WHY CHOOSE PINK?

Pink Elephant has been a thought leader in the global IT Service Management Industry for more than 40 years. We apply our expertise to both the public and private sectors across the globe.

At Pink Elephant, we believe that a sustainable, long term relationship between business and IT are instrumental in developing innovation, automation and change in your business.  We pride ourselves on improving the quality of IT services by applying recognised best practice frameworks and standards.

Female Pink Elephant employee explaining why you should choose Pink Elephant

SIGN UP FOR YOUR NEXT IT MANAGEMENT BEST PRACTICE CERTIFICATE NOW!

NEWS & EVENTS

Ransomware Prevention Best Practices

What is Ransomware? Ransomware is a form of malicious software designed to block access to a computer system and its data until a ransom is paid, usually in the form of cryptocurrency. The ransomware makes data unusable by encrypting all of the data it finds, which usually brings a company’s operations to a halt. Ransomware…

Top 7 IT service management metrics you need to measure

How do you measure the success of your IT service delivery if you’re not closely monitoring the numbers that dictate the efficiency and effectiveness of an organization’s service delivery? As IT leaders, you need to measure the performance of service desk processes by tracking critical ITSM metrics to understand the impact on overall business goals.…

Freshservice Service Management Benchmark Report 2022

Get insight into the future of ITSM for a business that’s always-on. Hear from Gartner® on strategic actions for 2022 that highlights the 5 areas that I&O leaders must focus on to be effective enablers of ITSM.

4 Types of Information Technology Cultures Explained

In his recent TechTarget article, 4 Types of Information Technology Cultures Explained, writer Jerald Murphy says “The type of information technology culture your organisation has determines the role of IT and the investments for which it will be more or less difficult to make a business case… IT leaders who understand their company’s culture are…

What are the top priorities for tech leaders in 2022?

The high penetration of cloud-based applications and the Great Resignation that shows no sign of slowing down makes technology the differentiator for organizations, stressing the need for uninterrupted IT now more than ever. 2022 will be a year of experimentation and tech adoption for IT leaders and their technology organizations, driven by the pandemic-induced “work…

Microsoft Vulnerabilities Report 2022

Get insight into the future of ITSM for a business that’s always-on. Hear from Gartner® on strategic actions for 2022 that highlights the 5 areas that I&O leaders must focus on to be effective enablers of ITSM.

Top 11 Help Desk Best Practices

A help desk software is designed to streamline customer conversations from across channels into one view, keep track of service requests, and resolve customer issues efficiently. Hence, it’s important for you to choose the right help desk software and implement the best practices to make the most of your investment. With help desk software, it…

5 ways to become an effective enabler of IT service management

The business needs of IT Service Management (ITSM) are evolving, and I&O leaders must take sufficient action to position their ITSM practices as an enabler of digital business instead of a bottleneck. A recent Gartner report on the 2022 Strategic Roadmap For IT Service Management states, “By 2024, 80% of ITSM teams that have not…

2022 Strategic Roadmap for IT Service Management

Get insight into the future of ITSM for a business that’s always-on. Hear from Gartner® on strategic actions for 2022 that highlights the 5 areas that I&O leaders must focus on to be effective enablers of ITSM.

7 Skills Every Customer Service Manager Needs

If you’re looking for an upward career movement in customer service, you need to be prepared to deal with difficult situations from day one. Be it face-to-face, over phone, email or even chat, whenever something goes wrong, a customer service manager will be the first point of contact for customer support agents trying to solve…

You need these 5 features in your ITSM chatbot

You need these 5 features in your ITSM chatbot With advances in AI, the obvious discussion arises, how to make work-life easier? How to minimize time spent on mundane tasks? How to save time and money while ensuring that your IT team is functioning as efficiently as possible? Now enter… the chatbot. The virtual assistant…

The role of Workforce Management in building future-ready support

The role of Workforce Management in building future-ready support 2 years into the pandemic, the business landscape has changed with the speed of light. While 74% of professionals expect remote work to become standard, managing a distributed workforce has its unique challenges. Overseeing disjointed teams and handling resource crunch has led to fragmented data, frustrated…

Most in-demand ITSM skills for 2022

Most in-demand ITSM skills for 2022 According to Gartner, the global cloud ITSM market is expected to grow to over $12 billion by 2025. ITSM now is more important than ever (even more so, after the pandemic), and industry leaders agree. What does this mean for ITSM professionals? This blog details how the ITSM profession…

Building a business case for Intelligent Service Management

Building a business case for Intelligent Service Management Traditional IT service management solutions often fall short when it comes to innovation. While legacy systems are tailor-made to perform one or two functions well today’s service management solutions need to perform beyond these boundaries. Especially, since the pandemic has just ushered in a new era of…

Does the rise of DevOps spell the end for ITIL?

Does the rise of DevOps spell the end for ITIL? One of the most challenging things when writing about DevOps and ITIL is finding the perfect phrases to define both of them. They not only mean different things to different people and organizations but are also implemented & used very differently. Let’s glance through their…

The Weak Password Report 2022

The Weak Password Report 2022 Password attacks are on the rise because passwords themselves are very vulnerable to attack. What specifically makes them vulnerable? This year’s Weak Password Report takes a look at both the human side and the tech side of why passwords are the weakest link in an organization’s network. From real world…

15 Top Customer Service Metrics That You Should Be Using

Tracking productivity and performance of the customer service function emerged as the #1 challenge of customer service leaders through the pandemic crisis, as per The New CX Mandate report. Whether you are starting a new business or have a newly formed customer support function, a strong set of customer service metrics will guide you in…

