend to be managed differently than Windows at the enterprise level. With the introduction of version 1.2 of our ITS Jamf Integration, compatible with Orlando and all recent ServiceNow versions, we aim to close that gap with automation and make it easier to deliver services remotely from ServiceNow to your Mac population.</p> <p>The ITS Jamf Integration has been able to automate the import of hardware and software data from Jamf to the ServiceNow CMDB since its initial release – Version 1.2 now also enables remote software delivery (and removal) for Macs from the ServiceNow Service Catalog. Just import policies from Jamf and use our simple wizard to convert them to catalog items. Your end-users get an easy, familiar online shopping experience for software; when they check out, the integration gathers approvals if needed and the user is automatically moved into the Jamf policy that installs the software.</p> <p>As economic uncertainty mounts, cutting costs is more important than ever. This is another area where we can help – the Integration can monitor software usage and remotely uninstall software that isn't meeting usage requirements. This allows you to redistribute underused licenses instead of purchasing more, saving up to 22% on IT software spending. The software data imported by the integration also gives you great data into compliance as software audits become more common, and Cybersecurity insights into the risk profile of your end-user software vulnerabilities.</p> <p>In this video, we'll demonstrate:</p> <p>1) Automated import of CMDB Hardware and Software Install data from Jamf and how that can support your teams 2) Automated Software Delivery from ServiceNow Service Portal 3) Automated Software Reclamation of underutilized or blacklisted software</p> <p>How do your teams benefit?:</p> <p>1) Cybersecurity can leverage the integration to better analyze software vulnerabilities and remotely remove problematic software 2) Software Asset Managers get accurate data to stay in compliance and reduce software spending during economic uncertainty - these SAM processes can save up to 20% on IT Software spending 3) IT Help Desk becomes more efficient with up-to-date info on user assignments and hardware configuration. 4) Automated Software Delivery frees your Help Desk from email requests and repetitive fulfillment tasks, increasing their bandwidth.</p>]]></content:encoded>
      
      
      <enclosure length="433698177" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Suppporting_Macs_Remotely_from_SN_with_ITS_Jamf_Integration.mp4?dest-id=91054"/>
      <itunes:duration>38:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>8</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/4/b/e/84bea29722203534/Jamf_Demo_Header.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Jay Wigard</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>As remote workforces grow, so does the demand for safe and remote delivery of IT services. For many, this is drawing attention to the fact that Macs still tend to be managed differently than Windows at the enterprise level. With the introduction of version 1.2 of our ITS Jamf Integration, compatible with Orlando and all recent ServiceNow versions, we aim to close that gap with automation and make it easier to deliver services remotely from ServiceNow to your Mac population. The ITS Jamf Integration has been able to automate the import of hardware and software data from Jamf to the ServiceNow CMDB since its initial release – Version 1.2 now also enables remote software delivery (and removal) for Macs from the ServiceNow Service Catalog. Just import policies from Jamf and use our simple wizard to convert them to catalog items. Your end-users get an easy, familiar online shopping experience for software; when they check out, the integration gathers approvals if needed and the user is automatically moved into the Jamf policy that installs the software. As economic uncertainty mounts, cutting costs is more important than ever. This is another area where we can help – the Integration can monitor software usage and remotely uninstall software that isn't meeting usage requirements. This allows you to redistribute underused licenses instead of purchasing more, saving up to 22% on IT software spending. The software data imported by the integration also gives you great data into compliance as software audits become more common, and Cybersecurity insights into the risk profile of your end-user software vulnerabilities. In this video, we'll demonstrate: 1) Automated import of CMDB Hardware and Software Install data from Jamf and how that can support your teams 2) Automated Software Delivery from ServiceNow Service Portal 3) Automated Software Reclamation of underutilized or blacklisted software How do your teams benefit?: 1) Cybersecurity can leverage the integration to better analyze software vulnerabilities and remotely remove problematic software 2) Software Asset Managers get accurate data to stay in compliance and reduce software spending during economic uncertainty - these SAM processes can save up to 20% on IT Software spending 3) IT Help Desk becomes more efficient with up-to-date info on user assignments and hardware configuration. 4) Automated Software Delivery frees your Help Desk from email requests and repetitive fulfillment tasks, increasing their bandwidth.</itunes:subtitle><itunes:summary>As remote workforces grow, so does the demand for safe and remote delivery of IT services. For many, this is drawing attention to the fact that Macs still tend to be managed differently than Windows at the enterprise level. With the introduction of version 1.2 of our ITS Jamf Integration, compatible with Orlando and all recent ServiceNow versions, we aim to close that gap with automation and make it easier to deliver services remotely from ServiceNow to your Mac population. The ITS Jamf Integration has been able to automate the import of hardware and software data from Jamf to the ServiceNow CMDB since its initial release – Version 1.2 now also enables remote software delivery (and removal) for Macs from the ServiceNow Service Catalog. Just import policies from Jamf and use our simple wizard to convert them to catalog items. Your end-users get an easy, familiar online shopping experience for software; when they check out, the integration gathers approvals if needed and the user is automatically moved into the Jamf policy that installs the software. As economic uncertainty mounts, cutting costs is more important than ever. This is another area where we can help – the Integration can monitor software usage and remotely uninstall software that isn't meeting usage requirements. This allows you to redistribute underused licenses instead of purchasing more, saving up to 22% on IT software spending. The software data imported by the integration also gives you great data into compliance as software audits become more common, and Cybersecurity insights into the risk profile of your end-user software vulnerabilities. In this video, we'll demonstrate: 1) Automated import of CMDB Hardware and Software Install data from Jamf and how that can support your teams 2) Automated Software Delivery from ServiceNow Service Portal 3) Automated Software Reclamation of underutilized or blacklisted software How do your teams benefit?: 1) Cybersecurity can leverage the integration to better analyze software vulnerabilities and remotely remove problematic software 2) Software Asset Managers get accurate data to stay in compliance and reduce software spending during economic uncertainty - these SAM processes can save up to 20% on IT Software spending 3) IT Help Desk becomes more efficient with up-to-date info on user assignments and hardware configuration. 4) Automated Software Delivery frees your Help Desk from email requests and repetitive fulfillment tasks, increasing their bandwidth.</itunes:summary></item>
    
    <item>
      <title>Managing Assets for a Mobile Workforce</title>
      <itunes:title>Managing Assets for a Mobile Workforce</itunes:title>
      <pubDate>Thu, 16 Apr 2020 02:29:10 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3cf89e76-3442-4d04-90ea-fafbe3ee0b82]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/managing-assets-for-a-mobile-workforce]]></link>
      <description><![CDATA[<h2>Today is about solving your organization's immediate needs and about building asset maturity into your organization over the long term.</h2> <p>Do you know if all your users have the right hardware and software entitlements needed for work from home? Are you accounting for assets possibly outside your established process?</p> <p>In this video, <a href="https://www.itsdelivers.com/fritz-byam" rel=" noopener">Fritz</a> and <a href= "https://www.itsdelivers.com/yvette-mathews" rel= " noopener">Yvette</a> will answer those questions and will also discuss:</p> <ul> <li>Getting clarity on the challenges of managing the assets for a remote workforce</li> <li>Strategies you can use and actions that you can take right now?</li> <li>Understanding how Remote Asset Management fits into your broader Asset strategy.</li> <li>How to move forward with Asset management maturity</li> <li>Your employees are using devices that have never been used for work or a device that IT knows nothing about.</li> <li>These devices might not check into the network regularly or at all, and how you should handle it.</li> <li>Figuring out what's urgent and what is important regarding your remote assets.</li> <li>How you can enable more mature asset management in your organization.</li> <li>These foundational workloads free IT and how the best people in your enterprise should move from the mundane to innovation and how these workloads are the basis of your security program.</li> <li>These foundational workloads, optimizing business as usual, is the key to digital transformation.</li> <li>Asset management saves money and risk for hardware and software.</li> <li>IOT is coming, and it looks a lot like mature asset management.</li> </ul>]]></description>
      
      <content:encoded><![CDATA[Today is about solving your organization's immediate needs and about building asset maturity into your organization over the long term. <p>Do you know if all your users have the right hardware and software entitlements needed for work from home? Are you accounting for assets possibly outside your established process?</p> <p>In this video, <a href="https://www.itsdelivers.com/fritz-byam" rel=" noopener">Fritz</a> and <a href= "https://www.itsdelivers.com/yvette-mathews" rel= " noopener">Yvette</a> will answer those questions and will also discuss:</p> <ul> <li>Getting clarity on the challenges of managing the assets for a remote workforce</li> <li>Strategies you can use and actions that you can take right now?</li> <li>Understanding how Remote Asset Management fits into your broader Asset strategy.</li> <li>How to move forward with Asset management maturity</li> <li>Your employees are using devices that have never been used for work or a device that IT knows nothing about.</li> <li>These devices might not check into the network regularly or at all, and how you should handle it.</li> <li>Figuring out what's urgent and what is important regarding your remote assets.</li> <li>How you can enable more mature asset management in your organization.</li> <li>These foundational workloads free IT and how the best people in your enterprise should move from the mundane to innovation and how these workloads are the basis of your security program.</li> <li>These foundational workloads, optimizing business as usual, is the key to digital transformation.</li> <li>Asset management saves money and risk for hardware and software.</li> <li>IOT is coming, and it looks a lot like mature asset management.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="287743086" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video-Managing_Assets_for_a_mobile_workforce.mp4?dest-id=91054"/>
      <itunes:duration>29:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/9/1/9/7919f87720b5104e/Copy_of_Copy_of_Copy_of_Managing_Assets_for_a_mobile_workforce.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Yvette Mathews &amp; Fritz Byam</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Today is about solving your organization's immediate needs and about building asset maturity into your organization over the long term. Do you know if all your users have the right hardware and software entitlements needed for work from home? Are you accounting for assets possibly outside your established process? In this video, Fritz and Yvette will answer those questions and will also discuss: Getting clarity on the challenges of managing the assets for a remote workforce Strategies you can use and actions that you can take right now? Understanding how Remote Asset Management fits into your broader Asset strategy. How to move forward with Asset management maturity Your employees are using devices that have never been used for work or a device that IT knows nothing about. These devices might not check into the network regularly or at all, and how you should handle it. Figuring out what's urgent and what is important regarding your remote assets. How you can enable more mature asset management in your organization. These foundational workloads free IT and how the best people in your enterprise should move from the mundane to innovation and how these workloads are the basis of your security program. These foundational workloads, optimizing business as usual, is the key to digital transformation. Asset management saves money and risk for hardware and software. IOT is coming, and it looks a lot like mature asset management.</itunes:subtitle><itunes:summary>Today is about solving your organization's immediate needs and about building asset maturity into your organization over the long term. Do you know if all your users have the right hardware and software entitlements needed for work from home? Are you accounting for assets possibly outside your established process? In this video, Fritz and Yvette will answer those questions and will also discuss: Getting clarity on the challenges of managing the assets for a remote workforce Strategies you can use and actions that you can take right now? Understanding how Remote Asset Management fits into your broader Asset strategy. How to move forward with Asset management maturity Your employees are using devices that have never been used for work or a device that IT knows nothing about. These devices might not check into the network regularly or at all, and how you should handle it. Figuring out what's urgent and what is important regarding your remote assets. How you can enable more mature asset management in your organization. These foundational workloads free IT and how the best people in your enterprise should move from the mundane to innovation and how these workloads are the basis of your security program. These foundational workloads, optimizing business as usual, is the key to digital transformation. Asset management saves money and risk for hardware and software. IOT is coming, and it looks a lot like mature asset management.</itunes:summary></item>
    
    <item>
      <title>Emergency Response Operations Demo</title>
      <itunes:title>Emergency Response Operations Demo -  ServiceNow Emergency Response App</itunes:title>
      <pubDate>Wed, 15 Apr 2020 00:41:22 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[06848eb7-2800-4cf4-ba81-7e5e432082c9]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/emergency-response-operations-demo]]></link>
      <description><![CDATA[<p>Emergency Response Operations. Optimize staff and resources to support emergency response for public agencies and other organizations.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Emergency Response Operations. Optimize staff and resources to support emergency response for public agencies and other organizations.</p>]]></content:encoded>
      
      
      <enclosure length="126533818" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_5_-_Using_the_ServiceNow_Emergency_Response_App_-_Emergency_Response_Operations.mp4?dest-id=91054"/>
      <itunes:duration>11:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/8/4/d/484d0123a3d19075/Video-5-Header-Image---Using-the-ServiceNow-Emergency-Response-App---Emergency-Response-Operations.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Adam Eaddy</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Emergency Response Operations. Optimize staff and resources to support emergency response for public agencies and other organizations.</itunes:subtitle><itunes:summary>Emergency Response Operations. Optimize staff and resources to support emergency response for public agencies and other organizations.</itunes:summary></item>
    
    <item>
      <title>Emergency Exposure Management Demo</title>
      <itunes:title>Emergency Exposure Management Demo - Using the ServiceNow Emergency Response App</itunes:title>
      <pubDate>Wed, 15 Apr 2020 00:37:35 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[abcadbc5-a052-46ab-8d0a-b5edff7fdbcd]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/emergency-exposure-management-demo]]></link>
      <description><![CDATA[<p>Emergency Exposure Management. Identify and manage exposure risk when an employee is diagnosed with an illness.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Emergency Exposure Management. Identify and manage exposure risk when an employee is diagnosed with an illness.</p>]]></content:encoded>
      
      
      <enclosure length="109208155" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_4_-_Using_the_ServiceNow_Emergency_Response_App_-_Emergency_Exposure_Management.mp4?dest-id=91054"/>
      <itunes:duration>09:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/6/1/8/a61888d818f07153/Video-4-Header-Image---Using-the-ServiceNow-Emergency-Response-App---Emergency-Exposure-Management.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Adam Eaddy</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Emergency Exposure Management. Identify and manage exposure risk when an employee is diagnosed with an illness.</itunes:subtitle><itunes:summary>Emergency Exposure Management. Identify and manage exposure risk when an employee is diagnosed with an illness.</itunes:summary></item>
    
    <item>
      <title>Emergency Outreach Demo</title>
      <itunes:title>Emergency Outreach Demo - Using the ServiceNow Emergency Response App</itunes:title>
      <pubDate>Wed, 15 Apr 2020 00:35:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[34937068-184a-47aa-b24b-43fe84c06f6b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/emergency-outreach-demo]]></link>
      <description><![CDATA[<p>Emergency Outreach. Distribute information and confirm employee safety and location through email or a mobile app.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Emergency Outreach. Distribute information and confirm employee safety and location through email or a mobile app.</p>]]></content:encoded>
      
      
      <enclosure length="97138846" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_3_-_Using_the_ServiceNow_Emergency_Response_App_-_Emergency_Outreach.mp4?dest-id=91054"/>
      <itunes:duration>09:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/e/9/f/ee9f5d3c2edb81d9/Video-3-Header-Image---Using-the-ServiceNow-Emergency-Response-App---Emergency-Outreach.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Adam Eaddy</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Emergency Outreach. Distribute information and confirm employee safety and location through email or a mobile app.</itunes:subtitle><itunes:summary>Emergency Outreach. Distribute information and confirm employee safety and location through email or a mobile app.</itunes:summary></item>
    
    <item>
      <title>Emergency Self Report Demo</title>
      <itunes:title>Emergency Self Report Demo - Using the ServiceNow Emergency Response App</itunes:title>
      <pubDate>Wed, 15 Apr 2020 00:31:11 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[165406d1-3594-481c-848b-b439ef29f3ac]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/emergency-self-report-demo]]></link>
      <description><![CDATA[<p>Emergency Self Report. Enable employees to report illnesses and readiness to return, and initiate workflows to help managers respond.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Emergency Self Report. Enable employees to report illnesses and readiness to return, and initiate workflows to help managers respond.</p>]]></content:encoded>
      
      
      <enclosure length="136170700" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_2_-_Using_the_ServiceNow_Emergency_Response_App_-_Emergency_Self_Report.mp4?dest-id=91054"/>
      <itunes:duration>12:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/4/8/e/848e4e91de26f103/Video-2-Header-Image--Using-the-ServiceNow-Emergency-Response-App---Emergency-Self-Report.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Adam Eaddy</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Emergency Self Report. Enable employees to report illnesses and readiness to return, and initiate workflows to help managers respond.</itunes:subtitle><itunes:summary>Emergency Self Report. Enable employees to report illnesses and readiness to return, and initiate workflows to help managers respond.</itunes:summary></item>
    
    <item>
      <title>Installation and Configuration of ServiceNow Emergency Response Apps</title>
      <itunes:title>ServiceNow Emergency Response Apps: Installation and Configuration of ServiceNow Emergency Response Apps</itunes:title>
      <pubDate>Wed, 15 Apr 2020 00:19:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[53303e30-f638-40df-b3f7-3d0d811a4ebe]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/installation-and-configuration-of-servicenow-emergency-response-apps]]></link>
      <description><![CDATA[<p>Installation and Configuration of ServiceNow Emergency Response Apps</p>]]></description>
      
      <content:encoded><![CDATA[<p>Installation and Configuration of ServiceNow Emergency Response Apps</p>]]></content:encoded>
      
      
      <enclosure length="398992211" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video_1_-_Installation_and_Configuration_of_ServiceNow_Emergency_Response_Apps.mp4?dest-id=91054"/>
      <itunes:duration>37:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Adam Eaddy</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Installation and Configuration of ServiceNow Emergency Response Apps</itunes:subtitle><itunes:summary>Installation and Configuration of ServiceNow Emergency Response Apps</itunes:summary></item>
    
    <item>
      <title>Learn how to Optimize your ServiceNow CMDB for Asset &amp; SecOps</title>
      <itunes:title>Learn how to Optimize your ServiceNow CMDB for Asset &amp;amp; SecOps</itunes:title>
      <pubDate>Thu, 26 Mar 2020 03:24:39 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[20761741-494f-4896-8292-4538f2b94536]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/learn-how-to-optimize-your-servicenow-cmdb-for-asset-secops]]></link>
      <description><![CDATA[<p>The team from ITS Partners will discuss how to Optimize your CMDB for ServiceNow's most intriguing offerings. We all know that a strong ServiceNow platform starts with a strong CMDB at its core. In this video we will hear from industry experts as they discuss CMDB principles and how to better utilize ServiceNow's hottest offerings: Software Asset Management Professional and Security Operations. Join ITS Partners as we share the secret sauce that they have derived from companies seeing high value from ServiceNow. More at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>The team from ITS Partners will discuss how to Optimize your CMDB for ServiceNow's most intriguing offerings. We all know that a strong ServiceNow platform starts with a strong CMDB at its core. In this video we will hear from industry experts as they discuss CMDB principles and how to better utilize ServiceNow's hottest offerings: Software Asset Management Professional and Security Operations. Join ITS Partners as we share the secret sauce that they have derived from companies seeing high value from ServiceNow. More at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="355043689" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Optmizing_the_CMDB_for_Asset_and_SecOps_l_Final_Edit_032620.mp4?dest-id=91054"/>
      <itunes:duration>40:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>9</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/8/8/7/a887d5f6a4f12c62/Screen_Shot_2020-03-25_at_10.57.10_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Fritz Byam</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The team from ITS Partners will discuss how to Optimize your CMDB for ServiceNow's most intriguing offerings. We all know that a strong ServiceNow platform starts with a strong CMDB at its core. In this video we will hear from industry experts as they discuss CMDB principles and how to better utilize ServiceNow's hottest offerings: Software Asset Management Professional and Security Operations. Join ITS Partners as we share the secret sauce that they have derived from companies seeing high value from ServiceNow. More at www.itsdelivers.com</itunes:subtitle><itunes:summary>The team from ITS Partners will discuss how to Optimize your CMDB for ServiceNow's most intriguing offerings. We all know that a strong ServiceNow platform starts with a strong CMDB at its core. In this video we will hear from industry experts as they discuss CMDB principles and how to better utilize ServiceNow's hottest offerings: Software Asset Management Professional and Security Operations. Join ITS Partners as we share the secret sauce that they have derived from companies seeing high value from ServiceNow. More at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Improve your ServiceNow Vulnerability Response with VulnDB Vulnerability Integration</title>
      <itunes:title>Improve your ServiceNow Vulnerability Response with VulnDB Vulnerability Integration</itunes:title>
      <pubDate>Thu, 27 Jun 2019 19:47:33 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7594b4da896a4c46bf1dbca3bb94b745]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/improve-your-servicenow-vulnerability-response-with-vulndb-vulnerability-integration]]></link>
      <description><![CDATA[<h3><span style="font-size: 10pt;">Vulnerability Response is only as good as the information available to you.</span></h3> <p><span style="font-size: 10pt;">Better data matters because it enables better prioritization decisions and quicker remediation. RBS' <strong>VulnDB Vulnerability Database</strong> has data on over 200,000 vulnerabilities, including over 68,000 that aren't found in the National Vulnerability Database (NVD / CVE) which feeds most scanner tools.</span></p> <p><span style="font-size: 10pt;">In this video, <a href= "https://www.itsdelivers.com/about-jay-wigard" target="_blank" rel= "noopener">Jay Wigard</a>, Product Development Leader from ITS Partners, and Jake Kouns, CISO at Risk-Based Security discuss the new <strong><a href= "https://store.servicenow.com/sn_appstore_store.do#!/store/application/8281dd08db5797005d9f755a8c9619b0/1.0.99?referer=sn_appstore_store.do%23!%2Fstore%2Fsearch%3Fq%3Dvulndb" target="_blank" rel="noopener">VulnDB Vulnerability Integration</a></strong>.</span></p> <p class="p1"><span style="font-size: 10pt;">Developed by ITS Partners, the <strong>VulnDB Vulnerability Integration</strong> can enrich your ServiceNow Vulnerability Response program with greatly improved data and arm your analysts with the information needed to quickly mitigate vulnerability risks.</span></p>]]></description>
      
      <content:encoded><![CDATA[Vulnerability Response is only as good as the information available to you. <p>Better data matters because it enables better prioritization decisions and quicker remediation. RBS' VulnDB Vulnerability Database has data on over 200,000 vulnerabilities, including over 68,000 that aren't found in the National Vulnerability Database (NVD / CVE) which feeds most scanner tools.</p> <p>In this video, <a href= "https://www.itsdelivers.com/about-jay-wigard" target="_blank" rel= "noopener">Jay Wigard</a>, Product Development Leader from ITS Partners, and Jake Kouns, CISO at Risk-Based Security discuss the new <a href= "https://store.servicenow.com/sn_appstore_store.do#!/store/application/8281dd08db5797005d9f755a8c9619b0/1.0.99?referer=sn_appstore_store.do%23!%2Fstore%2Fsearch%3Fq%3Dvulndb" target="_blank" rel="noopener">VulnDB Vulnerability Integration</a>.</p> <p class="p1">Developed by ITS Partners, the VulnDB Vulnerability Integration can enrich your ServiceNow Vulnerability Response program with greatly improved data and arm your analysts with the information needed to quickly mitigate vulnerability risks.</p>]]></content:encoded>
      
      
      <enclosure length="399385048" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/VulnDB_Webcast_Final.mp4?dest-id=91054"/>
      <itunes:duration>27:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>8</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/5/d/4/45d438fa148a9c05/Screen_Shot_2019-06-27_at_1.59.25_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Jay Wigard</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Vulnerability Response is only as good as the information available to you. Better data matters because it enables better prioritization decisions and quicker remediation. RBS' VulnDB Vulnerability Database has data on over 200,000 vulnerabilities, including over 68,000 that aren't found in the National Vulnerability Database (NVD / CVE) which feeds most scanner tools. In this video, Jay Wigard, Product Development Leader from ITS Partners, and Jake Kouns, CISO at Risk-Based Security discuss the new VulnDB Vulnerability Integration. Developed by ITS Partners, the VulnDB Vulnerability Integration can enrich your ServiceNow Vulnerability Response program with greatly improved data and arm your analysts with the information needed to quickly mitigate vulnerability risks.</itunes:subtitle><itunes:summary>Vulnerability Response is only as good as the information available to you. Better data matters because it enables better prioritization decisions and quicker remediation. RBS' VulnDB Vulnerability Database has data on over 200,000 vulnerabilities, including over 68,000 that aren't found in the National Vulnerability Database (NVD / CVE) which feeds most scanner tools. In this video, Jay Wigard, Product Development Leader from ITS Partners, and Jake Kouns, CISO at Risk-Based Security discuss the new VulnDB Vulnerability Integration. Developed by ITS Partners, the VulnDB Vulnerability Integration can enrich your ServiceNow Vulnerability Response program with greatly improved data and arm your analysts with the information needed to quickly mitigate vulnerability risks.</itunes:summary></item>
    
    <item>
      <title>3 ways the ITS Jamf Integration will simplify and improve your ServiceNow ITAM program</title>
      <itunes:title>3 ways the ITS Jamf Integration will simplify and improve your ServiceNow ITAM program</itunes:title>
      <pubDate>Fri, 19 Apr 2019 02:07:42 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b4aa226525f64d68b526eff81560a92d]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/3-ways-the-its-jamf-integration-will-simplify-and-improve-your-servicenow-itam-program]]></link>
      <description><![CDATA[<p>Many organizations are leveraging Jamf Pro to help manage their Macs, but they frequently experience headaches trying to import Jamf asset data into their CMDB.</p> <p><strong>With our new Jamf integration, you can be up and running in minutes and simplify the process of bringing your Mac software and hardware data into ServiceNow.</strong></p> <p>In this video, <strong><a href= "https://blog.itsdelivers.com/productive-it-insights/author/jay-wigard" rel=" noopener">Jay Wigard</a></strong>, Product Development Lead at ITS, discusses 3 of the key productivity-driving outcomes delivered by the integration and you'll get to see it live in action!</p> <p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Many organizations are leveraging Jamf Pro to help manage their Macs, but they frequently experience headaches trying to import Jamf asset data into their CMDB.</p> <p>With our new Jamf integration, you can be up and running in minutes and simplify the process of bringing your Mac software and hardware data into ServiceNow.</p> <p>In this video, <a href= "https://blog.itsdelivers.com/productive-it-insights/author/jay-wigard" rel=" noopener">Jay Wigard</a>, Product Development Lead at ITS, discusses 3 of the key productivity-driving outcomes delivered by the integration and you'll get to see it live in action!</p> <p> </p>]]></content:encoded>
      
      
      <enclosure length="209604372" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Webcast_-_3_ways_the_ITS_Jamf_Integration_will_simplify_and_improve_your_ServiceNow_ITAM_program.mp4?dest-id=91054"/>
      <itunes:duration>18:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>8</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/f/9/a/af9ab865c51ca60b/Webcast-Header---Jamf.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Chad Dupin</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Many organizations are leveraging Jamf Pro to help manage their Macs, but they frequently experience headaches trying to import Jamf asset data into their CMDB. With our new Jamf integration, you can be up and running in minutes and simplify the process of bringing your Mac software and hardware data into ServiceNow. In this video, Jay Wigard, Product Development Lead at ITS, discusses 3 of the key productivity-driving outcomes delivered by the integration and you'll get to see it live in action!  </itunes:subtitle><itunes:summary>Many organizations are leveraging Jamf Pro to help manage their Macs, but they frequently experience headaches trying to import Jamf asset data into their CMDB. With our new Jamf integration, you can be up and running in minutes and simplify the process of bringing your Mac software and hardware data into ServiceNow. In this video, Jay Wigard, Product Development Lead at ITS, discusses 3 of the key productivity-driving outcomes delivered by the integration and you'll get to see it live in action!  </itunes:summary></item>
    
