Operations | Monitoring | ITSM | DevOps | Cloud

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would: Identify your gaps with the NIS2 directive’s requirements now. Review your current supply chain security flaws. Now that we’ve discovered these security flaws, we must fix them — before time runs out in October 2024.

Get IT Right by Focusing on Service Strategy

Too often, we in IT get so busy performing the day-to-day work and fighting the many fires that come at us each day that we neglect to take a moment and focus on ways we can be strategic about how we do our jobs. When building or expanding IT Service Management offerings, it’s important to understand how taking time to focus on service strategy can greatly improve the efficiency of service delivery. First, let’s begin by defining a few terms.

How to Avoid These Two Common Monthly Patching Problems

It’s here — that time to patch your endpoints. Maybe it’s something you enjoy, but my guess is probably not. Patching can be a brutal task, and with many organizations still doing it manually, they’re spending more time and resources on patching than anyone really wants to think about. Now, given the fact that you are going to spend all that time and resources on patching, you want to make sure it goes smoothly.

Mapping IT Services for Improved Alignment Between Business and IT

Running a business in today's digitalized world comes with many challenges, such as industry regulations, escalating costs as businesses grow and continuity planning. To effectively manage IT services and align them with business goals, organizations are turning to service management solutions to optimize their resources, budgets and cross-functional collaboration.

Capitalizing on the Cloud: Five Strategic Benefits of ITSM in the Cloud

Cloud computing is no longer the future; it’s our reality. This means that the decision to move ITSM to the cloud isn't just an option. It's a strategic necessity. For business and IT leaders in the early stages of this transformation, understanding the benefits of cloud-based ITSM is pivotal. Here are five advantages that this shift can bring to your organization.

A Truce in the Device Management "Turf Wars"

“Why can’t you just use the MDM we’ve been using in corporate IT?” Sounds familiar? If you’ve been in operations IT for the last decade or more, you’ve likely heard this question from your corporate colleagues at least once. It may be a bit ironic that mobile device management may have been part of your operational tech stack for twice as many years as it’s been in the corporate conversation.

How to Use Generative AI for Knowledge Management

In the blog “How Generative AI Can Benefit Knowledge Management”, we looked at the benefits of AI to knowledge management to enhance the quality, automating the creation of content and enabling more engaging content. In enabling generative AI to become part of the knowledge management framework introduces concerns about accuracy, data bias, privacy and security. Now, it’s time to look at how we can make it work well together...

How Cloud Migration Helps Improve Employee Experience

The old saying goes, “practice what you preach.” When Ivanti started its "Customer Zero" initiative, Bob Grazioli, Chief Information Officer, saw it as a perfect opportunity to test the products and services consumed by customers. For example, during Ivanti’s move to the cloud, Grazioli and the team experienced the same issues that customers would’ve experienced in their migration process. This first-hand experience allowed them to make improvements along the way.

How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities

The security of your organization’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations. Ensuring compliance requires you to know what’s on your network. But how can that be done when only 48% of leaders and security professionals say they run their asset discovery program at least once per week?