ITSM Resolution: Don’t Overspend On Tool Features

Did you know through 2023, I&O leaders will overspend by $750 million* on buying unused features of ITSM tools? That’s almost $150 million more from $600 million spend in 2019. Despite this steep increase in cost, why do so many I&O leaders continue to overbuy ITSM tools beyond their needs? This isn’t because organizational budgets…

The IT agenda for 2022

The IT agenda for 2022 The Hackett Group’s 2022 Key Issues Study reveals technology’s top 10 priority objectives to help businesses plan their goals and tech investments to accelerate digital transformation in 2022. 2022 will be a year of experimentation and tech adoption for IT leaders and their technology organizations, driven by the pandemic-induced “work…

Active Directory privilege escalation

There is no shortage of vulnerabilities and risks in today’s digital world. Attackers are using any way possible to compromise business-critical data. However, one of the prevalent ways cybercriminals can get a foothold into your environment is by compromising user accounts. The holy grail of user account compromise is access to a privileged user or…

What Happens When You Don’t Secure The Service Desk

Employee password resets make up a big percentage of the tickets that the service desk handles on a daily basis. While a lot can be said for the high costs that are incurred at the help desk for these types of calls, which Forrester estimates cost about $70 per call, more can be said about…

Intelligent Service Management – 4 Principles to Modernize IT Service and Operations Management

Today, IT is expected to take on a more strategic role, one that goes beyond support to create business value and move the innovation agenda forward. Yet IT departments are unable to fulfil this mandate having to cope with increased demands for support with lower budgets and headcount. If companies are to flip the odds…

Minimize the business impact of critical incidents with Freshservice On-Call Management

“Service outage! Help!” These words (or their variations), have preceded notable losses of millions and billions of dollars in the 21st century. From large corporations to SMBs, no one is immune to the effects of downtime – whether planned or unplanned. However, the earlier an issue is noticed, the faster it is acted upon and…

What metrics should sysadmins use to show improvement over time?

To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This can help justify the overall budget of the IT department, as well as the future growth of systems and resources. Uptime of key systems One…

A Roadmap to Modernise IT Service and Operations Management

In the last decade or so AI has gone from a buzzword to table stakes. Data reveals that organizations that have adopted AI into their service management strategy have begun to reap the benefits. It is therefore imperative for businesses to invest in Intelligent Service Management to not just empower their agents but also keep…

Death of the password? It’s only 60!

We marked our calendars, counting down the months, days, and minutes. Now, the day we’ve all been waiting for is here: the 60th anniversary of the computer password!! Since its beginning in an MIT lab in the fall of 1961, we’ve developed a complex relationship with the password – even the inventor of the computer…

7 reasons why you need an Alert Management solution

As a modern enterprise your digital infrastructure – in all likelihood – is a multi-tiered, evolving, and expanding combination of services built on next-gen technologies. This dynamic configuration of servers, networks, applications, routers, etc. provides you with the agility to respond to rapidly changing customer demands. But it also tests the resilience of your digital…

11 Crucial Customer Service KPIs You Need to Track in 2022

Customer service is hard. Measuring the value of good customer service is even harder. However, only if you have quantifiable data on how well your support team is doing can you improve existing processes, make better staffing decisions, and ensure customer happiness. The best way to get these insights is by measuring customer service key…

How to build a Customer Experience Strategy

How to build a Customer Experience Strategy There are many moving parts in play when trying to explain, let alone execute, an exceptional customer experience. Therefore it truly takes a village and a good game plan to get things done effectively. Staying on top of your customer experience strategy is vital as the customer behavior…

Turn offboarding woes into wows using Freshservice

Turn offboarding woes into wows using Freshservice An employee’s last day at work is almost as significant as their first one. It commemorates all the learnings, experiences, and memories they have gathered during their journey in a company. Imagine on a day like that, when you are full of nostalgia and maybe relief (wink wink),…

The Most Important Privileged Accounts to Discover & Why

Privileged accounts are a key part of the cyberattack chain and involved in almost every security breach today. Protecting privileged user accounts and, increasingly, machine accounts (non-human accounts) is a key priority for every security-conscious organization today, and central to addressing many regulatory requirements and enabling zero trust. Privileged account access can enable a threat…

9 Common Change Management Mistakes (and How To Avoid Them)

Customer preferences are evolving just as quickly as technological advances! This can have a significant impact on your business and its internal operations. Such fast-paced evolution demands an equally agile change management function. Organizations that focus on the mechanics of change management but ignore the principles and intended outcomes are likely to make mistakes. But…

Leveraging AI for ITSM and ITOM Success.

In the era of digital workplaces, AI has emerged as a catalyst in enabling simplified, intelligent, and intuitive ITSM and ITOM environments. From increasing workflow automation, reducing IT staff workload to reducing downtime and outages, AI can help accelerate your service delivery and provide meaningful business insight. Latest research from Freshworks and IDG on “Right-sizing…

Why cached credentials are causing account lockouts

Active Directory user accounts can get locked out due to a number of reasons, especially when working remotely. Windows systems can cache credentials for users. Yet, cached credentials causing account lockouts is a major problem for remote users. Cached Active Directory credentials To understand the purpose of cached credentials, let’s look at the normal login…

INFO-TECH’S IT SERVICE MANAGEMENT SELECTION GUIDE

INFO-TECH’S IT SERVICE MANAGEMENT SELECTION GUIDE In this IT Service Management Selection Guide, Info-Tech experts discuss how you can build a business case and get the buy-in you need. We’ll also explore how to move beyond budget restrictions and show stakeholders how new IT operations solutions will benefit the business as a whole. {{ vc_btn:…

EXPLORE KEY METRICS TO MEASURE SERVICE DESK EXCELLENCE

The Freshservice Service Management Benchmark Report 2021 (FBR 2021) is a benchmark index for key performance indicators (KPIs) for IT Service Management. The FBR 2021 encourages organizations to measure their KPIs, and benchmark against the index thus allowing ITSM leaders to decide and act on what levers to pull, to ultimately deliver a delightful experience to employees and customers.