    <item>
      <title>Drive Software Asset Management Transparency with ServiceNow</title>
      <itunes:title>Drive Software Asset Management Transparency with ServiceNow</itunes:title>
      <pubDate>Thu, 21 Feb 2019 15:11:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[baff8662ffd24224959cdee79640c136]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/drive-software-asset-management-transparency-with-servicenow]]></link>
      <description><![CDATA[<p>ServiceNow has a full portfolio to capitalize on this age old problem. In this video we'll be discussing some of the best practices around Software Asset Management (SAM), Software Asset Management Professional (SAM-P), CMDB and leveraging a Discovery tool.</p> <p>ITS Partners is ServiceNow's specialized partner for SAM and SAM- P implementations. Yvette Mathews, ITAM/CMDB ServiceNow Practice Manager, will be leading the discussion around best practices for Asset Management programs.</p> <p>More at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>ServiceNow has a full portfolio to capitalize on this age old problem. In this video we'll be discussing some of the best practices around Software Asset Management (SAM), Software Asset Management Professional (SAM-P), CMDB and leveraging a Discovery tool.</p> <p>ITS Partners is ServiceNow's specialized partner for SAM and SAM- P implementations. Yvette Mathews, ITAM/CMDB ServiceNow Practice Manager, will be leading the discussion around best practices for Asset Management programs.</p> <p>More at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="13902385" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/2019-02-15_11.00_Drive_Software_Asset_Management_Transparency_with_ServiceNow_copy.mp4?dest-id=91054"/>
      <itunes:duration>14:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>8</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/5/4/1/c54187322301096b/Screen_Shot_2019-02-21_at_10.09.55_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Yvette Mathews</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>ServiceNow has a full portfolio to capitalize on this age old problem. In this video we'll be discussing some of the best practices around Software Asset Management (SAM), Software Asset Management Professional (SAM-P), CMDB and leveraging a Discovery tool. ITS Partners is ServiceNow's specialized partner for SAM and SAM- P implementations. Yvette Mathews, ITAM/CMDB ServiceNow Practice Manager, will be leading the discussion around best practices for Asset Management programs. More at www.itsdelivers.com</itunes:subtitle><itunes:summary>ServiceNow has a full portfolio to capitalize on this age old problem. In this video we'll be discussing some of the best practices around Software Asset Management (SAM), Software Asset Management Professional (SAM-P), CMDB and leveraging a Discovery tool. ITS Partners is ServiceNow's specialized partner for SAM and SAM- P implementations. Yvette Mathews, ITAM/CMDB ServiceNow Practice Manager, will be leading the discussion around best practices for Asset Management programs. More at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Demo how ServiceNow's Phishing Response Workflow works in the London Release</title>
      <itunes:title>Demo how ServiceNow's Phishing Response Workflow works in the London Release</itunes:title>
      <pubDate>Mon, 10 Dec 2018 13:26:22 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[abe3cd936bd14231a7261cfbd82f0fd0]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/demo-how-servicenows-phishing-response-workflow-works-in-the-london-release]]></link>
      <description><![CDATA[<p>Join us for a demonstration of ServiceNow's Phishing Response Workflow. The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network. We will also be demoing the New Security Incident Console available from the London Release.</p> <p>We will provide a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management.</p> <p>More at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Join us for a demonstration of ServiceNow's Phishing Response Workflow. The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network. We will also be demoing the New Security Incident Console available from the London Release.</p> <p>We will provide a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management.</p> <p>More at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="550272027" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/Video20Demo-20Learn20how20the20ServiceNow20Phishing20Response20Workflow20works20in20the20London20release20Final.mp4?dest-id=91054"/>
      <itunes:duration>36:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>7</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/c/2/e/6c2ea808015b16c4/Phishing-SecOps-Header.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Join us for a demonstration of ServiceNow's Phishing Response Workflow. The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network. We will also be demoing the New Security Incident Console available from the London Release. We will provide a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management. More at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Join us for a demonstration of ServiceNow's Phishing Response Workflow. The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network. We will also be demoing the New Security Incident Console available from the London Release. We will provide a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management. More at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>How ServiceNow Security Operations Can Help Unify and Accelerate Your Incident Response</title>
      <itunes:title>How ServiceNow Security Operations Can Help Unify and Accelerate Your Incident Response</itunes:title>
      <pubDate>Mon, 08 Oct 2018 15:18:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e7b8789d47a5473c85b5bb8f8a487928]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/how-servicenow-security-operations-can-help-unify-and-accelerate-your-incident-response]]></link>
      <description><![CDATA[<p>Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these.</p> <p>Oversights of too much information are delaying security teams ability to identify, mitigate and remediate critical incidents and aging vulnerabilities. In the last 18 months, enterprises have mobilized to take security process and procedure into a SOC workbench with a maturity plan, but the reality is a majority are still mired down in siloed dysfunction and manual or mundane processes. Automation is a dream many are simply unprepared for, meanwhile, Integration is at a high point in our time…let's leverage it!</p> <p>The challenges organizations face, lie in these core areas:<br /> Ineffective collaboration between IT, Network and Security<br /> Lack of business context on critical incidents or vulnerabilities<br /> Under-processed signals versus noise from underutilized toolsets<br /> Lack of management visibility into the overall efficacy of the team<br /> ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management!</p> <p>More at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these.</p> <p>Oversights of too much information are delaying security teams ability to identify, mitigate and remediate critical incidents and aging vulnerabilities. In the last 18 months, enterprises have mobilized to take security process and procedure into a SOC workbench with a maturity plan, but the reality is a majority are still mired down in siloed dysfunction and manual or mundane processes. Automation is a dream many are simply unprepared for, meanwhile, Integration is at a high point in our time…let's leverage it!</p> <p>The challenges organizations face, lie in these core areas: Ineffective collaboration between IT, Network and Security Lack of business context on critical incidents or vulnerabilities Under-processed signals versus noise from underutilized toolsets Lack of management visibility into the overall efficacy of the team ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management!</p> <p>More at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="470652309" type="video/mp4" url="https://traffic.libsyn.com/secure/itspartners/How_ServiceNow_Security_Operations_Can_Help_Unify_and_Accelerate_Your_Incident_Response_Final.mp4?dest-id=91054"/>
      <itunes:duration>39:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>7</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/a/c/a/6aca761b22844e0d/How-ServiceNow-Security-Operations-Can-Help-Unify-and-Accelerate-Your-Incident-Response-Header-Image-v2.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these. Oversights of too much information are delaying security teams ability to identify, mitigate and remediate critical incidents and aging vulnerabilities. In the last 18 months, enterprises have mobilized to take security process and procedure into a SOC workbench with a maturity plan, but the reality is a majority are still mired down in siloed dysfunction and manual or mundane processes. Automation is a dream many are simply unprepared for, meanwhile, Integration is at a high point in our time…let's leverage it! The challenges organizations face, lie in these core areas: Ineffective collaboration between IT, Network and Security Lack of business context on critical incidents or vulnerabilities Under-processed signals versus noise from underutilized toolsets Lack of management visibility into the overall efficacy of the team ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management! More at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these. Oversights of too much information are delaying security teams ability to identify, mitigate and remediate critical incidents and aging vulnerabilities. In the last 18 months, enterprises have mobilized to take security process and procedure into a SOC workbench with a maturity plan, but the reality is a majority are still mired down in siloed dysfunction and manual or mundane processes. Automation is a dream many are simply unprepared for, meanwhile, Integration is at a high point in our time…let's leverage it! The challenges organizations face, lie in these core areas: Ineffective collaboration between IT, Network and Security Lack of business context on critical incidents or vulnerabilities Under-processed signals versus noise from underutilized toolsets Lack of management visibility into the overall efficacy of the team ServiceNow customers are starting to change the game in "operationalizing security" by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management! More at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>5 Tips and Tricks To Build a Stronger CMDB Foundation</title>
      <itunes:title>5 Tips and Tricks To Build a Stronger CMDB Foundation</itunes:title>
      <pubDate>Wed, 13 Jun 2018 01:22:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[52085653e056428aae382167dd2553c6]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/5-tips-and-tricks-to-build-a-stronger-cmdb-foundation]]></link>
      <description><![CDATA[<p>Does your CMDB look like an attic, filled with old junk and cobwebs?</p> <p>Do you feel like you are missing things in your CMDB? A healthy CMDB is foundational to an excellent Asset Management strategy.</p> <p>On this video, our SACM Lead Architect, Yvette Mathews, will share 5 easy to implement tips and tricks to improve your CMDB's foundation, along with some best practices to follow in order to maintain it.</p> <p>More at https://www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Does your CMDB look like an attic, filled with old junk and cobwebs?</p> <p>Do you feel like you are missing things in your CMDB? A healthy CMDB is foundational to an excellent Asset Management strategy.</p> <p>On this video, our SACM Lead Architect, Yvette Mathews, will share 5 easy to implement tips and tricks to improve your CMDB's foundation, along with some best practices to follow in order to maintain it.</p> <p>More at https://www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="161888017" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/VIDEO_5_Tips_and_Tricks_To_Build_a_Stronger_CMDB_Foundation.mp4?dest-id=91054"/>
      <itunes:duration>17:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>7</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/4/c/7/34c73f48b079bb90/CMDB-Foundation-VIDEO."/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Does your CMDB look like an attic, filled with old junk and cobwebs? Do you feel like you are missing things in your CMDB? A healthy CMDB is foundational to an excellent Asset Management strategy. On this video, our SACM Lead Architect, Yvette Mathews, will share 5 easy to implement tips and tricks to improve your CMDB's foundation, along with some best practices to follow in order to maintain it. More at https://www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Does your CMDB look like an attic, filled with old junk and cobwebs? Do you feel like you are missing things in your CMDB? A healthy CMDB is foundational to an excellent Asset Management strategy. On this video, our SACM Lead Architect, Yvette Mathews, will share 5 easy to implement tips and tricks to improve your CMDB's foundation, along with some best practices to follow in order to maintain it. More at https://www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>So long DLP... Hello Insider Threat</title>
      <itunes:title>So long DLP... Hello Insider Threat</itunes:title>
      <pubDate>Thu, 22 Mar 2018 23:55:09 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[560e883c941f4629860c0b49a3be898b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/so-long-dlp-hello-insider-threat]]></link>
      <description><![CDATA[<p>We learned a lot of lessons about protecting within the 4 walls of the enterprise, but the digital transformation is changing the game, and companies are changing how they play it. Some organizations made some real headway in their privacy programs, others are using the cloud movement to get more serious.</p> <p>Prioritizing protection for the various control points and what we attempt to detect and respond to is much clearer now, but another level of hard work must be done to evolve and adapt with the times.</p> <p>The organizations leading the way in this transformational opportunity have:</p> <p>Made it somewhere down the risk reduction maturity scale<br /> Are able to treat data loss prevention as another security tool<br /> Put more focus on process and the longer-term investment: people.<br /> In this video, Matt Reid, VP of Risk Management at ITS reflects on some notable moments in DLP adoption and discusses the most productive companies that we work with who are building true Insider Threat programs.</p>]]></description>
      
      <content:encoded><![CDATA[<p>We learned a lot of lessons about protecting within the 4 walls of the enterprise, but the digital transformation is changing the game, and companies are changing how they play it. Some organizations made some real headway in their privacy programs, others are using the cloud movement to get more serious.</p> <p>Prioritizing protection for the various control points and what we attempt to detect and respond to is much clearer now, but another level of hard work must be done to evolve and adapt with the times.</p> <p>The organizations leading the way in this transformational opportunity have:</p> <p>Made it somewhere down the risk reduction maturity scale Are able to treat data loss prevention as another security tool Put more focus on process and the longer-term investment: people. In this video, Matt Reid, VP of Risk Management at ITS reflects on some notable moments in DLP adoption and discusses the most productive companies that we work with who are building true Insider Threat programs.</p>]]></content:encoded>
      
      
      <enclosure length="514788513" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/So20Long20DLP20Webcast20032218.mp4?dest-id=91054"/>
      <itunes:duration>31:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>7</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/9/1/1/3911216b0830e0fd/Screen_Shot_2018-03-22_at_7.12.03_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>We learned a lot of lessons about protecting within the 4 walls of the enterprise, but the digital transformation is changing the game, and companies are changing how they play it. Some organizations made some real headway in their privacy programs, others are using the cloud movement to get more serious. Prioritizing protection for the various control points and what we attempt to detect and respond to is much clearer now, but another level of hard work must be done to evolve and adapt with the times. The organizations leading the way in this transformational opportunity have: Made it somewhere down the risk reduction maturity scale Are able to treat data loss prevention as another security tool Put more focus on process and the longer-term investment: people. In this video, Matt Reid, VP of Risk Management at ITS reflects on some notable moments in DLP adoption and discusses the most productive companies that we work with who are building true Insider Threat programs.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>We learned a lot of lessons about protecting within the 4 walls of the enterprise, but the digital transformation is changing the game, and companies are changing how they play it. Some organizations made some real headway in their privacy programs, others are using the cloud movement to get more serious. Prioritizing protection for the various control points and what we attempt to detect and respond to is much clearer now, but another level of hard work must be done to evolve and adapt with the times. The organizations leading the way in this transformational opportunity have: Made it somewhere down the risk reduction maturity scale Are able to treat data loss prevention as another security tool Put more focus on process and the longer-term investment: people. In this video, Matt Reid, VP of Risk Management at ITS reflects on some notable moments in DLP adoption and discusses the most productive companies that we work with who are building true Insider Threat programs.</itunes:summary></item>
    
    <item>
      <title>7 keys to resolving security incidents faster than "People Speed"</title>
      <itunes:title>7 keys to resolving security incidents faster than "People Speed"</itunes:title>
      <pubDate>Wed, 20 Dec 2017 20:19:04 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7801f6deeed9280a49213aa58003b4f1]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/7-keys-to-resolving-security-incidents-faster-than-people-speed]]></link>
      <description><![CDATA[<p>Symantec solutions are essential for helping organizations protect and detect security incidents across the enterprise. But every incident still needs a response from the organization—and in some cases, the response needs to be lightning fast.</p> <p>The challenge is that most companies are still responding at "people speed"—following long runbooks, relying on multiple sources of data, moving data between spreadsheets, responding to long email threads, and creating manual reports. The incident response function is a chronically unstructured and unproductive process. But it doesn't have to be.</p> <p>In this video, we'll address the challenges and dysfunction majority of organizations face responding to security incidents and events. In particular, how to operationalize Symantec tools and services in conjunction with ServiceNow Security Incident Response from ITS.</p> <p>Leverage our specialized expertise in helping IT break free of the mundane. Learn how at http://its.partners/2DfKNDP</p>]]></description>
      
      <content:encoded><![CDATA[<p>Symantec solutions are essential for helping organizations protect and detect security incidents across the enterprise. But every incident still needs a response from the organization—and in some cases, the response needs to be lightning fast.</p> <p>The challenge is that most companies are still responding at "people speed"—following long runbooks, relying on multiple sources of data, moving data between spreadsheets, responding to long email threads, and creating manual reports. The incident response function is a chronically unstructured and unproductive process. But it doesn't have to be.</p> <p>In this video, we'll address the challenges and dysfunction majority of organizations face responding to security incidents and events. In particular, how to operationalize Symantec tools and services in conjunction with ServiceNow Security Incident Response from ITS.</p> <p>Leverage our specialized expertise in helping IT break free of the mundane. Learn how at http://its.partners/2DfKNDP</p>]]></content:encoded>
      
      
      <enclosure length="557812366" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/720keys20to20resolving20security20incidents20faster20than20E2809CPeople20Speed2220Recording.mp4?dest-id=91054"/>
      <itunes:duration>41:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>8</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/b/7/d/ab7dc82e16309942/Screen_Shot_2017-12-20_at_2.41.35_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Matt Reid</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Symantec solutions are essential for helping organizations protect and detect security incidents across the enterprise. But every incident still needs a response from the organization—and in some cases, the response needs to be lightning fast. The challenge is that most companies are still responding at "people speed"—following long runbooks, relying on multiple sources of data, moving data between spreadsheets, responding to long email threads, and creating manual reports. The incident response function is a chronically unstructured and unproductive process. But it doesn't have to be. In this video, we'll address the challenges and dysfunction majority of organizations face responding to security incidents and events. In particular, how to operationalize Symantec tools and services in conjunction with ServiceNow Security Incident Response from ITS. Leverage our specialized expertise in helping IT break free of the mundane. Learn how at http://its.partners/2DfKNDP</itunes:subtitle><itunes:summary>Symantec solutions are essential for helping organizations protect and detect security incidents across the enterprise. But every incident still needs a response from the organization—and in some cases, the response needs to be lightning fast. The challenge is that most companies are still responding at "people speed"—following long runbooks, relying on multiple sources of data, moving data between spreadsheets, responding to long email threads, and creating manual reports. The incident response function is a chronically unstructured and unproductive process. But it doesn't have to be. In this video, we'll address the challenges and dysfunction majority of organizations face responding to security incidents and events. In particular, how to operationalize Symantec tools and services in conjunction with ServiceNow Security Incident Response from ITS. Leverage our specialized expertise in helping IT break free of the mundane. Learn how at http://its.partners/2DfKNDP</itunes:summary></item>
    
    <item>
      <title>Security Operations: Incident Response</title>
      <itunes:title>Security Operations: Incident Response</itunes:title>
      <pubDate>Fri, 10 Nov 2017 20:19:49 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7469f61dbca0bb7528d3a5b040d5e14f]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/security-operations-incident-response]]></link>
      <description/>
      
      <content:encoded/>
      
      
      <enclosure length="483726521" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Edited_ServiceNow_SecOps_Incident_Response_v1-1_2.mp4?dest-id=91054"/>
      <itunes:duration>18:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/5/c/e/f5ce36b98f2cd333/Screen_Shot_2017-11-10_at_3.11.28_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Pat McPherson</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author></item>
    
    <item>
      <title>5 Awesome Features with Symantec's ATP 3.0</title>
      <itunes:title>5 Awesome Features with Symantec's ATP 3.0</itunes:title>
      <pubDate>Fri, 10 Nov 2017 12:23:44 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[2b5b42631e17b28094fd67c3a473f59b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/5-awesome-features-with-symantecs-atp-30]]></link>
      <description><![CDATA[<p class="first">Enterprises are increasingly under threat from sophisticated attacks. In fact, threats dwell in an organization's environment an average of 190 days! Security teams also face multiple challenges when attempting to detect and fully expose the extent of an advanced attack. Symantec's anticipated evolution to full-fledged Endpoint Detection and Response (EDR) is here to address this!</p> <p>There are a lot of enhancements in this latest version of Symantec's ATP, but we will focus on these 5 highlights in this video:</p> <p>1) Endpoint Activity Recorder - Continuous visibility across SEP endpoints<br /> 2) Search, filter and retrieve events for specific endpoints - Search, filter and retrieve events for specific endpoints<br /> 3) File-less threat detection - Detect and view suspicious script and memory exploits<br /> 4) Hybrid sandboxing - Detonate files on-premises or in the cloud<br /> 5) Enhanced APIs and integrations with Splunk, ServiceNow, QRadar - Ease custom integrations and leverage pre-built components</p> <p>Learn more at <a href="http://www.itsdelivers.com/" target= "_blank" rel="nofollow noopener noreferrer">itsdelivers.com</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first">Enterprises are increasingly under threat from sophisticated attacks. In fact, threats dwell in an organization's environment an average of 190 days! Security teams also face multiple challenges when attempting to detect and fully expose the extent of an advanced attack. Symantec's anticipated evolution to full-fledged Endpoint Detection and Response (EDR) is here to address this!</p> <p>There are a lot of enhancements in this latest version of Symantec's ATP, but we will focus on these 5 highlights in this video:</p> <p>1) Endpoint Activity Recorder - Continuous visibility across SEP endpoints 2) Search, filter and retrieve events for specific endpoints - Search, filter and retrieve events for specific endpoints 3) File-less threat detection - Detect and view suspicious script and memory exploits 4) Hybrid sandboxing - Detonate files on-premises or in the cloud 5) Enhanced APIs and integrations with Splunk, ServiceNow, QRadar - Ease custom integrations and leverage pre-built components</p> <p>Learn more at <a href="http://www.itsdelivers.com/" target= "_blank" rel="nofollow noopener noreferrer">itsdelivers.com</a></p>]]></content:encoded>
      
      
      <enclosure length="304250516" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ATP20320Final20Edit.mp4?dest-id=91054"/>
      <itunes:duration>17:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/1/f/6/31f6dca1db4a16c7/Screen_Shot_2017-11-09_at_5.27.11_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>John Higday</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Enterprises are increasingly under threat from sophisticated attacks. In fact, threats dwell in an organization's environment an average of 190 days! Security teams also face multiple challenges when attempting to detect and fully expose the extent of an advanced attack. Symantec's anticipated evolution to full-fledged Endpoint Detection and Response (EDR) is here to address this! There are a lot of enhancements in this latest version of Symantec's ATP, but we will focus on these 5 highlights in this video: 1) Endpoint Activity Recorder - Continuous visibility across SEP endpoints 2) Search, filter and retrieve events for specific endpoints - Search, filter and retrieve events for specific endpoints 3) File-less threat detection - Detect and view suspicious script and memory exploits 4) Hybrid sandboxing - Detonate files on-premises or in the cloud 5) Enhanced APIs and integrations with Splunk, ServiceNow, QRadar - Ease custom integrations and leverage pre-built components Learn more at itsdelivers.com</itunes:subtitle><itunes:summary>Enterprises are increasingly under threat from sophisticated attacks. In fact, threats dwell in an organization's environment an average of 190 days! Security teams also face multiple challenges when attempting to detect and fully expose the extent of an advanced attack. Symantec's anticipated evolution to full-fledged Endpoint Detection and Response (EDR) is here to address this! There are a lot of enhancements in this latest version of Symantec's ATP, but we will focus on these 5 highlights in this video: 1) Endpoint Activity Recorder - Continuous visibility across SEP endpoints 2) Search, filter and retrieve events for specific endpoints - Search, filter and retrieve events for specific endpoints 3) File-less threat detection - Detect and view suspicious script and memory exploits 4) Hybrid sandboxing - Detonate files on-premises or in the cloud 5) Enhanced APIs and integrations with Splunk, ServiceNow, QRadar - Ease custom integrations and leverage pre-built components Learn more at itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Patch compliance is not a delusion</title>
      <itunes:title>Patch compliance is not a delusion</itunes:title>
      <pubDate>Wed, 23 Aug 2017 19:35:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[487d227cfb547d16c886a4a475e5e9ce]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/patch-compliance-is-not-a-delusion]]></link>
      <description><![CDATA[<p>Let's face it, Patch Management historically hasn't been sexy. Despite it being a critical part of any security program, many organizations are still struggling to solve these challenges and often for good reason…it's complicated and rife with mundane activities and tasks. What's worse is that a majority of today's threats are exploiting these well-known and abundant vulnerabilities almost every week. Many are still missing the basics and falling for old tricks that end up causing serious problems.</p> <p>Here's the good news: a community of companies are mobilized to solve it and solve it correctly. Whether it's process improvement, or a foundational restart of their patch program, those companies that want to change and mature, very much can. We are seeing it.</p> <p>Working with over 1000 clients in various industries, we have been advising companies in this area of IT for over a decade. Join Bob Rabbitt and Matt Reid, Systems and Risk Management SMEs from ITS, for a video where they will demystify this whole thing and share what the most productive companies are doing to improve in this critical, yet fundamental area.</p> <p>more information at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Let's face it, Patch Management historically hasn't been sexy. Despite it being a critical part of any security program, many organizations are still struggling to solve these challenges and often for good reason…it's complicated and rife with mundane activities and tasks. What's worse is that a majority of today's threats are exploiting these well-known and abundant vulnerabilities almost every week. Many are still missing the basics and falling for old tricks that end up causing serious problems.</p> <p>Here's the good news: a community of companies are mobilized to solve it and solve it correctly. Whether it's process improvement, or a foundational restart of their patch program, those companies that want to change and mature, very much can. We are seeing it.</p> <p>Working with over 1000 clients in various industries, we have been advising companies in this area of IT for over a decade. Join Bob Rabbitt and Matt Reid, Systems and Risk Management SMEs from ITS, for a video where they will demystify this whole thing and share what the most productive companies are doing to improve in this critical, yet fundamental area.</p> <p>more information at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="843566168" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Patch20Compliance20Webcast20Final.mp4?dest-id=91054"/>
      <itunes:duration>53:31</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/3/2/d/232d5575c1658150/Patchcompliancevideoheader.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      <itunes:author>Chad Dupin</itunes:author>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Let's face it, Patch Management historically hasn't been sexy. Despite it being a critical part of any security program, many organizations are still struggling to solve these challenges and often for good reason…it's complicated and rife with mundane activities and tasks. What's worse is that a majority of today's threats are exploiting these well-known and abundant vulnerabilities almost every week. Many are still missing the basics and falling for old tricks that end up causing serious problems. Here's the good news: a community of companies are mobilized to solve it and solve it correctly. Whether it's process improvement, or a foundational restart of their patch program, those companies that want to change and mature, very much can. We are seeing it. Working with over 1000 clients in various industries, we have been advising companies in this area of IT for over a decade. Join Bob Rabbitt and Matt Reid, Systems and Risk Management SMEs from ITS, for a video where they will demystify this whole thing and share what the most productive companies are doing to improve in this critical, yet fundamental area. more information at www.itsdelivers.com</itunes:subtitle><itunes:summary>Let's face it, Patch Management historically hasn't been sexy. Despite it being a critical part of any security program, many organizations are still struggling to solve these challenges and often for good reason…it's complicated and rife with mundane activities and tasks. What's worse is that a majority of today's threats are exploiting these well-known and abundant vulnerabilities almost every week. Many are still missing the basics and falling for old tricks that end up causing serious problems. Here's the good news: a community of companies are mobilized to solve it and solve it correctly. Whether it's process improvement, or a foundational restart of their patch program, those companies that want to change and mature, very much can. We are seeing it. Working with over 1000 clients in various industries, we have been advising companies in this area of IT for over a decade. Join Bob Rabbitt and Matt Reid, Systems and Risk Management SMEs from ITS, for a video where they will demystify this whole thing and share what the most productive companies are doing to improve in this critical, yet fundamental area. more information at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Overcoming Roadblocks To DLP Maturity.mp4</title>
      <itunes:title>Overcoming Roadblocks To DLP Maturity</itunes:title>
      <pubDate>Wed, 12 Jul 2017 21:36:18 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[27fa00fbafa11f6b8921d00b50304b27]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/overcoming-roadblocks-to-dlp-maturitymp4]]></link>
      <description><![CDATA[<p>If you're wondering why you still aren't seeing the value from your DLP investment or can't seem to move up the maturity scale, you need to watch this video. Many organizations invest in a DLP solution thinking that it will simply plug into their environment and begin preventing data loss. Not true. As with most IT investments, there is more to solving the problem than simply buying a tool. In this webinar we'll highlight the common mistakes we see organizations make once the dust has settled with an initial DLP implementation. That said, we don't want to just describe problems without providing solutions! As we discuss the common mistakes made when managing DLP, we'll also describe how ITS can help you move past those issues and achieve the outcomes you have hoped and dreamed of. more information at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>If you're wondering why you still aren't seeing the value from your DLP investment or can't seem to move up the maturity scale, you need to watch this video. Many organizations invest in a DLP solution thinking that it will simply plug into their environment and begin preventing data loss. Not true. As with most IT investments, there is more to solving the problem than simply buying a tool. In this webinar we'll highlight the common mistakes we see organizations make once the dust has settled with an initial DLP implementation. That said, we don't want to just describe problems without providing solutions! As we discuss the common mistakes made when managing DLP, we'll also describe how ITS can help you move past those issues and achieve the outcomes you have hoped and dreamed of. more information at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="573132225" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Overcoming20Roadblocks20To20DLP20Maturity.mp4?dest-id=91054"/>
      <itunes:duration>40:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/c/4/0/8c401f87abd7e176/Screen_Shot_2017-07-12_at_3.49.10_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>If you're wondering why you still aren't seeing the value from your DLP investment or can't seem to move up the maturity scale, you need to watch this video. Many organizations invest in a DLP solution thinking that it will simply plug into their environment and begin preventing data loss. Not true. As with most IT investments, there is more to solving the problem than simply buying a tool. In this webinar we'll highlight the common mistakes we see organizations make once the dust has settled with an initial DLP implementation. That said, we don't want to just describe problems without providing solutions! As we discuss the common mistakes made when managing DLP, we'll also describe how ITS can help you move past those issues and achieve the outcomes you have hoped and dreamed of. more information at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>If you're wondering why you still aren't seeing the value from your DLP investment or can't seem to move up the maturity scale, you need to watch this video. Many organizations invest in a DLP solution thinking that it will simply plug into their environment and begin preventing data loss. Not true. As with most IT investments, there is more to solving the problem than simply buying a tool. In this webinar we'll highlight the common mistakes we see organizations make once the dust has settled with an initial DLP implementation. That said, we don't want to just describe problems without providing solutions! As we discuss the common mistakes made when managing DLP, we'll also describe how ITS can help you move past those issues and achieve the outcomes you have hoped and dreamed of. more information at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Don't lose your job over Windows 10</title>
      <itunes:title>Don't lose your job over Windows 10</itunes:title>
      <pubDate>Thu, 04 May 2017 18:07:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[21db87d614a4a7ec3a6c3d50fcfef0fb]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/dont-lose-your-job-over-windows-10]]></link>
      <description><![CDATA[<p class="first">If your organization has already completed the migration to Windows 10, there's really no reason to watch this video. Congratulations!</p> <p>However, if you're unsure, stuck or frustrated, this event is for you. Like… specifically you.</p> <p>2 million and counting…Over the past several months, we've set migrations in motion for over 2 million endpoints. This is a big enough sample size to draw some relevant conclusions and we think it's time to raise the community consciousness around this set of challenges.</p> <p>If you're a CIO and you're not personally involved in your Windows 10 migration, you're at risk right now. Microsoft is following through on the positions they've staked out and the safe havens you thought would be there are gone.</p> <p>Many organizations assume this migration is the same old refresh cycle they know very well, but the couldn't be more wrong.</p> <p>Need more evidence to watch this video?</p> <p>You already know the endpoint is the number one exploit vector. Wherever end user fingertips touch, they're going to test your security posture. Windows 10 provides you the best possible footing for security at the endpoint and we find most organizations don't even know about all the new capabilities at their disposal.</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first">If your organization has already completed the migration to Windows 10, there's really no reason to watch this video. Congratulations!</p> <p>However, if you're unsure, stuck or frustrated, this event is for you. Like… specifically you.</p> <p>2 million and counting…Over the past several months, we've set migrations in motion for over 2 million endpoints. This is a big enough sample size to draw some relevant conclusions and we think it's time to raise the community consciousness around this set of challenges.</p> <p>If you're a CIO and you're not personally involved in your Windows 10 migration, you're at risk right now. Microsoft is following through on the positions they've staked out and the safe havens you thought would be there are gone.</p> <p>Many organizations assume this migration is the same old refresh cycle they know very well, but the couldn't be more wrong.</p> <p>Need more evidence to watch this video?</p> <p>You already know the endpoint is the number one exploit vector. Wherever end user fingertips touch, they're going to test your security posture. Windows 10 provides you the best possible footing for security at the endpoint and we find most organizations don't even know about all the new capabilities at their disposal.</p>]]></content:encoded>
      
