Operations | Monitoring | ITSM | DevOps | Cloud

August 2023

10 Ways Your CMDB Influences ITIL Success

The Information Technology Infrastructure Library (ITIL) Service Asset and Configuration Management process, described in its Service Transition guide, requires IT organizations to establish and maintain a configuration management database (CMDB) to keep track of configuration items (CIs) and the relationships between them. An up-to-date and functioning CMDB is one of the most important indicators of ITIL implementation success.

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time

You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance. But you might be tempted to think that October 2024 is far away, right? Think twice. After all, how can you know if you have plenty of time to prepare if you don’t know how well you currently comply with the projected regulations?

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now. Review your current supply chain security flaws. Now that we’ve discovered these security flaws, we must fix them — before time runs out in October 2024.

Your Guide to ACSC Essential 8 Compliance

Shane Wescott and Abdul Azize from Ivanti demonstrate how the Australian Cyber Security Centre (ACSC) experts' Essential 8 recommendations can be applied at your organisation – saving you time and reducing costs and risks. Learn how: To improve your compliance with the Essential 8 controls. To decrease your cost and time to patch. To protect faster and improve your maturity with risk-based threat intelligence.

Five Ways Voice Picking Raises Accuracy in Supply Chain Operations

Accuracy in supply chain operations means so many things. There’s the obvious order accuracy in fulfillment, and all that comes with it — KPIs met, customer satisfaction ratings, etc. Every one of these is important. But there are several ways that improving accuracy affects the business, so we’re looking at how operations teams hit the target with help from voice-enabled applications.

Get IT Right by Focusing on Service Strategy

Too often, we in IT get so busy performing the day-to-day work and fighting the many fires that come at us each day that we neglect to take a moment and focus on ways we can be strategic about how we do our jobs. When building or expanding IT Service Management offerings, it’s important to understand how taking time to focus on service strategy can greatly improve the efficiency of service delivery. First, let’s begin by defining a few terms.

Gartner Security and Risk Management Summit Takeaways Ep. 24 | Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Demo: Interactive quantitative & qualitative surveys for ITSM

Create and update ITSM ticket stages using AI-driven automation bots and update ITSM events against a CI. Collect qualitative information from users to confirm symptoms, schedule troubleshooting or add context to poor survey results. Capture quantitative rating information from users with star, emoji, or radio button scales.

Practical Demo: Optimize Your Compliance with Unified Risk Assessment and Remediation

Organizations are held to a higher standard when it comes to the safeguarding of personal data, including personally identifiable information. But, adhering to internal governance, risk and compliance (GRC) standards — let alone the growing number of external regulations in this area — challenges even the most mature organizations as settings shift, perils increase in complexity and internal partnerships waver.

Learn why comprehensive patching matters.

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

MDM + MTD Demo Webinar

Better together demo between Ivanti Neurons for MDM and Ivanti Neurons for MTD Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

This VideoGame Vulnerability was a Huge Headache: Unpacking Log4j Ep.22 | Security Insights Podcast

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Micro Product Demo: Ivanti Neurons for RBVM & ASOC in 252 seconds

With Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) and App Security Orchestration & Correlation (ASOC), you can move from detection of vulnerabilities and weaknesses to remediation in minutes — not months. As shown in this video from Ivanti, these offerings deliver a contextualized, risk-based view of your organization’s cybersecurity posture. They work by continuously correlating your infrastructure and applications with data ingested from scanners, threat intelligence, human pen test findings and business asset criticality to measure risk and prioritize remediation activities.

Cybersecurity Myth Busting Ep. 21 | Security Insights Podcast

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.