What Is Customer Perception And How Can Brands Track It

Customer experience is key to gauge how your customers perceive your brand. The reaction that customers have in response to the way your company treats them is crucial. Businesses have to work hard to attain and retain customers, for which keeping an eye on customer perception matters throughout their lifecycle. You have more influence than…

Not Even Superheroes Have the Power to Stay Off of Breached Password Lists

Batman or Spiderman? Superman or Thor? Flash or Falcon? The infatuation with and intense debate over Marvel and DC superhero and villain supremacy among comic book aficionados is a year-round musing, but always intensifies during the months when the latest movie hits the big screen. In conjunction with the new Loki (Marvel) series now streaming…

How To Set Up Your Service Desk – The People, Process, and Technology

Service Desk Defined The service desk acts as the primary support mechanism in organizations, managing customer contacts for assistance and access to services. Their primary purpose includes the following: Receiving and responding to requests for support across multiple communication channels Prioritizing the requested work based on its impact on the business Communication of incidents and…

Specops Software Survey: 48% of Businesses Do not Use a User Verification Policy for Password Reset Calls to IT Service Desks

Specops Software survey highlights social engineering vulnerabilities among IT service help desks. 48% of organizations do not have a user verification policy in place for incoming calls to IT service desks, according to Specops Software, the leading provider of password management and authentication solutions. The information was uncovered as part of Specops Software’s survey of…

Why You Should Switch To A Modern Cloud-Based ITSM Solution.

Is my service desk investment paying off? Is my service desk delivering true business value? Are we incurring costs that are not under control? Are we able to leverage the service desk beyond IT use cases? If your current ITSM solution makes you question its true value and reliability, are you even using the right…

#CUTTHEWAIT PLAYBOOK: 5 STEPS TO SPEEDY CUSTOMER SERVICE

Today, customer service should be at the center of your growth strategy. According to McKinsey research, more than 60% of consumers are trying new brands due to economic pressures, store closings, and changing priorities. With these consumers going online in their search for better and safer ways to transact with businesses, the lines between sales and service are blurring. Companies cannot treat customer service reactively anymore.

10 Tips for Improving IT Support Efficiency

When we think about increased IT support efficiency, we might think of faster and/or cheaper IT service desk operations. But now, post-pandemic, or what is being called “the new normal”, there’s a hunger for “better, faster, and cheaper” IT support. This recognizes key modern business priorities, such as: Emphasis on outcomes and value creation Need…

ITIL 4: preparing organizations for digital transformation

Digital transformation is about improving your digital footprint, digitalizing processes and most importantly – changing your company culture. The preparation for – and execution of – transformation is critical which means setting both clear goals and defining an approach to undertaking the change. A key part of that is being agile before, during and after…

Weak Windows passwords blamed for recent rise in Purple Fox attacks

Purple Fox is malware that was first discovered in 2018 but has seen a recent rise in proliferation as hackers take advantage of a new attack method: weak passwords used over the SMB protocol. SMB (Server Message Block) is a protocol (mainly) used by Windows computers to communicate with other network devices like printers and…

HR Service Delivery: What Modernizing Can Do For Your Organization

When it comes to running a Human Resources (HR) department successfully, it’s a balancing act of maximizing budget and productivity. HR is a core part of the enterprise but is often up against flat or shrinking budgets. A lot of time gets invested into searching for ways to eliminate full-time employee hours spent on tedious…

And the Award for Most Popular Movie Used in Passwords Goes to…

With the Oscars taking place over the weekend, Specops refreshed their breached password list and revealed the most popular movies used in leaked passwords. According to new research, which analyzed more than 800 million breached passwords – a subset of Specops Breached Password Protection, which contains over 2 billion passwords breached passwords – fan favorite…

The Big Trends in ITSM in 2021 from Freshworks and SDI

Transformational changes continue to impact ITSM. While IT service management embraces new technologies, most organisations don’t currently have the high-level capabilities to match their ambitions. Freshworks has collaborated with the Service Desk Institute (SDI) to produce a report that determines how IT professionals feel about these new advances. The report aims to show the current…

How to Structure Your IT Service Desk to Support Process Improvements

Buying a modern service desk tool won’t solve all your problems in and of itself. Although these tools are designed to ensure general best practices are met, service desk tools must also be configured to address your organization’s specific essential protocols. In a recent Info-Tech research shows that tiered service desks with a first-tier generalist…

Remote Team Management: The Do’s and Don’ts

Remote team management has always been different for team managers and leaders. Not just challenging, but different. Not having the luxury to rub shoulders often and not having the liberty to have the entire team under one roof has compelled leaders to acquire new and innovative approaches to remote leadership. And while leadership styles and…

Supercharging Self-service with Virtual Agents

AI – the new normal prerequisite Business priorities are shifting. Employees’ expectations are rising. Simply put, the world around us is changing. And so should your service desk. AI is everywhere, and now it is redefining ITSM to provide end-users with a superior experience. Why wouldn’t they, right? While building a self-service culture around IT…

Top 8 IT Asset Management Challenges and How to Overcome Them Using ITIL 4

The hardware and software required to deliver IT services are critical to running today’s organizations from an operational perspective – not to mention representing a major investment. It’s therefore crucial to ensure these IT assets are effectively managed, controlled, and protected. It’s also essential that any risk associated with the deployment and use of these…

THE STATE OF IT SERVICE MANAGEMENT IN A VOLATILE 2021

Written in partnership by The Service Desk Institute, this 2021 ITSM report will look at the thoughts and predictions of IT Teams, from the skills service desk analysts of the future will need and the state of their emotional wellbeing, to how automation is impacting individuals organisations and generally how IT professionals feel about the future of the industry in such a volatile environment.

