Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Asset Management, Device Management and related technologies.

Shareable Ticket Links #helpdesk #communication

Save your time and sanity with shareable ticket links in Alloy Navigator! Just Shift-click a ticket number and instantly get a quick direct link with the ticket summary, ready to share. No more annoying back-and-forth or endless copy-pasting! It’s super effective, easy, and shows respect to your teammate. Shareable links work everywhere in Alloy Navigator — in change requests, purchase orders, assets... It’s one of our favorite features, and we hope it becomes one of yours too!

From legacy to security: Ivanti Connect Secure

When I took on leading the Network Security Group (NSG) at Ivanti in October 2024, it was a bit like a homecoming for me. You see, I spent almost two decades overseeing the development of these products before moving on to other responsibilities at Ivanti. NSG is responsible for building and maintaining Ivanti Connect Secure, Policy Secure, and Neurons for ZTNA, among other solutions.

Enhancing Vulnerability Management Through Exposure Management

Exposure management improves vulnerability management by integrating various attack surfaces and enhancing asset visibility. It promotes a proactive approach to continuously manage threats and exposures. Organizations define their risk appetite for quicker decision-making on vulnerabilities. A zero day response strategy enables swift action on critical vulnerabilities. Ivanti's approach includes strong asset discovery and prioritization, utilizing threat intelligence for effective risk management.

(Full Episode) IT Horror Stories: Human Error Ep11 S1

IT isn’t just wires and widgets. It’s a minefield of lurking disasters waiting to strike. Few know that better than Mark Settle, 7-time CIO and author, who’s survived more operational horrors than most dare imagine. In this episode, Mark takes us into the shadowy corners of enterprise IT, where outdated processes haunt progress, bad news festers in silence, and AI ignorance prowls like a predator in the dark. He shares battle-tested wisdom from a career spent defusing digital disasters and building resilient, process-driven teams that can take a punch.

How to Set Up a VPN: Complete Guide With Steps

Breaches of online privacy have become a serious issue in any IT environment, which is why a VPN is a handy tool to secure your digital footprint. In this video, we’ll show you how to set up a VPN through a complete step-by-step guide. Chapters: Introduction 00:01 What is a VPN 00:22 Why should you use a VPN 00:43 How to set up a VPN 01:12 Troubleshooting VPN issues0 1:44.

RFID Based File Tracking System for Document Management & Movement Monitoring

What if your most sensitive documents could raise the alarm before they ever go missing? In industries like banking, legal services, and secure record storage, a single lost file can lead to audits, lawsuits, or irreparable reputational damage. Yet, many of these organizations still rely on manual registers, CCTV, and physical locks to safeguard high-value paperwork—leaving behind a trail of vulnerability. That’s where a file tracking system changes the game.