Operations | Monitoring | ITSM | DevOps | Cloud

October 2023

Cybersecurity Awareness Month: A Discussion About Cloud Security And AI

Explore the benefits of moving security to the cloud, how AI will shape security in the future, advice for those joining the field of cybersecurity and infosec, approaching complex problems and more including: Key trends - from cloud native to zero trust security & beyond The role of a CTO and CPO in cloud security Inspiring new talent to get into cybersecurity Foundations for cyber safety Ensuring organizations of all sizes are safe.

Manage and defend your IT estate like never before with Ivanti Neurons for ITSM

To learn more about our ITSM solution packages, please visit: At Ivanti, we’ve developed advanced solutions that automatically find, heal, and protect every device, no matter where they are located. Whether your team is working together in the same office or spread across different locations, Ivanti ensures that they can easily and securely perform their best work. Our focus is on delivering exceptional employee experiences, regardless of the device or location. We provide proactive and efficient service, allowing employees to work in the way that suits them best.

Modernizing ITSM with ITIL 4: Service value system

Demonstrating value is crucial to the success of any business. That's why it’s an important topic for IT service management (ITSM) service providers to consider when evaluating their service operations. How do IT service operations align with business outcomes and customer needs? How do operational metrics correlate to business value that stakeholders want to see?

Top 6 Benefits of AIOps You Must Know

AIOps — a term coined by Gartner back in 2017 has emerged as one of the hottest talking points in the realm of ITOps. Since its inception, its adoption by large enterprises has gone up from 5% to 30% in 2023. This impressive 6X growth is a clear indicator that AIOps is here to transform how businesses manage their IT operations. But what is it that makes AIOps special? What are the benefits of AIOps that businesses are looking to leverage.

What is Shadow IT - And How to Detect it?

One of the biggest causes of concern to IT departments across the globe is shadow IT. Uncontained, it can cause duplication, unnecessary costs, and compliance issues. To manage and mitigate risks, IT managers need to understand what shadow IT is, its risks, and how organizations can proactively address them. In this regard, IT Asset Management solutions incorporate capabilities that help organizations implement protection measures and build a culture of cybersecurity.

Zero-Trust Security: Best Practices for Securing the Remote Workforce

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Building an Equipment Checkout System With InvGate Insight

Checking out equipment is essential for schools, universities, and other industries that loan assets temporarily on a regular basis. And even though there's dedicated software for this, you can use your ITSM and ITAM tools to check in and out equipment — and thus avoid having to purchase yet another tool. You can see how to build an automated workflow on InvGate Service Desk to forget the headaches of loaning hardware.

Simplify your back-to-school inventory management

New school year, same problem: outdated inventory management that doesn’t make the storekeeper’s job any easier. Keeping track of thousands of assets with Excel, library software (SIGB) or, worse still, by hand is a real ordeal… which could easily be avoided. Material tracking and loan management shouldn’t be cumbersome, time-consuming tasks that encroach on all your other projects. Not to mention that using old, manual methods predisposes you to wasted time and mistakes.

Security Webinar, Zero Trust For Users

Zero trust security — anywhere Working from everywhere means employees need access to corporate apps and data from any device, anywhere, anytime. This is a new level of freedom — and a new level of vulnerability. Navigate this new landscape with security that’s purpose-built for Everywhere Work. Get edge-to-edge security for every device, every user, every application and every network everywhere.

Detect Shadow IT And Keep Unauthorized Assets Under Control

Shadow IT refers to systems, software, applications, SaaS services, hardware, or mobile devices used within an organization without the IT department's explicit approval, oversight, support, or knowledge. Initially, it focused on hardware assets, but it has evolved to include SaaS applications (SaaS sprawl). Even though shadow IT has a few benefits, it also poses significant risks to organizations, such as.

UEM vs. MDM: Everything You Need to Know!

Microsoft's release of Windows 10 modernized how IT teams approach device management. Windows 10 is not a strict evolution of Windows 7 and 8. It’s an evolution of Windows Phone 8 and 10, where an MDM API was available to manage all aspects of a device, such as DLP, restrictions, software distribution and so on.