FORRESTER TOTAL ECONOMIC IMPACT STUDY™ (TEI) COMMISSIONED BY FRESHWORKS

Investment in digital transformation efforts must translate to direct business benefits by reducing costs while growing faster. The Total Economic Impact™ Study, conducted by Forrester Consulting on behalf of Freshworks, illustrates how Freshdesk Omnichannel can revolutionize your contact center.

Developing a Business Case for Your IT Project

How to Gain Executive Buy-in for ITSM Technology is critical for improving employee productivity and organizational efficiency, but getting new technology into the hands of those who need it most often takes time—a long time. The technology buying process can be complicated and unwieldy, filled with short- and long-term budget considerations and several stakeholders across…

GARTNER’S 2021 MAGIC QUADRANT FOR CRM CUSTOMER ENGAGEMENT CENTER

The 2020 Gartner Magic Quadrant for the CRM Customer Engagement Center (CEC) report examines the global market for customer service and support applications. It helps business leaders identify the latest customer service priorities and evaluate a wide range of customer service applications to make the right choice.

BE A SERVICE MANAGEMENT CHAMPION: EXECUTIVE SUMMARY – HOW TO BUILD A BUSINESS CASE FOR YOUR IT PROJECT

You are a champion and a change-maker, with an eye on identifying and implementing solutions that will improve your business, now and in the future. You know it’s time for a new ITSM Solution. Arm yourself with the insights and positioning you need to bring decision makers into the conversation and champion changes to your service desk environment.

BE A SERVICE MANAGEMENT CHAMPION: EBOOK 1 – BENCHMARK YOUR SERVICE MANAGEMENT PRACTICE

How does your ITSM solution stack up? Stop guessing and start benchmarking. Before you can determine where you’re going, you need to understand where you are—especially when it comes to transforming your ITSM solution. Too often, though, organizations get comfortable with the status quo, even if that status quo isn’t delivering—or, worse, slowing down your workflows and creating hurdles to business success.

BE A SERVICE MANAGEMENT CHAMPION: EBOOK 2 – MAKE SENSE OF YOUR ITSM OPTIONS

Which ITSM solution is right for you? Identify the capabilities you need and then evaluate vendors. You know it’s not about choosing any ITSM solution—it’s about choosing the right ITSM solution. And given the complexities and capabilities in the service management landscape, finding that spot-on solution—and selling it through internally—isn’t always so simple.

BE A SERVICE MANAGEMENT CHAMPION: EBOOK 3 – ESTABLISH THE BUSINESS IMPACT OF THE RIGHT ITSM

Numbers speak louder than words. Quantify the impact a new ITSM solution will have on your business. Let’s face it: gaining executive buy in means ensuring stakeholders and decision makers understand the direct, financial impact of your recommendations. Pulling those pieces together, though, and putting them through the lens of your organization’s unique needs and objectives can be challenging. Until now.

BE A SERVICE MANAGEMENT CHAMPION: EBOOK 4 – GAIN WIDESPREAD SUPPORT AND EXECUTIVE BUY-IN

Do you have the internal momentum to bring your ITSM proposal into reality? You’ve done the heavy lifting—not just identifying the holes in your existing ITSM solution but researching the right ITSM solution and creating meaningful positioning that simplifies justification. Now it’s time to take your work across the finish line and move from vision to reality.

Ivanti acquire Cherwell to further enable the everywhere workplace

Ivanti has signed a definitive agreement to acquire Cherwell, a global leader in enterprise service management (ESM) solutions. Cherwell has, for a long time, been a direct competitor of Ivanti in the ITSM space. Both Ivanti and Cherwell featured in the 2020 Gartner Magic Quadrant for IT Service Management Tools report, with Cherwell listed as…

Introducing Freshworks – Our latest cloud-based CRM software offering

Moving to a new ITSM solution is never easy and let’s face it, most people hate the software they use at work. Business software is often clunky, expensive, difficult to setup and frustrating to use. Countless hours are wasted trying to customise these solutions and they often require expensive professional services to get everything to…

GARTNER’S 2021 MAGIC QUADRANT FOR IT SERVICE MANAGEMENT TOOLS

The Gartner Magic Quadrant for IT Service Management Tools provides an invaluable resource for evaluating ITSM vendors. In this report, you’ll find recommendations for defining your ITSM requirements as well as a side-by-side look at the industry landscape. See how each ITSM vendor is placed and get recommendations for selecting a solution that matches your needs.

PRIVILEGED ACCESS MANAGEMENT CHECKLIST

This PAM Checklist is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. It will help you identify where to begin your privileged access management project, how to progress to a better IT security posture, and what business outcomes to expect.

10 CRITERIA FOR CHOOSING A NEXT-GEN ITSM PLATFORM

Selecting a new IT service management (ITSM) tool has never been a straightforward process. With dozens of options ranging from basic ticketing functionality to complex enterprise suites, it’s easy to get bogged down in the fast-growing list of requirements, conflicting stakeholder views, and endless vendor demos and pitches.

Service Desk Improvement.

The Complete Service Desk Health Check… . We’ll help you be the best you can be with our 4 point improvement plan. Our complete approach to establishing Service Desk excellence follows a structured process. We can help you identify where you want to be, where you are now, and how you can improve to deliver…

Are you a member of the 5% Club? – How fit for purpose is your CMDB

A successful CMDB can be vital for an organisation, or rather it should be! . The implementation of a CMDB, should herald the dawn of a new era: The transformation of an organisation from being a reactive and Technology/System managed based Service Provider, to being a truly proactive Service based Service Provider A CMDB enables…

FireScope’s Multi-layer Dependency Maps Video.

