Operations | Monitoring | ITSM | DevOps | Cloud

Asset Management

The latest News and Information on Asset Management, Device Management and related technologies.

Understanding RBVM & Application Security Orchestration & Correlation

The video introduces Risk-based Vulnerability Management (RBVM) and Application Security Orchestration and Correlation (ASOC), tools that integrate third-party data into a SaaS platform for threat analysis and risk scoring. It highlights recent improvements, new export capabilities, UX updates, and custom attributes for data uploads. It also explores the vulnerability response feature, which integrates RBVM and ASOC with ITSM for automatic ticket creation and security incident syncing, and the RBVM and patch integration for CVE analysis and patch management.#Risk-based Vulnerability Management, #Application Security Orchestration and Correlation, #ITSM integration, #patch management, #CVE analysis.

Innovators Preview: Security Enhancements and Upcoming Events

The innovators preview introduces security enhancements and upcoming events. It highlights opportunities for innovators, including a UX research team session and challenges to share 2024 goals. The preview also announces events like the Avanti neurons innovator preview and the Ivanti Solutions Summit. It discusses Q1 enhancements, including Ivanti neurons for RBVM and ASOC, patch management, and neuros patch management. The preview covers topics related to Linux flavors, testing, security levels, Linux patch configuration, scoping feature, and custom application publishing.

Innovators Preview: Exploring New Features and Enhancements in UEM

The Innovators Preview event offers a comprehensive look at the latest developments in Unified Endpoint Management (UEM). The discussion ranges from product management and OS platforms to updates for Android and Apple devices. Key topics include 5G slicing, carrier support, app configurations, and account-driven device enrollment. The shift to declarative management and the transition from CentOS 7 to Oracle Linux 8 are also highlighted.

How to successfully implement an inventory management software?

For inventory management software to reach its full potential and meet the specific needs of your business, a well-designed and well-executed implementation is essential. This article will provide a step-by-step guide to the successful implementation of inventory management software while emphasizing the importance of customer onboarding.

How to Conduct an IT Audit in 2024

Is your organization looking to up its IT audit game? Conducting it successfully will help you ensure that your IT systems and processes are secure, they comply with relevant regulations and standards, and are aligned with your overall goals and objectives. This practice lies at the core of your IT Asset Management (ITAM) strategy, guaranteeing a robust, safe, and well-managed IT environment across your operations.

How to Check Lenovo Warranty (And How to Automate it!)

Warranty Management is crucial to the lifecycle of IT assets since it helps you optimize device usage, plan for replacements, and manage your IT budget effectively. In this sense, if your organization has Lenovo laptops and servers as part of its IT inventory, consistent Lenovo warranty checks are a mandatory step in your IT procurement plan. Luckily, the brand offers a straightforward process for checking the warranty status of your laptops.