Case Studies

Portfolio Management Case Study for Mid-Sized Education Organization

A leading University making the transition toward becoming a Research Institution had a consistent record of growth which created a supply and demand imbalance between...

Portfolio Management SOP for Retail Company

Fueled by growth, IT faced some large strategic issues and did not have the time to spend on operational initiatives. The organization needed to build a process that...

Service Desk SOP for an Energy Company

With a new service desk tool coming in the following week, the organization wanted to formalize their service desk processes to ensure all requirements were met, and...

Service Desk SOP for a Public Sector Organization

Increasing staff and an organizational need to improve the maturity of the service desk meant IT had to rebuild its service desk to ensure all requests were handled...

DRP Workshop Summary for a Mid-Sized Insurance Company

The existing Business Continuity Plan lacked the specific details of a step-by-step incident response plan, and failed to account for all potential disaster scenarios. IT...

Right-Sizing DRP Case Study of a State Government Agency

Increasing complexity within the environment, with competing priorities within the organization, made it challenging to create an actionable DRP or even to know where to...

Cloud Strategy Case Study of a State Department Federal Credit Union

Since 1935, State Department Federal Credit Union (SDFCU) remains committed to serving its 68,000+ members worldwide. SDFCU needed IT to provide value-added services for...

Cloud Strategy Case Study of a Large Food Producer

The current IT team of an international food producer provided IT services to all sister companies in North American, and was stretched for resources and time. An...

Case Study: Reducing Email

Email can be addictive, and dangerous to enterprise culture and productivity. However, it is a required tool that is the blood line of most enterprises.

Case Study: HHS

The influx of consumer devices has brought along a variety of potential security risks through the consumer applications that end users have on their devices. Hamilton...
GET HELP Contact Us
×
VL Methodology