Watch this video 2 minute video now. . . Whether you’re migrating applications to the cloud or ensuring your CMDB is accurate, you need a solution that can account for every change and over a period of time, observe the behaviour of your application for successful migrations and ongoing service delivery. Learn more about FireScope…

The Future is Built on ITIL!

Develop Essential Skills for the Digital Era with ITIL® 4 Managing Professional ITIL® 4 Managing Professional builds on the content in the ITIL® 4 Foundation, to provide practical guidance for people who work in a wide variety of IT and digital roles. The Managing Professional (MP) stream provides practical and technical knowledge about how to…

Discover the Benefits of Agile Project Management.

What is Agile Project Management? It’s no secret that the Agile Model is fast becoming the preferred way to manage projects. Organisations, teams and even project management software are increasingly responding to a demand for more adaptive and evolutionary processes. And for good reason. In a fast-changing business world that needs to respond to rapid market and…

Join the Pink Portal for Organisations now!

Pink Elephant’s E-learning training solution for organisations. Training for large teams and organisations can be difficult, time-consuming as well as expensive. Our Pink e-Learning Portal is the perfect cost-effective training solution for large teams and organisations that you and your colleagues can use at your desk or on the move, one that provides access to multiple world-class accredited…

ENABLE & SECURE YOUR REMOTE WORKFORCE

IT departments are under incredible pressure to maintain the business productivity for an expanded remote workforce that may already be exponentially larger than it was just a few weeks ago. As many IT teams work overtime to enable remote workers, the risks of not maintaining security practices are also top of mind, with the acute awareness that threat actors are actively seeking opportunities to benefit from current circumstances.

9 CONSIDERATIONS BEFORE YOU LICENSE A NEW ITSM SOLUTION

It may be easy to find a potential ITSM solution that meets your IT service management requirements. However, it might be difficult to calculate the hard and soft costs of this solution. Getting clear answers to these nine questions is critical in controlling your total cost of ownership.

3 Questions you need to ask before choosing an ITIL® 4 training supplier.

We want you to obtain the highest-quality ITIL® 4 training. That’s why we are encouraging you to do some comparative shopping! Before you commit your organisation’s training investment to ITIL® 4 training, you will most likely want to research a few training organisations and we encourage you to do this in order to take full…

Save on your ITIL® 4 Certification now!

Get 35% off the examination fee for your ITIL® 4 Advanced Course. Pink Elephant South Africa is please to announce the ITIL® 4 Examination Promotional offer from PeopleCert and AXELOS which is valid till the end of 2020! Take advantage of this special offer and get certified in the globally sought after ITIL® best practice,…

A Service Catalogue is a Powerful Tool.

The Service Catalogue Perspective: Do you really know what you want? . Service Catalogues seem to be the hot topic at the moment with many organisations deciding that they want one as indeed they should. A Service Catalogue can be an incredibly useful tool that helps raise the level of understanding between business and IT…

Discover the power of FireScope Secure Discovery and Dependency Mapping.

Imagine what you could achieve if your CMDB was service-aware, always up to date and required no effort to keep up. That’s the power of FireScope Secure Discovery and Dependency Mapping. . Organisations that attempt to track IT service configuration through manual efforts cannot keep up with the rapid pace of change and complexity in…

Do you know how to measure the maturity of your Service Management processes…?

Our PinkScan is the only independent and objective assessment service of its kind and it can analyse the maturity of any number of your ITSM Processes! . All companies are most likely aware of their IT process capabilities. But what is not immediately obvious is whether these processes are operating at their optimum level, or…

ITSM HANDBOOK FOR REMOTE WORKFORCE ENABLEMENT

The magnitude of IT and workforce disruption that’s taken place in recent weeks has tested the mettle of IT teams everywhere. As workers transition from office to home, staff are racing to deliver the tech and services employees need to do their jobs, as well as introduce new systems and processes that boost productivity.

What can ITIL® 4 do for your organisation?

10 Improvements Your Organisation Can Put in Place Using ITIL® 4 Ever feel like your organisation is on a treadmill trying to keep pace with change, with technology and, of course, changing technology? Savvy organisations know that to just keep pace with – much less try to get ahead of – their competition, they must…

Watch Cherwell’s HR Service Management Solution Demonstration Video.

Streamline and Adapt your HR Service Management. Make a profound impact on the quality of your colleagues’ daily work experiences and bring positive change to the whole enterprise. Cherwell HRSM is a purpose-built solution to automate and simplify the myriad of HR tasks associated with employee on-boarding, off-boarding, and role changes—and to integrate these tasks…

Watch this FREE video: Taking the Service Desk to the next level: an Opportunity for IT Pro’s!

As our industry transforms and matures, last century standards for cross-team communication become less and less efficient. And in today’s digital world, the tiniest technical glitch can have huge consequences—requiring swift and flawless communication. Whether it’s a datacenter outage, a cyber-attack, an application failure, or a manmade issue, they’re all critical events which support centers…

ESM: THE (R)EVOLUTION OF ITSM

In a recent study by leading IT analyst firm Enterprise Management Associates (EMA), 87% of organisations reported having some level of ESM (enterprise service management) deployment from their ITSM platform/team. What’s more, given a healthy selection of possible responses, 38% rated the impact of supporting ESM as “transformational” on the relationship between IT and business stakeholders.

Specops Freeware to prevent password expiration during the pandemic.

Freeware to help address password challenges associated with remote workers. Password Notification enables IT admins to configure password expiration email reminders to be sent via their own SMTP server, letting IT admins communicate password expirations to remote users. Many password expiration reminders work well while in the office or on-network, but fail to notify users…

4 ways that ITAM is going to change in a world that is no longer organised within a physical office!

