Operations | Monitoring | ITSM | DevOps | Cloud

ITSM

The latest News and Information on IT Service Management, Service Desk and related technologies.

IDC Names Ivanti a Global Leader in UEM Software Support

Hey, here’s some exciting news worth sharing near and far. Industry research firm IDC has positioned Ivanti in the Leaders category in its 2020 IDC MarketScape for Worldwide UEM Software report. This follows on the heels of Gartner placing Ivanti as a Leader in the Gartner Magic Quadrant for IT Service Management Tools in October 2020.

The Importance of Simplifying the Customer Experience

Businesses often undermine the significance of delivering superior customer experience — the driving force which influences the decision of over 90% of American consumers. Unless you simplify your customer support mechanism, you may not be able to deliver a superior customer experience. So, you need to evaluate whether your customers getting exactly what they need.

7 Ways UEM Enhances Your Security

Introduction Many things blur the line between endpoint management and security. Examples? Managing an endpoint. Configuring it. Performing application and software management. And patching the endpoint. The fact is, managing and securing a device is so interrelated that it makes sense for these two functions to come together in a single platform that can accomplish these, and other tasks needed in your IT organization. Here are the seven ways Unified Endpoint Management (UEM) can support security.

ITAM vs. ITSM - What's the Difference?

IT Asset Management (ITAM) and IT Service Management (ITSM) are critical for any organization that requires IT capabilities to support business objectives. Both technologies provide IT operational support to an organization; however, the purpose and objectives of these technologies are quite different. Let’s explore the differences and similarities between ITAM and ITSM.

Race to Automation with the right ITSM

At ServiceNow, ITSM is like a favorite sports car we’ve tuned and optimized over the years into a precision machine that can keep pace with the speed of technological and business innovation. But to keep ITSM operating at its full potential requires constant maintenance, modifications, and grit. More recently, we’ve realized that ensuring continued ITSM performance requires automation and developing enterprise solution connections.

Extending the Zero-Trust Security Framework to Your Home

Mixing your personal and work devices while connected to your home network and accessing the Internet is a risky proposition from a security and privacy standpoint. Why? I frequently monitor my firewall logs. What I observe on my WAN interface are blocked IP addresses sourced from adversarial nation states which makes the hair on the back of my neck stand up.

Overcome security challenges with ServiceNow CMDB population

Networks always start off small and simple, but over time they can become increasingly complex. You start with a small network consisting of a simple Virtual Local Area Network (VLAN) with broad connectivity. However, once your security team get involved and add DMZs, routers, firewalls, etc you will find it hard to keep track of the intricate web you have created to support your business network.

Top integration tools to populate your CMDB

A Configuration Management Database (CMDB) is critical in supporting services such as Incidents and Change & Asset Management. Most companies dream of having a beautifully populated CMDB, but struggle with how to make this a reality as the process can be quite daunting! But never fear there are loads of tools you can buy to do just this! Typically, there are three types of solutions designed to populate your CMDB, these are either agent-based, scanner, or integration style tools.