Solution Sets

Optimize Project Intake, Approval, and Prioritization

While many IT managers lack the capacity to realistically say “yes” to more project work, many also lack the authority to decline or defer new requests. It’s a catch-22...
  • guided implementation icon

Define the Business Context Needed to Complete Strategic IT Initiatives

Understand the business context specific to your strategic IT initiative. Each strategic IT project requires answers to a specific set of questions regarding the...

Develop an IT Infrastructure Services Playbook

Create an infrastructure services playbook to clarify infrastructure capabilities and achievable service levels, standardize infrastructure service delivery, and make...
  • guided implementation icon

Extend the Service Desk to the Enterprise

Extending the service desk to business units beyond IT to other customer-facing business units can not only boost the performance of the department and improve end-user...
  • guided implementation icon

Align Infrastructure Architecture to Business Value

Assess your infrastructure needs, align architecture principles to business capabilities, and define the infrastructure reference architecture.
  • guided implementation icon

LEAP – Application Manager

A week-long training course that builds leadership skills and practices for application managers who are either new to their job or looking to transform the performance...

Develop Your Security Outsourcing Strategy

The need and importance of IT security is growing but most organizations lack the time and resources needed to create a mature security program internally. Most...
  • guided implementation icon

Develop a Security Operations Strategy

Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat...

Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk

Monitoring user counts, examining license feature set consumption, determining licensing metrics that best suit the environment, and indirect access rights are only a few...
  • guided implementation icon

Discover the Secrets of ITSM Licensing

Evaluating your desired ITSM vendor and negotiating the software agreement can be daunting. Vendors do this for a living, so it’s important that you come to the table...
GET HELP Contact Us
×
VL Methodology