What IT Asset Management Looks Like in a World That Has Gone Fully Remote… Moving an entire company remote is more challenging than people think. For example, most medium to large-scale businesses have processes in place for onboarding and training new employees on both the hardware and software required to do their job. When you…

Is it time to outsource your IT Service Desk?

Outsourcing – it is still a viable proposition! Business end users are benefiting from increased availability and diversity of applications and devices, driving increased expectations for technical support wherever and whenever they need it. At the same time, cost pressures on the business are driving the need to migrate support to lower-cost channels and delivery…

There’s more to learning online than getting certified in your pyjamas!

8 benefits of remote learning / digital education! . With millions of professionals around the world working remotely for the foreseeable future, online training will no doubt reach even higher levels of popularity. . Technology has changed the possibilities within teaching and learning. Classes, which prior to the digital era were restricted to lectures, talks,…

ITIL®4 High Velocity IT – Fast & Agile

Stay ahead of the game with the upcoming ITIL4 Specialist certification High-Velocity IT. . Many organisations have come to realise that to compete in today’s global economy they need to intensify their agility, speed-to-market, cost-effectiveness, and responsiveness. This means there is an increased focus and need for organisations to integrating new technologies, as well as…

AgileSHIFT® has become more than a buzzword.

AgileShift® has become more than a buzzword . The global pandemic has caught virtually every organisation off-guard and has seen many carefully detailed Business Continuity Plans ripped to shreds. The sudden changing of our carefully orchestrated business lives has been traumatic and has forced virtually every style of business to rework how they do business.…

Watch BeyondTrust’s overview of how to support remote workers + FREE 90 Day Trial!

Secure your remote workforce today.   If you’re not already using BeyondTrust’s Remote Support or Privileged Remote Access solutions, the free evaluations of these products has been expanded to 90 days to help you stay secure through this difficult time and help you manage the current remote workforce surge.   These solutions can: Enable remote…

25% off selected Instructor-Led Virtual Classes during April 2020.

Don’t be an april fool, stay in school! . Pink Elephant’s Virtual Classroom courses allow you to take part in our classroom training, without leaving the comfort of your own home or office! . Instructor-led virtual classroom courses can be taken online from anywhere – all you need is access to the Internet. With virtual…

Cherwell Service Management (CSM) 10.0 is here!

Introducing An Even Smarter Way to Make Work Flow Cherwell Service Management 10.0 will dramatically improve IT efficiency, employee productivity and really moves us forward from an innovation perspective. SO, WHAT’S NEW? CSM 10.0 introduces expanded channels, new models of collaboration, ground-breaking machine learning and more. Smart Collaboration and Self-Service – Instantly bring the right people…

Keep your business safe while supporting your expanded remote workforce for free!

Support Remote Work Securely. . Our technology partner, BeyondTrust, is offering their Secure Remote Access solutions for free for three months, to help organisations support an increased remote workforce during the current pandemic. In times of crisis, good security practices are often the first thing to go. As COVID-19 has spread around the globe, many…

Book Virtual Classroom or Self-paced Online Training Today!

Join one of our virtual classroom courses or self-paced online courses from the comfort of your own home . Virtual-classroom Courses: Pink Elephants Virtual Classroom courses allow you to take part in our award-winning classroom training, without leaving the comfort of your own home or office. . How it works: Classes are delivered online by one of…

THE DEFINITIVE GUIDE TO SERVICE DESK KPIS AND METRICS

THE DEFINITIVE GUIDE TO SERVICE DESK KPIS AND METRICS Many IT service desk leaders and practitioners wonder whether they have the right portfolio of KPIs and metrics, even when they are hitting (or exceeding) the targets they have established. If this sounds familiar, then this guide is for you and your service desk team. {{…

WHY BUILD A SERVICE-CENTRIC SECURITY STRATEGY

Bad actors are not limited to Hollywood. According to the 2019 Verizon Data Breach Investigations Report, (DBIR) 59% of healthcare breaches exposing corporate data to an unauthorized 3rd party were caused by internal actors. This paper outlines how a CISO can plan and build a security defense against these bad actors.

Highlights from Pink20

HOLY ITSM CONFERENCE, BATMAN!   From the moment Batman swooped into the conference centre in his Batmobile for the Sunday evening welcome reception and exhibition showcase opening through to the half-day workshops on the final day, Pink20 rocked the Bellagio in Las Vegas! But, don’t take our word for it…   Day 1 – Batman…

5 Vital Elements of an Enterprise-Class HR Service Management Solution.

5 Vital elements of an Enterprise-Class HR Service Management Solution: Human resources departments are put in place to find outstanding people who can drive outstanding results. Finding these well-suited people, with the skill sets your company requires, is essential to remain competitive. However, at many companies, the vast majority of HR’s time is spent on…

Top 10 Considerations for ITSM Program Success.

A Checklist For ITSM Program Success: When establishing an IT Service Management (ITSM) improvement program, the most common questions that arise tend to be: “How do we get started?” “What is the goal?” “What critical knowledge do we need from People, Process, Product and Partners perspectives?”, etc. This is understandable, especially, since the ITSM program…

When is a Service Catalogue not a Service Catalogue?

“A Service Catalogue or a Service Request Catalogue” The term Service Catalogue is commonly misused and can lead to confusion! Often the term is incorrectly used to describe a User Self-Service Portal, which is also colloquially termed as a Service Request Catalogue. This blog seeks to identify the source and effects of this confusion and…

Three Key Traits of the Business Relationship Manager Role.

Three Key Traits of the Business Relationship Manager Role: The Business Relationship Manager Role Embodies a set of competencies (knowledge, skills, and behaviours) that foster a productive, value-producing relationship between a Provider organisation and their Business Partners. These competencies can be leveraged through organisational roles (for example, in an IT Provider, the CIO typically has…

ITIL® 4’s Managing Professional Transition Course expires in October 2020!

