Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Five worthy reads: Unified endpoint management, a 360° look at organizational security

One of the most obvious effects of the digital age is the unprecedented advancements in technology. Thirty years back, driverless cars, missions to Mars, and AI-powered robots were pure science fiction. Today, all these things are close to being an everyday reality. And speaking of unparalleled innovations, who would’ve thought that the day would come when all the devices around us—from mobile devices to sensors and appliances—could exchange information amongst themselves.

Tailor alarm content to your specific needs using Alarm Modifier

DevOps teams use a number of monitoring, project management, log management, and other IT management tools to receive alerts when something’s up. While this helps IT teams keep their system up and running at all times, the content of the alerts sent by some applications might not be relevant or insightful to the technicians who work on those issues. Now, with the Alarm Modifier feature, you can add new fields to an alarm, modify existing fields, rename fields, or remove them altogether.

Enhanced change management in ServiceDesk Plus: 5 tips to simplify your change implementations

Do you manage your organization’s IT infrastructure? Then you’ve probably dealt with change management in some capacity. IT change management—in particular—is an IT service management (ITSM) process where alterations to some or all the components in an organization’s IT infrastructure are planned, managed, and implemented. These changes need to happen without impacting service availability or business continuity.

Five worthy reads: Machine learning, the next phase of cybersecurity

With the number of cyberattacks growing with each passing day, the need for increasingly sophisticated security systems has never been higher. Just when these ceaseless attacks had you at your wit’s end, machine learning may just restore some sanity to the cybersecurity scene.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.