Operations | Monitoring | ITSM | DevOps | Cloud

Asset Management

The latest News and Information on Asset Management, Device Management and related technologies.

Boosting Risk Management Automation with Asset Health Rules and Smart Tags

Risk Management helps organizations identify, assess, and mitigate potential threats. It's part of a comprehensive IT Asset Management strategy, so you can use InvGate Insight to implement it. Moreover, the tool can automate multiple tasks to help you: See how InvGate Product Specialist Matt Beran configures Asset Health Rules and Smart Tags to boost Risk Management automation!

Asset Lifecycle Management: A Complete Guide for 2023 | Infraon

This comprehensive video guide will glimpse Asset Lifecycle Management (ALM) and its significance in 2023. ALM assists firms in managing asset acquisition, maintenance, and disposal, resulting in increased operational efficiency, higher ROI, and decreased downtime. The asset management lifecycle is divided into six stages: planning, procurement, deployment, utilization, maintenance, and disposal. Learn about the advantages of ALM, such as cost control, increased efficiency, compliance, risk management, sustainability, and better planning.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.

How to Use Service Tickets to Improve Your Digital Employee Experience

What can you expect when you shift ITSM to the rest of your organization? Watch Bob Grazioli, Ivanti's Chief Information Officer, break it down in this video. Explore how the move from on-prem to the cloud has driven improvements in the employee experience and IT efficiency at Ivanti.

Why IT Asset Discovery Is the Foundation of a Risk-Based Vulnerability Management Program

With over 236,000 total vulnerabilities currently known – and an average 61 new vulnerabilities added every day to the NVD – it’s impossible to remediate every single CVE or threat vector that appears. So, how do everyday organizations handle the continuously growing threats to their organization’s end users, customers and data – especially across an increasingly hybrid and remote Everywhere Workplace?

Three Reasons Endpoint Security Can't Stop With Just Patching

With remote work now commonplace, having a good cyber hygiene program is crucial for organizations who want to survive in today’s threat landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success. Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software.

ITSM's Role in Building a Connected Enterprise: The Perspective of a CIO

With 73% of IT and security professionals reporting an increased workload since hybrid and remote work started, ITSM is a game changer for your organization. By automating workloads and increasing visibility, you’re able to build up the resiliency of your IT operations and proactively resolve problems. But getting started can be hard. That’s why Bob Grazioli, Ivanti’s Chief Information Officer, sat down to share his perspective gathered over more than 25 years in the field.