ITIL® 4’s Managing Professional Transition Course expires in October 2020!   The clock is now ticking on the ITIL 4 Managing Professional Transition (MPT). The ITIL Managing Professional course was launched with a one-year expiry date last year – and the countdown to its retirement in October 2020 has now begun. ITIL® 4 supports the existing investment that…

8 Questions you need to ask about your Change Management process.

8 Questions you need to ask about your Change Management process We are often confronted with a belief that selecting a service management toolset will magically instill the discipline of service management within an organisation. It has been said many time before but having a service management toolset, even a really good one, only allows…

Understanding ITIL® 4.

Understanding ITIL® 4. ITIL® 4 expands on previous versions by providing a practical and flexible basis to support organisations on their journey to the new world of digital transformation. It provides an end-to-end IT/digital operating model for the delivery and operation of tech-enabled products and services and enables IT teams to continue to play a…

Save time and money with Specops uReset® now!

Save time and money with Specops uReset® now!  Are password resets and account lockouts exhausting valuable IT resources?  We have an easy, cost-saving solution for you: Want to know how much you can save? Contact us on info.africa@pinkelephant.co.za For more info on our Automation Services, click here. For more info on all our services or…

5 COMMON MISTAKES WITH ENDPOINT ENCRYPTION

Endpoint encryption is heralded as one of the cornerstones to securing data and complying with data protection regulations, but it introduces new challenges which can result in costly mistakes.

7 DEADLY SINS OF ITIL IMPLEMENTATION

ITIL provides a set of recommended best practices, but it doesn’t hold all of the answers. When you look to ITIL as the “be all and end all”—instead of the means to an end—you can easily become misguided.

Pink Elephant voted best large training organisation in the Netherlands!

Pink Elephant voted best large training organisation in the Netherlands!   Our Dutch colleagues took home GOLD in The Best Educator of the Netherlands (BOVNL) awards. On Thursday, January 9th of January 2020, the best Dutch training organisations from 2019 were again announced by Springest, the largest training comparison company in Europe. The Best Educator…

MICROSOFT VULNERABILITIES REPORT 2019

The 2019 Microsoft Vulnerabilities Report compiles every Microsoft security bulletin from the past 12 months, analyses the trends, and includes viewpoints from security experts.

BUSTING THE 6 MYTHS OF PAM

BUSTING THE 6 MYTHS OF PAM In this whitepaper, you’ll discover six popular beliefs about Privileged Access Management (PAM) that are, in fact, wrong. We’ll explain why, shed some light on the truth, and provide you with actionable takeaways to develop your journey to a more secure, folklore-free organisation. {{ vc_btn: title=DOWNLOAD+EBOOK&style=custom&custom_background=%23e5007e&custom_text=%23ffffff&css=.vc_custom_1643201264794%7Bbackground-color%3A+rgba%28229%2C0%2C126%2C0.01%29+%21important%3B%2Abackground-color%3A+rgb%28229%2C0%2C126%29+%21important%3B%7D&link=url%3Ahttps%253A%252F%252Fpinkelephant.co.za%252Fbusting-the-6-myths-of-pam-landing-page%252F%7C%7C%7C }}

Self-Service isn’t Self-Serving!

Self-Service isn’t Self-Serving! The Internet has transformed the way we shop – to the point where we take it for granted that a couple of clicks on a site such as Amazon will deliver a product to our doorstep the following day. It is easy to forget that the e-commerce world has had to learn…

Watch this two-minute video about the power of Cherwell ITSM Software.

Unify and Simplify Service Experiences for All Employees The award-winning Cherwell® Service Platform allows you to automate workflows, integrate systems, and improve employee productivity for departments inside and outside the traditional boundaries of IT.  Their innovative solutions for HR, Security, PPM, and Facilities, combined with codeless configuration, provides a simple and cost-effective way to make…

5 PROVEN STRATEGIES TO MAXIMIZE SERVICE DESK EFFICIENCY

The pace of business is faster than ever before–and the pressure is on to keep up. Discover five ways to gain the speed and efficiency needed to deliver upon the business’ expectations.

IT SERVICE MANAGEMENT 2020: THE FUTURE OF ITSM

Included in this exclusive eBook are recommendations for developing an ITSM roadmap, tips for leading the digital revolution in your organization, and ideas for taking advantage of the changing IT landscape.

The Different Stages Of Agile Teams

Organisations often expect a lot from self-supporting Agile project teams in today’s world. In a lot of organisations, the team velocity is the only KPI they notice and it is important to understand the influence of team dynamics on the velocity. Looking at the Agile manifesto, there is value some statements, like we value responding…

ITIL® 4 – A Holistic View of Service Management

The Casualties of Frameworks Going to War In principle, the primary goal of an IT service management (ITSM) framework is to provide a published body of knowledge (BoK) so professionals can improve their ability to deliver value to the larger community they serve. However, most IT organisations struggle with a silo mentality regarding culture, processes,…

Enhancing business value with your Service Catalogue.

The many ways a Service Catalogue enhances business value… The Service Catalogue is an invaluable resource to the business. It plays a crucial role as the point of access to all products and services offered by IT and other departments. A Service Catalogue is used to define what an IT department does (and does not)…

PINK ELEPHANT ANNOUNCES THE LAUNCH OF THE ITIL® 4 FOUR ADVANCED COURSES!

PINK ELEPHANT ANNOUNCES THE LAUNCH OF THE ITIL® 4 FOUR ADVANCED COURSES! Further to the release of the new ITIL® Managing Professional Transition certification, Pink Elephant South Africa is excited to be the first to announce course dates for the industry’s first ITIL® 4 Advanced courses for the Managing Professional stream. The ITIL 4 Specialist –…

Blacklisting weak and exposed passwords is crucial.