      
      <enclosure length="541161914" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/DonE28099t20lose20your20job20over20Windows201020Final.mp4?dest-id=91054"/>
      <itunes:duration>29:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/6/a/d/a6ad79a1d927e2ae/Screen_Shot_2017-05-04_at_1.43.08_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>If your organization has already completed the migration to Windows 10, there's really no reason to watch this video. Congratulations! However, if you're unsure, stuck or frustrated, this event is for you. Like… specifically you. 2 million and counting…Over the past several months, we've set migrations in motion for over 2 million endpoints. This is a big enough sample size to draw some relevant conclusions and we think it's time to raise the community consciousness around this set of challenges. If you're a CIO and you're not personally involved in your Windows 10 migration, you're at risk right now. Microsoft is following through on the positions they've staked out and the safe havens you thought would be there are gone. Many organizations assume this migration is the same old refresh cycle they know very well, but the couldn't be more wrong. Need more evidence to watch this video? You already know the endpoint is the number one exploit vector. Wherever end user fingertips touch, they're going to test your security posture. Windows 10 provides you the best possible footing for security at the endpoint and we find most organizations don't even know about all the new capabilities at their disposal.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>If your organization has already completed the migration to Windows 10, there's really no reason to watch this video. Congratulations! However, if you're unsure, stuck or frustrated, this event is for you. Like… specifically you. 2 million and counting…Over the past several months, we've set migrations in motion for over 2 million endpoints. This is a big enough sample size to draw some relevant conclusions and we think it's time to raise the community consciousness around this set of challenges. If you're a CIO and you're not personally involved in your Windows 10 migration, you're at risk right now. Microsoft is following through on the positions they've staked out and the safe havens you thought would be there are gone. Many organizations assume this migration is the same old refresh cycle they know very well, but the couldn't be more wrong. Need more evidence to watch this video? You already know the endpoint is the number one exploit vector. Wherever end user fingertips touch, they're going to test your security posture. Windows 10 provides you the best possible footing for security at the endpoint and we find most organizations don't even know about all the new capabilities at their disposal.</itunes:summary></item>
    
    <item>
      <title>Keeping Windows 10 in orbit – The Systems Management Guide</title>
      <itunes:title>Keeping Windows 10 in orbit – The Systems Management Guide</itunes:title>
      <pubDate>Wed, 29 Mar 2017 23:43:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[94964c8ac957ec9290c1c0619b5dd341]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/keeping-windows-10-in-orbit-the-systems-management-guide]]></link>
      <description><![CDATA[<p class="first">We've discovered the launch codes for keeping Windows 10 in orbit in any organization, no matter what systems management solution you use.</p> <p>Here's the trick – you have to be at the right level for your current maturity. Aim too low and you'll crash and burn. Aim too high and you'll just float away into the dark expanse of space… where no one can hear you scream.</p> <p>In this video, Troy Whittaker will be sharing 5 key insights that will help you navigate the significant challenges you're already facing:</p> <p>1.) Why there are no more safe havens to avoid migrating to Windows 10<br /> 2.) How understanding Microsoft's philosophy will help you see what's coming and how it will affect you<br /> 3.) Why the traditional on-premise approach to systems management isn't going to work in the new Windows World<br /> 4.) What the new model for systems management will look like<br /> 5.) 2 paths forward you can take to get from where you are today to where you need to be</p> <p>more at <a href="http://www.itsdelivers.com/" target="_blank" rel="nofollow noopener noreferrer">itsdelivers.com</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first">We've discovered the launch codes for keeping Windows 10 in orbit in any organization, no matter what systems management solution you use.</p> <p>Here's the trick – you have to be at the right level for your current maturity. Aim too low and you'll crash and burn. Aim too high and you'll just float away into the dark expanse of space… where no one can hear you scream.</p> <p>In this video, Troy Whittaker will be sharing 5 key insights that will help you navigate the significant challenges you're already facing:</p> <p>1.) Why there are no more safe havens to avoid migrating to Windows 10 2.) How understanding Microsoft's philosophy will help you see what's coming and how it will affect you 3.) Why the traditional on-premise approach to systems management isn't going to work in the new Windows World 4.) What the new model for systems management will look like 5.) 2 paths forward you can take to get from where you are today to where you need to be</p> <p>more at <a href="http://www.itsdelivers.com/" target="_blank" rel="nofollow noopener noreferrer">itsdelivers.com</a></p>]]></content:encoded>
      
      
      <enclosure length="739769230" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Windows1020Webcast2003291720Final.mp4?dest-id=91054"/>
      <itunes:duration>45:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/5/1/0/0510475640294fec/Windows-10-Webcast-Replay-Header.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>We've discovered the launch codes for keeping Windows 10 in orbit in any organization, no matter what systems management solution you use. Here's the trick – you have to be at the right level for your current maturity. Aim too low and you'll crash and burn. Aim too high and you'll just float away into the dark expanse of space… where no one can hear you scream. In this video, Troy Whittaker will be sharing 5 key insights that will help you navigate the significant challenges you're already facing: 1.) Why there are no more safe havens to avoid migrating to Windows 10 2.) How understanding Microsoft's philosophy will help you see what's coming and how it will affect you 3.) Why the traditional on-premise approach to systems management isn't going to work in the new Windows World 4.) What the new model for systems management will look like 5.) 2 paths forward you can take to get from where you are today to where you need to be more at itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>We've discovered the launch codes for keeping Windows 10 in orbit in any organization, no matter what systems management solution you use. Here's the trick – you have to be at the right level for your current maturity. Aim too low and you'll crash and burn. Aim too high and you'll just float away into the dark expanse of space… where no one can hear you scream. In this video, Troy Whittaker will be sharing 5 key insights that will help you navigate the significant challenges you're already facing: 1.) Why there are no more safe havens to avoid migrating to Windows 10 2.) How understanding Microsoft's philosophy will help you see what's coming and how it will affect you 3.) Why the traditional on-premise approach to systems management isn't going to work in the new Windows World 4.) What the new model for systems management will look like 5.) 2 paths forward you can take to get from where you are today to where you need to be more at itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Don't Fall for Shiny Toy Syndrome</title>
      <itunes:title>Don't Fall for Shiny Toy Syndrome</itunes:title>
      <pubDate>Fri, 24 Mar 2017 19:15:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[d1b132cd18bdc7a4932904cb5857bb09]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/-dont-fall-for-shiny-toy-syndrome]]></link>
      <description><![CDATA[<p>Coming out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace.</p> <p>But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Coming out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace.</p> <p>But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.</p>]]></content:encoded>
      
      
      <enclosure length="428367970" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Shiny_Objects_Webcast_Small.mp4?dest-id=91054"/>
      <itunes:duration>51:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>6</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Coming out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace. But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Coming out of RSA this year, we're reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It's easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that's just it; it's become a vast marketplace. But before some shiny new toy gets your attention, make sure that your current tool set couldn't be better optimized. Or ensure a low hanging legacy technology wouldn't address a key gap.</itunes:summary></item>
    
    <item>
      <title>Challenging the status quo of IT Management: Keeping users productive and protected.</title>
      <itunes:title>Challenging the status quo of IT Management: Keeping users productive and protected.</itunes:title>
      <pubDate>Tue, 15 Nov 2016 21:23:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c037b800064685c69f0e939f550a4e38]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/challenging-the-status-quo-of-it-management-keeping-users-productive-and-protected]]></link>
      <description><![CDATA[<h2>What IT leaders can learn from "open world" games like Grand Theft Auto and Minecraft.</h2> <p>"Open world" games like Grand Theft Auto and Minecraft have transformed the gaming industry and have made a huge impact on our culture because of one simple reason: <strong>They give players freedom and control over how they play.</strong> Instead of a linear, structured track controlled by the game developers, players can choose their own path and approach.</p> <p><strong>The equivalent transformation is happening in IT––end users expect freedom in how they work. This new era is bogging down IT Management teams–the status quo isn't working.</strong></p> <h3>Learn how other IT leaders are dealing with the challenge of keeping users productive AND protected.</h3> <ul> <li>What IT leaders can learn from games like Grand Theft Auto and Minecraft</li> <li>How the productivity demands of digitally-savvy users are changing IT Management</li> <li>Why IT Management is more critical than ever – understanding the rising challenges and costly implications</li> <li>Top reasons why so many IT Management teams are bogged down and struggling to manage everything</li> <li><strong>The 7 key doctrines of IT management followed by the most productive teams on the planet</strong></li> </ul>]]></description>
      
      <content:encoded><![CDATA[What IT leaders can learn from "open world" games like Grand Theft Auto and Minecraft. <p>"Open world" games like Grand Theft Auto and Minecraft have transformed the gaming industry and have made a huge impact on our culture because of one simple reason: They give players freedom and control over how they play. Instead of a linear, structured track controlled by the game developers, players can choose their own path and approach.</p> <p>The equivalent transformation is happening in IT––end users expect freedom in how they work. This new era is bogging down IT Management teams–the status quo isn't working.</p> Learn how other IT leaders are dealing with the challenge of keeping users productive AND protected. <ul> <li>What IT leaders can learn from games like Grand Theft Auto and Minecraft</li> <li>How the productivity demands of digitally-savvy users are changing IT Management</li> <li>Why IT Management is more critical than ever – understanding the rising challenges and costly implications</li> <li>Top reasons why so many IT Management teams are bogged down and struggling to manage everything</li> <li>The 7 key doctrines of IT management followed by the most productive teams on the planet</li> </ul>]]></content:encoded>
      
      
      <enclosure length="858407894" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/PITM_webcast_FINAL.mp4?dest-id=91054"/>
      <itunes:duration>43:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/c/e/c/3cecdc9454d352c9/PITM-Header-VIDEO.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>What IT leaders can learn from "open world" games like Grand Theft Auto and Minecraft. "Open world" games like Grand Theft Auto and Minecraft have transformed the gaming industry and have made a huge impact on our culture because of one simple reason: They give players freedom and control over how they play. Instead of a linear, structured track controlled by the game developers, players can choose their own path and approach. The equivalent transformation is happening in IT––end users expect freedom in how they work. This new era is bogging down IT Management teams–the status quo isn't working. Learn how other IT leaders are dealing with the challenge of keeping users productive AND protected. What IT leaders can learn from games like Grand Theft Auto and Minecraft How the productivity demands of digitally-savvy users are changing IT Management Why IT Management is more critical than ever – understanding the rising challenges and costly implications Top reasons why so many IT Management teams are bogged down and struggling to manage everything The 7 key doctrines of IT management followed by the most productive teams on the planet</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>What IT leaders can learn from "open world" games like Grand Theft Auto and Minecraft. "Open world" games like Grand Theft Auto and Minecraft have transformed the gaming industry and have made a huge impact on our culture because of one simple reason: They give players freedom and control over how they play. Instead of a linear, structured track controlled by the game developers, players can choose their own path and approach. The equivalent transformation is happening in IT––end users expect freedom in how they work. This new era is bogging down IT Management teams–the status quo isn't working. Learn how other IT leaders are dealing with the challenge of keeping users productive AND protected. What IT leaders can learn from games like Grand Theft Auto and Minecraft How the productivity demands of digitally-savvy users are changing IT Management Why IT Management is more critical than ever – understanding the rising challenges and costly implications Top reasons why so many IT Management teams are bogged down and struggling to manage everything The 7 key doctrines of IT management followed by the most productive teams on the planet</itunes:summary></item>
    
    <item>
      <title>Ten Mistakes Not to Make When Implementing ITAM/SAM</title>
      <itunes:title>Ten Mistakes Not to Make When Implementing ITAM/SAM</itunes:title>
      <pubDate>Wed, 05 Oct 2016 15:12:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6d0367b4966e0eb9325bbe577e11ede0]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/ten-mistakes-not-to-make-when-implementing-itamsam]]></link>
      <description><![CDATA[<p>Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This video will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, this one hour video will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative.<br /> Presenters:<br /> Yvette Mathews, Senior Consultant, ITAM, ITS Partners<br /> Patricia Adams, ITAM Evangelist, LANDESK</p>]]></description>
      
      <content:encoded><![CDATA[<p>Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This video will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, this one hour video will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative. Presenters: Yvette Mathews, Senior Consultant, ITAM, ITS Partners Patricia Adams, ITAM Evangelist, LANDESK</p>]]></content:encoded>
      
      
      <enclosure length="986595871" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Ten_Mistakes_ITAM_Webcat.mp4?dest-id=91054"/>
      <itunes:duration>52:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/2/4/7/62472bc8d331af2b/10-Mistakes.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This video will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, this one hour video will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative. Presenters: Yvette Mathews, Senior Consultant, ITAM, ITS Partners Patricia Adams, ITAM Evangelist, LANDESK</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This video will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, this one hour video will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative. Presenters: Yvette Mathews, Senior Consultant, ITAM, ITS Partners Patricia Adams, ITAM Evangelist, LANDESK</itunes:summary></item>
    
    <item>
      <title>Symantec Data Loss Prevention 14.5 Form Recognition</title>
      <itunes:title>Symantec Data Loss Prevention 14.5 Form Recognition</itunes:title>
      <pubDate>Fri, 16 Sep 2016 16:07:37 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[581bfd173ae655413485ac740be558b9]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-data-loss-prevention-145-form-recognition]]></link>
      <description><![CDATA[<p>In this quick demo, Pat McPherson of ITS Partners, shows how Data Loss Prevention Form Recognition allows organizations to detect sensitive information that is contained on forms in a variety of image formats.</p> <p>Learn more at: https://www.itsdelivers.com/solutions/it-risk-management/</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this quick demo, Pat McPherson of ITS Partners, shows how Data Loss Prevention Form Recognition allows organizations to detect sensitive information that is contained on forms in a variety of image formats.</p> <p>Learn more at: https://www.itsdelivers.com/solutions/it-risk-management/</p>]]></content:encoded>
      
      
      <enclosure length="292269696" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/DLP_Forms_With_Edits_Final.mp4?dest-id=91054"/>
      <itunes:duration>14:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/b/6/3/7b630c9954aa6aa5/Symantec-Data-Loss-Prevention-14.5-Form-Recognition-Header.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this quick demo, Pat McPherson of ITS Partners, shows how Data Loss Prevention Form Recognition allows organizations to detect sensitive information that is contained on forms in a variety of image formats. Learn more at: https://www.itsdelivers.com/solutions/it-risk-management/</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this quick demo, Pat McPherson of ITS Partners, shows how Data Loss Prevention Form Recognition allows organizations to detect sensitive information that is contained on forms in a variety of image formats. Learn more at: https://www.itsdelivers.com/solutions/it-risk-management/</itunes:summary></item>
    
    <item>
      <title>BigFoot and the Security Drones</title>
      <itunes:title>BigFoot and the Security Drones</itunes:title>
      <pubDate>Mon, 12 Sep 2016 16:58:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b88df7bfe9aa504fe94e50de0c342e84]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/bigfoot-and-the-security-drones]]></link>
      <description><![CDATA[<p class="p1"><span class="s1"><strong>Productivity, not visibility, is the key to maturing risk management.</strong></span></p> <p class="p2"><span class="s1">Obviously BigFoot is not happy about the drone bothering his family.</span></p> <p class="p3"><span class="s1"><a href= "https://www.itsdelivers.com/solutions/it-risk-management/"><strong> Learn more about our IT Risk Management team today.</strong></a></span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="p1">Productivity, not visibility, is the key to maturing risk management.</p> <p class="p2">Obviously BigFoot is not happy about the drone bothering his family.</p> <p class="p3"><a href= "https://www.itsdelivers.com/solutions/it-risk-management/"> Learn more about our IT Risk Management team today.</a></p>]]></content:encoded>
      
      
      <enclosure length="38582286" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Big_Foot_Drone_Final.mp4?dest-id=91054"/>
      <itunes:duration>35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/f/6/b/7f6b81dbf8d3f121/Screen_Shot_2016-09-12_at_12.52.26_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Productivity, not visibility, is the key to maturing risk management. Obviously BigFoot is not happy about the drone bothering his family. Learn more about our IT Risk Management team today.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Productivity, not visibility, is the key to maturing risk management. Obviously BigFoot is not happy about the drone bothering his family. Learn more about our IT Risk Management team today.</itunes:summary></item>
    
    <item>
      <title>Symantec Advanced Threat Protection (ATP) 2.0.2 Update</title>
      <itunes:title>Symantec Advanced Threat Protection (ATP) 2.0.2 Update</itunes:title>
      <pubDate>Thu, 16 Jun 2016 17:47:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[77b4aea4f27bd0e160e5cee0d6d7c2e8]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-advanced-threat-protection-atp-202-update]]></link>
      <description><![CDATA[<p>In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment.</p> <p>Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.</p> <p>Download our ATP whitepaper at https://www.itsdelivers.com/white-paper-the-arms-race-to-stop-advanced-threats/</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment.</p> <p>Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.</p> <p>Download our ATP whitepaper at https://www.itsdelivers.com/white-paper-the-arms-race-to-stop-advanced-threats/</p>]]></content:encoded>
      
      
      <enclosure length="95056792" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ATP_2.0.2_Update.mp4?dest-id=91054"/>
      <itunes:duration>04:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/a/2/f/ca2f63e2d218a5e0/Screen_Shot_2016-06-16_at_1.47.02_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment. Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console. Download our ATP whitepaper at https://www.itsdelivers.com/white-paper-the-arms-race-to-stop-advanced-threats/</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment. Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console. Download our ATP whitepaper at https://www.itsdelivers.com/white-paper-the-arms-race-to-stop-advanced-threats/</itunes:summary></item>
    
    <item>
      <title>Is 2016 the year for ransomware?</title>
      <itunes:title>Is 2016 the year for ransomware?</itunes:title>
      <pubDate>Fri, 11 Mar 2016 19:07:31 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[afcd1ee8a30d4c07f5b91aa61d330d49]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/is-2016-the-year-for-ransomware]]></link>
      <description><![CDATA[<p>Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015. Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before.</p>
<p>Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk.</p>
<p>While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing.</p>
<p>Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners.</p>
<p>Learn more at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015. Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before.</p> <p>Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk.</p> <p>While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing.</p> <p>Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners.</p> <p>Learn more at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="894214203" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/2016_RANSOMWARE_WEBCAST_FINAL.mp4?dest-id=91054"/>
      <itunes:duration>59:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/5/2/5/d5258b68b4981f1b/Screen_Shot_2016-03-11_at_1.29.21_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015. Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before. Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk. While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing. Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners. Learn more at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015. Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before. Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk. While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing. Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners. Learn more at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Advanced Threat Protection – Identify, prioritize and remediate today's threats, leveraging your existing Symantec solutions</title>
      <itunes:title>Advanced Threat Protection – Identify, prioritize and remediate today's threats, leveraging your existing Symantec solutions</itunes:title>
      <pubDate>Tue, 26 Jan 2016 13:27:50 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[8902f23045558d223a091cb2ccf6009c]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/advanced-threat-protection-identify-prioritize-and-remediate-todays-threats-leveraging-your-existing-symantec-solutions]]></link>
      <description><![CDATA[<p>Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when.</p>
<p>Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen:<br />~ Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR)<br />~ 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report)<br />~ On average, data breaches were detected 243 days after they happened (Source: Ponemon)<br />~ And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report)</p>
<p>Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!</p>]]></description>
      
      <content:encoded><![CDATA[<p>Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when.</p> <p>Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen:~ Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR)~ 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report)~ On average, data breaches were detected 243 days after they happened (Source: Ponemon)~ And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report)</p> <p>Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!</p>]]></content:encoded>
      
      
      <enclosure length="723605410" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ATP_Webcast_Final_Edit.mp4?dest-id=91054"/>
      <itunes:duration>58:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>5</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/3/a/2/43a28e7633ef1d70/Webinar_ATP_Banner_Jan2016.jpg"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when. Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen: ~ Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR) ~ 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report) ~ On average, data breaches were detected 243 days after they happened (Source: Ponemon) ~ And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report) Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when. Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen: ~ Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR) ~ 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report) ~ On average, data breaches were detected 243 days after they happened (Source: Ponemon) ~ And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report) Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!</itunes:summary></item>
    
    <item>
      <title>Actionable Integration: ServiceNow to Microsoft SCCM</title>
      <itunes:title>Actionable Integration: ServiceNow to Microsoft SCCM</itunes:title>
      <pubDate>Wed, 26 Aug 2015 13:36:34 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[24ccc53a5253f4351acc9f972eefe13f]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/actionable-integration-servicenow-to-microsoft-sccm]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">THE CHALLENGE:<br />Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organizations lack the automation and integration to meet these expectations, instead they rely upon manual action to fulfill the employee’s request.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">THE SOLUTION:<br />ITS Partners solves this issue with an Actionable Integration between ServiceNow and Microsoft SCCM. This integration automates the SCCM software delivery and client actions from ServiceNow. The integration is compatible with SCCM 2007 through 2012 R2. Automation occurs by executing a SCCM software delivery and client actions from a Service Catalog Software Request or from a link on a form. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. ServiceNow Orchestration is not a requirement.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Features of the Actionable Integration: ServiceNow to SCCM<br />1) Execute SCCM software delivery and client actions on computers managed by SCCM and imported from SCCM<br />2) From a link within an Incident record<br />3) From a Service Catalog Item request for Software with automated task deliver from SCCM</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">More info: <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/integrations/servicenow-to-sccm/" target="_blank" rel="nofollow">itsdelivers.com/integrations/servicenow-to-sccm/</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">THE CHALLENGE:Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organizations lack the automation and integration to meet these expectations, instead they rely upon manual action to fulfill the employee’s request.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">THE SOLUTION:ITS Partners solves this issue with an Actionable Integration between ServiceNow and Microsoft SCCM. This integration automates the SCCM software delivery and client actions from ServiceNow. The integration is compatible with SCCM 2007 through 2012 R2. Automation occurs by executing a SCCM software delivery and client actions from a Service Catalog Software Request or from a link on a form. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. ServiceNow Orchestration is not a requirement.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Features of the Actionable Integration: ServiceNow to SCCM1) Execute SCCM software delivery and client actions on computers managed by SCCM and imported from SCCM2) From a link within an Incident record3) From a Service Catalog Item request for Software with automated task deliver from SCCM</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">More info: <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/integrations/servicenow-to-sccm/" target="_blank" rel="nofollow">itsdelivers.com/integrations/servicenow-to-sccm/</a></p>]]></content:encoded>
      