What Is ITSM? IT Service Management Explained

ITSM, which stands for IT service management, is a strategy for delivering IT services and support to an organization, its employees, customers and business partners. ITSM focuses on understanding end users’ expectations and improving the quality of both IT services and their delivery. In the early days of computers, employees relied on the company IT department for help whenever a computer issue arose.

Unable to accurately measure IT success? Watch out for these 7 KPIs

The right KPIs are critical for optimizing IT management lifecycles. With the right set of metrics, organizations can objectively measure their IT function’s performance and identify areas for improvement. These service and operational KPIs often act as a compass, guiding IT teams to help drive operational excellence and achieve strategic alignment with organizational goals.

Death, Taxes and Phishing - Cybersecurity Research Results (Pt. 1) | Ep.33 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Understanding the ServiceNow CMDB - and how AIOps modernizes it

Navigating the complex world of ServiceNow’s Configuration Management Database (CMDB) can feel overwhelming. You might find yourself grappling with understanding the foundational aspects of the CMDB, or maybe you’re seeking effective ways to utilize and integrate it seamlessly into your IT processes. You want to extract the maximum value from your ServiceNow CMDB but need help figuring out how to start.

Importance of Network Monitoring

In today’s fast-paced digital world, the importance of network monitoring is growing by leaps and bounds. With real-time network monitoring, businesses can transform their user experiences and drive unstoppable growth. Whether you run a small business or a large corporation, incorporating network monitoring tools can help in the smooth functioning of your networks. Join us as we unveil the top benefits of network monitoring in the modern business landscape.

Secure UEM Solution Packages in 187 seconds

Ivanti’s Secure UEM solutions provide a unified view of devices, enabling efficient discovery, management and security of endpoints and vulnerabilities. Accurate and actionable insights enable faster remediation. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Prioritize and promote service observability best practices with Service Scorecards

The Datadog Service Catalog consolidates knowledge of your organization’s services and shows you information about their performance, reliability, and ownership in a central location. The Service Catalog now includes Service Scorecards, which inform service owners, SREs, and other stakeholders throughout your organization of any gaps in observability or deviations from reliability best practices.

How to Use ITAM Software as Your Equipment Check-Out System? [Video Tutorial]

An equipment check-out system is a lifesaver for any organization. This is especially true for sectors like education, healthcare, mining, and construction, where the need to loan and track numerous assets is a priority. But what if there’s a way to take that system even further? Utilizing IT Asset Management (ITAM) software as your equipment check-out system brings your organization a whole new level of efficiency and control.

Micro Product Demo: Ivanti Neurons for Spend Intelligence in 135 seconds

Ivanti Neurons for Spend Intelligence enables an organization to manage and control their software spend across on-premise and subscription software. In this video, we introduce Spend Intelligence and look at more in-depth capabilities across License Mangagement, Entitlement, Reclaiming unused licenses, and Saas Management.

Planning for the unexpected with business continuity management

As a major retailer with more than 1,700 outlets, Canadian Tire needs robust business processes that continue to operate seamlessly when adverse events strike. Although the company had disaster recovery plans in IT and an established business impact analysis discipline in its business units, these processes ran on Microsoft Excel, Word, and emails—and weren’t connected.

Platform Engineering - Paving the Way to Accelerate Eeleases

Platform engineering started appearing in 2017 and was identified as a distinct DevOps role in 2019 in the book Team Topologies. Adoption quickly accelerates, and by 2022, there are platform engineering meetups worldwide, and over 6,000 DevOps professionals attend Platform Con, the first platform engineering conference. With such a fast rise in popularity, many technology professionals still need clarification on the role and how it fits into the DevOps methodology.

On-Trend in Operations This Peak Season

Here we are, back again to another calendar fourth quarter and maybe the same for your business. But whether your fiscal calendar lines up or not, it is that most wonderful time of year we all know as peak season. Each year's a little different, especially lately. But rather than re-hash what we have all lived through leading up to this season, it feels right to have a look at what operations — maybe yours included, are doing to make peak season 2023 a success.