Blacklisting weak and exposed passwords is crucial. Read this business case to learn why blacklisting weak and exposed passwords should be a critical part of making sure your organization’s password policy is successful: Specops Password Policy Business Case Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use…

The King Price IT Service Desk – Underpinning Customer Experience.

The King Price IT Service Desk – Underpinning Customer Experience. Today’s modern business is delivered on a platform of increasingly sophisticated technology powering operations across the organisation and usually resulting in an intimate interface with the customer that allows for the participation in the fulfilment of the service required and delivered. These days, time constrained…

5 Reasons Why Implementing ITSM is More Critical Now Than Ever Before.

5 Reasons Why Implementing ITSM is More Critical Now Than Ever Before. IT Service Management (ITSM) is the most widely followed paradigm for managing IT resources. Why do these organisations implement ITSM? Through a process-oriented approach, ITSM empowers IT teams to take a more structured approach to service management, increase transparency and accountability of the…

Cherwell introduces a Beyond Trust Integration!

Cherwell introduces a Beyond Trust Integration! The BeyondTrust Integration mergeable application (mApp) provides functionality that enables secure, real-time remote support sessions. Using the mApp, CSM technicians and Customers can launch remote support sessions directly from CSM to encourage real-time collaboration and fast resolution of IT issues. Session details (ex: Chat conversation history) can then be…

CMDB – Offline Source of Trusted Data or Ongoing Updated collection of actual Data?

CMDB – Offline Source of Trusted Data or Ongoing Updated collection of actual Data? Many organisations struggle with keeping track of what is within their IT enterprise environment and at best hope that they have a handle on IT asset controls for financial management governance.  Many IT operational groups have their own view of what’s…

SPECIAL ITIL® EXAM OFFER!

Special ITIL® exam offer! a Do you want to get your ITIL®4 Foundation certification, or are you determined to obtain the required credits to become an ITIL®4 Managing Professional? a PeopleCert have two amazing offers for you! a 1. ITIL®4 Foundation EXAM: 30% off ITIL 4 Foundation exams This is exclusively for ITIL® v3 Foundation…

Pink Elephant SA runs Root Cause Analysis Specialist™ course (RCS)

Pink Elephant SA runs Root Cause Analysis Specialist™ course (RCS) Albert Einstein said: “We can’t solve problems by using the same kind of thinking we used when we created them.” So why do we do Root Cause Analysis?  Average enterprises suffer more than 61 hours of downtime each year and an initial 54% of that…

6 WAYS TO BE A GREAT SERVICE DESK MANAGER.

6 Ways To Be A great Service Desk Manager. The Service Desk sees everything, speaks to everyone and deals with everything from forgotten passwords to Major Incidents. They are the unsung heroes of IT and are the IT single point of contact for many enterprises. Managing these heroes is no easy task, so we’ve compiled…

KING PRICE CHOOSES PINK ELEPHANT!

King Price Chooses Pink Elephant! The 1st of August 2019 sees the Pink Elephant meeting the “king” following a three-month transition of the King Price Service Desk environment to the Pink Elephant Global Service Centre in Woodmead, Johannesburg. Leading with a PinkScan™ ITSM Maturity assessment, Pink and King Price developed a strategic roadmap that culminated…

ITIL 4 Managing Professional (MP) Transition

Calling all “ITIL Experts“… Are you ready for your next challenge? You invested countless hours, successfully manoeuvring your way through the multiple layers of the ITIL® v3 qualification scheme. You’ve become an “ITIL Expert, or are very close to it. Now you’re ready to apply your talents on your next adventure. Well, here it is… A…

Leading Organisational Transformation

Leading Organisational Transformation Winston Churchill once said, “There is nothing wrong in change if it is in the right direction.” Whether people perceive change as heading in the right direction or not, most fear change. How many times have you tried to introduce a new way of doing an ordinary business activity and been asked:…

What is the difference between a Help Desk and a Service Desk?

What is the difference between a Help Desk and a Service Desk? By Kate Hamblin, IT Management Consultant @ Pink Elephant South Africa   “What’s the difference between a Help Desk and a Service Desk?” A question I frequently get asked on training courses. The Oxford English Dictionary states: Help – make it easier or…

Agile Service Management – a mindset as well as a framework

According to “The Agile Service Management Guide”, Agile Service Management involves: “adapting Agile and Scrum values and practices to IT Service Management (ITSM) processes, process design and improvement activities.” Yet, elements of the Agile Manifesto can appear to contradict with tenets of the IT Service Management. For example, the favouring of: “Individuals and interactions” over “Processes and…

2019 ITSM Trends

Take a look at the top trends to expect in the ITSM space in 2019 with Troy DuMoulin VP, Research & Development Pink Elephant “Well, another year has come to a close and it feels like it went by much faster than the last one! Or perhaps 2018 seems to have flown by on a rocket-propelled hoverboard because so…

Top Questions about ITIL4

The recent launch of the ITIL® 4 Foundation certification course and ITIL 4 certification scheme – and the retention of ITIL v3 certification courses – have left many folks with questions about which path they should take from here. Should you continue your ITIL v3 certification – or move directly to ITIL 4 certification? This…

Pink20 EarlyBird Special

Holy ITSM Conference, Batman! Calling all IT superheroes! Hop in your Batmobile and make your way to Pink20. Now in its 24th hugely successful year, our annual event is globally recognized as the world’s premier IT Service Management Conference. We live in a business era of superhuman challenges. Is your IT team up to the…

WHAT OUR CLIENTS SAY

Lady signing up to Pink Elephant newsletter

GET THE LATEST NEWS

Sign up to our newsletter for all the latest industry news and opportunities from Pink Elephant.

SIGN ME UP

WHO WE'VE WORKED WITH