Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to implement an automated health check alert for Enterprise Alert database

Enterprise Alert is the central hub for managing critical alerting, notifications, and remediation needs. It is a database-driven application and most of the time, once set up and configured, it just silently does its job in the background.

Improved 2-way integration with BMC product family

With our latest release 8.4.4, we included a number of changes to our 2-way smart connectors for the BMC product family to improve running scenarios as well as to ease the way for more integration to benefit from the reliable notifications and remote remediation capabilities Enterprise Alert offers.

DNS Blacklist Monitoring: Protect Your Company's Reputation

Did you know that around 306 billion emails have been sent globally every day in 2020 and about 45 percent of all emails received are spam. Even more surprisingly, websites that are marked as spam on email portals lose 95 percent of their traffic. Email servers tend to blacklist certain IDs as spam based on their content. And for companies marketing their business via emails, 36 percent of the total spam messages across the globe are attributed to advertising content.

The Importance of Monitoring SSL Certificates

Secure Sockets Layer, or SSL, is a global security standard technology that is being adopted by a number of different organizations across the globe. Essentially, SSLs are small data files containing a cryptographic key. This key carries important information about the organization using it. Around 600,000 websites have installed SSL certificates for security.

VPN vs. Remote Desktop - Gateway Security Concerns

VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user – whether that’s from prying eyes or the need to have physical access to their business network. But while each option can be attractive, neither is without its security concerns.

3 ways secrets management improves monitoring & observability

Monitoring — by its very nature — requires privileged access to internal and external services. In order to safely maintain visibility into critical systems, it’s vital to have some form of secrets management to manage authentication credentials (AKA, "secrets"), including passwords, keys, APIs, tokens, and any other sensitive pieces of information in your IT infrastructure.

Cut down the time to improve with ITSM Continual Improvement Management

We measure a lot of our ITSM success through increments of time. But mean time to resolution, time on page in the knowledgebase, and cases-per-hour aren’t just go-to metrics. They set the cultural expectations for our service teams – that improving service times, without sacrificing quality, is paramount.

Your ITSM should have purpose-built workspaces

Look around your desk, and you probably see a variety of tools that make you more productive — an ergonomic chair, a mug of coffee or tea, a notepad, or a charger. As individuals, we put great thought into making our personal space productive, a habit that many organizations have yet to fully replicate in their digital workspaces.

5 things you should look for in your ITSM chatbot

Chatbots are rising in popularity, both in consumer and enterprises circles, because they are quick, sometimes clever, and ultimately help workers and customers get answers to common questions without bogging down your service team. As part of our ITSM Professional package, ServiceNow’s Virtual Agent far exceeds some of the chatbots you may have used in your personal life for one simple reason – access to information.