      
      <enclosure length="183881372" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Actionable_Integration-ServiceNow_to_SCCM_full_length.mp4?dest-id=91054"/>
      <itunes:duration>10:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>18</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/5/0/8/e/508e5e3de02504c9/Screen_Shot_2015-08-26_at_9.20.52_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organizations lack the automation and integration to meet these expectations, instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION: ITS Partners solves this issue with an Actionable Integration between ServiceNow and Microsoft SCCM. This integration automates the SCCM software delivery and client actions from ServiceNow. The integration is compatible with SCCM 2007 through 2012 R2. Automation occurs by executing a SCCM software delivery and client actions from a Service Catalog Software Request or from a link on a form. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. ServiceNow Orchestration is not a requirement. Features of the Actionable Integration: ServiceNow to SCCM 1) Execute SCCM software delivery and client actions on computers managed by SCCM and imported from SCCM 2) From a link within an Incident record 3) From a Service Catalog Item request for Software with automated task deliver from SCCM More info: itsdelivers.com/integrations/servicenow-to-sccm/</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organizations lack the automation and integration to meet these expectations, instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION: ITS Partners solves this issue with an Actionable Integration between ServiceNow and Microsoft SCCM. This integration automates the SCCM software delivery and client actions from ServiceNow. The integration is compatible with SCCM 2007 through 2012 R2. Automation occurs by executing a SCCM software delivery and client actions from a Service Catalog Software Request or from a link on a form. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. ServiceNow Orchestration is not a requirement. Features of the Actionable Integration: ServiceNow to SCCM 1) Execute SCCM software delivery and client actions on computers managed by SCCM and imported from SCCM 2) From a link within an Incident record 3) From a Service Catalog Item request for Software with automated task deliver from SCCM More info: itsdelivers.com/integrations/servicenow-to-sccm/</itunes:summary></item>
    
    <item>
      <title>Rolling Out Strong Authentication: Symantec VIP v9.6</title>
      <itunes:title>Rolling Out Strong Authentication: Symantec VIP v9.6</itunes:title>
      <pubDate>Tue, 25 Aug 2015 12:58:40 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7d7bad82f9bcf5172f5fde7c08356753]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/rolling-our-strong-authentication-symantec-vip-v96]]></link>
      <description><![CDATA[<p>Are you implementing with compliance in mind, aiming to protect information?</p>
<p>Will it go beyond VPN and embrace the mobile workforce?</p>
<p>How do you avoid burdening the IT staff or end users?</p>
<p>The consequences of inadequate security are pretty well understood today.  Penalties for regulatory noncompliance, loss of confidential information or damage to brand are also top concerns for organizations.  But, while many organizations are locking doors with security safeguards such as firewalls and IDS, they are inadvertently opening windows to corporate information via mobile devices, rogue clouds and web 2.0 apps.</p>
<p>A 2FA solution must not only provide high levels of protection, it should be adaptive, easy to manage as well as easy to use.</p>
<p>In this webinar we’ll dive deep into the 3 key things you should consider when attempting to solve the challenges of strong authentication for your organization. Solution Spotlight will be Validation and Identity Protection (VIP), a market leading 2FA solution offered by Symantec.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Are you implementing with compliance in mind, aiming to protect information?</p> <p>Will it go beyond VPN and embrace the mobile workforce?</p> <p>How do you avoid burdening the IT staff or end users?</p> <p>The consequences of inadequate security are pretty well understood today. Penalties for regulatory noncompliance, loss of confidential information or damage to brand are also top concerns for organizations. But, while many organizations are locking doors with security safeguards such as firewalls and IDS, they are inadvertently opening windows to corporate information via mobile devices, rogue clouds and web 2.0 apps.</p> <p>A 2FA solution must not only provide high levels of protection, it should be adaptive, easy to manage as well as easy to use.</p> <p>In this webinar we’ll dive deep into the 3 key things you should consider when attempting to solve the challenges of strong authentication for your organization. Solution Spotlight will be Validation and Identity Protection (VIP), a market leading 2FA solution offered by Symantec.</p>]]></content:encoded>
      
      
      <enclosure length="475052607" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Getting_Ready_To_Rollout_Strong_Authentication_Final.mp4?dest-id=91054"/>
      <itunes:duration>30:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>17</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/6/c/c/a6cc5f8ce27e01f1/Screen_Shot_2015-08-25_at_8.52.05_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Are you implementing with compliance in mind, aiming to protect information? Will it go beyond VPN and embrace the mobile workforce? How do you avoid burdening the IT staff or end users? The consequences of inadequate security are pretty well understood today.  Penalties for regulatory noncompliance, loss of confidential information or damage to brand are also top concerns for organizations.  But, while many organizations are locking doors with security safeguards such as firewalls and IDS, they are inadvertently opening windows to corporate information via mobile devices, rogue clouds and web 2.0 apps. A 2FA solution must not only provide high levels of protection, it should be adaptive, easy to manage as well as easy to use. In this webinar we’ll dive deep into the 3 key things you should consider when attempting to solve the challenges of strong authentication for your organization. Solution Spotlight will be Validation and Identity Protection (VIP), a market leading 2FA solution offered by Symantec.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Are you implementing with compliance in mind, aiming to protect information? Will it go beyond VPN and embrace the mobile workforce? How do you avoid burdening the IT staff or end users? The consequences of inadequate security are pretty well understood today.  Penalties for regulatory noncompliance, loss of confidential information or damage to brand are also top concerns for organizations.  But, while many organizations are locking doors with security safeguards such as firewalls and IDS, they are inadvertently opening windows to corporate information via mobile devices, rogue clouds and web 2.0 apps. A 2FA solution must not only provide high levels of protection, it should be adaptive, easy to manage as well as easy to use. In this webinar we’ll dive deep into the 3 key things you should consider when attempting to solve the challenges of strong authentication for your organization. Solution Spotlight will be Validation and Identity Protection (VIP), a market leading 2FA solution offered by Symantec.</itunes:summary></item>
    
    <item>
      <title>Actionable Integration: ServiceNow to Altiris (available on Fuji)</title>
      <itunes:title>Actionable Integration: ServiceNow to Altiris (available on Fuji)</itunes:title>
      <pubDate>Fri, 14 Aug 2015 16:03:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[980563260bc293e629ad1aba1be1e7b9]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/actionable-integration-servicenow-to-altiris-available-on-fuji]]></link>
      <description><![CDATA[<p><strong>THE CHALLENGE</strong></p>
<p>Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.</p>
<p>One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request.</p>
<p><strong>THE SOLUTION</strong></p>
<p>ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5.</p>
<p>Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software.  The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software.</p>
<p>Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required.</p>
<p><strong>Features of the Actionable Integration: ServiceNow to Altiris:</strong></p>
<p> </p>
<p>*Import Core Data – Computers Data from Altiris 7.5</p>
<p>     *With related Installed Software, Physical and Virtual Disks, & Network Adapters</p>
<p>*Execute Altiris tasks on Computers managed by Altiris and imported from Altiris</p>
<p>     *From a link within an Incident record</p>
<p>     *From a link within a Computer record</p>
<p>     *From a Service Catalog Item request for Software with automated task deliver from Altiris</p>]]></description>
      
      <content:encoded><![CDATA[<p>THE CHALLENGE</p> <p>Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.</p> <p>One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request.</p> <p>THE SOLUTION</p> <p>ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5.</p> <p>Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software.</p> <p>Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required.</p> <p>Features of the Actionable Integration: ServiceNow to Altiris:</p> <p> </p> <p>*Import Core Data – Computers Data from Altiris 7.5</p> <p> *With related Installed Software, Physical and Virtual Disks, & Network Adapters</p> <p>*Execute Altiris tasks on Computers managed by Altiris and imported from Altiris</p> <p> *From a link within an Incident record</p> <p> *From a link within a Computer record</p> <p> *From a Service Catalog Item request for Software with automated task deliver from Altiris</p>]]></content:encoded>
      
      
      <enclosure length="141735890" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/AI-Altiris-Fuji2-Final.mp4?dest-id=91054"/>
      <itunes:duration>06:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>16</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/f/7/5/0f752cd0b8bb0808/Screen_Shot_2015-08-14_at_11.56.16_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>THE CHALLENGE Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5. Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software.  The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required. Features of the Actionable Integration: ServiceNow to Altiris:   *Import Core Data – Computers Data from Altiris 7.5      *With related Installed Software, Physical and Virtual Disks, &amp; Network Adapters *Execute Altiris tasks on Computers managed by Altiris and imported from Altiris      *From a link within an Incident record      *From a link within a Computer record      *From a Service Catalog Item request for Software with automated task deliver from Altiris</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>THE CHALLENGE Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5. Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software.  The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required. Features of the Actionable Integration: ServiceNow to Altiris:   *Import Core Data – Computers Data from Altiris 7.5      *With related Installed Software, Physical and Virtual Disks, &amp; Network Adapters *Execute Altiris tasks on Computers managed by Altiris and imported from Altiris      *From a link within an Incident record      *From a link within a Computer record      *From a Service Catalog Item request for Software with automated task deliver from Altiris</itunes:summary></item>
    
    <item>
      <title>Ready to upgrade your enterprise? ITS Delivers Windows10!</title>
      <itunes:title>Ready to upgrade your enterprise? ITS Delivers Windows10!</itunes:title>
      <pubDate>Thu, 06 Aug 2015 14:39:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3b2c30b9aef3abe95d5559b1fd2279f2]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/ready-to-upgrade-your-enterprise-its-delivers-windows10]]></link>
      <description><![CDATA[<p><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">In this instructional video, Rasmus Ronlev shows you how to perform an upgrade to Windows 10 from Windows 7, 8 or 8.1 using System Center Configuration Manager (SCCM).</span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Learn more about our approach and offerings at </span><a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="http://www.itsdelivers.com/microsoft" target="_blank" rel="nofollow">itsdelivers.com/microsoft</a><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Check out the following articles for more detail:</span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Blog on what’s new with Win10 deployment and Provisioning packages</span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/</a><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Blog on different methods for applying provisioning packages</span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/</a><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"> </span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Blog/Vid on ICD Provisioning Package</span><br style="color: #71767a; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/</a></p>]]></description>
      
      <content:encoded><![CDATA[<p>In this instructional video, Rasmus Ronlev shows you how to perform an upgrade to Windows 10 from Windows 7, 8 or 8.1 using System Center Configuration Manager (SCCM).Learn more about our approach and offerings at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="http://www.itsdelivers.com/microsoft" target="_blank" rel="nofollow">itsdelivers.com/microsoft</a>Check out the following articles for more detail:Blog on what’s new with Win10 deployment and Provisioning packages<a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/</a>Blog on different methods for applying provisioning packages<a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/</a> Blog/Vid on ICD Provisioning Package<a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" href="https://adameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/" target="_blank" rel="nofollow">adameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/</a></p>]]></content:encoded>
      
      
      <enclosure length="404245919" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Windows_10_Upgrade_SCCM_2012r2_SP1.mp4?dest-id=91054"/>
      <itunes:duration>11:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>15</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/6/6/7/9667d594bccd8469/Screen_Shot_2015-08-06_at_10.30.59_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this instructional video, Rasmus Ronlev shows you how to perform an upgrade to Windows 10 from Windows 7, 8 or 8.1 using System Center Configuration Manager (SCCM).Learn more about our approach and offerings at itsdelivers.com/microsoftCheck out the following articles for more detail:Blog on what’s new with Win10 deployment and Provisioning packagesadameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/Blog on different methods for applying provisioning packagesadameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/ Blog/Vid on ICD Provisioning Packageadameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this instructional video, Rasmus Ronlev shows you how to perform an upgrade to Windows 10 from Windows 7, 8 or 8.1 using System Center Configuration Manager (SCCM).Learn more about our approach and offerings at itsdelivers.com/microsoftCheck out the following articles for more detail:Blog on what’s new with Win10 deployment and Provisioning packagesadameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/Blog on different methods for applying provisioning packagesadameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/ Blog/Vid on ICD Provisioning Packageadameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/</itunes:summary></item>
    
    <item>
      <title>Get to know ITS Managed Services</title>
      <itunes:title>Get to know ITS Managed Services</itunes:title>
      <pubDate>Wed, 08 Jul 2015 19:38:13 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f0aaf95921971a074a4ead33a1132a11]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/get-to-know-its-managed-services]]></link>
      <description><![CDATA[<p>Get to know some of the team members here at ITS on the Managed Services Team including Cory Grant, Jacob Crawford, Mikhail Brunes and Brian Whitacre.</p>
<p>For more information, visit itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Get to know some of the team members here at ITS on the Managed Services Team including Cory Grant, Jacob Crawford, Mikhail Brunes and Brian Whitacre.</p> <p>For more information, visit itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="2621162" type="audio/mpeg" url="https://traffic.libsyn.com/secure/itspartners/Get_to_know_ITS_Managed_Services_Audio.mp3?dest-id=91054"/>
      <itunes:duration>02:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>14</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/9/5/f/7/95f7be39e06e92a8/Screen_Shot_2015-07-08_at_3.34.00_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Get to know some of the team members here at ITS on the Managed Services Team including Cory Grant, Jacob Crawford, Mikhail Brunes and Brian Whitacre. For more information, visit itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Get to know some of the team members here at ITS on the Managed Services Team including Cory Grant, Jacob Crawford, Mikhail Brunes and Brian Whitacre. For more information, visit itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Symantec Endpoint Protection 12.x Modules</title>
      <itunes:title>Symantec Endpoint Protection 12.x Modules</itunes:title>
      <pubDate>Wed, 08 Jul 2015 18:39:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ebf48d591c8528bf16dcb20e22d7f7f6]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-endpoint-protection-12x-modules]]></link>
      <description><![CDATA[<p>Discussion around Symantec Endpoint Protection modules and layered security to better protect your environment.  For more information, visit www.itsdelivers.com</p>
<p> </p>]]></description>
      
      <content:encoded><![CDATA[<p>Discussion around Symantec Endpoint Protection modules and layered security to better protect your environment. For more information, visit www.itsdelivers.com</p> <p> </p>]]></content:encoded>
      
      
      <enclosure length="57316862" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_Endpoint_Protection_12.x_Modules_Final.mp4?dest-id=91054"/>
      <itunes:duration>06:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>13</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/f/b/6/efb6f66d4553a74b/Screen_Shot_2015-07-08_at_2.27.53_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Discussion around Symantec Endpoint Protection modules and layered security to better protect your environment.  For more information, visit www.itsdelivers.com  </itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Discussion around Symantec Endpoint Protection modules and layered security to better protect your environment.  For more information, visit www.itsdelivers.com  </itunes:summary></item>
    
    <item>
      <title>SEP 12.1.6 System Lockdown</title>
      <itunes:title>SEP 12.1.6 System Lockdown</itunes:title>
      <pubDate>Wed, 08 Jul 2015 16:29:14 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[40693da9d67d8d5a0ab36bf0a148e118]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/sep-1216-system-lockdown]]></link>
      <description><![CDATA[<p>In this video, Will VanderLinden and Jake Crawford will demonstrate the System Lockdown component of Symantec Endpoint Protection 12.1.6, and show you how to implement a simple application whitelisting policy for your organization using SEP 12.1.6.</p>
<p> </p>
<p>For more information visit www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video, Will VanderLinden and Jake Crawford will demonstrate the System Lockdown component of Symantec Endpoint Protection 12.1.6, and show you how to implement a simple application whitelisting policy for your organization using SEP 12.1.6.</p> <p> </p> <p>For more information visit www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="317718932" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symanec_Endpoint_Protection__SEP_12.1_Final.mp4?dest-id=91054"/>
      <itunes:duration>17:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>12</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/a/9/f/aa9f45329afa2615/Screen_Shot_2015-07-08_at_12.19.45_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video, Will VanderLinden and Jake Crawford will demonstrate the System Lockdown component of Symantec Endpoint Protection 12.1.6, and show you how to implement a simple application whitelisting policy for your organization using SEP 12.1.6.   For more information visit www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video, Will VanderLinden and Jake Crawford will demonstrate the System Lockdown component of Symantec Endpoint Protection 12.1.6, and show you how to implement a simple application whitelisting policy for your organization using SEP 12.1.6.   For more information visit www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Data Center Security 6: Configuring Application Whitelisting, Data Center Security &amp; Managed Services</title>
      <itunes:title>Data Center Security 6: Configuring Application Whitelisting, Data Center Security &amp; Managed Services</itunes:title>
      <pubDate>Wed, 08 Jul 2015 15:10:37 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[24adb00e8bb3a243fc5bb5e5d5e09a97]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/data-center-security-6-configuring-application-whitelisting-data-center-security-managed-services]]></link>
      <description><![CDATA[<p>Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.</p>
<p> </p>
<p>Learn more at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.</p> <p> </p> <p>Learn more at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="165285227" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Data_Center_Security_6_-_Configuring_Application_WhitelistingData_Center_SecurityManaged_Services_Final.mp4?dest-id=91054"/>
      <itunes:duration>09:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>11</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/3/a/6/c3a65b558c6b6e40/Screen_Shot_2015-07-08_at_10.56.42_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.   Learn more at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.   Learn more at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>ServiceNow Lists Your Way: Filters, Breadcrumbs, and Personalized List Columns</title>
      <itunes:title>ServiceNow Lists Your Way: Filters, Breadcrumbs, and Personalized List Columns</itunes:title>
      <pubDate>Mon, 06 Jul 2015 13:27:37 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[a8374736579bb2ab14a6f8659050cf7a]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/-servicenow-lists-your-way-filters-breadcrumbs-and-personalized-list-columns]]></link>
      <description><![CDATA[<p>How you as a user can make minor changes to ServiceNow lists using Filters, Breadcrumbs, and Personalized List Columns so that you see exactly what you need to get your job done. This video covers:</p>
<ol>
<li>Defining a ServiceNow List Filters and Filter Examples</li>
<li>Breadcrumbs</li>
<li>Creating a Filter<ol>
<li>Quick Filter</li>
<li>Custom Filter</li>
<li>List Search</li>
<li>Column Search</li>
</ol></li>
<li>Saving a Filter</li>
<li>Personalizing List Columns</li>
</ol>]]></description>
      
      <content:encoded><![CDATA[<p>How you as a user can make minor changes to ServiceNow lists using Filters, Breadcrumbs, and Personalized List Columns so that you see exactly what you need to get your job done. This video covers:</p> <ol> <li>Defining a ServiceNow List Filters and Filter Examples</li> <li>Breadcrumbs</li> <li>Creating a Filter<ol> <li>Quick Filter</li> <li>Custom Filter</li> <li>List Search</li> <li>Column Search</li> </ol></li> <li>Saving a Filter</li> <li>Personalizing List Columns</li> </ol>]]></content:encoded>
      
      
      <enclosure length="260440633" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ServiceNow_Using_Filters.mp4?dest-id=91054"/>
      <itunes:duration>14:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>10</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/a/b/c/6abc43e0c2cd285b/Screen_Shot_2015-06-08_at_11.59.15_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>How you as a user can make minor changes to ServiceNow lists using Filters, Breadcrumbs, and Personalized List Columns so that you see exactly what you need to get your job done. This video covers: Defining a ServiceNow List Filters and Filter Examples Breadcrumbs Creating a Filter Quick Filter Custom Filter List Search Column Search Saving a Filter Personalizing List Columns</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>How you as a user can make minor changes to ServiceNow lists using Filters, Breadcrumbs, and Personalized List Columns so that you see exactly what you need to get your job done. This video covers: Defining a ServiceNow List Filters and Filter Examples Breadcrumbs Creating a Filter Quick Filter Custom Filter List Search Column Search Saving a Filter Personalizing List Columns</itunes:summary></item>
    
    <item>
      <title>Getting Your DLP Program Unstuck</title>
      <itunes:title>Getting Your DLP Program Unstuck</itunes:title>
      <pubDate>Thu, 02 Jul 2015 13:37:17 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e5a85407020eb2c343074831aacf1baa]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/getting-your-dlp-program-unstuck]]></link>
      <description><![CDATA[<ul>
<li>Where exactly IS your Organization in the lifecycle of risk reduction?</li>
<li>Is it moving forward?</li>
<li>Is your DLP program addressing key areas of risk?  </li>
<li>How would you know?</li>
<li>Are your users embracing security and learning more about how they interact with information assets?</li>
<li>Has your DLP program been able to plan and anticipate change?  </li>
<li>What about cloud?</li>
</ul>
<p>If you’re answering yes to any of these questions, you need to watch this video!</p>
<p>With all of the pressures on IT Security teams today, it’s understandable how a DLP program can fall of course or “get stuck”.  A comprehensive data loss prevention (DLP) solution is built on a structured, risk-based approach to develop, tune, and expand policies and protection for the company’s sensitive information.  Couple that with effective remediation of violations and monitoring of metrics to demonstrate decreased data loss risk back to the business, and you have achieved the right goal.</p>
<p>In this video we’ll further explain the common pitfalls or missteps in a successful DLP rollout and share strategies around proper coverage, communications, policies, remediation and metrics.</p>]]></description>
      
      <content:encoded><![CDATA[<ul> <li>Where exactly IS your Organization in the lifecycle of risk reduction?</li> <li>Is it moving forward?</li> <li>Is your DLP program addressing key areas of risk? </li> <li>How would you know?</li> <li>Are your users embracing security and learning more about how they interact with information assets?</li> <li>Has your DLP program been able to plan and anticipate change? </li> <li>What about cloud?</li> </ul> <p>If you’re answering yes to any of these questions, you need to watch this video!</p> <p>With all of the pressures on IT Security teams today, it’s understandable how a DLP program can fall of course or “get stuck”. A comprehensive data loss prevention (DLP) solution is built on a structured, risk-based approach to develop, tune, and expand policies and protection for the company’s sensitive information. Couple that with effective remediation of violations and monitoring of metrics to demonstrate decreased data loss risk back to the business, and you have achieved the right goal.</p> <p>In this video we’ll further explain the common pitfalls or missteps in a successful DLP rollout and share strategies around proper coverage, communications, policies, remediation and metrics.</p>]]></content:encoded>
      
      
      <enclosure length="313131942" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Getting_Your_DLP_Program_Unstuck.mp4?dest-id=91054"/>
      <itunes:duration>32:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>9</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/6/8/e/168e38a50371e8d6/Screen_Shot_2015-07-01_at_6.32.37_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Where exactly IS your Organization in the lifecycle of risk reduction? Is it moving forward? Is your DLP program addressing key areas of risk?   How would you know? Are your users embracing security and learning more about how they interact with information assets? Has your DLP program been able to plan and anticipate change?   What about cloud? If you’re answering yes to any of these questions, you need to watch this video! With all of the pressures on IT Security teams today, it’s understandable how a DLP program can fall of course or “get stuck”.  A comprehensive data loss prevention (DLP) solution is built on a structured, risk-based approach to develop, tune, and expand policies and protection for the company’s sensitive information.  Couple that with effective remediation of violations and monitoring of metrics to demonstrate decreased data loss risk back to the business, and you have achieved the right goal. In this video we’ll further explain the common pitfalls or missteps in a successful DLP rollout and share strategies around proper coverage, communications, policies, remediation and metrics.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Where exactly IS your Organization in the lifecycle of risk reduction? Is it moving forward? Is your DLP program addressing key areas of risk?   How would you know? Are your users embracing security and learning more about how they interact with information assets? Has your DLP program been able to plan and anticipate change?   What about cloud? If you’re answering yes to any of these questions, you need to watch this video! With all of the pressures on IT Security teams today, it’s understandable how a DLP program can fall of course or “get stuck”.  A comprehensive data loss prevention (DLP) solution is built on a structured, risk-based approach to develop, tune, and expand policies and protection for the company’s sensitive information.  Couple that with effective remediation of violations and monitoring of metrics to demonstrate decreased data loss risk back to the business, and you have achieved the right goal. In this video we’ll further explain the common pitfalls or missteps in a successful DLP rollout and share strategies around proper coverage, communications, policies, remediation and metrics.</itunes:summary></item>
    
    <item>
      <title>Asset and Inventory Data Comparison in Altiris</title>
      <itunes:title>Asset and Inventory Data Comparison in Altiris</itunes:title>
      <pubDate>Tue, 02 Jun 2015 23:00:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[9deab3a43a92e9cf92a1841364c076ff]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/asset-and-inventory-data-comparison-in-altiris]]></link>
      <description><![CDATA[<p>This video goes in depth to compare asset data with inventory data in Altiris Asset Management Suite.</p>]]></description>
      
      <content:encoded><![CDATA[<p>This video goes in depth to compare asset data with inventory data in Altiris Asset Management Suite.</p>]]></content:encoded>
      
      
      <enclosure length="154878991" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Asset_and_Inventory_Data_Comparison_in_Altiris.mp4?dest-id=91054"/>
      <itunes:duration>11:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>8</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/d/3/9/7d39772cab9aec80/Screen_Shot_2015-06-02_at_6.51.48_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>This video goes in depth to compare asset data with inventory data in Altiris Asset Management Suite.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>This video goes in depth to compare asset data with inventory data in Altiris Asset Management Suite.</itunes:summary></item>
    
    <item>
      <title>Using Symantec Data Loss Prevention To Block A Specific Email Address or Domain.</title>
      <itunes:title>Using Symantec Data Loss Prevention To Block A Specific Email Address or Domain.</itunes:title>
      <pubDate>Tue, 02 Jun 2015 20:57:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1aae0d2f37ee0f2c12e929c1f0cce8c6]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/using-symantec-data-loss-prevention-to-block-a-specific-email-address-or-domain]]></link>
      <description><![CDATA[<p>"Is it possible to block content to a specific email address or a domain with Symantec DLP?" was a question recently asked of us by a customer and this video demonstrates how to accomplish this task. In this video we will create a policy to track emails to a specific external user and then create an Email Prevent Response Rule to block email to our external user.</p>]]></description>
      
      <content:encoded><![CDATA[<p>"Is it possible to block content to a specific email address or a domain with Symantec DLP?" was a question recently asked of us by a customer and this video demonstrates how to accomplish this task. In this video we will create a policy to track emails to a specific external user and then create an Email Prevent Response Rule to block email to our external user.</p>]]></content:encoded>
      
      
      <enclosure length="172171661" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Blocking_an_Email_Address_With_DLP.mp4?dest-id=91054"/>
      <itunes:duration>10:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/6/6/4/26647162cd91c84c/Screen_Shot_2015-06-02_at_4.48.16_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>"Is it possible to block content to a specific email address or a domain with Symantec DLP?" was a question recently asked of us by a customer and this video demonstrates how to accomplish this task. In this video we will create a policy to track emails to a specific external user and then create an Email Prevent Response Rule to block email to our external user.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>"Is it possible to block content to a specific email address or a domain with Symantec DLP?" was a question recently asked of us by a customer and this video demonstrates how to accomplish this task. In this video we will create a policy to track emails to a specific external user and then create an Email Prevent Response Rule to block email to our external user.</itunes:summary></item>
    
    <item>
      <title>Symantec Data Center Security: Keeping Legacy OS Protected</title>
      <itunes:title>Symantec Data Center Security: Keeping Legacy OS Protected</itunes:title>
      <pubDate>Mon, 01 Jun 2015 16:04:19 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bd1ae55a9204fa1e28ef8b41e2435b8d]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-data-center-security-keeping-legacy-os-protected]]></link>
      <description><![CDATA[<p>Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video!</p>
<p>The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries:</p>
<ul>
<li>Finance: Protecting customer information and security intelligent alerting/auditing</li>
<li>Manufacturing: Secure applications and business operations</li>
<li>Retail: Securing consumer end devices  </li>
<li>Health care: Patching legacy systems and protecting systems with consumer data</li>
<li>Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced</li>
</ul>]]></description>
      
