Operations | Monitoring | ITSM | DevOps | Cloud

How to Use Service Tickets to Improve Your Digital Employee Experience

What can you expect when you shift ITSM to the rest of your organization? Watch Bob Grazioli, Ivanti's Chief Information Officer, break it down in this video. Explore how the move from on-prem to the cloud has driven improvements in the employee experience and IT efficiency at Ivanti.

Why IT Asset Discovery Is the Foundation of a Risk-Based Vulnerability Management Program

With over 236,000 total vulnerabilities currently known – and an average 61 new vulnerabilities added every day to the NVD – it’s impossible to remediate every single CVE or threat vector that appears. So, how do everyday organizations handle the continuously growing threats to their organization’s end users, customers and data – especially across an increasingly hybrid and remote Everywhere Workplace?

Three Reasons Endpoint Security Can't Stop With Just Patching

With remote work now commonplace, having a good cyber hygiene program is crucial for organizations who want to survive in today’s threat landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success. Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software.

ITSM's Role in Building a Connected Enterprise: The Perspective of a CIO

With 73% of IT and security professionals reporting an increased workload since hybrid and remote work started, ITSM is a game changer for your organization. By automating workloads and increasing visibility, you’re able to build up the resiliency of your IT operations and proactively resolve problems. But getting started can be hard. That’s why Bob Grazioli, Ivanti’s Chief Information Officer, sat down to share his perspective gathered over more than 25 years in the field.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.

How to Start a Knowledge Base: Simple Yet Surefire Approach

Early in my career, I made the jump from defense contractor to customer support agent for an up-and-coming IT Service Management solution provider. Being new to the team and industry, I felt completely out of place. After the initial product training, I was pointed to a lab computer and told to start diagnosing a set of customer issues. I felt completely lost. Over time, with significant amounts of studying and leaning on my peers, I figured things out and eventually became one of the go-to analysts.

How to overcome obstacles on your Enterprise Service Management (ESM) journey

Expanding ITSM beyond IT isn’t a walk in the park. There are countless roadblocks that you’ll need to overcome. Phil Bowermaster, Director of Solutions Marketing at Ivanti, and Mark Temple, Assistant Director for Service Management at the University of Glasgow, share their experiences and give advice on how to make your ESM initiative a successful one.

How to implement Enterprise Service Management (ESM) at your organization

ESM applications are growing in prominence. So, what’s the best way to implement it at your organization? In this video, Ivanti’s Phil Bowermaster and Mark Temple from University of Glasgow dive into the easiest way to start and expand that ITSM environment to manage non-service workflows.

The Next Evolution of Patch Management: Security Insights Podcast Ep. 13

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.