BANGALORE – IBM has set up a center in Pune, India to give its customers the opportunity to understand and test service management concepts and technology built into its Tivoli software. The centre will focus and build skills in areas such as telecommunications, security, automation and asset management, IBM said Tuesday.

Service management gives customers better visibility into its IT assets and applications, while also enabling better security, compliance management and automation, said Rekha Garapati, director at IBM India Software Lab.

The new center, called the IBM Service Management Centre of Excellence, will be used by IBM’s sales and marketing teams for customers both in India and in the Asia-Pacific region, Garapati added. Some of the services it will provide to IBM sales teams and to partners include facilities for proofs-of-concept, demos, and workshops.

IBM already does some of its product development for Tivoli software in Pune, which will ensure that customers will have access to IBM staff with deep knowledge of Tivoli products and technologies, Garapati said.

IBM said it chose Pune as the location for the new center to take advantage of the availability of technical skills locally, and also because it can collaborate with educational institutions based there. IBM is working with educational institutions on shaping the curriculum so that students can be trained on service management skills, Garapati said.

The new center will use service management staff from within IBM and also hire staff externally, Garapati said. It will build expertise both on Tivoli products and related technologies such as system software, she added.

Related Download
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate Sponsor: Absolute Software
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate
Lost and stolen devices. Employees off grid. Repairs or firmware upgrades. Endpoint device visibility frequently goes dark, leaving them vulnerable and open to attack. IT and security teams need a better way than traditional approaches to strengthen the security, visibility and management of endpoint devices.
Register Now