Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Service Portfolio in ITIL: What is it, And What's the Difference With The Service Catalog

The service portfolio helps you pull together your end-to-end service offering and make it more focused on customer outcomes. Done well, it can promote IT Service Management (ITSM) and make your services more visible. Defined in ITIL, this process broadens the view and incorporates IT services across their entire lifecycle. In the following post we will explore its full scope of practice and the benefits it can bring to service delivery and user experience across your organization.

A Step-by-step Guide to Implementing a Patch Management Process

A proper Patch Management process is crucial as it helps prevent data breaches by fixing security vulnerabilities and bugs. It is also the way to make sure all your devices run the latest software versions, which implies having access to updated functions and characteristics. Just so we are all on the same page, Patch Management consists of acquiring, testing, distributing, and installing updates or software patches.

How to Build a Change Management Workflow

Change Management is a critical practice for organizations to effectively adapt, innovate, and maintain stability. It involves various aspects of an organization's IT infrastructure, applications, processes, and policies. As the scope and complexity of changes continue to grow, the need to automate a Change Management workflow becomes paramount. In this article, we will explore the different types of changes described by ITIL to then break down the process behind automating the Change Management process.

What's New With InvGate: September Updates

We start September with some exciting news and brand new functionalities for both of our products, InvGate Service Desk and Insight. Fasten your seatbelt because you’re about to see some serious improvements in user experience, workflows, security, Data Management, and more. In particular, we’ll introduce you to: Let’s get into details!

Why The Pentagon Has The Worst IT Help Desk in The US Government - And How to Avoid it

No one wants to have the worst IT help desk, but someone has to. And the title was recently earned by the Pentagon. According to a survey, the Department of Defense (DoD) was the last in line regarding help desk support, behind 23 other federal departments. But how did it get there? And, more importantly, how can you avoid being the last in line? Let’s see.

What is SIAM? Things to Consider Before Adopting The Framework

SIAM or Service Integration and Management consists of a way of managing multiple suppliers and integrating them to provide a single business-facing IT organization. It can effectively integrate interdependent services from service providers into end-to-end services to enable you to meet business requirements. Information regarding suppliers and vendors is central to an effective service delivery strategy: it will help both your overall organization capabilities and your financial decision making.

An Introduction to Enterprise Mobility Management (EMM)

Enterprise Mobility Management or EMM is a holistic set of practices and technology oriented to help you improve your management of mobile devices, the applications, and the data they enable and enforce your information security policies. Done well, it can help you keep track of phones and tablets, and keep your data protected.

How to Reduce IT Security Risk With IT Asset Management

The connected world we live in has both transformed our workplaces and raised the cybersecurity challenges. On top of this, remote work and the growing reliance on cloud services and SaaS apps can also make it more difficult for cybersecurity teams to keep track of all the potential threats. This is why, today more than ever, learning how to reduce IT security risk with IT Asset Management (ITAM) can be a game changer to keep your workplace protected.

4 Types of IT Assets Your IT Inventory Should Include

Defining the types of IT assets to include in your IT inventory is the first step to implement your IT Asset Management (ITAM) strategy. But it’s not just about understanding their classification, but also how to monitor and manage each type. This will make sure you are optimizing their utilization, mitigating risks, and controlling costs.

10 Best Firewalls for Small Business to Use in 2023

Why is it critical to know and implement the best firewalls for small businesses? Well, cybercrime in information technology development has reached new heights, and according to Cybersecurity Ventures, the damage it causes to the online landscape is forecasted to grow to $10.5 trillion annually by 2025. Phishing, malware, account takeover, credential abuse, ransomware, cryptojacking, and zillions of other severe cyber security attacks are commonplace these days.