Operations | Monitoring | ITSM | DevOps | Cloud

June 2021

SOS! Why 2021 has to be the Summer of Security

Sunblock: Check. Life vest: Check. Zero trust security: Wait, what? Summer gives us all a little breathing room and a chance to relax. This summer, perhaps more than any other in our lifetimes, we’re all looking forward to loosening up. As we get a hint of normalcy, or at least what “normal” is going to look like now that we’re in the Everywhere Workplace, many people are letting their guards down. We want folks to relax. We really do.

Alloy Software Wins Globee in the 16th Annual 2021 IT World Awards

BLOOMFIELD, N.J., June 24, 2021 (Newswire.com) – Alloy Software, a leading provider of ITSM and ITAM solutions, announced today that The Globee® Awards had named Alloy Software a winner in the 16th Annual 2021 IT World Awards®, in the IT Service Management category. These prestigious global awards recognize software vendors with advanced, ground-breaking products, solutions, and services in all areas of technology and cybersecurity.

HR Service Delivery: What Modernizing Can Do For Your Organization

When it comes to running a Human Resources (HR) department successfully, it’s a balancing act of maximizing budget and productivity. HR is a core part of the enterprise, but it is often up against flat or shrinking budgets. A lot of time gets invested into searching for ways to eliminate full-time employee hours spent on tedious manual tasks and re-shift its staff’s focus to driving more strategic initiatives.

Are You in It to Win It? Optimize Your Warehouse Operations with Future-Proof Technology

Take a moment if you will. Imagine your typical day at the warehouse. Warehouse workers are buzzing about. Forklifts are driving back and forth down the aisles. Your workers are staying productive, scanning and picking boxes, one after the other. They’ve got their rugged devices and scanners, helping them buzz away, busy as can be.

Ivanti and BT Work Together to Secure and Service Mobile Assets Through Hyper-Automation

The world is constantly changing all around us, and the number of endpoints that organizations are using has increased significantly. Dan O’Boyle, Global Director from Ivanti, believes that there has been a sharp increase in more critical workplace devices needing to be connected and communicating while generating more data. To secure and service these changing mobile assets an evolution is needed.

No One Likes Passwords and They are the Leading Cause of Data Breaches

Did you hear about the latest data breach caused by a stolen password? Technically, it was a user account security token used by the malicious cyber threat actors to gain initial access into the company’s chat workspace. Once on the IT chat channel, the threat actors impersonated an employee and then used a simple social engineering tactic to trick an IT support member into providing them with a long-lived login access token onto the corporate network.

Service Management: Firefighting and Fire Prevention

In the face of major disruptive change, the organizations that succeed are those that do more than just react to new circumstances. They evolve. When it comes to addressing the unprecedented challenges that have emerged in 2020 and 2021, the most successful IT teams have risen and will continue to rise to the occasion by recognizing the need for a proactive approach to the waves of disruption.

Splunk Connector for Ivanti Device Control - Now Available!

Ivanti Device Control is all about securing your endpoints while also providing a detailed overview to quickly identify weak links in your environment. The latter has now become much simpler and quicker to perform! Our new Splunk connector enables you to connect directly to your Ivanti Device Control environment, feeding in all reported events and showing you the most important data in a single dashboard.

Quick Demo: A Day in the Life of a Remote Knowledge Worker

Do you make it a habit of connecting to the free Wi-Fi network at the coffee shop, restaurant, hotel, airport or even in-flight on the airplane to save on your cellular data minutes? Watch this short 2-minute video to see what happens if you connect to a wireless network with a malicious cyber threat actor performing Man-in-The-Middle (MiTM) attacks to unsuspecting victims.

Forrester Research: The Future of Technology Operations

Recently, we had the opportunity to hear from Charlie Betz of Forrester Research about the future of technology operations. He covered the shift from project-based work to product team orientation, the integration between DevOps and IT services and the ways in which the entire enterprise is getting value from investments in artificial intelligence. Check out some of the interesting questions and answers from the discussion and be sure to catch the full conversation in the video below.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 2 of 2

As mentioned in Part 1 of this blog series, IT Service Management (ITSM) and IT Asset Management (ITAM) make a great combo to support IT’s overall plan to maximize operational efficiencies and improve service delivery experiences, while also optimizing compliance and cost. This post discusses the remaining three use-case examples: 3) Tackle Problem Assets with Proactive Management; 4) Effective Change Management; and 5) Complete Lifecycle Visibility.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 1 of 2

Actor 1: “Hey, you got peanut butter on my chocolate.” Actor 2: “Well you got chocolate in my peanut butter.” This 1970’s ad campaign of “Two Great Tastes that Taste Great Together” put Reese’s Peanut Butter Cups on the map. Know what else makes a great combo? IT Service Management (ITSM) and IT Asset Management (ITAM).