Ivanti Neurons for HR

To view all Ivanti Demos please click here. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.
Sponsored Post

How To Optimize Your Consulting Workflow

A streamlined consulting workflow is not just a luxury-it's a necessity. If you've found yourself here, you're likely grappling with a range of different concerns: Rest assured, this article aims to address these concerns and offer practical ways to begin optimizing your consulting workflow and elevating client experiences. With decades in the consulting industry, I've witnessed, firsthand, the evolution of consulting workflows. By blending tried-and-tested methods with the latest tools and technology, I've helped firms revolutionize their consultation processes.

Patch Management vs. Vulnerability Management: What's The Difference?

Patch Management and Vulnerability Management are two key practices that keep organizations safe. Used effectively, they can detect vulnerabilities, patch them efficiently and safely, and help organizations meet their Governance, Risk, and Compliance (GRC) requirements. Because both practices work together to build up an organization’s IT security strategy, they are often incorrectly used interchangeably.

ServiceNow is a Magic Quadrant Leader for Low-Code for the fourth year

I’m delighted to announce that, for the fourth consecutive year, ServiceNow has been recognized as a Leader in the 2023 Gartner® Magic Quadrant™ for Enterprise Low-Code Application Platforms. We believe this recognition reflects our continued commitment to helping our customers eliminate the skills gap for app creation with low-code tooling.

The art and science of bridging the goals of IT teams and customer success teams

The IT department designs, implements, and maintains the technology backbone of any enterprise’s operations. Their decisions about systems architecture, software deployment, and security directly influence the daily tools and platforms the customer success team uses. In turn, the customer success team, constantly interacting with clients, provides invaluable feedback on system functionalities, performance issues, and user interface, which can guide IT in optimization and troubleshooting efforts.

ServiceNow Integration

In this video, we'll be covering the benefits of the ServiceNow integration. We'll also go through the configuration process allowing you to follow along and quickly configure this integration. The integration will allow you to automatically create and resolve incidents based off of alarms triggered in Exoprise. With incidents being sent to ServiceNow, you can begin automatically assigning incidents to the correct teams based off of criteria or automatically escalating issues that have not been addressed yet.

Demo ITSM 10-Minute Intro

Service-desk tickets. Lost laptops. End-user complaints. Sometimes it can feel like you can barely keep your head above water. But what if you could be proactive instead of simply reactive? During this practical demo webinar you’ll learn how your IT team can gain insights they need to solve business problems proactively with IT Service Management (ITSM) and IT Asset Management (ITAM) working together.

The red team: ServiceNow's first line of defense

If you ask any ServiceNow employee about their role, they'll likely tell you their job and team are the best they’ve ever had. One small but mighty team proclaims this proudly: the red team, a group of professional hackers. As vigilant guardians of the company, the six-person team is tasked with testing the security of our systems and identifying cyber risks, data vulnerabilities, and security threats.

5 principles of great experiences

Product experience is a key driver of business success for ServiceNow and our customers. That’s why my product experience team and I spend a lot of time focusing on design principles that help ensure we exceed our customers' expectations. You don’t have to be a designer to use these principles and create great experiences. These are fundamentals that anyone can put into practice.

Vendor Risk Management 101-The Imminent Threat of IoT Litter Boxes | Ep.32 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Elevate Your Teamwork in 2023: Dive into Collaborative Work Management! Infraon

Are you prepared for the future of collaboration? Look no further! Our latest video is your ultimate guide to "Everything You Should Know About Collaborative Work Management In 2023. In a world where seamless teamwork is a game-changer, this guide is your key to staying ahead. From the latest tools that streamline collaboration to strategies that foster communication and boost productivity, we've got you covered.

Mastering SaaS License Management: A Comprehensive Guide | Infraon

Unlock the secrets of effective SaaS License Management in our latest blog post! In this comprehensive video, we dive deep into the world of Software as a Service (SaaS) licensing, helping you streamline your operations and optimize costs. Learn about understanding SaaS licenses, the benefits of efficient license management, common challenges and best practices.