      <content:encoded><![CDATA[<p>Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video!</p> <p>The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries:</p> <ul> <li>Finance: Protecting customer information and security intelligent alerting/auditing</li> <li>Manufacturing: Secure applications and business operations</li> <li>Retail: Securing consumer end devices </li> <li>Health care: Patching legacy systems and protecting systems with consumer data</li> <li>Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced</li> </ul>]]></content:encoded>
      
      
      <enclosure length="346659245" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/DCS_Webinar_Final_.mp4?dest-id=91054"/>
      <itunes:duration>34:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/b/5/2/7b52f200e0f3f403/Screen_Shot_2015-06-01_at_11.51.16_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video! The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries: Finance: Protecting customer information and security intelligent alerting/auditing Manufacturing: Secure applications and business operations Retail: Securing consumer end devices   Health care: Patching legacy systems and protecting systems with consumer data Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video! The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries: Finance: Protecting customer information and security intelligent alerting/auditing Manufacturing: Secure applications and business operations Retail: Securing consumer end devices   Health care: Patching legacy systems and protecting systems with consumer data Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced</itunes:summary></item>
    
    <item>
      <title>The ITS Partners ITAM Maturity Model</title>
      <itunes:title>The ITS Partners ITAM Maturity Model</itunes:title>
      <pubDate>Sun, 31 May 2015 17:36:40 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[073b193d354a2c9e843e311947e76816]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/the-its-partners-itam-maturity-model]]></link>
      <description><![CDATA[<p>On this video, one of our ITAM experts walks through of each of the phases of the 5 phased IT Asset Management Maturity Model including example customer data.</p>]]></description>
      
      <content:encoded><![CDATA[<p>On this video, one of our ITAM experts walks through of each of the phases of the 5 phased IT Asset Management Maturity Model including example customer data.</p>]]></content:encoded>
      
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/a/e/6/5/ae6542b45c1da189/Screen_Shot_2015-05-31_at_1.28.16_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author></item>
    
    <item>
      <title>Symantec DLP: Exact Data Match</title>
      <itunes:title>Symantec DLP: Exact Data Match</itunes:title>
      <pubDate>Tue, 19 May 2015 21:33:25 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0ee9f3d749b687ce3a8dae38e1a38080]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-dlp-exact-data-match]]></link>
      <description><![CDATA[<p>In this video presentation we talk about Symantec Data Loss Prevention (DLP) and Exact Data Matching (EDM). We demonstrate how to implement EDM in the Enforce Platform by revealing  several ways we can use data that is exported into a flat file and imported into the DLP system. Once this data is in the system, we then create a policy and generate incidents to prove out the technology.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video presentation we talk about Symantec Data Loss Prevention (DLP) and Exact Data Matching (EDM). We demonstrate how to implement EDM in the Enforce Platform by revealing several ways we can use data that is exported into a flat file and imported into the DLP system. Once this data is in the system, we then create a policy and generate incidents to prove out the technology.</p>]]></content:encoded>
      
      
      <enclosure length="427595068" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_DLP_Exact_Data_Match_Final_Version_1280x720.mp4?dest-id=91054"/>
      <itunes:duration>31:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/e/5/f/6e5f371f8ffd05c2/Screen_Shot_2015-05-19_at_5.26.29_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video presentation we talk about Symantec Data Loss Prevention (DLP) and Exact Data Matching (EDM). We demonstrate how to implement EDM in the Enforce Platform by revealing  several ways we can use data that is exported into a flat file and imported into the DLP system. Once this data is in the system, we then create a policy and generate incidents to prove out the technology.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video presentation we talk about Symantec Data Loss Prevention (DLP) and Exact Data Matching (EDM). We demonstrate how to implement EDM in the Enforce Platform by revealing  several ways we can use data that is exported into a flat file and imported into the DLP system. Once this data is in the system, we then create a policy and generate incidents to prove out the technology.</itunes:summary></item>
    
    <item>
      <title>Managed Any Device, Anywhere With IT Management Suite 7.6 (Altiris) by Symantec</title>
      <itunes:title>Managed Any Device, Anywhere With IT Management Suite 7.6 (Altiris) by Symantec</itunes:title>
      <pubDate>Fri, 24 Apr 2015 02:21:11 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[bb37c80fb73353861444a6e93d799e18]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/managed-any-device-anywhere-with-it-management-suite-76-altiris-by-symantec]]></link>
      <description><![CDATA[<p>In this presentation, we will preview the new capabilities in the Altiris platform provided by Bomgar technology with a focus on their integrated solution with ITMS 7.6 and how you can drive down support costs, improve end user satisfaction and manage any device in your organization – no matter where it is!</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this presentation, we will preview the new capabilities in the Altiris platform provided by Bomgar technology with a focus on their integrated solution with ITMS 7.6 and how you can drive down support costs, improve end user satisfaction and manage any device in your organization – no matter where it is!</p>]]></content:encoded>
      
      
      <enclosure length="651520530" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Altiris20Revival20Webcast20Final.mp4?dest-id=91054"/>
      <itunes:duration>52:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/b/7/0/0b70e1e723dbc46f/Screen_Shot_2015-04-23_at_9.48.19_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this presentation, we will preview the new capabilities in the Altiris platform provided by Bomgar technology with a focus on their integrated solution with ITMS 7.6 and how you can drive down support costs, improve end user satisfaction and manage any device in your organization – no matter where it is!</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this presentation, we will preview the new capabilities in the Altiris platform provided by Bomgar technology with a focus on their integrated solution with ITMS 7.6 and how you can drive down support costs, improve end user satisfaction and manage any device in your organization – no matter where it is!</itunes:summary></item>
    
    <item>
      <title>Symantec IT Management Suite 7.6 Tour</title>
      <itunes:title>Symantec IT Management Suite 7.6 Tour</itunes:title>
      <pubDate>Thu, 12 Mar 2015 12:25:59 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b3aea11213f600af927cb319ef1aadcb]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-it-management-suite-76-tour]]></link>
      <description><![CDATA[<p>In this screencast Rasmus Ronlev, Lead Solution Architect for ITS Partners will walk you through some visible and valuable feature changes in ITMS 7.6 at both the server and client level.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this screencast Rasmus Ronlev, Lead Solution Architect for ITS Partners will walk you through some visible and valuable feature changes in ITMS 7.6 at both the server and client level.</p>]]></content:encoded>
      
      
      <enclosure length="344687876" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/What_Is_New_With_ITSM_7.6_Altiris.mp4?dest-id=91054"/>
      <itunes:duration>21:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/6/9/9/8699806f4d10010d/Screen_Shot_2015-03-13_at_7.44.38_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this screencast Rasmus Ronlev, Lead Solution Architect for ITS Partners will walk you through some visible and valuable feature changes in ITMS 7.6 at both the server and client level.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this screencast Rasmus Ronlev, Lead Solution Architect for ITS Partners will walk you through some visible and valuable feature changes in ITMS 7.6 at both the server and client level.</itunes:summary></item>
    
    <item>
      <title>Actionable Integration Demo: ServiceNow To Altiris (AI: Altiris)</title>
      <itunes:title>Actionable Integration Demo: ServiceNow To Altiris (AI: Altiris)</itunes:title>
      <pubDate>Mon, 09 Mar 2015 15:11:38 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[54ebad7ac37779806bbfc4fd7250dfce]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/actionable-integration-demo-servicenow-to-altiris-ai-altiris]]></link>
      <description><![CDATA[<p>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.  One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request.</p>
<p>THE SOLUTION: ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5.  Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required.</p>
<p>Features of the Actionable Integration: ServiceNow to Altiris</p>
<p>• Import Core Data – Computers Data from Altiris 7.5</p>
<p>• With related Installed Software, Physical and Virtual</p>
<p>Disks, & Network Adapters</p>
<p>• Execute Altiris tasks on Computers managed by Altiris and imported from Altiris</p>
<p>• From a link within an Incident record</p>
<p>• From a link within a Computer record</p>
<p>• From a Service Catalog Item request for Software with automated task deliver from Altiris</p>
<p>Other Actionable Integrations by ITS Partners</p>
<p>• ServiceNow to Symantec Data Loss Prevention (DLP)</p>
<p>• ServiceNow to Symantec Endpoint Protection (SEP)</p>
<p>• ServiceNow to Symantec Control Compliance Suite (CCS)</p>
<p>• ServiceNow to Microsoft System Center 2012 R2 Configuration Manager (SCCM)</p>
<p>more information at www.itsdelivers.com</p>]]></description>
      
      <content:encoded><![CDATA[<p>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request.</p> <p>THE SOLUTION: ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5. Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required.</p> <p>Features of the Actionable Integration: ServiceNow to Altiris</p> <p>• Import Core Data – Computers Data from Altiris 7.5</p> <p>• With related Installed Software, Physical and Virtual</p> <p>Disks, & Network Adapters</p> <p>• Execute Altiris tasks on Computers managed by Altiris and imported from Altiris</p> <p>• From a link within an Incident record</p> <p>• From a link within a Computer record</p> <p>• From a Service Catalog Item request for Software with automated task deliver from Altiris</p> <p>Other Actionable Integrations by ITS Partners</p> <p>• ServiceNow to Symantec Data Loss Prevention (DLP)</p> <p>• ServiceNow to Symantec Endpoint Protection (SEP)</p> <p>• ServiceNow to Symantec Control Compliance Suite (CCS)</p> <p>• ServiceNow to Microsoft System Center 2012 R2 Configuration Manager (SCCM)</p> <p>more information at www.itsdelivers.com</p>]]></content:encoded>
      
      
      <enclosure length="163555870" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Actionable_Integration-_ServiceNow_To_Altiris_AI-_Altiris.mp4?dest-id=91054"/>
      <itunes:duration>06:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/2/2/6/4226204b806e548e/Screen_Shot_2015-03-09_at_2.48.13_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.  One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION: ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5.  Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required. Features of the Actionable Integration: ServiceNow to Altiris • Import Core Data – Computers Data from Altiris 7.5 • With related Installed Software, Physical and Virtual Disks, &amp; Network Adapters • Execute Altiris tasks on Computers managed by Altiris and imported from Altiris • From a link within an Incident record • From a link within a Computer record • From a Service Catalog Item request for Software with automated task deliver from Altiris Other Actionable Integrations by ITS Partners • ServiceNow to Symantec Data Loss Prevention (DLP) • ServiceNow to Symantec Endpoint Protection (SEP) • ServiceNow to Symantec Control Compliance Suite (CCS) • ServiceNow to Microsoft System Center 2012 R2 Configuration Manager (SCCM) more information at www.itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>THE CHALLENGE: Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated.  One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION: ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5.  Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required. Features of the Actionable Integration: ServiceNow to Altiris • Import Core Data – Computers Data from Altiris 7.5 • With related Installed Software, Physical and Virtual Disks, &amp; Network Adapters • Execute Altiris tasks on Computers managed by Altiris and imported from Altiris • From a link within an Incident record • From a link within a Computer record • From a Service Catalog Item request for Software with automated task deliver from Altiris Other Actionable Integrations by ITS Partners • ServiceNow to Symantec Data Loss Prevention (DLP) • ServiceNow to Symantec Endpoint Protection (SEP) • ServiceNow to Symantec Control Compliance Suite (CCS) • ServiceNow to Microsoft System Center 2012 R2 Configuration Manager (SCCM) more information at www.itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>ITS Managed Services Endpoint Security Offerings.</title>
      <itunes:title>ITS Managed Services Endpoint Security Offerings.</itunes:title>
      <pubDate>Mon, 23 Feb 2015 20:43:16 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[0e6c6550ba3bf3b5354e10d9ba5354ef]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-managed-services-endpoint-security-offerings]]></link>
      <description><![CDATA[<p>ITS Managed Services Endpoint Security Offerings.  ITS offers solutions for your endpoint protection, and patching compliance.  Please contact itsdelivers.com for more details!</p>]]></description>
      
      <content:encoded><![CDATA[<p>ITS Managed Services Endpoint Security Offerings. ITS offers solutions for your endpoint protection, and patching compliance. Please contact itsdelivers.com for more details!</p>]]></content:encoded>
      
      
      <enclosure length="162674163" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ITS_MSO_Endpoint_Security_Final.mp4?dest-id=91054"/>
      <itunes:duration>07:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>4</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/7/f/a/c7faeeeaa4fa2a66/Screen_Shot_2015-02-23_at_3.41.00_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>ITS Managed Services Endpoint Security Offerings.  ITS offers solutions for your endpoint protection, and patching compliance.  Please contact itsdelivers.com for more details!</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>ITS Managed Services Endpoint Security Offerings.  ITS offers solutions for your endpoint protection, and patching compliance.  Please contact itsdelivers.com for more details!</itunes:summary></item>
    
    <item>
      <title>Automated Risk Management and Compliance within Healthcare with ITS and Symantec</title>
      <itunes:title>Automated Risk Management and Compliance within Healthcare with ITS and Symantec</itunes:title>
      <pubDate>Tue, 09 Dec 2014 12:31:28 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5fc3ca8e7eff8a30c0d5043833eef9c1]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/automated-risk-management-and-compliance-within-healthcare-with-its-and-symantec]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Today, Healthcare organizations are at a crossroad. Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game? The reality is that personal health information is worth more than credit cards and what’s worse is that thieves know it! Today’s threats are also more automated, more targeted, and more sophisticated than ever before. That, in turn, has given rise to a plethora of new and often vague laws and regulations, forcing organizations to demonstrate compliance and effective security</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Where does your organization stand in today’s landscape?</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Join ITS and Symantec for this presentation to learn more about our separate, yet shared dedication and focus to securing Healthcare.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">~ Symantec’s focus on Healthcare<br />~ Symantec’s response to Automated Risk Management and Compliance<br />~ Healthcare Case Studies from ITS Partners<br />~ Healthcare Specific Security Assessments</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Today, Healthcare organizations are at a crossroad. Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game? The reality is that personal health information is worth more than credit cards and what’s worse is that thieves know it! Today’s threats are also more automated, more targeted, and more sophisticated than ever before. That, in turn, has given rise to a plethora of new and often vague laws and regulations, forcing organizations to demonstrate compliance and effective security</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Where does your organization stand in today’s landscape?</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Join ITS and Symantec for this presentation to learn more about our separate, yet shared dedication and focus to securing Healthcare.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">~ Symantec’s focus on Healthcare~ Symantec’s response to Automated Risk Management and Compliance~ Healthcare Case Studies from ITS Partners~ Healthcare Specific Security Assessments</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></content:encoded>
      
      
      <enclosure length="414353820" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ITS_and_Symantec_Healthcare_Webcast.mp4?dest-id=91054"/>
      <itunes:duration>32:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>19</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/2/c/e/c/2cec72d25fff77c6/Screen_Shot_2014-12-09_at_6.58.08_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Today, Healthcare organizations are at a crossroad. Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game? The reality is that personal health information is worth more than credit cards and what’s worse is that thieves know it! Today’s threats are also more automated, more targeted, and more sophisticated than ever before. That, in turn, has given rise to a plethora of new and often vague laws and regulations, forcing organizations to demonstrate compliance and effective security Where does your organization stand in today’s landscape? Join ITS and Symantec for this presentation to learn more about our separate, yet shared dedication and focus to securing Healthcare. ~ Symantec’s focus on Healthcare ~ Symantec’s response to Automated Risk Management and Compliance ~ Healthcare Case Studies from ITS Partners ~ Healthcare Specific Security Assessments Learn more at itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Today, Healthcare organizations are at a crossroad. Continue the struggle to strike balance between business reward and risk, or take the brave steps toward making IT security an offensive game? The reality is that personal health information is worth more than credit cards and what’s worse is that thieves know it! Today’s threats are also more automated, more targeted, and more sophisticated than ever before. That, in turn, has given rise to a plethora of new and often vague laws and regulations, forcing organizations to demonstrate compliance and effective security Where does your organization stand in today’s landscape? Join ITS and Symantec for this presentation to learn more about our separate, yet shared dedication and focus to securing Healthcare. ~ Symantec’s focus on Healthcare ~ Symantec’s response to Automated Risk Management and Compliance ~ Healthcare Case Studies from ITS Partners ~ Healthcare Specific Security Assessments Learn more at itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Natura Case Study l Microsoft Office 365 &amp; Managed Services</title>
      <itunes:title>Natura Case Study l Microsoft Office 365 &amp; Managed Services</itunes:title>
      <pubDate>Tue, 25 Nov 2014 20:10:42 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5e9dfcb4971869fcfc98738144bb80c4]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/natura-case-study-l-microsoft-office-365-managed-services]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">In this short video, Nathan M. Gillette of Natura Architectural Consulting discusses the value of their partnership with ITS.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Natura chose Microsoft Office 365 as their productivity platform and accelerated the deployment of their stateless IT with Managed Services from ITS Partners. The combination of ITS’ passion for engineering and Microsoft’s focused small business offerings, Natura was able to significantly reduce both capital and operational expense and have laid the foundation to confidently manage growth in their organization.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">In this short video, Nathan M. Gillette of Natura Architectural Consulting discusses the value of their partnership with ITS.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Natura chose Microsoft Office 365 as their productivity platform and accelerated the deployment of their stateless IT with Managed Services from ITS Partners. The combination of ITS’ passion for engineering and Microsoft’s focused small business offerings, Natura was able to significantly reduce both capital and operational expense and have laid the foundation to confidently manage growth in their organization.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></content:encoded>
      
      
      <enclosure length="101849825" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Natura_Case_Study_Final.mp4?dest-id=91054"/>
      <itunes:duration>01:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>18</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this short video, Nathan M. Gillette of Natura Architectural Consulting discusses the value of their partnership with ITS. Natura chose Microsoft Office 365 as their productivity platform and accelerated the deployment of their stateless IT with Managed Services from ITS Partners. The combination of ITS’ passion for engineering and Microsoft’s focused small business offerings, Natura was able to significantly reduce both capital and operational expense and have laid the foundation to confidently manage growth in their organization. Learn more at itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this short video, Nathan M. Gillette of Natura Architectural Consulting discusses the value of their partnership with ITS. Natura chose Microsoft Office 365 as their productivity platform and accelerated the deployment of their stateless IT with Managed Services from ITS Partners. The combination of ITS’ passion for engineering and Microsoft’s focused small business offerings, Natura was able to significantly reduce both capital and operational expense and have laid the foundation to confidently manage growth in their organization. Learn more at itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Who Really Owns Your Organization's Data? Symantec Insight and DLP.</title>
      <itunes:title>Who Really Owns Your Organization's Data? Symantec Insight and DLP.</itunes:title>
      <pubDate>Wed, 10 Sep 2014 18:33:54 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[336fecf57d12b3285f6892eddaa9cc4c]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/who-really-owns-your-organizations-data-symantec-insight-and-dlp]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of the capabilities of this solution, including:</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">~ Track any file reads, writes, or deletes by Active Directory user name<br />~ Track any usage on a per-file basis on any File Share<br />Identify which user is a Data Owner, as opposed to simply a data creator.<br />~ Assign custodians to clean up or archive unused stale data that is simply taking up valuable space<br />~ Integrate with Data Loss Prevention to identify data owners on files violating DLP policies<br />~ Identify openly-accessible File Shares which are not properly protecting potentially critical data</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Join us in discovering what you might not even know you needed to know about your data!</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of the capabilities of this solution, including:</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">~ Track any file reads, writes, or deletes by Active Directory user name~ Track any usage on a per-file basis on any File ShareIdentify which user is a Data Owner, as opposed to simply a data creator.~ Assign custodians to clean up or archive unused stale data that is simply taking up valuable space~ Integrate with Data Loss Prevention to identify data owners on files violating DLP policies~ Identify openly-accessible File Shares which are not properly protecting potentially critical data</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">Join us in discovering what you might not even know you needed to know about your data!</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.5555562973022px; line-height: 21px; background-color: #f4f5f7;">learn more at <a style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;" href="http://www.itsdelivers.com/" target="_blank" rel="nofollow">itsdelivers.com</a></p>]]></content:encoded>
      
      
      <enclosure length="117810257" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/Data_Insight_DLP_Webcast_090914.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>39:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>17</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/e/1/c/3e1c64ae58ff5d60/Screen_Shot_2014-09-10_at_2.17.35_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization. ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of the capabilities of this solution, including: ~ Track any file reads, writes, or deletes by Active Directory user name ~ Track any usage on a per-file basis on any File Share Identify which user is a Data Owner, as opposed to simply a data creator. ~ Assign custodians to clean up or archive unused stale data that is simply taking up valuable space ~ Integrate with Data Loss Prevention to identify data owners on files violating DLP policies ~ Identify openly-accessible File Shares which are not properly protecting potentially critical data Join us in discovering what you might not even know you needed to know about your data! learn more at itsdelivers.com</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The explosion of data since 2008 has produced a new challenge for IT personnel who understand the value of data and the importance of empowering the team with the right information about that data in order to determine how to govern it. Let us bring “insight” as to who is really the owner of critical data in your organization. ITS would like to work with you to understand Symantec's Data Insight, a product that integrates with Symantec's Data Loss Prevention, discovering and collecting activity and permissions information about your data. Data Insight solves the problem of identifying data owners through usage patterns and behavioral tracking. Join us as we delve into the Data Insight console and demonstrate some of the capabilities of this solution, including: ~ Track any file reads, writes, or deletes by Active Directory user name ~ Track any usage on a per-file basis on any File Share Identify which user is a Data Owner, as opposed to simply a data creator. ~ Assign custodians to clean up or archive unused stale data that is simply taking up valuable space ~ Integrate with Data Loss Prevention to identify data owners on files violating DLP policies ~ Identify openly-accessible File Shares which are not properly protecting potentially critical data Join us in discovering what you might not even know you needed to know about your data! learn more at itsdelivers.com</itunes:summary></item>
    
    <item>
      <title>Introduction to Managed Services by ITS.</title>
      <itunes:title>Introduction to Managed Services by ITS.</itunes:title>
      <pubDate>Thu, 28 Aug 2014 16:09:42 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5e649e037c2b528f370c1a5b92a9ba75]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/-introduction-to-managed-services-by-its]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Managing and protecting your critical IT assets is a tough job. To compound the issue, many times the solutions required to address these needs depend upon highly specialized skill sets and processes. Both of which can be in short supply as organizations deal with doing more with less.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Fortunately ITS can help! Please join us for a webinar on how ITS Managed Services can help you realize your goals for Securing Infrastructure, Protecting Information, and Automating IT Processes using solutions by:<br />Symantec<br />ServiceNow<br />Microsoft</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Managing and protecting your critical IT assets is a tough job. To compound the issue, many times the solutions required to address these needs depend upon highly specialized skill sets and processes. Both of which can be in short supply as organizations deal with doing more with less.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Fortunately ITS can help! Please join us for a webinar on how ITS Managed Services can help you realize your goals for Securing Infrastructure, Protecting Information, and Automating IT Processes using solutions by:SymantecServiceNowMicrosoft</p>]]></content:encoded>
      
      
      <enclosure length="264238863" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Managed_Services_by_ITS_Webcast.mp4?dest-id=91054"/>
      <itunes:duration>36:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>16</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/b/5/d/bb5d0c0668b063b6/Screen_Shot_2014-08-28_at_12.02.31_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Managing and protecting your critical IT assets is a tough job. To compound the issue, many times the solutions required to address these needs depend upon highly specialized skill sets and processes. Both of which can be in short supply as organizations deal with doing more with less. Fortunately ITS can help! Please join us for a webinar on how ITS Managed Services can help you realize your goals for Securing Infrastructure, Protecting Information, and Automating IT Processes using solutions by: Symantec ServiceNow Microsoft</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Managing and protecting your critical IT assets is a tough job. To compound the issue, many times the solutions required to address these needs depend upon highly specialized skill sets and processes. Both of which can be in short supply as organizations deal with doing more with less. Fortunately ITS can help! Please join us for a webinar on how ITS Managed Services can help you realize your goals for Securing Infrastructure, Protecting Information, and Automating IT Processes using solutions by: Symantec ServiceNow Microsoft</itunes:summary></item>
    
    <item>
      <title>Not That Type Of Security Company - The Bouncers</title>
      <itunes:title>Not That Type Of Security Company - The Bouncers</itunes:title>
      <pubDate>Mon, 04 Aug 2014 15:37:17 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[76ff472c17d3811f4e3def4ba12554af]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/not-that-type-of-security-company-the-bouncers]]></link>
      <description><![CDATA[<p>Bigfoot is at it again.  This time some "security" personnel had to remove bigfoot from a club.  ITS is not that type of security company.  Watch to learn more.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Bigfoot is at it again. This time some "security" personnel had to remove bigfoot from a club. ITS is not that type of security company. Watch to learn more.</p>]]></content:encoded>
      
      
      <enclosure length="36088937" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Bigfoot_-_Bouncer.mp4?dest-id=91054"/>
      <itunes:duration>35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>15</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/0/8/7/c08723e77d0a58f8/Screen_Shot_2014-08-04_at_11.30.08_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Bigfoot is at it again.  This time some "security" personnel had to remove bigfoot from a club.  ITS is not that type of security company.  Watch to learn more.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Bigfoot is at it again.  This time some "security" personnel had to remove bigfoot from a club.  ITS is not that type of security company.  Watch to learn more.</itunes:summary></item>
    
    <item>
      <title>Not That Type Of Security Company - Surveillance Company</title>
      <itunes:title>Not That Type Of Security Company - Surveillance Company</itunes:title>
      <pubDate>Wed, 23 Jul 2014 15:04:47 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e805405c18ad9efbbc655f03074d09c3]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/not-that-type-of-security-company-surveillance-company]]></link>
      <description><![CDATA[<h1 class="js-clip_title" style="margin: 0px 0px 5px; padding: 0px; color: #445566; line-height: 1.1; font-size: 36px; word-wrap: break-word; font-family: Helvetica, Arial, sans-serif; background-color: #f4f5f7;"><span style="font-size: 12pt;">Not That Type Of Security Company - Surveillance Company</span></h1>]]></description>
      
      <content:encoded><![CDATA[Not That Type Of Security Company - Surveillance Company]]></content:encoded>
      
      
      <enclosure length="70233680" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Security_-_Surveillance_Video.mp4?dest-id=91054"/>
      <itunes:duration>01:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>14</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/d/5/8/cd5877c4fd9bb011/Screen_Shot_2014-07-22_at_9.22.38_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Not That Type Of Security Company - Surveillance Company</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Not That Type Of Security Company - Surveillance Company</itunes:summary></item>
    
    <item>
      <title>Not That Type Of Security Company - Community Patrol</title>
      <itunes:title>Not That Type Of Security Company - Community Patrol</itunes:title>
      <pubDate>Wed, 09 Jul 2014 13:30:27 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e6076bbe31df1b69ff9a0f2b94460f76]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/not-that-type-of-security-company-community-patrol]]></link>
      <description/>
      
