with Stephen Mann, IT Service Management Expert and Principal Analyst and Content Director at ITSM.tools
It’s not unusual for organizations, especially those that have grown through mergers and acquisitions, to have multiple service desk tools. Each is used by a different team, in different locations, and perhaps using different service and support practices. But how great is this? First, for employees who receive different service experiences, including needing to use different self-service capabilities. Second, for the organization – not only in terms of the associated costs of running multiple service desk tools but also the inherent inefficiencies of fractured operations and tooling.
If your organization is using and perhaps struggling with multiple service desk tools, then please attend this webinar with Stephen Mann of ITSM.tools to find out how:
Principal and Content Director at the ITSM-focused industry analyst firm ITSM.tools. Also an independent IT and IT service management marketing content creator, and a frequent blogger, writer, and presenter on the challenges and opportunities for IT service management professionals.
Previously held positions in IT research and analysis (at IT industry analyst firms Ovum and Forrester and the UK Post Office), IT service management consultancy, enterprise IT service desk and IT service management, IT asset management, innovation and creativity facilitation, project management, finance consultancy, internal audit, and product marketing for a SaaS IT service management technology vendor.
Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction and Vendor Outsourcing industries with over 20 years in the Support and Security space. In his free time he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology and keep their data and personal information safe.