Operations | Monitoring | ITSM | DevOps | Cloud

ITSM

The latest News and Information on IT Service Management, Service Desk and related technologies.

Question Time: GenAI and the Future of Work | ServiceNow

AI isn’t new to ServiceNow — we’ve been innovating in the space for nearly a decade. ServiceNow’s Chief Transformation Officer Kelley Steven-Waiss shares how generative AI will help employees focus on the work that matters most, get the right insights, and take the right actions. Watch until the end for her personal favorite way to use Now Assist. Now it's your turn in the hot seat — Have you discovered any innovative uses of AI at work? Drop your knowledge in the comments.

MSPs and AIOps: How to get the best of both worlds

MSPs and AIOps, how can we combine both to get the maximum positive result out of any situation? The IT ecosystem has undergone a major change in recent years. Cloud computing, distributed architectures, and a constant evolution of technologies have made it increasingly complex and dynamic. Human oversight alone is no longer sufficient to monitor, manage, and troubleshoot this ever-evolving landscape.

Innovator Preview: Ivanti Neurons for Patch Intune

In this conversation, Charity Tieri discusses two new features related to Patch for Intune. The first feature is the value of third-party patching through Patch for Intune, which provides time and resource savings for organizations using Microsoft Intune. The second feature is scopes in Microsoft Intune, which allows large organizations to operate in silos while sharing the same Microsoft Intune tenant. The third feature is custom application publishing, which enables users to publish applications that are not available in the catalog through Patch for Intune.

Innovator Preview: Ivanti Neurons for RBVM, ASOC, Patch Management, & Patch Intune

In this conversation, Chris Goettl provides an update on the upcoming release features and demonstrates them. The release focuses on Linux support, with enhancements for Mac OS and Windows patching as well. Chris explains the content-based approach for Linux and the challenges it presents. He also discusses the ability to exclude patches via patch group and the configuration of Linux repositories. Additionally, he covers the Mac OS Sonoma support and the new always reboot option. The conversation includes demonstrations of Patch Intelligence, endpoint vulnerability, and patch configuration for Linux and Mac OS.

Dell Warranty Check: How to do it - And How to Automate it

If your company’s IT infrastructure includes Dell devices, then you need to find a way to do Dell warranty checks efficiently. Sure, you can do it manually, computer by computer. But if you have just received a large batch of them, you can be looking at various days of work ahead.

Continuous Monitoring: A Definitive Guide

Continuous monitoring is the backbone of staying ahead in your business, maintaining a constant watch on your company’s activities. It adapts to the demanding needs of modern times, whether for compliance checks, continuous control, and infrastructure monitoring or defending against cyber threats. However, before the widespread adoption of continuous monitoring, companies relied on periodic audits, manual assessments, and sporadic checks to monitor their systems.

How IT Managers and MSPs can drive transformation with Remote Monitoring and Management (RMM)

Managing multiple vendors in an IT ecosystem can be daunting and fraught with risks. From the complexities of contract negotiations and renewals to the compliance challenges, the process is often time-consuming. In such a scenario, RMM Tools can help, a unified, scalable solution that can streamline various aspects of IT and network infrastructure, reducing the administrative burden and enhancing operational efficiency.

Understanding RBVM & Application Security Orchestration & Correlation

The video introduces Risk-based Vulnerability Management (RBVM) and Application Security Orchestration and Correlation (ASOC), tools that integrate third-party data into a SaaS platform for threat analysis and risk scoring. It highlights recent improvements, new export capabilities, UX updates, and custom attributes for data uploads. It also explores the vulnerability response feature, which integrates RBVM and ASOC with ITSM for automatic ticket creation and security incident syncing, and the RBVM and patch integration for CVE analysis and patch management.#Risk-based Vulnerability Management, #Application Security Orchestration and Correlation, #ITSM integration, #patch management, #CVE analysis.
Sponsored Post

Best Service Delivery Management Software for 2024

When it comes to finding the best service delivery management software, you should gravitate toward platforms that offer a full range of features for team members. Effective service delivery management software will equip teams with everything they need to hit the ground running on projects and make rapid progress in no time at all. StartingPoint is one such example of an all-encompassing platform.

Understanding Network Topology: Types, Best Practices

When you Google ‘Topology,’ it’s defined as ‘the way something is arranged or interconnected’. A similar definition extends into the digital world, especially in a computer network. Network topology is the structure and arrangement of the network and its devices. The question is- why should you care about network topologies? The answer is that your whole work depends on the digital realm in this era, and you want everything to run smoothly.