      <content:encoded/>
      
      
      <enclosure length="21104933" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Not_That_Type_Of_Security_Company_-_Community_Patrol.mp4?dest-id=91054"/>
      <itunes:duration>28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>13</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:author>ITS Partners</itunes:author></item>
    
    <item>
      <title>The time is NOW to tell you how ITS is growing our ServiceNow Practice and doing some cool integrations with Symantec Solutions.</title>
      <itunes:title>The time is NOW to tell you how ITS is growing our ServiceNow Practice and doing some cool integrations with Symantec Solutions.</itunes:title>
      <pubDate>Mon, 07 Jul 2014 14:42:46 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[6660ef380bd220023e0635271a19b04e]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/the-time-is-now-to-tell-you-how-its-is-growing-our-servicenow-practice-and-doing-some-cool-integrations-with-symantec-solutions]]></link>
      <description><![CDATA[<p>Over the last few months, ITS has added more than 12 certified ServiceNow engineers, successfully completed multiple implementations and have dedicated trainers who are ITIL certified and ServiceNow approved. In addition to being one of only a select few partners in the US with Resale and Service implementation capability, ITS has 3 core areas of focus when it comes to our ServiceNow practice:</p>
<ol>
<li>Asset Management / Workflow Management Services – allowing you to go from where you are today to where you want to be tomorrow</li>
<li>Bi Directional Integration between end point management systems to leverage your existing Altiris/Symantec or Microsoft SCCM environment</li>
<li>ITIL certification trainers who can conduct broad based regional classes or dedicated in house sessions</li>
</ol>
<p>Find out why so many companies have made the switch and how their IT staff is now better equipped to proactively deliver more value rather than reacting to fire after fire during this demo.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Over the last few months, ITS has added more than 12 certified ServiceNow engineers, successfully completed multiple implementations and have dedicated trainers who are ITIL certified and ServiceNow approved. In addition to being one of only a select few partners in the US with Resale and Service implementation capability, ITS has 3 core areas of focus when it comes to our ServiceNow practice:</p> <ol> <li>Asset Management / Workflow Management Services – allowing you to go from where you are today to where you want to be tomorrow</li> <li>Bi Directional Integration between end point management systems to leverage your existing Altiris/Symantec or Microsoft SCCM environment</li> <li>ITIL certification trainers who can conduct broad based regional classes or dedicated in house sessions</li> </ol> <p>Find out why so many companies have made the switch and how their IT staff is now better equipped to proactively deliver more value rather than reacting to fire after fire during this demo.</p>]]></content:encoded>
      
      
      <enclosure length="411558281" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Final_Render_Time_Is_Now_Webcast.mp4?dest-id=91054"/>
      <itunes:duration>32:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>12</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/7/e/2/e7e27c965c756e55/Screen_Shot_2014-06-26_at_9.38.27_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Over the last few months, ITS has added more than 12 certified ServiceNow engineers, successfully completed multiple implementations and have dedicated trainers who are ITIL certified and ServiceNow approved. In addition to being one of only a select few partners in the US with Resale and Service implementation capability, ITS has 3 core areas of focus when it comes to our ServiceNow practice: Asset Management / Workflow Management Services – allowing you to go from where you are today to where you want to be tomorrow Bi Directional Integration between end point management systems to leverage your existing Altiris/Symantec or Microsoft SCCM environment ITIL certification trainers who can conduct broad based regional classes or dedicated in house sessions Find out why so many companies have made the switch and how their IT staff is now better equipped to proactively deliver more value rather than reacting to fire after fire during this demo.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Over the last few months, ITS has added more than 12 certified ServiceNow engineers, successfully completed multiple implementations and have dedicated trainers who are ITIL certified and ServiceNow approved. In addition to being one of only a select few partners in the US with Resale and Service implementation capability, ITS has 3 core areas of focus when it comes to our ServiceNow practice: Asset Management / Workflow Management Services – allowing you to go from where you are today to where you want to be tomorrow Bi Directional Integration between end point management systems to leverage your existing Altiris/Symantec or Microsoft SCCM environment ITIL certification trainers who can conduct broad based regional classes or dedicated in house sessions Find out why so many companies have made the switch and how their IT staff is now better equipped to proactively deliver more value rather than reacting to fire after fire during this demo.</itunes:summary></item>
    
    <item>
      <title>Today's Security Challenge: Protecting Your Data</title>
      <itunes:title>Today's Security Challenge: Protecting Your Data</itunes:title>
      <pubDate>Thu, 12 Jun 2014 14:25:22 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7d2dc5d22ea0bc4e3a7ab91acd92e8ce]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/todays-security-challenge-protecting-your-data]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">With the exponential increase in devices, point solutions, appliances, and other hardware in today's industry, protecting that hardware has become a daunting challenge. Combined with the evolution of targeted attack motivation from just bragging rights to massive profits, a new approach to IT security is required.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Focus needs to shift from protecting the hardware to protecting what the attackers want: your data. ITS will explore how some of these trends have developed, and what Symantec is doing to shift from yesterday's protection strategies to tomorrow's.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Hint: it's all about data.</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">With the exponential increase in devices, point solutions, appliances, and other hardware in today's industry, protecting that hardware has become a daunting challenge. Combined with the evolution of targeted attack motivation from just bragging rights to massive profits, a new approach to IT security is required.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Focus needs to shift from protecting the hardware to protecting what the attackers want: your data. ITS will explore how some of these trends have developed, and what Symantec is doing to shift from yesterday's protection strategies to tomorrow's.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 15.555556297302246px; line-height: 21px; background-color: #f4f5f7;">Hint: it's all about data.</p>]]></content:encoded>
      
      
      <itunes:keywords/>
      
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/2/9/f/129f77acfefb3dc2/Screen_Shot_2014-06-11_at_3.18.19_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author></item>
    
    <item>
      <title>Symantec Data Loss Prevention- Triggering Endpoint Response Rules</title>
      <itunes:title>Symantec Data Loss Prevention- Triggering Endpoint Response Rules</itunes:title>
      <pubDate>Thu, 22 May 2014 18:37:17 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1954b9bcba54c077524b665a78561633]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-data-loss-prevention-triggering-endpoint-response-rules]]></link>
      <description><![CDATA[<p>There's many ways for confidential data to be lost on your endpoints. Whether a malicious user gains access to a database of social security numbers, or your employees simply want to take their work home for the long holiday weekend, it's relatively easy for users to leak confidential data. Check out this demonstration on  Symantec Data Loss Prevention to discover how DLP can monitor and even block data loss on your endpoints.</p>]]></description>
      
      <content:encoded><![CDATA[<p>There's many ways for confidential data to be lost on your endpoints. Whether a malicious user gains access to a database of social security numbers, or your employees simply want to take their work home for the long holiday weekend, it's relatively easy for users to leak confidential data. Check out this demonstration on Symantec Data Loss Prevention to discover how DLP can monitor and even block data loss on your endpoints.</p>]]></content:encoded>
      
      
      <enclosure length="308032084" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_Data_Loss_Prevention-_Triggering_Endpoint_Response_Rules.mp4?dest-id=91054"/>
      <itunes:duration>15:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>11</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/c/0/a/dc0afbef8decd2f1/DLP_Thumbnail.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>There's many ways for confidential data to be lost on your endpoints. Whether a malicious user gains access to a database of social security numbers, or your employees simply want to take their work home for the long holiday weekend, it's relatively easy for users to leak confidential data. Check out this demonstration on  Symantec Data Loss Prevention to discover how DLP can monitor and even block data loss on your endpoints.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>There's many ways for confidential data to be lost on your endpoints. Whether a malicious user gains access to a database of social security numbers, or your employees simply want to take their work home for the long holiday weekend, it's relatively easy for users to leak confidential data. Check out this demonstration on  Symantec Data Loss Prevention to discover how DLP can monitor and even block data loss on your endpoints.</itunes:summary></item>
    
    <item>
      <title>Symantec Endpoint Protection: Custom Drive Letter Scanning</title>
      <itunes:title>Symantec Endpoint Protection: Custom Drive Letter Scanning</itunes:title>
      <pubDate>Thu, 22 May 2014 18:29:35 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e719d95b6492230464329540b78e4f68]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-endpoint-protection-custom-drive-letter-scanning]]></link>
      <description><![CDATA[<p>Scanning by drives is easy. Open the SEP client, create a new client scan, and set the drive letter. Then, just do this for each and every machine in your environment.  Or, check out this demo from the experts at ITS Partners to learn how to create such a policy from the management server, fully deployable across your environment.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Scanning by drives is easy. Open the SEP client, create a new client scan, and set the drive letter. Then, just do this for each and every machine in your environment. Or, check out this demo from the experts at ITS Partners to learn how to create such a policy from the management server, fully deployable across your environment.</p>]]></content:encoded>
      
      
      <enclosure length="218789223" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_Endpoint_Protection-_Custom_Drive_Letter_Scanning.mp4?dest-id=91054"/>
      <itunes:duration>07:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>10</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/c/e/e/4cee599607ad6a29/SEP_thumbnail.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Scanning by drives is easy. Open the SEP client, create a new client scan, and set the drive letter. Then, just do this for each and every machine in your environment.  Or, check out this demo from the experts at ITS Partners to learn how to create such a policy from the management server, fully deployable across your environment.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Scanning by drives is easy. Open the SEP client, create a new client scan, and set the drive letter. Then, just do this for each and every machine in your environment.  Or, check out this demo from the experts at ITS Partners to learn how to create such a policy from the management server, fully deployable across your environment.</itunes:summary></item>
    
    <item>
      <title>ITS Coffee Talks: ITS Partners' Discuss The Heartbleed Vulnerability. SE01EP04</title>
      <itunes:title>ITS Coffee Talks: ITS Partners' Discuss The Heartbleed Vulnerability. SE01EP04</itunes:title>
      <pubDate>Tue, 13 May 2014 19:50:49 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c586c25725bacb0228382ce4de90b2a5]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-coffee-talks-its-partners-discuss-the-heartbleed-vulnerability-se01ep04]]></link>
      <description><![CDATA[<p><span style="color: #333333; font-family: Interstate, 'Lucida Grande', 'Lucida Sans Unicode', 'Lucida Sans', Garuda, Verdana, Tahoma, sans-serif; font-size: 16px; line-height: 22.399999618530273px; background-color: #f2f2f2;">It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what exactly is it? How much damage has really been caused by it? What can people do to protect themselves from it? All of that and more in this week’s episode of ITS Coffee Talks.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what exactly is it? How much damage has really been caused by it? What can people do to protect themselves from it? All of that and more in this week’s episode of ITS Coffee Talks.</p>]]></content:encoded>
      
      
      <enclosure length="16666235" type="audio/mpeg" url="https://traffic.libsyn.com/secure/itspartners/ITS_Coffee_Talks_SE01EP04_-_Heartbleed.mp3?dest-id=91054"/>
      <itunes:duration>11:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>9</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what exactly is it? How much damage has really been caused by it? What can people do to protect themselves from it? All of that and more in this week’s episode of ITS Coffee Talks.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>It’s the bug that continues to make global headlines over a month after its discovery. The Heartbleed vulnerability in OpenSSL has been called “the biggest fault in internet security history”, but what exactly is it? How much damage has really been caused by it? What can people do to protect themselves from it? All of that and more in this week’s episode of ITS Coffee Talks.</itunes:summary></item>
    
    <item>
      <title>Getting The Most Out Of Symantec Endpoint Protection</title>
      <itunes:title>Getting The Most Out Of Symantec Endpoint Protection</itunes:title>
      <pubDate>Fri, 25 Apr 2014 20:13:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e047e2c85afdf5ed2303fa064b64d9b5]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/getting-the-most-out-of-symantec-endpoint-protection]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">If you’re not using all of the advanced features of Symantec Endpoint Protection, not only are you not getting the most out of your investment, but it’s probably hurting you more than you realize! ITS finds that over 50% customers we interact with are NOT leveraging SEP beyond the foundation of AV/AS functionality and the breakouts and incidents they deal with are a reflection of this.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">IT Administrators today are often put in a tough spot between giving users a positive experience, allowing them to work and play freely while protecting organizational assets and information. Join our consultants for a presentation on how to enable advanced SEP features, protect desktops and laptops against today’s advanced malware threats.</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">If you’re not using all of the advanced features of Symantec Endpoint Protection, not only are you not getting the most out of your investment, but it’s probably hurting you more than you realize! ITS finds that over 50% customers we interact with are NOT leveraging SEP beyond the foundation of AV/AS functionality and the breakouts and incidents they deal with are a reflection of this.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">IT Administrators today are often put in a tough spot between giving users a positive experience, allowing them to work and play freely while protecting organizational assets and information. Join our consultants for a presentation on how to enable advanced SEP features, protect desktops and laptops against today’s advanced malware threats.</p>]]></content:encoded>
      
      
      <enclosure length="159187607" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_Endpoint_Webcast_Final.mp4?dest-id=91054"/>
      <itunes:duration>17:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>8</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/b/a/2/f/ba2f57309c88bce0/Screen_Shot_2014-04-25_at_4.10.35_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>If you’re not using all of the advanced features of Symantec Endpoint Protection, not only are you not getting the most out of your investment, but it’s probably hurting you more than you realize! ITS finds that over 50% customers we interact with are NOT leveraging SEP beyond the foundation of AV/AS functionality and the breakouts and incidents they deal with are a reflection of this. IT Administrators today are often put in a tough spot between giving users a positive experience, allowing them to work and play freely while protecting organizational assets and information. Join our consultants for a presentation on how to enable advanced SEP features, protect desktops and laptops against today’s advanced malware threats.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>If you’re not using all of the advanced features of Symantec Endpoint Protection, not only are you not getting the most out of your investment, but it’s probably hurting you more than you realize! ITS finds that over 50% customers we interact with are NOT leveraging SEP beyond the foundation of AV/AS functionality and the breakouts and incidents they deal with are a reflection of this. IT Administrators today are often put in a tough spot between giving users a positive experience, allowing them to work and play freely while protecting organizational assets and information. Join our consultants for a presentation on how to enable advanced SEP features, protect desktops and laptops against today’s advanced malware threats.</itunes:summary></item>
    
    <item>
      <title>Symantec Endpoint  Management (Altiris) To ServiceNow Integration</title>
      <itunes:title>Symantec Endpoint  Management (Altiris) To ServiceNow Integration</itunes:title>
      <pubDate>Wed, 23 Apr 2014 01:18:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[10e4fe31c81f406b79de0713b7349b6b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-endpoint-management-altiris-to-servicenow-integration]]></link>
      <description><![CDATA[<p>In this video, Aaron Hudson of ITS Partners will demonstrate how you can leverage the power of your existing Altiris infrastructure within the ServiceNow platform.  As an endpoint management customer, you are likely to have valuable resource data and processes already defined that you would like to take advantage of within ServiceNow. Our Automation team has come to the rescue and developed an integration project that is sure to maximize your efficiency and ROI by eliminating swivel chair tasks required when working in both systems.</p>
<p>This video will discuss:</p>
<ul>
<li>What data can be pulled from Altiris and reflected in my ServiceNow platform?</li>
<li>Can I take action on those resources such as automating software delivery?</li>
<li>How can I make my ServiceNow technicians more efficient without granting unnecessary permissions?</li>
<li>Can I see how Automation works within the ServiceNow platform?</li>
</ul>]]></description>
      
      <content:encoded><![CDATA[<p>In this video, Aaron Hudson of ITS Partners will demonstrate how you can leverage the power of your existing Altiris infrastructure within the ServiceNow platform. As an endpoint management customer, you are likely to have valuable resource data and processes already defined that you would like to take advantage of within ServiceNow. Our Automation team has come to the rescue and developed an integration project that is sure to maximize your efficiency and ROI by eliminating swivel chair tasks required when working in both systems.</p> <p>This video will discuss:</p> <ul> <li>What data can be pulled from Altiris and reflected in my ServiceNow platform?</li> <li>Can I take action on those resources such as automating software delivery?</li> <li>How can I make my ServiceNow technicians more efficient without granting unnecessary permissions?</li> <li>Can I see how Automation works within the ServiceNow platform?</li> </ul>]]></content:encoded>
      
      
      <enclosure length="235686683" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Altiris_To_ServiceNow_Integration.mp4?dest-id=91054"/>
      <itunes:duration>10:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/f/0/d/6f0d181b84f8abe3/Screen_Shot_2014-04-22_at_8.59.55_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video, Aaron Hudson of ITS Partners will demonstrate how you can leverage the power of your existing Altiris infrastructure within the ServiceNow platform.  As an endpoint management customer, you are likely to have valuable resource data and processes already defined that you would like to take advantage of within ServiceNow. Our Automation team has come to the rescue and developed an integration project that is sure to maximize your efficiency and ROI by eliminating swivel chair tasks required when working in both systems. This video will discuss: What data can be pulled from Altiris and reflected in my ServiceNow platform? Can I take action on those resources such as automating software delivery? How can I make my ServiceNow technicians more efficient without granting unnecessary permissions? Can I see how Automation works within the ServiceNow platform?</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video, Aaron Hudson of ITS Partners will demonstrate how you can leverage the power of your existing Altiris infrastructure within the ServiceNow platform.  As an endpoint management customer, you are likely to have valuable resource data and processes already defined that you would like to take advantage of within ServiceNow. Our Automation team has come to the rescue and developed an integration project that is sure to maximize your efficiency and ROI by eliminating swivel chair tasks required when working in both systems. This video will discuss: What data can be pulled from Altiris and reflected in my ServiceNow platform? Can I take action on those resources such as automating software delivery? How can I make my ServiceNow technicians more efficient without granting unnecessary permissions? Can I see how Automation works within the ServiceNow platform?</itunes:summary></item>
    
    <item>
      <title>ITS Coffee Talks: The Fate of Windows XP &amp; The Rise Of Symantec CSP</title>
      <itunes:title>ITS Coffee Talks: The Fate of Windows XP &amp; The Rise Of Symantec CSP</itunes:title>
      <pubDate>Mon, 24 Mar 2014 19:38:56 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[876a255ca5b13e5333cc5150daf4b342]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-coffee-talks-the-fate-of-windows-xp-the-rise-of-symantec-csp]]></link>
      <description><![CDATA[<p><span style="color: #333333; font-family: Interstate, 'Lucida Grande', 'Lucida Sans Unicode', 'Lucida Sans', Garuda, Verdana, Tahoma, sans-serif; font-size: 16px; line-height: 22.399999618530273px; background-color: #f2f2f2;">Jacob Crawford of ITS Partners discusses the upcoming end of life for Windows XP.  Windows XP has been powering computers across the world for over a decade, but this April, Microsoft is dropping all support for Windows XP, and that means no more patches or operating system vulnerability fixes. While upgrading to a new, supported version of Windows is obviously the best answer, it isn’t always possible for every organization. We’ll take a look at the future of Windows XP and how Symantec’s Critical System Protection can keep your XP environments protected even after Microsoft stops support.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Jacob Crawford of ITS Partners discusses the upcoming end of life for Windows XP. Windows XP has been powering computers across the world for over a decade, but this April, Microsoft is dropping all support for Windows XP, and that means no more patches or operating system vulnerability fixes. While upgrading to a new, supported version of Windows is obviously the best answer, it isn’t always possible for every organization. We’ll take a look at the future of Windows XP and how Symantec’s Critical System Protection can keep your XP environments protected even after Microsoft stops support.</p>]]></content:encoded>
      
      
      <enclosure length="9776785" type="audio/mpeg" url="https://traffic.libsyn.com/secure/itspartners/ITS_Coffee_Talks_Episode_3.mp3?dest-id=91054"/>
      <itunes:duration>06:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Jacob Crawford of ITS Partners discusses the upcoming end of life for Windows XP.  Windows XP has been powering computers across the world for over a decade, but this April, Microsoft is dropping all support for Windows XP, and that means no more patches or operating system vulnerability fixes. While upgrading to a new, supported version of Windows is obviously the best answer, it isn’t always possible for every organization. We’ll take a look at the future of Windows XP and how Symantec’s Critical System Protection can keep your XP environments protected even after Microsoft stops support.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Jacob Crawford of ITS Partners discusses the upcoming end of life for Windows XP.  Windows XP has been powering computers across the world for over a decade, but this April, Microsoft is dropping all support for Windows XP, and that means no more patches or operating system vulnerability fixes. While upgrading to a new, supported version of Windows is obviously the best answer, it isn’t always possible for every organization. We’ll take a look at the future of Windows XP and how Symantec’s Critical System Protection can keep your XP environments protected even after Microsoft stops support.</itunes:summary></item>
    
    <item>
      <title>ITS Coffee Talks: ITS Partners' Interview with Slava Gomzin</title>
      <itunes:title>ITS Coffee Talks: ITS Partners' Interview with Slava Gomzin</itunes:title>
      <pubDate>Mon, 03 Mar 2014 19:03:49 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dc947ce1072e169034eaad966e4d7b66]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-coffee-talks-its-partners-interview-with-slava-gomzin]]></link>
      <description><![CDATA[<p>Jacob Crawford from ITS Partners interviews Slava Gomzin. <span style="color: #555555; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 21.709999084472656px;">Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security and technology at www.gomzin.com.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Jacob Crawford from ITS Partners interviews Slava Gomzin. Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security and technology at www.gomzin.com.</p>]]></content:encoded>
      
      
      <enclosure length="12984735" type="audio/mpeg" url="https://traffic.libsyn.com/secure/itspartners/ITS_Coffee_Talks_SE01EP02.mp3?dest-id=91054"/>
      <itunes:duration>09:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Jacob Crawford from ITS Partners interviews Slava Gomzin. Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&amp;D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&amp;D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security and technology at www.gomzin.com.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Jacob Crawford from ITS Partners interviews Slava Gomzin. Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&amp;D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&amp;D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security and technology at www.gomzin.com.</itunes:summary></item>
    
    <item>
      <title>ITS Coffee Talks: Credit Card Breaches and Symantec Security Solutions</title>
      <itunes:title>ITS Coffee Talks: Credit Card Breaches and Symantec Security Solutions</itunes:title>
      <pubDate>Mon, 03 Mar 2014 18:34:57 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[50b51a2f9f1681ed8ca5b546e1dd37e4]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-coffee-talks-credit-card-breaches-and-symantec-security-solutions]]></link>
      <description><![CDATA[<p>Jacob Crawford, security consultant for ITS Partners, discusses recent credit card breaches and Symantec security solutions.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Jacob Crawford, security consultant for ITS Partners, discusses recent credit card breaches and Symantec security solutions.</p>]]></content:encoded>
      
      
      <enclosure length="11924004" type="audio/mpeg" url="https://traffic.libsyn.com/secure/itspartners/ITS_Coffee_Talks_SE01EP01__01.mp3?dest-id=91054"/>
      <itunes:duration>08:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Jacob Crawford, security consultant for ITS Partners, discusses recent credit card breaches and Symantec security solutions.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Jacob Crawford, security consultant for ITS Partners, discusses recent credit card breaches and Symantec security solutions.</itunes:summary></item>
    
    <item>
      <title>Symantec Security &amp; Mobility Update For The Healthcare Industry</title>
      <itunes:title>Symantec Security &amp; Mobility Update For The Healthcare Industry</itunes:title>
      <pubDate>Thu, 30 Jan 2014 14:26:36 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[b855a9f7530a2ac1816fa26a679ab381]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-security-mobility-update-for-the-healthcare-industry]]></link>
      <description><![CDATA[<p>Healthcare more than ever is becoming an information driven enterprise. Organizations are moving to a state where data security, availability, and secure access and authentication are critical. However, very few enterprises / verticals have to deliver this experience in an environment where:</p>
<p>* Access to data and it’s integrity can literally mean life and death,</p>
<p>* Your customer’s most valued data is constantly at risk,</p>
<p>* The stakes for compliance / non compliance with industry regulation are high.</p>
<p></p>
<p>Symantec helps address the questions of:</p>
<p>* What is my sensitive information (HIPAA, PII)?</p>
<p>* Where is that information being stored?</p>
<p>* How is it being accessed?</p>
<p>* How is it used or shared?</p>
<p>* Are standard business processes / flows putting it at risk?</p>
<p></p>
<p>How can we offer users a fluid experience that provides secure access to information from any device?</p>
<p></p>
<p>Symantec Solutions to focus on as we answer these:</p>
<p>* Data Insight</p>
<p>* DLP</p>
<p>* PGP</p>
<p>* VIP / MPKI</p>
<p>* Mobility</p>]]></description>
      
      <content:encoded><![CDATA[<p>Healthcare more than ever is becoming an information driven enterprise. Organizations are moving to a state where data security, availability, and secure access and authentication are critical. However, very few enterprises / verticals have to deliver this experience in an environment where:</p> <p>* Access to data and it’s integrity can literally mean life and death,</p> <p>* Your customer’s most valued data is constantly at risk,</p> <p>* The stakes for compliance / non compliance with industry regulation are high.</p> <p></p> <p>Symantec helps address the questions of:</p> <p>* What is my sensitive information (HIPAA, PII)?</p> <p>* Where is that information being stored?</p> <p>* How is it being accessed?</p> <p>* How is it used or shared?</p> <p>* Are standard business processes / flows putting it at risk?</p> <p></p> <p>How can we offer users a fluid experience that provides secure access to information from any device?</p> <p></p> <p>Symantec Solutions to focus on as we answer these:</p> <p>* Data Insight</p> <p>* DLP</p> <p>* PGP</p> <p>* VIP / MPKI</p> <p>* Mobility</p>]]></content:encoded>
      
      
      <enclosure length="136940209" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Security_Healthcare_Webinar_Final_iTunes.mp4?dest-id=91054"/>
      <itunes:duration>32:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/e/d/a/8/eda8c5b94126d42a/Screen_Shot_2014-01-30_at_7.29.11_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Healthcare more than ever is becoming an information driven enterprise. Organizations are moving to a state where data security, availability, and secure access and authentication are critical. However, very few enterprises / verticals have to deliver this experience in an environment where: * Access to data and it’s integrity can literally mean life and death, * Your customer’s most valued data is constantly at risk, * The stakes for compliance / non compliance with industry regulation are high. Symantec helps address the questions of: * What is my sensitive information (HIPAA, PII)? * Where is that information being stored? * How is it being accessed? * How is it used or shared? * Are standard business processes / flows putting it at risk? How can we offer users a fluid experience that provides secure access to information from any device? Symantec Solutions to focus on as we answer these: * Data Insight * DLP * PGP * VIP / MPKI * Mobility</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Healthcare more than ever is becoming an information driven enterprise. Organizations are moving to a state where data security, availability, and secure access and authentication are critical. However, very few enterprises / verticals have to deliver this experience in an environment where: * Access to data and it’s integrity can literally mean life and death, * Your customer’s most valued data is constantly at risk, * The stakes for compliance / non compliance with industry regulation are high. Symantec helps address the questions of: * What is my sensitive information (HIPAA, PII)? * Where is that information being stored? * How is it being accessed? * How is it used or shared? * Are standard business processes / flows putting it at risk? How can we offer users a fluid experience that provides secure access to information from any device? Symantec Solutions to focus on as we answer these: * Data Insight * DLP * PGP * VIP / MPKI * Mobility</itunes:summary></item>
    
