Operations | Monitoring | ITSM | DevOps | Cloud

ITSM

The latest News and Information on IT Service Management, Service Desk and related technologies.

How to Create a New Task List or Checklist Template for Team Members | StartingPoint

In this video, we show you how to create checklist templates for team members to remember their day to day tasks within StartingPoint for your team members. StartingPoint is a workflow management platform for service-focused companies and teams. Our platform helps companies retain customers, save money by using less software, save time by centralizing information and data, and improve operational efficiency through simple workflow to make sure nothing falls through the cracks for your customers and your team members.

How to Create a New On-boarding or Checklist Template for Customers | StartingPoint

In this video, we show you how to create an on-boarding or checklist template to have an easy way to complete tasks within StartingPoint for your customers. StartingPoint is a workflow management platform for service-focused companies and teams. Our platform helps companies retain customers, save money by using less software, save time by centralizing information and data, and improve operational efficiency through simple workflow to make sure nothing falls through the cracks for your customers and your team members.

What role does ITIL Project Management play in ITSM?

Organizations with established ITSM strategy already know how ITSM can transform the IT department from a cost-center to a value-generating driver to offer real business value. As teams modify their service operations to meet increasing needs, IT departments are under more pressure than ever to swiftly execute changes without putting their service levels at risk. This is where organizations can leverage project management best practices along with ITSM best practices to introduce new services.

Are You in It to Win It? Optimize Your Warehouse Operations with Future-Proof Technology

Take a moment if you will. Imagine your typical day at the warehouse. Warehouse workers are buzzing about. Forklifts are driving back and forth down the aisles. Your workers are staying productive, scanning and picking boxes, one after the other. They’ve got their rugged devices and scanners, helping them buzz away, busy as can be.

Introducing the Nexthink Service Graph Connector

Configuration Management Databases (CMDBs) are key elements of any IT infrastructure. In large or growing organizations, however, successfully managing a CMDB is no easy feat. After all, IT Operations teams are responsible for managing tens of thousands of data points in dynamic environments. Lack of visibility, shallow troubleshooting, and the overall maintenance of a “healthy” CMDB can quickly lead to frustrations and result in expensive professional services support.

ABC's of UEM - Part 2

In my introduction to this blog series, I talked about why Unified Endpoint Management (UEM) is more relevant than ever before. In this second part of the ABC’s of UEM series I will talk about the next set of letters and how they tie into Ivanti. While reading this blog put your own experiences into perspective with how you and your company were forced to work during COVID-19.

Ivanti and BT Work Together to Secure and Service Mobile Assets Through Hyper-Automation

The world is constantly changing all around us, and the number of endpoints that organizations are using has increased significantly. Dan O’Boyle, Global Director from Ivanti, believes that there has been a sharp increase in more critical workplace devices needing to be connected and communicating while generating more data. To secure and service these changing mobile assets an evolution is needed.

No One Likes Passwords and They are the Leading Cause of Data Breaches

Did you hear about the latest data breach caused by a stolen password? Technically, it was a user account security token used by the malicious cyber threat actors to gain initial access into the company’s chat workspace. Once on the IT chat channel, the threat actors impersonated an employee and then used a simple social engineering tactic to trick an IT support member into providing them with a long-lived login access token onto the corporate network.

Service quality and the rising need for enterprise SRE

In its DevOps 2021 survey of global IT professionals, Enterprise Management Associates (EMA) found that 95% of organizations with highly successful DevOps initiatives were predominantly decentralized and purposefully becoming more so as fast as possible (see Figure 1). This decentralization of development and DevOps teams is making site reliability engineering (SRE) both critical and difficult to achieve.