{"id":169,"date":"2007-04-13T00:00:00","date_gmt":"2007-04-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/13\/ibm-offers-reference-tool\/"},"modified":"2021-12-30T11:36:38","modified_gmt":"2021-12-30T11:36:38","slug":"ibm-offers-reference-tool","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/04\/13\/ibm-offers-reference-tool\/","title":{"rendered":"IBM Offers Reference Tool"},"content":{"rendered":"<p>IBM announced the availability of a free, Web-based tool that provides clients with an information guide of best practices based on IT Service Management and governance initiatives.  The new version of the IBM Tivoli Unified Process (ITUP) is the industry&#8217;s broadest &#8220;how to&#8221; source of information on industry best practices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the announcement of a new release of the ITUP tool, IBM provides clients enhanced and expanded practical guidance in how to implement process integration, activity flows, clarified operational roles, and management tool strategies required for effective service management.<\/p>\n<p>ITUP supports ITIL, COBIT, ISO IEC 20000, eTOM and includes detailed documentation of IBM&#8217;s Process Reference Model for the Business of IT.<\/p>\n<p>&#8220;With complex compliance regulations looming, many organizations are seeking to implement a more consistent IT governance and risk management process,&#8221; said Susan Blocher, Director, Governance and Risk Management, IBM.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=121692&#038;WT.svl=wire_2<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-169","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=169"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/169\/revisions"}],"predecessor-version":[{"id":2656,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/169\/revisions\/2656"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}