    <item>
      <title>Automate The Scaling Out Of A Remote Desktop Services Farm Using System Center</title>
      <itunes:title>Automate The Scaling Out Of A Remote Desktop Services Farm Using System Center</itunes:title>
      <pubDate>Tue, 21 Jan 2014 21:23:41 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[c6503e405d888df897c3beb4241df179]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/automate-the-scaling-out-of-a-remote-desktop-services-farm-using-system-center]]></link>
      <description><![CDATA[<p>In this video, Cris Weber from ITS Partners demonstrates how to automatically scale out a Remote Desktop Services farm based on user demand using System Center Operations Manager, Virtual Machine Manager and Orchestrator.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video, Cris Weber from ITS Partners demonstrates how to automatically scale out a Remote Desktop Services farm based on user demand using System Center Operations Manager, Virtual Machine Manager and Orchestrator.</p>]]></content:encoded>
      
      
      <enclosure length="118452806" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Roadshow_Project_Final.mp4?dest-id=91054"/>
      <itunes:duration>26:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>2</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/e/b/4/3eb49471476293f8/Screen_Shot_2014-01-21_at_1.00.23_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video, Cris Weber from ITS Partners demonstrates how to automatically scale out a Remote Desktop Services farm based on user demand using System Center Operations Manager, Virtual Machine Manager and Orchestrator.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video, Cris Weber from ITS Partners demonstrates how to automatically scale out a Remote Desktop Services farm based on user demand using System Center Operations Manager, Virtual Machine Manager and Orchestrator.</itunes:summary></item>
    
    <item>
      <title>ServiceNow Asset Management Lab (2 of 2)</title>
      <itunes:title>ServiceNow Asset Management Lab (2 of 2)</itunes:title>
      <pubDate>Wed, 08 Jan 2014 15:29:01 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[1e3835db44691c11884513269b6e7181]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/servicenow-asset-management-lab-2-of-2]]></link>
      <description><![CDATA[<p>In the 2nd of 2 parts, the ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types.  Be sure to watch our 1st video in this series too.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In the 2nd of 2 parts, the ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types. Be sure to watch our 1st video in this series too.</p>]]></content:encoded>
      
      
      <itunes:keywords/>
      
      
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author></item>
    
    <item>
      <title>ServiceNow Asset Management Lab (1 of 2)</title>
      <itunes:title>ServiceNow Asset Management Lab (1 of 2)</itunes:title>
      <pubDate>Wed, 08 Jan 2014 15:16:30 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dd4dc0a7b699d8cbd95c7cef4c48cf53]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/service-now-asset-management-lab-1-of-2]]></link>
      <description><![CDATA[<p><span style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types. Be sure to check out the 2nd video in this series.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>The ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types. Be sure to check out the 2nd video in this series.</p>]]></content:encoded>
      
      
      <enclosure length="81371911" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ServiceNow_Asset_Management_Lab_1.1_Final.mp4?dest-id=91054"/>
      <itunes:duration>10:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>3</itunes:season>
      
      
      <itunes:episode>1</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/1/d/8/c/1d8c57dd73d23684/Screen_Shot_2014-01-07_at_1.19.42_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types. Be sure to check out the 2nd video in this series.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The ServiceNow experts at ITS Partners will demonstrate the installation of the of the Software Asset Module in ServiceNow. This video includes basic installation, software compliance, software entitlements and software license types. Be sure to check out the 2nd video in this series.</itunes:summary></item>
    
    <item>
      <title>Learn how to handle Symantec DLP incidents with your ticketing system.</title>
      <itunes:title>Learn how to handle Symantec DLP incidents with your ticketing system.</itunes:title>
      <pubDate>Tue, 22 Oct 2013 14:39:58 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[83a2cf8064d2d9583e8d1dbbd4fdd3ca]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/learn-how-to-handle-symantec-dlp-incidents-with-your-ticketing-system]]></link>
      <description><![CDATA[<p>One of the challenges in Symantec Data Loss Prevention is assignment and tracking of incidents. The system has a built-in workflow to handle basic escalation, but wouldn’t it be great if you could leverage your existing ticketing service desk system, such as Symantec’s ServiceDesk or ServiceNow, to handle this workflow?</p>
<p></p>
<p>During this video, you will learn how we leverage the Incident API to get information from the DLP system and place it into your service desk system, and then resolve the incident in the DLP system once a change has been made.  We will demonstrate the Incident Reporting API, creating an incident in the service desk system, and then resolving the incident which will update the DLP system.  We will use the following software to perform this:</p>
<p></p>
<p>* Symantec DLP</p>
<p>* Symantec Workflow</p>
<p>* Symantec Incident API</p>
<p>* Symantec Service Desk and ServiceNow Incident Management</p>]]></description>
      
      <content:encoded><![CDATA[<p>One of the challenges in Symantec Data Loss Prevention is assignment and tracking of incidents. The system has a built-in workflow to handle basic escalation, but wouldn’t it be great if you could leverage your existing ticketing service desk system, such as Symantec’s ServiceDesk or ServiceNow, to handle this workflow?</p> <p></p> <p>During this video, you will learn how we leverage the Incident API to get information from the DLP system and place it into your service desk system, and then resolve the incident in the DLP system once a change has been made. We will demonstrate the Incident Reporting API, creating an incident in the service desk system, and then resolving the incident which will update the DLP system. We will use the following software to perform this:</p> <p></p> <p>* Symantec DLP</p> <p>* Symantec Workflow</p> <p>* Symantec Incident API</p> <p>* Symantec Service Desk and ServiceNow Incident Management</p>]]></content:encoded>
      
      
      <enclosure length="154263522" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/DLP_TIckets_Final_Render.mp4?dest-id=91054"/>
      <itunes:duration>17:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>22</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/6/d/f/66df243454fb99b7/Screen_Shot_2013-10-22_at_10.26.22_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>One of the challenges in Symantec Data Loss Prevention is assignment and tracking of incidents. The system has a built-in workflow to handle basic escalation, but wouldn’t it be great if you could leverage your existing ticketing service desk system, such as Symantec’s ServiceDesk or ServiceNow, to handle this workflow? During this video, you will learn how we leverage the Incident API to get information from the DLP system and place it into your service desk system, and then resolve the incident in the DLP system once a change has been made.  We will demonstrate the Incident Reporting API, creating an incident in the service desk system, and then resolving the incident which will update the DLP system.  We will use the following software to perform this: * Symantec DLP * Symantec Workflow * Symantec Incident API * Symantec Service Desk and ServiceNow Incident Management</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>One of the challenges in Symantec Data Loss Prevention is assignment and tracking of incidents. The system has a built-in workflow to handle basic escalation, but wouldn’t it be great if you could leverage your existing ticketing service desk system, such as Symantec’s ServiceDesk or ServiceNow, to handle this workflow? During this video, you will learn how we leverage the Incident API to get information from the DLP system and place it into your service desk system, and then resolve the incident in the DLP system once a change has been made.  We will demonstrate the Incident Reporting API, creating an incident in the service desk system, and then resolving the incident which will update the DLP system.  We will use the following software to perform this: * Symantec DLP * Symantec Workflow * Symantec Incident API * Symantec Service Desk and ServiceNow Incident Management</itunes:summary></item>
    
    <item>
      <title>7.5 Reasons To Upgrade To Altiris 7.5</title>
      <itunes:title>7.5 Reasons To Upgrade To Altiris 7.5</itunes:title>
      <pubDate>Thu, 03 Oct 2013 14:50:24 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[7a2f618934c6b2cbae569b788b4007df]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/7-5-reasons-to-upgrade-to-altiris-7-5]]></link>
      <description><![CDATA[<p>It is almost here! You read that correctly, Altiris 7.5′s release is right around the corner. We are so excited to be part of this big release.</p>
<p>The Altiris experts from ITS will review the 7.5 top reasons everyone should consider upgrading to the Altiris 7.5 platform. We will provide an overview of the features and capabilities that are new to the 7.5 platform as well as how those will enable better management of your IT environment.</p>
<p>Okay, enough with the pleasantries you say? What are we actually going to talk about? Here is what we will be covering:</p>
<p></p>
<p>Cloud Enabled Management</p>
<p>Deployment Solution</p>
<p>Macintosh Management</p>
<p>Performance</p>
<p>Platform Support</p>
<p>Automation</p>
<p>In-place upgrade</p>
<p>iPad App</p>
<p></p>]]></description>
      
      <content:encoded><![CDATA[<p>It is almost here! You read that correctly, Altiris 7.5′s release is right around the corner. We are so excited to be part of this big release.</p> <p>The Altiris experts from ITS will review the 7.5 top reasons everyone should consider upgrading to the Altiris 7.5 platform. We will provide an overview of the features and capabilities that are new to the 7.5 platform as well as how those will enable better management of your IT environment.</p> <p>Okay, enough with the pleasantries you say? What are we actually going to talk about? Here is what we will be covering:</p> <p></p> <p>Cloud Enabled Management</p> <p>Deployment Solution</p> <p>Macintosh Management</p> <p>Performance</p> <p>Platform Support</p> <p>Automation</p> <p>In-place upgrade</p> <p>iPad App</p> <p></p>]]></content:encoded>
      
      
      <enclosure length="265773229" type="video/quicktime" url="https://traffic.libsyn.com/secure/itspartners/7.5_Reasons_To_Ugrade_To_Altiris_7.5_Final.mov?dest-id=91054"/>
      <itunes:duration>45:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>21</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/4/e/2/44e255329a4c4c6b/Screen_Shot_2013-10-03_at_10.36.23_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>It is almost here! You read that correctly, Altiris 7.5′s release is right around the corner. We are so excited to be part of this big release. The Altiris experts from ITS will review the 7.5 top reasons everyone should consider upgrading to the Altiris 7.5 platform. We will provide an overview of the features and capabilities that are new to the 7.5 platform as well as how those will enable better management of your IT environment. Okay, enough with the pleasantries you say? What are we actually going to talk about? Here is what we will be covering: Cloud Enabled Management Deployment Solution Macintosh Management Performance Platform Support Automation In-place upgrade iPad App</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>It is almost here! You read that correctly, Altiris 7.5′s release is right around the corner. We are so excited to be part of this big release. The Altiris experts from ITS will review the 7.5 top reasons everyone should consider upgrading to the Altiris 7.5 platform. We will provide an overview of the features and capabilities that are new to the 7.5 platform as well as how those will enable better management of your IT environment. Okay, enough with the pleasantries you say? What are we actually going to talk about? Here is what we will be covering: Cloud Enabled Management Deployment Solution Macintosh Management Performance Platform Support Automation In-place upgrade iPad App</itunes:summary></item>
    
    <item>
      <title>Deployment Solution 7.5</title>
      <itunes:title>Deployment Solution 7.5</itunes:title>
      <pubDate>Mon, 30 Sep 2013 19:00:11 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5f2d69fd47d10f595795b27a4c77985b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/deployment-solution-7-5]]></link>
      <description><![CDATA[<p>Deployment Solution (DS) 7.5 from Symantec boasts numerous improvements over previous releases. Here is a field review of some key improvements, and a few good reasons for 7.1 customers and 6.9 customers alike, to consider 7.5 in their upgrade plans.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Deployment Solution (DS) 7.5 from Symantec boasts numerous improvements over previous releases. Here is a field review of some key improvements, and a few good reasons for 7.1 customers and 6.9 customers alike, to consider 7.5 in their upgrade plans.</p>]]></content:encoded>
      
      
      <enclosure length="55193975" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Deployment_Solution_7.5.mp4?dest-id=91054"/>
      <itunes:duration>08:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>19</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/6/8/7/46877898998e36ed/Screen_Shot_2013-09-30_at_2.38.12_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Deployment Solution (DS) 7.5 from Symantec boasts numerous improvements over previous releases. Here is a field review of some key improvements, and a few good reasons for 7.1 customers and 6.9 customers alike, to consider 7.5 in their upgrade plans.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Deployment Solution (DS) 7.5 from Symantec boasts numerous improvements over previous releases. Here is a field review of some key improvements, and a few good reasons for 7.1 customers and 6.9 customers alike, to consider 7.5 in their upgrade plans.</itunes:summary></item>
    
    <item>
      <title>Are you still running Windows XP? Using Office 2003? Act now or leave yourself exposed!</title>
      <itunes:title>Are you still running Windows XP? Using Office 2003? Act now or leave yourself exposed!</itunes:title>
      <pubDate>Thu, 05 Sep 2013 21:10:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e5ea1005c1c5f693dc9f63d90dd88709]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/are-you-still-running-windows-xp-using-office-2003-act-now-or-leave-yourself-exposed]]></link>
      <description><![CDATA[<p>Are you still running Windows XP? Using Office 2003?</p>
<p>If you answered yes to either of the above questions, April 8th, 2014 is coming fast and you need to act now. As of that date, Microsoft will no longer support or release any security patches for these End of Life products.</p>
<p>Are you comfortable with that level of risk?</p>
<p>Windows XP was released on August 24, 2001 and after 12 years, there are still vulnerabilities being found. If you look at the most recent batch of updates from Microsoft, there was yet another critical patch for XP released. The fact is, you need to migrate to a new Operating System and you need to kick the project off soon.</p>
<p>All is not lost though, ITS is here to help you analyze your environment and provide a migration solution. This video will focus on how the Symantec Client Management Suite(CMS) and its rich set of features can help you complete a successful migration.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Are you still running Windows XP? Using Office 2003?</p> <p>If you answered yes to either of the above questions, April 8th, 2014 is coming fast and you need to act now. As of that date, Microsoft will no longer support or release any security patches for these End of Life products.</p> <p>Are you comfortable with that level of risk?</p> <p>Windows XP was released on August 24, 2001 and after 12 years, there are still vulnerabilities being found. If you look at the most recent batch of updates from Microsoft, there was yet another critical patch for XP released. The fact is, you need to migrate to a new Operating System and you need to kick the project off soon.</p> <p>All is not lost though, ITS is here to help you analyze your environment and provide a migration solution. This video will focus on how the Symantec Client Management Suite(CMS) and its rich set of features can help you complete a successful migration.</p>]]></content:encoded>
      
      
      <enclosure length="112802696" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/WIndows_XP_Migration_Using_Symantec_CMS_090413.mp4?dest-id=91054"/>
      <itunes:duration>41:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>18</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/3/8/6/f386ba35fb1980b8/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Are you still running Windows XP? Using Office 2003? If you answered yes to either of the above questions, April 8th, 2014 is coming fast and you need to act now. As of that date, Microsoft will no longer support or release any security patches for these End of Life products. Are you comfortable with that level of risk? Windows XP was released on August 24, 2001 and after 12 years, there are still vulnerabilities being found. If you look at the most recent batch of updates from Microsoft, there was yet another critical patch for XP released. The fact is, you need to migrate to a new Operating System and you need to kick the project off soon. All is not lost though, ITS is here to help you analyze your environment and provide a migration solution. This video will focus on how the Symantec Client Management Suite(CMS) and its rich set of features can help you complete a successful migration.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Are you still running Windows XP? Using Office 2003? If you answered yes to either of the above questions, April 8th, 2014 is coming fast and you need to act now. As of that date, Microsoft will no longer support or release any security patches for these End of Life products. Are you comfortable with that level of risk? Windows XP was released on August 24, 2001 and after 12 years, there are still vulnerabilities being found. If you look at the most recent batch of updates from Microsoft, there was yet another critical patch for XP released. The fact is, you need to migrate to a new Operating System and you need to kick the project off soon. All is not lost though, ITS is here to help you analyze your environment and provide a migration solution. This video will focus on how the Symantec Client Management Suite(CMS) and its rich set of features can help you complete a successful migration.</itunes:summary></item>
    
    <item>
      <title>Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1</title>
      <itunes:title>Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1</itunes:title>
      <pubDate>Wed, 14 Aug 2013 18:03:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[5aa710ae4d971a412d3357701531233f]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/downloading-importing-and-updating-management-packs-in-microsoft-system-center-operations-manager-2012-sp1]]></link>
      <description><![CDATA[<p><span style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Troy Whittaker of ITS Partners will discuss Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1. He will show the following:</span><br style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">* Finding available downloaded management packs</span><br style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">* Searching for new management packs</span><br style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;" /><span style="color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">* Easiest way to update your installed management packs</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>Troy Whittaker of ITS Partners will discuss Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1. He will show the following:* Finding available downloaded management packs* Searching for new management packs* Easiest way to update your installed management packs</p>]]></content:encoded>
      
      
      <enclosure length="79904089" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/MS_Podcast_1_SCOM_MPacks.mp4?dest-id=91054"/>
      <itunes:duration>07:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>17</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/f/d/1/6fd12a42f9f6e26e/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Troy Whittaker of ITS Partners will discuss Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1. He will show the following:* Finding available downloaded management packs* Searching for new management packs* Easiest way to update your installed management packs</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Troy Whittaker of ITS Partners will discuss Downloading, Importing and Updating Management Packs in Microsoft System Center Operations Manager 2012 SP1. He will show the following:* Finding available downloaded management packs* Searching for new management packs* Easiest way to update your installed management packs</itunes:summary></item>
    
    <item>
      <title>Symantec Security Routing Engine Created by ITS Partners</title>
      <itunes:title>Symantec Security Routing Engine Created by ITS Partners</itunes:title>
      <pubDate>Mon, 29 Jul 2013 15:56:09 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[713b8a8e513569764c0e6fd75c63073b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/symantec-security-routing-engine-created-by-its-partners]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The Symantec Workflow and Symantec Security Consultants at ITS Partners have worked together to create a solution that takes an input from a Symantec security product and then routes it based on some decisions that are made in the ITS Security Routing Engine.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Symantec Security solutions such as Symantec DLP, SEP, CSP, and PGP have a very basic workflow for handling events and incidents in which most of these revolve around notification via email. One of the problems many customers have is how to notify different individuals based on certain criteria in the incident or event.<span class="Apple-tab-span" style="white-space: pre;"> </span></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The Symantec Workflow and Symantec Security Consultants at ITS Partners have worked together to create a solution that takes an input from a Symantec security product and then routes it based on some decisions that are made in the ITS Security Routing Engine.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Symantec Security solutions such as Symantec DLP, SEP, CSP, and PGP have a very basic workflow for handling events and incidents in which most of these revolve around notification via email. One of the problems many customers have is how to notify different individuals based on certain criteria in the incident or event. </p>]]></content:encoded>
      
      
      <enclosure length="43829941" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_Security_Routing_Engine_by_ITS_Partners_iTunes.mp4?dest-id=91054"/>
      <itunes:duration>10:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>16</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/4/2/a/c/42ac1bb7efc724ac/Screen_Shot_2013-07-29_at_11.50.26_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The Symantec Workflow and Symantec Security Consultants at ITS Partners have worked together to create a solution that takes an input from a Symantec security product and then routes it based on some decisions that are made in the ITS Security Routing Engine. Symantec Security solutions such as Symantec DLP, SEP, CSP, and PGP have a very basic workflow for handling events and incidents in which most of these revolve around notification via email. One of the problems many customers have is how to notify different individuals based on certain criteria in the incident or event.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The Symantec Workflow and Symantec Security Consultants at ITS Partners have worked together to create a solution that takes an input from a Symantec security product and then routes it based on some decisions that are made in the ITS Security Routing Engine. Symantec Security solutions such as Symantec DLP, SEP, CSP, and PGP have a very basic workflow for handling events and incidents in which most of these revolve around notification via email. One of the problems many customers have is how to notify different individuals based on certain criteria in the incident or event.</itunes:summary></item>
    
    <item>
      <title>Azure and Configuration Manager 2012 SP1: A powerful combination for distribution points</title>
      <itunes:title>Azure and Configuration Manager 2012 SP1: A powerful combination for distribution points</itunes:title>
      <pubDate>Tue, 11 Jun 2013 20:33:02 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[58eaf31200acc2388c4cdbdbf622e1a6]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/azure-and-configuration-manager-2012-sp1-a-powerful-combination-for-distribution-points]]></link>
      <description><![CDATA[<p>Have you ever wanted to deploy applications to users out on that series of tubes, otherwise known as the internet? In this video, Troy Whittaker of ITS, will show you the magic of how to put your content on a cloud and still integrate with your on-premise Configuration Manager infrastructure.</p>
<p></p>
<p>A live walkthrough of configuring both on-premise and cloud-hosted distribution points in Microsoft System Center Configuration Manager 2012 SP1. Note that an Azure subscription is required to facilitate this example.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Have you ever wanted to deploy applications to users out on that series of tubes, otherwise known as the internet? In this video, Troy Whittaker of ITS, will show you the magic of how to put your content on a cloud and still integrate with your on-premise Configuration Manager infrastructure.</p> <p></p> <p>A live walkthrough of configuring both on-premise and cloud-hosted distribution points in Microsoft System Center Configuration Manager 2012 SP1. Note that an Azure subscription is required to facilitate this example.</p>]]></content:encoded>
      
      
      <enclosure length="158976609" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Azure_and_Configuration_Manager_Webcast_061113_iTunes_Version.mp4?dest-id=91054"/>
      <itunes:duration>23:58</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>15</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/c/b/f/6cbff2767356635e/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Have you ever wanted to deploy applications to users out on that series of tubes, otherwise known as the internet? In this video, Troy Whittaker of ITS, will show you the magic of how to put your content on a cloud and still integrate with your on-premise Configuration Manager infrastructure. A live walkthrough of configuring both on-premise and cloud-hosted distribution points in Microsoft System Center Configuration Manager 2012 SP1. Note that an Azure subscription is required to facilitate this example.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Have you ever wanted to deploy applications to users out on that series of tubes, otherwise known as the internet? In this video, Troy Whittaker of ITS, will show you the magic of how to put your content on a cloud and still integrate with your on-premise Configuration Manager infrastructure. A live walkthrough of configuring both on-premise and cloud-hosted distribution points in Microsoft System Center Configuration Manager 2012 SP1. Note that an Azure subscription is required to facilitate this example.</itunes:summary></item>
    
    <item>
      <title>Active Directory User Management Demo Video</title>
      <itunes:title>Active Directory User Management Demo Video</itunes:title>
      <pubDate>Wed, 05 Jun 2013 12:51:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[3468f0f9778f1e98a4d84e49d4f4d51a]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/active-directory-user-management-demo-video]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"><span color="#71767a" face="sans-serif" size="3" style="color: #71767a; font-family: sans-serif; font-size: small;"><span style="line-height: 21px;">The AD User Self-Update is a workflow project that allows organizations to more effectively manage their Active Directory environments. It allows for users within an organization to request changes be made to their AD accounts which will be committed upon execution of a 3 step approval process.</span></span></p>
<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"><span color="#71767a" face="sans-serif" size="3" style="color: #71767a; font-family: sans-serif; font-size: small;"><span style="line-height: 21px;"><br /></span></span></p>
<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"><span color="#71767a" face="sans-serif" size="3" style="color: #71767a; font-family: sans-serif; font-size: small;"><span style="line-height: 21px;">The workflow pulls the user’s AD information into a form from which the user can edit and submit the changes. The workflow checks to see if the user has an approved manager, if not then the user can search for a manager to submit their changes to. If the user does have a manager, they will be given an option to select that manager for submission or select/search for a different manager.</span></span></p>
<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"><span color="#71767a" face="sans-serif" size="3" style="color: #71767a; font-family: sans-serif; font-size: small;"><span style="line-height: 21px;"><br /></span></span></p>
<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"><span color="#71767a" face="sans-serif" size="3" style="color: #71767a; font-family: sans-serif; font-size: small;"><span style="line-height: 21px;">Once submitted by the user, the workflow will be sent to the manager via email/link for approval. The manager will have the option to either accept or reject the changes. If the changes are accepted they will be updated and a confirmation email will be sent to the user. If the changes are rejected (manager can/must give reason in a text box) then the user will be notified via email stating what the manager wrote and the changes will not be updated.</span></span></p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">More information: <a href="http://www.itsdelivers.com/services/itautomation" target="_blank" rel="nofollow" style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;">itsdelivers.com/services/itautomation</a></p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The AD User Self-Update is a workflow project that allows organizations to more effectively manage their Active Directory environments. It allows for users within an organization to request changes be made to their AD accounts which will be committed upon execution of a 3 step approval process.</p> <p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"></p> <p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The workflow pulls the user’s AD information into a form from which the user can edit and submit the changes. The workflow checks to see if the user has an approved manager, if not then the user can search for a manager to submit their changes to. If the user does have a manager, they will be given an option to select that manager for submission or select/search for a different manager.</p> <p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;"></p> <p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Once submitted by the user, the workflow will be sent to the manager via email/link for approval. The manager will have the option to either accept or reject the changes. If the changes are accepted they will be updated and a confirmation email will be sent to the user. If the changes are rejected (manager can/must give reason in a text box) then the user will be notified via email stating what the manager wrote and the changes will not be updated.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">More information: <a href="http://www.itsdelivers.com/services/itautomation" target="_blank" rel="nofollow" style="cursor: pointer; font-weight: bold; color: #112233; text-decoration: none;">itsdelivers.com/services/itautomation</a></p>]]></content:encoded>
      
      
      <enclosure length="17966141" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/AD_User_Management_Demo_iTunes.mp4?dest-id=91054"/>
      <itunes:duration>05:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>14</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/f/5/2/e/f52e42acfe2c9b66/Screen_Shot_2013-06-04_at_3.11.48_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The AD User Self-Update is a workflow project that allows organizations to more effectively manage their Active Directory environments. It allows for users within an organization to request changes be made to their AD accounts which will be committed upon execution of a 3 step approval process. The workflow pulls the user’s AD information into a form from which the user can edit and submit the changes. The workflow checks to see if the user has an approved manager, if not then the user can search for a manager to submit their changes to. If the user does have a manager, they will be given an option to select that manager for submission or select/search for a different manager. Once submitted by the user, the workflow will be sent to the manager via email/link for approval. The manager will have the option to either accept or reject the changes. If the changes are accepted they will be updated and a confirmation email will be sent to the user. If the changes are rejected (manager can/must give reason in a text box) then the user will be notified via email stating what the manager wrote and the changes will not be updated. More information: itsdelivers.com/services/itautomation</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The AD User Self-Update is a workflow project that allows organizations to more effectively manage their Active Directory environments. It allows for users within an organization to request changes be made to their AD accounts which will be committed upon execution of a 3 step approval process. The workflow pulls the user’s AD information into a form from which the user can edit and submit the changes. The workflow checks to see if the user has an approved manager, if not then the user can search for a manager to submit their changes to. If the user does have a manager, they will be given an option to select that manager for submission or select/search for a different manager. Once submitted by the user, the workflow will be sent to the manager via email/link for approval. The manager will have the option to either accept or reject the changes. If the changes are accepted they will be updated and a confirmation email will be sent to the user. If the changes are rejected (manager can/must give reason in a text box) then the user will be notified via email stating what the manager wrote and the changes will not be updated. More information: itsdelivers.com/services/itautomation</itunes:summary></item>
    
    <item>
      <title>Deploying Symantec CSP with Microsoft System Center 2012 SP1's Configuration Manager</title>
      <itunes:title>Deploying Symantec CSP with Microsoft System Center 2012 SP1's Configuration Manager</itunes:title>
      <pubDate>Mon, 03 Jun 2013 15:08:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[93978321a6e1bfa7cb20646405c75ae2]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/deploying-symantec-csp-with-microsoft-system-center-configuration-manager-2012]]></link>
      <description><![CDATA[<p></p>
<p class="p1">With Symantec Critical System Protection we can secure our physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. In this video, we will demonstrate how to package and deploy Symantec Critical System Protection using Microsoft System Center 2012 Configuration Manager so we can easily protect and monitor our servers.</p>]]></description>
      
