Top 10 Considerations for ITSM Program Success.

A Checklist For ITSM Program Success: When establishing an IT Service Management (ITSM) improvement program, the most common questions that arise tend to be: “How do we get started?” “What is the goal?” “What critical knowledge do we need from People, Process, Product and Partners perspectives?”, etc. This is understandable, especially, since the ITSM program…

Pink Elephant voted best large training organisation in the Netherlands!

Pink Elephant voted best large training organisation in the Netherlands!   Our Dutch colleagues took home GOLD in The Best Educator of the Netherlands (BOVNL) awards. On Thursday, January 9th of January 2020, the best Dutch training organisations from 2019 were again announced by Springest, the largest training comparison company in Europe. The Best Educator…

PINK ELEPHANT ANNOUNCES THE LAUNCH OF THE ITIL® 4 FOUR ADVANCED COURSES!

PINK ELEPHANT ANNOUNCES THE LAUNCH OF THE ITIL® 4 FOUR ADVANCED COURSES! Further to the release of the new ITIL® Managing Professional Transition certification, Pink Elephant South Africa is excited to be the first to announce course dates for the industry’s first ITIL® 4 Advanced courses for the Managing Professional stream. The ITIL 4 Specialist –…

Blacklisting weak and exposed passwords is crucial.

Blacklisting weak and exposed passwords is crucial. Read this business case to learn why blacklisting weak and exposed passwords should be a critical part of making sure your organization’s password policy is successful: Specops Password Policy Business Case Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use…