Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Setting the Cornerstone of a Successful ITSM Practice [Webinar]

One of the key challenges that most IT service desks face is transitioning ITSM best practices from the drawing board to daily practice. And seldom do teams realize that this hurdle can be handled effectively by leveraging the capabilities offered by #ITSM tools like ServiceDesk Plus. This session is a blend of the recommended industry best practices and ManageEngine's 15 years of ITSM experience, all aimed at helping service desk teams implement best practices in their day-to-day #ITSMprocesses. 

Introducing ServiceDesk Plus MSP 10.5: The all-in-one MSP Business Software

The latest update to #ServiceDeskPlusMSP brings a refreshing new UI and exciting new features empowering your #servicedesk with capabilities that will help you take your business to the next level, and provide an enhanced service experience to your customers.

The six stages of Change management process : Part 2

In this video, we're going to take a deep dive into the six-stage change management process. Let's follow a change record through its life cycle and see how it gets logged, passes through different stages, what roles the stakeholders play at each stage, how communication happens, and finally, how the change is successfully closed.

Mitigating cyberthreats in 2020: A unified approach to endpoint security

Unsecured endpoints can cause catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, preempt, and thwart breaches at the device level is critical to your organization’s security posture. In this webinar, you will learn about major attacks of the past, vulnerabilities that led to these attacks, and how to build a proactive shield against them.

[Webinar] Release Management in ServiceDesk Plus Cloud.

Software releases, whether simple or complex, often entail common challenges like lack of communication between different teams, scheduling conflicts, and absence of central control. Failing to adequately address these challenges may result in underdeveloped or failed releases. This can cause an increase in outages leading to costly downtime that could have otherwise been prevented.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.