Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Free ITIL v4 training from ITIL 4 co-author Barclay Rae | ITIL4 implementation in non-IT areas | ESM

Learn about #ITIL4 and #enterpriseservicemanagement from one of the ITIL 4 architects and co-author on how to extend the scope of ITIL 4 beyond IT and best practices to benefit your organization. With the developments in ITIL 4 in recent years, organizations are now appreciating the real meaning of value “co-creation,” and the need for collaboration across organizations. So there is a lot of development and collaborative work taking place to synthesize and integrate work, tasks, and value streams across departments, teams, and functional groups—all well beyond IT.

Assessing the cybersecurity landscape

In the latest installment of the ManageEngine Insights' podcast, enterprise analyst John Donegan sits down with Andy Bates, the executive director of the Global Cyber Alliance. An expert in the field of cybersecurity, Bates discusses current IT security trends, attack vectors, crime deterrents, and other emerging issues, such as biometrics and blockchain technologies. Bates also addresses user psychology as it relates to IT security, as well as some of the silver linings of the COVID pandemic.

Change workflow builder

Using the new change workflow builder, users can now configure end-to-end workflows scaling to meet their business requirements. Dynamic approvals within each stage of the workflow, conditions to decide the path of the change and switch operations to shift the same, and the feasibility to perform field updates on change requests, are some of the functionalities available with the new change workflow builder.

Credential management best practices for business process automations

This webinar recording gives you a clear picture of the various credential-related perils that can surface because of implementing business process automation (BPA) workfows in your enterprise. Ganesh, our in-house IT security expert will walk you through the risks associated with hard-coding privileged credentials within application scripts and also provide you with a handful of security best practices to mitigate the risks and fortify your IT infrastructure from credential exposure through PAM360.