Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

The six stages of Change management process : Part 2

In this video, we're going to take a deep dive into the six-stage change management process. Let's follow a change record through its life cycle and see how it gets logged, passes through different stages, what roles the stakeholders play at each stage, how communication happens, and finally, how the change is successfully closed.

Mitigating cyberthreats in 2020: A unified approach to endpoint security

Unsecured endpoints can cause catastrophic incidents that threaten an organization’s security and reputation. The ability to identify, preempt, and thwart breaches at the device level is critical to your organization’s security posture. In this webinar, you will learn about major attacks of the past, vulnerabilities that led to these attacks, and how to build a proactive shield against them.

[Webinar] Release Management in ServiceDesk Plus Cloud.

Software releases, whether simple or complex, often entail common challenges like lack of communication between different teams, scheduling conflicts, and absence of central control. Failing to adequately address these challenges may result in underdeveloped or failed releases. This can cause an increase in outages leading to costly downtime that could have otherwise been prevented.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.