Operations | Monitoring | ITSM | DevOps | Cloud

June 2023

ITIL & Risk Management: How Do They Relate?

ITIL and Risk Management are closely related. They're both focused on helping organizations run their IT departments efficiently and, most importantly, safely. But here's the thing. The relationship between the two hasn’t always been clearly defined. That is, until the latest version of ITIL launched in 2019. A new version of ITIL is always exciting in the IT Service Management (ITSM) world, and incorporating knowledge on dedicated Risk Management practices was a very welcomed inclusion.

New Apple Zero-Days: Patch CVE 2023-32434 and CVE 2023-32435

Apple released a series of patches today to address zero-day vulnerabilities CVE-2023-32434 and CVE-2023-32435. As Patch Management’s best practices indicate, the company advised updating the following products: iOS, iPadOS, macOS, watchOS, and Safari browser. Keep reading to understand the extent of the exploits and discover how to easily spot outdated devices on your network using InvGate Insight.

IT Asset Tagging: How to Tag Software and Hardware Assets

When managing assets across your organization, IT asset tagging acts as a starting block. It ensures that everything is properly identified and easily tracked to avoid inaccurate inventory records, unregistered losses, or misusage. The practice provides a systematic approach to label and identify software and hardware assets to easily track relevant information throughout the asset’s whole lifecycle.

CISA's BOD 23-02: How to Mitigate The Risk of Internet-Exposed Management Interfaces

The Cybersecurity and Infrastructure Security Agency (CISA) issued the Binding Operational Directive (BOD) 23-02 to mitigate the risks of internet-exposed management interfaces. For federal civilian agencies particularly, complying with this directive is not merely an operational necessity; it's a strategic imperative for securing their information systems. Keep reading to fully understand the CISA’s BOD 23-02 implications, and learn how InvGate Insight can help you comply with it.

Microsoft Teams' IDOR Lets Attackers Inject Malware Into Your Organization - Here's How to Prevent it

Cybersecurity researchers have recently informed that a vulnerability in the latest version of Microsoft Teams allows attackers to inject malware into any organization's network. Though the company has yet to release a patch, there's a change in the configuration you can do to prevent this in the meantime. The exploit was communicated by Max Corbridge and Tom Ellson from the JUMPSEC's Red Team on June 21. They promptly notified Microsoft about this security breach but didn't receive a satisfactory reply.

How to Manage an IT Asset Inventory? Outlining an ITAM Strategy

Your IT inventory is not a once-and-done thing. Assembling it is only the first part. But once you have all your organization's asset information centralized, what's next? It's all about adding details, monitoring the assets' behavior, and using the information InvGate Insight provides you with in your favor. With an IT asset inventory in place, you can do things like: Linking assets to users so you know who owns them. Tracking your investments. Automating notifications and alerts. Mapping your assets' relationships.

The Definitive Guide to IT Risk Management

IT Risk Management ensures all IT risks are properly spotted and dealt with in an efficient and safe manner. It can protect your environment and its users from internal and external threats and help your organization meet its Governance, Risk, and Compliance (GRC) obligations. If you’re searching for reliable and proficient ways to keep your workplace protected, you’re in the right place. In this article we will explore the full scope of Risk Management and the benefits that come with it.

Boosting Risk Management Automation with Asset Health Rules and Smart Tags

Risk Management helps organizations identify, assess, and mitigate potential threats. It's part of a comprehensive IT Asset Management strategy, so you can use InvGate Insight to implement it. Moreover, the tool can automate multiple tasks to help you: See how InvGate Product Specialist Matt Beran configures Asset Health Rules and Smart Tags to boost Risk Management automation!

What is ITIL Service Operation? Functions, Processes, and Best Practices

ITIL service operation is the fourth stage of the service lifecycle. It's responsible for the day-to-day support and maintenance of all IT services. Done well, it can protect the live environment, restore service quickly in the event of incidents, and investigate the root cause of preventable incidents. In the following article we will see how service operations work, the benefits it can bring to your organization, and its main functions and processes.

The ABC of Risk Management Automation

Every IT asset in your organization has the power to pose a risk to your organization. Outdated or unauthorized software can be a backdoor for a cyber attack, and expired licenses can make you lose a lot of money, just to name a few. Luckily, these can be mitigated with Risk Management automation. As you know, automating stuff can help you avoid human error, reduce your team’s workload, and be more strategic in terms of budget.

ITIL Service Transition, Explained

ITIL Service transition is the third stage of the service lifecycle. It involves transitioning the services that were created and developed in strategy and design – first and second stage of the cycle – into the production environment effectively, efficiently, and safely. This stage deals with everything from preparing for change to documenting the components of the asset that make up the service to creating knowledge articles for support teams and end users.

Agent vs. Agentless ITAM: What Are Their Differences - And Why You Need Both?

One of the most frequent questions when searching for IT Asset Management (ITAM) software is whether it's agent-based or agentless. The debate between these two is somewhat complex and has its intricacies, but we managed to compile everything you need to know in this article.

How to Build a Service Catalog in 5 Easy Steps

Building a service catalog is an absolute must to improve your company's IT self-service — and you can do it in just five simple steps! An ITIL service catalog benefits the business, consumers, and IT organizations alike, since it: In this video, InvGate Product Specialist Matt Beran walks you through creating a service catalog on InvGate Service Desk and highlights its differences from a service portfolio.

Everything You Need to Know About Software License Management

Software License Management (SLM) is a critical aspect of IT Asset Management (ITAM). Organizations heavily rely on software applications for their everyday functions. However, grappling with diverse licensing models and meeting compliance requirements requires good organization, knowledge on the matter, and a competent tool. Effective SLM is the way to address this.

The Fundamentals of ITIL Service Design

ITIL service design is defined as the second stage in the ITIL v3 service lifecycle. This stage creates a blueprint for effective and efficient IT services and ensures they are fit for purpose and use. It comes right after the service strategy that previously sets out the objectives and guidelines that underpin the whole process.

Looking for Free IT Asset Management Software? You Should Read This First

If you’ve decided it’s time for your organization to start thoroughly managing its IT assets, it’s likely that you’re looking at free IT Asset Management (ITAM) software with good eyes. The cost of a paid tool can be a drawback, either because you don’t have the budget for it or you’re hesitant about its effectiveness. However, cheap can be expensive, and ITAM tools are no exception.

ITIL Service Strategy Definition, Processes, and Implementation

The ITIL Service strategy is the first stage in the service lifecycle. It paves the way for the following four. This stage contains the guidelines for organizations to set out a solid strategy for their IT services, position them in the appropriate place in the service portfolio, and ensure they add value from a financial and experience perspective. This article will define service strategy, its purpose, and examine in detail the five processes that comprise it.

The 5 Incident Severity Levels - And a Free Matrix

Just as a red flag warns of imminent danger, incident severity levels in IT Service Management (ITSM) act as crucial indicators that alert organizations to potential problems. By understanding and leveraging them, businesses can swiftly and effectively respond to incidents, minimizing their impact on operations. In the dynamic business operations landscape, unexpected disruptions are an unavoidable reality.