Project and Portfolio Management with ITSM

For this practical 10-minute demo, Dave Pickering, Ivanti’s Technical Product Marketing Director, will cover how to extend your ITSM platform and processes to support project portfolio management (PPM). He’ll explain the benefits of using integrated PPM and ITSM tools for streamlining processes, improving collaboration across your organization and elevating your organization's overall IT strategy. YOU’LL LEARN HOW TO.

AI will empower app developers-not replace them

Despite the rise of AI, the need for app developers isn’t going away. In fact, a 2023 ServiceNow-sponsored study by Pearson suggests approximately 95,000 new application developer roles will be added globally over the next five years. According to ServiceNow’s special report on the impact of AI on tech skills, based on the research, only about 20% of app developer tasks will be either automated or augmented by 2027.

DEX Show Live from London: The Future Workplace

Tim and Tom hosted a very special DEX Show episode LIVE at an incredible, standing-room-only Experience Everywhere event in London. They were joined for the occasion by two amazing guests - Darren Wright (Vice President, Information Technology, Honeywell) and former F1 driver and entreupreneur Robert Doornbos. It was an amazing conversation in front of a huge crowd – touching upon data, Formula 1, adaptation, technolgy, employee engagement and much more.

The Future of Database Monitoring - AIOps

IT pros need tools designed to ingest large volumes of data, correlate events across data sources, detect problems, and resolve them with new technologies to support more efficient IT systems. This is the function of AIOps. AIOps or Artificial Intelligence for IT Operations, is the use of artificial intelligence (AI) and machine learning (ML) technologies to enhance and automate various aspects of IT.

4 ways innovative companies can navigate digital transformation

From the tight global labor market to social and political volatility, macroeconomic headwinds continue to hamper business growth. Such a complex environment is anything but smooth. Your organization may be feeling pressure to deliver on initiatives to support talent, products and services, and business operations. Finding success in these areas requires digital transformation. Innovative companies are best positioned to prosper and thrive.

Unlock the power of the Cloud with App Distribution in Ivanti Neurons for UEM

Deploying applications from the cloud can be complicated with a wrath of technical issues. With App Distribution in Ivanti Neurons for UEM, (Windows OS only) you can easily deploy applications to your users' devices with a simple package distribution. You can also take advantage of perpetual app deployment to detect and push app packages when needed. You can view deployment status of your app packages, confirming if your devices are in compliance. In this demo, we'll show you the benefits of Ivanti Neurons for UEM App Distribution capabilities and how they can help you deploy vendor and custom applications from the cloud, stage complex app installations, and keep track of software compliance.

What is ITOM? IT Operations Management Definition, Benefits, And Best Practices

IT Operations Management or ITOM is the practice that helps you manage IT service delivery. It ensures that your services are monitored, incidents are dealt with quickly and effectively, and your environment is optimized for availability and performance. In this article, we will go through ITOM’s scope of action, the main functions it covers, benefits of implementing it, and some possible challenges to consider when doing so.
Sponsored Post

AI for Customer Support and Why You Need It

Providing exceptional customer support has become a key differentiator for businesses. Customers expect quick and personalized solutions to their queries and issues. To meet these expectations, organizations are turning to Artificial Intelligence (AI) for customer support solutions. AI technologies, such as Generative AI, have revolutionized the way companies interact with their customers, streamlining support processes, and delivering superior customer experiences. In this comprehensive guide, we will explore the significance of AI for customer support, its various use cases, how to implement it, the role of Generative AI, and the barriers to overcome for its successful adoption.

A KDC/One senior system administrator shares why ADManager Plus blows his mind!

KDC/One provides beauty, personal care, and home care solutions through its worldwide presence. It used to have issues creating and terminating users and was looking for a solution to automate this process. Cedrick Tshibamba, KDC/One's senior system administrator, was mind-blown when he came across ADManager Plus and its capabilities. They are now able to schedule creating and terminating users at ease, which used to take them half a day previously.

Phishing 2.0: Anyone lose a dog?

