Operations | Monitoring | ITSM | DevOps | Cloud

InvGate

Conflict Management and the Major Incident Management Process

Major incidents are, by their very nature, stressful and intense. The ITIL 4 definition of a major incident is: High-stress situations can cause conflict that left unchecked could delay the fix effort. Since we already have a definitive guide on incident management, this blog post will focus specifically on the major incident management process.

AWS vs. Azure vs. Google Cloud: Which Cloud Provider is Best?

Over the last two decades, we have seen companies move to the cloud in hordes and presently, the cloud is often the default option for almost all new enterprises. Only companies in a very narrow niche are sticking to on-premise solutions. And the trend is expected to continue. In 2021 alone, the end-user spending in cloud computing was around 482 bn USD.

All About ITOPS: IT Operations Roles & Responsibilities

IT Operations or ITOps have long been a key part of IT service management (ITSM) for organizations. It has played and continues to play an important role in maintaining organizations’ IT infrastructure up and running and making IT available to all employees. Unlike the service desk which directly communicates with the employees, the activities of ITOps rarely involve direct contact with the users they serve.

7 laws of UX to improve the experience of IT managers

Besides features, integrations, and needs, #userexperience is crucial when selecting products, build custom solutions, or design usability studies. Tools that abide by #uxlaws increase their chances of adoption since they are based on utility, ease of use, and efficiency notions. Whether you're on the creator or the user side, Matt Beran - Invgate Product Specialist - listed 7 #lawsofux needed to make a wise decision. Find examples of each one of them in the video!

Keeping a Detailed Hardware Inventory: Best Practices

Hardware and asset management is not easy even in relatively small organizations with 20 or 30 employees. As the size of the organization increases, it becomes difficult to keep track of all the laptops, printers, and other hardware used by the employees. This is where a detailed hardware inventory of IT assets becomes useful. A hardware inventory can help you keep track of all devices and equipment owned or used by your organization.

Apple Zero-Day: How to Spot Devices to Update in Your Company in Seconds

Just a couple of days after Google announced a high-risk zero-day vulnerability in Chrome, Apple disclosed two zero-day vulnerabilities affecting their operating system on both mobile and desktop devices. The company has already issued updates for its iOS and macOS users. The patched versions are as follows: As for the Apple zero-day exploits, they were reported anonymously.

5 Important Things To Consider Before Moving To a Cloud-Based ITSM Solution

It should come as no surprise that cloud-based ITSM solutions have become so popular. As we’ve explored in our comparative piece: they are easily deployable, they tend to be less costly as an upfront investment and they are highly customizable to fit different IT infrastructures and team functions when compared to their on-site equivalent.

How to use ITAM to support your IT support game

Historically IT asset management (ITAM) is the practice that was forgotten about by IT service management (ITSM) practitioners because it wasn’t considered a “core” ITIL process. This changed with the publication of ITIL 4, and now ITAM sits firmly in the ITIL management practice section of the service value stream. Done well, ITAM can help organizations to manage, control and support their IT services.

Chrome Zero Day: Find vulnerable devices for patching

Google issued an emergency security update due to the severity of exploit CVE-2022-1096. A few days later, Microsoft joined the recommendation, advising Chromium Edge users to update their browsers as well. Therefore, if you haven’t already, you should check your browser details to check if it’s updated to version 99.0.4844.84 of Chrome or version 99.0.1150.55 or higher of Edge. Matt Beran shows you how you can find vulnerable devices across your inventory for proactive patching using InvGate Insight.

Chrome zero-day: find devices with vulnerabilities across your inventory

If you’re an asset manager or an application administrator, you must have had - or are about to have - a lot of work since there’s a new Chrome zero-day vulnerability in the wild. Google issued an emergency security update due to the severity of exploit CVE-2022-1096. A few days later, Microsoft joined the recommendation, advising Chromium Edge users to update their browsers as well.