      <content:encoded><![CDATA[<p></p> <p class="p1">With Symantec Critical System Protection we can secure our physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. In this video, we will demonstrate how to package and deploy Symantec Critical System Protection using Microsoft System Center 2012 Configuration Manager so we can easily protect and monitor our servers.</p>]]></content:encoded>
      
      
      <enclosure length="122248277" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Deploying_CSP_Final_iTunes.mp4?dest-id=91054"/>
      <itunes:duration>18:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>13</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/7/9/f/8/79f8d0ab0340f1e0/__Deploying_CSP_Header.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>With Symantec Critical System Protection we can secure our physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. In this video, we will demonstrate how to package and deploy Symantec Critical System Protection using Microsoft System Center 2012 Configuration Manager so we can easily protect and monitor our servers.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>With Symantec Critical System Protection we can secure our physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. In this video, we will demonstrate how to package and deploy Symantec Critical System Protection using Microsoft System Center 2012 Configuration Manager so we can easily protect and monitor our servers.</itunes:summary></item>
    
    <item>
      <title>Introducing ServiceNow, The Enterprise IT Cloud Company.</title>
      <itunes:title>Introducing ServiceNow, The Enterprise IT Cloud Company.</itunes:title>
      <pubDate>Thu, 30 May 2013 13:37:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f5c0282c7674f294f2a2b0dac1d7583d]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/introducing-service-now-the-enterprise-it-cloud-company]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">In this video, ITS Partners will demonstrate how you can automate your service management and transform IT with ServiceNow.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">As an IT professional, you are likely being asked to deliver innovative products and services that improve operation effeciency. To be successful, you need to minimize capital investments and operating expenses, increase service quality and delivery speed, and support all regulatory and compliance requirements.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The key to all of this? Automation.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">This video will discuss:<br />1) Why ITS has decided to partner with ServiceNow<br />2) Learn how you can improve customer satisfaction with faster response times and self-service<br />3) Simplify and automate IT operations so you can allocate your resources more effectively<br />4) See how Automation works within the ServiceNow platform</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">In this video, ITS Partners will demonstrate how you can automate your service management and transform IT with ServiceNow.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">As an IT professional, you are likely being asked to deliver innovative products and services that improve operation effeciency. To be successful, you need to minimize capital investments and operating expenses, increase service quality and delivery speed, and support all regulatory and compliance requirements.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The key to all of this? Automation.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">This video will discuss:1) Why ITS has decided to partner with ServiceNow2) Learn how you can improve customer satisfaction with faster response times and self-service3) Simplify and automate IT operations so you can allocate your resources more effectively4) See how Automation works within the ServiceNow platform</p>]]></content:encoded>
      
      
      <enclosure length="306129624" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ServiceNow_Webcast_Final_052913_iTunes_Version.mp4?dest-id=91054"/>
      <itunes:duration>56:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>12</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/6/6/f/6/66f6cffd95d44042/Screen_Shot_2013-05-30_at_8.35.01_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video, ITS Partners will demonstrate how you can automate your service management and transform IT with ServiceNow. As an IT professional, you are likely being asked to deliver innovative products and services that improve operation effeciency. To be successful, you need to minimize capital investments and operating expenses, increase service quality and delivery speed, and support all regulatory and compliance requirements. The key to all of this? Automation. This video will discuss: 1) Why ITS has decided to partner with ServiceNow 2) Learn how you can improve customer satisfaction with faster response times and self-service 3) Simplify and automate IT operations so you can allocate your resources more effectively 4) See how Automation works within the ServiceNow platform</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video, ITS Partners will demonstrate how you can automate your service management and transform IT with ServiceNow. As an IT professional, you are likely being asked to deliver innovative products and services that improve operation effeciency. To be successful, you need to minimize capital investments and operating expenses, increase service quality and delivery speed, and support all regulatory and compliance requirements. The key to all of this? Automation. This video will discuss: 1) Why ITS has decided to partner with ServiceNow 2) Learn how you can improve customer satisfaction with faster response times and self-service 3) Simplify and automate IT operations so you can allocate your resources more effectively 4) See how Automation works within the ServiceNow platform</itunes:summary></item>
    
    <item>
      <title>ITS SEPM Group Move Automation</title>
      <itunes:title>ITS SEPM Group Move Automation</itunes:title>
      <pubDate>Tue, 21 May 2013 18:55:21 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f9380c37a3eb266c0fa31e2abe3d7707]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-sepm-group-move-automation]]></link>
      <description><![CDATA[<p>This video demonstrates the ITS SEPM Group Move Automation which is a Symantec Workflow project that uses web services available in the SEPM to move computers from the default SEPM group to other groups in the SEPM based on configuration changes in text files used by the workflow process. The packages files and install instructions for this workflow projects can be requested by emailing automation@itsdelivers.com.</p>]]></description>
      
      <content:encoded><![CDATA[<p>This video demonstrates the ITS SEPM Group Move Automation which is a Symantec Workflow project that uses web services available in the SEPM to move computers from the default SEPM group to other groups in the SEPM based on configuration changes in text files used by the workflow process. The packages files and install instructions for this workflow projects can be requested by emailing automation@itsdelivers.com.</p>]]></content:encoded>
      
      
      <enclosure length="27172015" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/ITS_SEPM_Group_Move_Automation_iTunes.mp4?dest-id=91054"/>
      <itunes:duration>03:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>11</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/f/c/1/3fc1cc7b3fdd3359/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>This video demonstrates the ITS SEPM Group Move Automation which is a Symantec Workflow project that uses web services available in the SEPM to move computers from the default SEPM group to other groups in the SEPM based on configuration changes in text files used by the workflow process. The packages files and install instructions for this workflow projects can be requested by emailing automation@itsdelivers.com.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>This video demonstrates the ITS SEPM Group Move Automation which is a Symantec Workflow project that uses web services available in the SEPM to move computers from the default SEPM group to other groups in the SEPM based on configuration changes in text files used by the workflow process. The packages files and install instructions for this workflow projects can be requested by emailing automation@itsdelivers.com.</itunes:summary></item>
    
    <item>
      <title>The ITS Advanced Search Tool Symantec ServiceDesk</title>
      <itunes:title>The ITS Advanced Search Tool Symantec ServiceDesk</itunes:title>
      <pubDate>Fri, 03 May 2013 14:12:00 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[dd64a2844fe856050fbc22d943404502]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/the-its-advanced-search-tool-symantec-service-desk]]></link>
      <description><![CDATA[<p>The ITS ServiceDesk Search Bundle is a set of tools which enables easier and more granular searches in the Service Desk Process Manager portal. It consists of three separate projects which allow for different types of searches. The tools are separate pieces, which can be installed separately and run individually by customers.</p>
<ul>
<li>Process Search – Adds ability to execute ad-hoc searches of tickets by text or by contact.</li>
<li>Process Search Advanced – Adds ability to execute ad-hoc searches of tickets by text, contact, assignment, status, priority, and other discrete fields on Service Desk tickets.</li>
<li>Quick Ticket Search – a small bonus tool which enables quick searches based on ticket ID/number.</li>
</ul>]]></description>
      
      <content:encoded><![CDATA[<p>The ITS ServiceDesk Search Bundle is a set of tools which enables easier and more granular searches in the Service Desk Process Manager portal. It consists of three separate projects which allow for different types of searches. The tools are separate pieces, which can be installed separately and run individually by customers.</p> <ul> <li>Process Search – Adds ability to execute ad-hoc searches of tickets by text or by contact.</li> <li>Process Search Advanced – Adds ability to execute ad-hoc searches of tickets by text, contact, assignment, status, priority, and other discrete fields on Service Desk tickets.</li> <li>Quick Ticket Search – a small bonus tool which enables quick searches based on ticket ID/number.</li> </ul>]]></content:encoded>
      
      
      <enclosure length="12397823" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/ITS_Advanced_Search_Final.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>04:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>10</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/f/a/1/3fa1acc1e0b7f709/Screen_Shot_2013-04-12_at_10.28.10_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The ITS ServiceDesk Search Bundle is a set of tools which enables easier and more granular searches in the Service Desk Process Manager portal. It consists of three separate projects which allow for different types of searches. The tools are separate pieces, which can be installed separately and run individually by customers. Process Search – Adds ability to execute ad-hoc searches of tickets by text or by contact. Process Search Advanced – Adds ability to execute ad-hoc searches of tickets by text, contact, assignment, status, priority, and other discrete fields on Service Desk tickets. Quick Ticket Search – a small bonus tool which enables quick searches based on ticket ID/number.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The ITS ServiceDesk Search Bundle is a set of tools which enables easier and more granular searches in the Service Desk Process Manager portal. It consists of three separate projects which allow for different types of searches. The tools are separate pieces, which can be installed separately and run individually by customers. Process Search – Adds ability to execute ad-hoc searches of tickets by text or by contact. Process Search Advanced – Adds ability to execute ad-hoc searches of tickets by text, contact, assignment, status, priority, and other discrete fields on Service Desk tickets. Quick Ticket Search – a small bonus tool which enables quick searches based on ticket ID/number.</itunes:summary></item>
    
    <item>
      <title>Deploying Office 365 as an Application in Configuration Manager 2012 SP1</title>
      <itunes:title>Deploying Office 365 as an Application in Configuration Manager 2012 SP1</itunes:title>
      <pubDate>Thu, 02 May 2013 20:31:34 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[e8198a3a488cb4a79b82ca036e14097e]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/deploying-office-365-as-an-application-in-configuration-manager-2012-sp1]]></link>
      <description/>
      
      <content:encoded/>
      
      
      <enclosure length="271894906" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Deploying_Office_365_iTunes_Final.mp4?dest-id=91054"/>
      <itunes:duration>37:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>9</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/8/7/1/c87165918a176a47/Screen_Shot_2013-05-02_at_4.10.14_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:author>ITS Partners</itunes:author></item>
    
    <item>
      <title>Demystifying Licensing For System Center, SQL and Windows Servers</title>
      <itunes:title>Demystifying Licensing For System Center, SQL and Windows Servers</itunes:title>
      <pubDate>Thu, 25 Apr 2013 19:36:05 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[28475803716af5a47b1900f6b1b2ff20]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/demystifying-licensing-for-system-center-sql-and-windows-servers]]></link>
      <description><![CDATA[<p>Are you confused about how processor-based licensing works? Do you wonder if shifting more servers to virtual will save you money? Is SQL really free with System Center 2012?</p>
<p>In this video, Troy Whittaker of ITS Partners will review important changes to licensing of Microsoft Server 2012, SQL 2012 and System Center 2012 and clarify how those changes can impact your business.</p>]]></description>
      
      <content:encoded><![CDATA[<p>Are you confused about how processor-based licensing works? Do you wonder if shifting more servers to virtual will save you money? Is SQL really free with System Center 2012?</p> <p>In this video, Troy Whittaker of ITS Partners will review important changes to licensing of Microsoft Server 2012, SQL 2012 and System Center 2012 and clarify how those changes can impact your business.</p>]]></content:encoded>
      
      
      <enclosure length="99659525" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/Demystifying_Licensing_For_System_Center_SQL_and_Windows_Servers.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>31:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>8</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/7/a/7/87a74c7e5c191094/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Are you confused about how processor-based licensing works? Do you wonder if shifting more servers to virtual will save you money? Is SQL really free with System Center 2012? In this video, Troy Whittaker of ITS Partners will review important changes to licensing of Microsoft Server 2012, SQL 2012 and System Center 2012 and clarify how those changes can impact your business.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Are you confused about how processor-based licensing works? Do you wonder if shifting more servers to virtual will save you money? Is SQL really free with System Center 2012? In this video, Troy Whittaker of ITS Partners will review important changes to licensing of Microsoft Server 2012, SQL 2012 and System Center 2012 and clarify how those changes can impact your business.</itunes:summary></item>
    
    <item>
      <title>Secure Your Endpoints Against Advanced Threats using Arellia.</title>
      <itunes:title>Secure Your Endpoints Against Advanced Threats using Arellia.</itunes:title>
      <pubDate>Fri, 22 Mar 2013 19:38:12 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[ca2a809772f0b4320de6eb8fc457ea1d]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/secure-your-endpoints-against-advanced-threats-using-arellia]]></link>
      <description><![CDATA[<p><span style="color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">You know things are bad when headline news and late night TV are talking about cyber-attacks, zero-day vulnerabilities, and security breaches. Today’s threat landscape is at a critical state and new layers of security are needed to protect against advanced attacks. This video will discuss and demonstrate how privilege management, white-listing, and security configuration remediation can provide added measures of protection from today’s security threats and why the desktops and laptops continues to be the most common target for attackers.</span></p>]]></description>
      
      <content:encoded><![CDATA[<p>You know things are bad when headline news and late night TV are talking about cyber-attacks, zero-day vulnerabilities, and security breaches. Today’s threat landscape is at a critical state and new layers of security are needed to protect against advanced attacks. This video will discuss and demonstrate how privilege management, white-listing, and security configuration remediation can provide added measures of protection from today’s security threats and why the desktops and laptops continues to be the most common target for attackers.</p>]]></content:encoded>
      
      
      <enclosure length="167065383" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/Arellia_Webcast_HD_032113.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>55:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>7</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/0/f/f/0/0ff0df330905bfc2/Arellia-Webcast.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>You know things are bad when headline news and late night TV are talking about cyber-attacks, zero-day vulnerabilities, and security breaches. Today’s threat landscape is at a critical state and new layers of security are needed to protect against advanced attacks. This video will discuss and demonstrate how privilege management, white-listing, and security configuration remediation can provide added measures of protection from today’s security threats and why the desktops and laptops continues to be the most common target for attackers.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>You know things are bad when headline news and late night TV are talking about cyber-attacks, zero-day vulnerabilities, and security breaches. Today’s threat landscape is at a critical state and new layers of security are needed to protect against advanced attacks. This video will discuss and demonstrate how privilege management, white-listing, and security configuration remediation can provide added measures of protection from today’s security threats and why the desktops and laptops continues to be the most common target for attackers.</itunes:summary></item>
    
    <item>
      <title>ITS Partners Microsoft System Center Practice Update</title>
      <itunes:title>ITS Partners Microsoft System Center Practice Update</itunes:title>
      <pubDate>Thu, 21 Mar 2013 15:25:51 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[84a6bd7cf04b1cc9140ce7b7adee6967]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/its-partners-microsoft-system-center-practice-update]]></link>
      <description><![CDATA[<div class="description_wrapper" style="margin: 0px; padding: 0px; position: relative; color: #71767a; font-family: sans-serif; font-size: 14px; line-height: 20px;">
<div class="description " data-expand-tooltip="Click to expand description" itemprop="description" style="margin: 0px; padding: 0px; font-size: 16px; line-height: 21px; max-height: 9999px; -webkit-transition: all 1s ease-in-out 0ms;">
<p class="first" style="margin: 0px; padding: 0px;">ITS is an engineer centric organization focused on endpoint management (EPM) systems and processes. Our process for engaging customers is simple. We start by understanding your company’s level of maturity* in several core areas of EPM. Next, we determine if there is value in advancing the maturity level in any of the core areas. Finally, we work with you to plan and implement the changes that bring value to your business. There is no right level of maturity* that fits all companies, which is why we closely collaborate with you to understand your specific needs, review our best practices and recommend changes where they add the most value to your organization. This video explains it all. Enjoy</p>
</div>
</div>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px;">ITS is an engineer centric organization focused on endpoint management (EPM) systems and processes. Our process for engaging customers is simple. We start by understanding your company’s level of maturity* in several core areas of EPM. Next, we determine if there is value in advancing the maturity level in any of the core areas. Finally, we work with you to plan and implement the changes that bring value to your business. There is no right level of maturity* that fits all companies, which is why we closely collaborate with you to understand your specific needs, review our best practices and recommend changes where they add the most value to your organization. This video explains it all. Enjoy</p>]]></content:encoded>
      
      
      <enclosure length="43835468" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/ITS_System_Center_Practice_Update.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>03:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>6</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/3/9/6/9/39692aa85b7d515f/Screen_Shot_2013-03-21_at_11.01.05_AM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>ITS is an engineer centric organization focused on endpoint management (EPM) systems and processes. Our process for engaging customers is simple. We start by understanding your company’s level of maturity* in several core areas of EPM. Next, we determine if there is value in advancing the maturity level in any of the core areas. Finally, we work with you to plan and implement the changes that bring value to your business. There is no right level of maturity* that fits all companies, which is why we closely collaborate with you to understand your specific needs, review our best practices and recommend changes where they add the most value to your organization. This video explains it all. Enjoy</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>ITS is an engineer centric organization focused on endpoint management (EPM) systems and processes. Our process for engaging customers is simple. We start by understanding your company’s level of maturity* in several core areas of EPM. Next, we determine if there is value in advancing the maturity level in any of the core areas. Finally, we work with you to plan and implement the changes that bring value to your business. There is no right level of maturity* that fits all companies, which is why we closely collaborate with you to understand your specific needs, review our best practices and recommend changes where they add the most value to your organization. This video explains it all. Enjoy</itunes:summary></item>
    
    <item>
      <title>Migrate from Windows XP &amp; Office 2003 through the use of industry leading System Management tools.</title>
      <itunes:title>Migrate from Windows XP &amp; Office 2003 through the use of industry leading System Management tools.</itunes:title>
      <pubDate>Thu, 14 Mar 2013 15:00:06 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[15a02bf0c78349404c2b15b1c4c8875b]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/migrate-from-windows-xp-office-2003-through-the-use-of-industry-leading-system-management-tools]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The endpoint management experts at ITS Partners will walk you through the process changes required to successfully execute on the migration of your Windows endpoints and Microsoft Office installations.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">They will cover: <br />*Review of EOL support announcements from Microsoft<br />*Overview of version migration paths for Windows Operating System<br />*Overview of version migration paths for Microsoft Office<br />*Accounting for your Mac endpoints during the migration<br />*Gotchas for infrastructure services like Deployment Services, Exchange and Sharepoint<br />*Preview of ITS tools & processes for managing & automating migrations</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Microsoft will end their support for Windows XP and Office 2003 on April 8, 2014. With just over thirteen months remaining, approximately 40% of all users are still using XP and/or Office 2003. Is your company in this boat?</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Are you using either Symantec or Microsoft as your system management tool?</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">We know migrating can be an expensive and time consuming process. Check out this video and find out how ITS Partners may be able to help!</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">The endpoint management experts at ITS Partners will walk you through the process changes required to successfully execute on the migration of your Windows endpoints and Microsoft Office installations.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">They will cover: *Review of EOL support announcements from Microsoft*Overview of version migration paths for Windows Operating System*Overview of version migration paths for Microsoft Office*Accounting for your Mac endpoints during the migration*Gotchas for infrastructure services like Deployment Services, Exchange and Sharepoint*Preview of ITS tools & processes for managing & automating migrations</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Microsoft will end their support for Windows XP and Office 2003 on April 8, 2014. With just over thirteen months remaining, approximately 40% of all users are still using XP and/or Office 2003. Is your company in this boat?</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Are you using either Symantec or Microsoft as your system management tool?</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">We know migrating can be an expensive and time consuming process. Check out this video and find out how ITS Partners may be able to help!</p>]]></content:encoded>
      
      
      <enclosure length="114749336" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/EOL_Windowx_XP_Office_03_Webcast_022613.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>41:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>5</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/c/b/b/d/cbbdca87c042380e/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>The endpoint management experts at ITS Partners will walk you through the process changes required to successfully execute on the migration of your Windows endpoints and Microsoft Office installations. They will cover:  *Review of EOL support announcements from Microsoft *Overview of version migration paths for Windows Operating System *Overview of version migration paths for Microsoft Office *Accounting for your Mac endpoints during the migration *Gotchas for infrastructure services like Deployment Services, Exchange and Sharepoint *Preview of ITS tools &amp; processes for managing &amp; automating migrations Microsoft will end their support for Windows XP and Office 2003 on April 8, 2014. With just over thirteen months remaining, approximately 40% of all users are still using XP and/or Office 2003. Is your company in this boat? Are you using either Symantec or Microsoft as your system management tool? We know migrating can be an expensive and time consuming process. Check out this video and find out how ITS Partners may be able to help!</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>The endpoint management experts at ITS Partners will walk you through the process changes required to successfully execute on the migration of your Windows endpoints and Microsoft Office installations. They will cover:  *Review of EOL support announcements from Microsoft *Overview of version migration paths for Windows Operating System *Overview of version migration paths for Microsoft Office *Accounting for your Mac endpoints during the migration *Gotchas for infrastructure services like Deployment Services, Exchange and Sharepoint *Preview of ITS tools &amp; processes for managing &amp; automating migrations Microsoft will end their support for Windows XP and Office 2003 on April 8, 2014. With just over thirteen months remaining, approximately 40% of all users are still using XP and/or Office 2003. Is your company in this boat? Are you using either Symantec or Microsoft as your system management tool? We know migrating can be an expensive and time consuming process. Check out this video and find out how ITS Partners may be able to help!</itunes:summary></item>
    
    <item>
      <title>De-Escalation of Privileges using Symantec's Critical System Protection (CSP)</title>
      <itunes:title>De-Escalation of Privileges using Symantec's Critical System Protection (CSP)</itunes:title>
      <pubDate>Thu, 14 Mar 2013 14:49:25 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[f806b77a5b4dd379c3fc723a18590b4d]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/de-escalation-of-privileges-using-symantec-s-critical-system-protection-csp]]></link>
      <description><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Join ITS Partners for this short demo as Will Vanderlinden, a security engineer for ITS Partners, will be showing why restricting the movement and capabilities of an administrator or root user can be difficult in most environments. With SCSP, you can take a policy-based approach to what each user or group of users can do.</p>
<p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Leading organizations leverage Symantec Critical System Protection to secure their physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. Achieve complete protection for VMware vSphere, stop zero-day and targeted attacks, and gain real-time visibility and control into compliance with Symantec Critical System Protection.</p>]]></description>
      
      <content:encoded><![CDATA[<p class="first" style="margin: 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Join ITS Partners for this short demo as Will Vanderlinden, a security engineer for ITS Partners, will be showing why restricting the movement and capabilities of an administrator or root user can be difficult in most environments. With SCSP, you can take a policy-based approach to what each user or group of users can do.</p> <p style="margin: 10px 0px 0px; padding: 0px; color: #71767a; font-family: sans-serif; font-size: 16px; line-height: 21px; background-color: #f4f5f7;">Leading organizations leverage Symantec Critical System Protection to secure their physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. Achieve complete protection for VMware vSphere, stop zero-day and targeted attacks, and gain real-time visibility and control into compliance with Symantec Critical System Protection.</p>]]></content:encoded>
      
      
      <enclosure length="374135928" type="video/x-mp4" url="https://traffic.libsyn.com/secure/itspartners/Symantec_CSP_De-Escalate_Privileges.mp4?dest-id=91054"/>
      <itunes:duration>08:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>4</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/d/5/e/1/d5e10e970247665a/Screen_Shot_2013-02-15_at_3.44.52_PM.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>Join ITS Partners for this short demo as Will Vanderlinden, a security engineer for ITS Partners, will be showing why restricting the movement and capabilities of an administrator or root user can be difficult in most environments. With SCSP, you can take a policy-based approach to what each user or group of users can do. Leading organizations leverage Symantec Critical System Protection to secure their physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. Achieve complete protection for VMware vSphere, stop zero-day and targeted attacks, and gain real-time visibility and control into compliance with Symantec Critical System Protection.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>Join ITS Partners for this short demo as Will Vanderlinden, a security engineer for ITS Partners, will be showing why restricting the movement and capabilities of an administrator or root user can be difficult in most environments. With SCSP, you can take a policy-based approach to what each user or group of users can do. Leading organizations leverage Symantec Critical System Protection to secure their physical and virtual data centers. Delivering host-based intrusion detection (HIDS) and intrusion prevention (HIPS), Symantec provides a proven and comprehensive solution for server security. Achieve complete protection for VMware vSphere, stop zero-day and targeted attacks, and gain real-time visibility and control into compliance with Symantec Critical System Protection.</itunes:summary></item>
    
    <item>
      <title>User Driven Installation With Configuration Manager 2012 and MDT</title>
      <itunes:title>User Driven Installation With Configuration Manager 2012 and MDT</itunes:title>
      <pubDate>Mon, 04 Feb 2013 19:57:26 +0000</pubDate>
      <guid isPermaLink="false"><![CDATA[fb4b7a7025e1d4cad663c562c64826eb]]></guid>
      <link><![CDATA[https://itspartners.libsyn.com/user-driven-installation-with-configuration-manager-2012-and-mdt]]></link>
      <description><![CDATA[<p>In this video Adam Eaddy, Microsoft Consultant for ITS Partners, will cover a feature of CM12 and MDT 2012 called User Driven Installation.  He will cover installing and setting up MDT to integrate w/ Configuration Manager 2012, as well as walk through the steps to customize a UDI wizard, and create and deploy a UDI task sequence.</p>]]></description>
      
      <content:encoded><![CDATA[<p>In this video Adam Eaddy, Microsoft Consultant for ITS Partners, will cover a feature of CM12 and MDT 2012 called User Driven Installation. He will cover installing and setting up MDT to integrate w/ Configuration Manager 2012, as well as walk through the steps to customize a UDI wizard, and create and deploy a UDI task sequence.</p>]]></content:encoded>
      
      
      <enclosure length="82278553" type="video/x-m4v" url="https://traffic.libsyn.com/secure/itspartners/User_Driven_Installation_w._Configuration_Manager_2012_and_MDT.mp4_iPod__iPhone.m4v?dest-id=91054"/>
      <itunes:duration>20:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      
      <itunes:keywords/>
      
      <itunes:season>2</itunes:season>
      
      
      <itunes:episode>3</itunes:episode>
      
      
      <itunes:image href="https://static.libsyn.com/p/assets/8/b/d/b/8bdb7da1e1dc2bcb/thumbnail2.png"/>
      
      <itunes:episodeType>full</itunes:episodeType>
      
      
      
    <author>cdupin@itsdelivers.com (ITS Partners)</author><itunes:subtitle>In this video Adam Eaddy, Microsoft Consultant for ITS Partners, will cover a feature of CM12 and MDT 2012 called User Driven Installation.  He will cover installing and setting up MDT to integrate w/ Configuration Manager 2012, as well as walk through the steps to customize a UDI wizard, and create and deploy a UDI task sequence.</itunes:subtitle><itunes:author>ITS Partners</itunes:author><itunes:summary>In this video Adam Eaddy, Microsoft Consultant for ITS Partners, will cover a feature of CM12 and MDT 2012 called User Driven Installation.  He will cover installing and setting up MDT to integrate w/ Configuration Manager 2012, as well as walk through the steps to customize a UDI wizard, and create and deploy a UDI task sequence.</itunes:summary></item>
    
  </channel>
</rss>