According to Ivanti's 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing attack – despite virtually every organization getting phished last year! Today’s phishing campaigns use sophisticated social engineering techniques and the latest AI advances with devastating effectiveness, tricking your most valuable users out of sensitive information, network access and personal credentials.

How Nexthink Helps You See and Diagnose Issues at Scale

Digital Employee Experience is vital to attract and keep the best employees. A solid DEX strategy also increases employee productivity and motivation, a selling point for business leadership across the board. Yet, IT teams have less and less ability to control the factors that make up the digital employee experience. Although IT still own the devices, most of the network and applications are managed by third-party vendors.

Employee onboarding for better engagement and retention from Day 1

Only 52% of workers felt satisfied with their latest employee onboarding experience, according to a Paychex survey. That means just under half of new hires are dissatisfied and feel unprepared to start their new jobs. Nearly 40% of survey respondents found onboarding clear, 32% said it was confusing, and 22% said it was disorganized. Four out of five (80%) new hires who feel undertrained due to poor onboarding plan to quit. Poor onboarding experiences aren’t new for HR teams.

IT vs Security - When Hackers Patch for Profit | Ep.31 Security Insights Podcasts

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Micro Product Demo: Ivanti Neurons for Patch Management

Ivanti Neurons for Patch Management enables you to prioritize and patch vulnerabilities based on active risk exposure, patch reliability, and device compliance, health and risk from a single web interface. In this video we take a firsthand look at this cloud-native patch management solution and its key features and capabilities that help you better protect against data breaches, ransomware and other threats that stem from software vulnerabilities.

Practical Demo: Protect all endpoints with secure UEM countermeasures

Deploying a diverse mix of endpoints – from iOS, Android and macOS, to Windows, ChromeOS and IoT – leads to a diverse mix of security risks. Fighting those risks is nearly impossible with siloed point products, especially when your data is disparate and processes are disjointed. Join this practical demo for your dose of insider tips from our endpoint management and security experts, and experience how integrated tools minimize security risks that stem from all sorts of endpoints.

SQL Sentry Then and Now Part 2

In my first post, I talked about how SQL Sentry has taken shape over the years. Now we announced SQL Sentry 2023.3, and a lot is changing. In the past, customers could only work with SQL Sentry through an installed, Windows-based client. It’s a feature-rich interface with access to everything you need with no limit to how many users install it. But we heard our customers; they wanted a web-based interface with a simplified user experience.

3 ways to enhance digital experiences and productivity

Digital transformation is critical to enabling organizational change. In fact, 85% of CEOs recognize that digital capabilities are a strategic business differentiator and vital for accelerating revenue growth, according to IDC. IT leaders play a central role in business strategy. They’re asked to deliver digital capabilities to enhance organizational speed, agility, and innovation that leads to change and growth.

Taking the Work Out of Workflows with Nexthink Flow's Low Code Visual Designer

How automated are your automations? You (or your expert engineers) are probably spending hours on complicated PowerShell coding – writing, testing, reviewing, signing, and updating. What if there were a better way to coordinate your automations with workflows? Orchestrate multi-layer automated detection, communication, integration, and action.

3 Nexthink Flow Integrations to Help You Automate Anything, Anywhere

Nexthink’s ability to integrate with anything has long been one of the most popular aspects of our products. From your ITSM tool to Azure AD, Nexthink data can be connected across your environment – so you can act on Nexthink insights to build the best possible digital employee experience. Nexthink Flow continues our dedication to integrations by allowing for the sharing of data and actions in both directions for several key integrations.

5 of Our Favorite Use Cases for Nexthink Flow

Automation and orchestration present huge opportunities for business efficiency, time optimization, and cost savings. With Nexthink Flow, EUC teams now have the power to orchestrate full end-to-end automations that eliminate repetitive manual work and drive employee productivity. But with so many opportunities at your fingertips, it can be hard to know where to begin. Flow is a powerful orchestration engine, with incredible flexibility designed to fit diverse business needs.

Zero Trust - An Analyst's 10-Minute Perspective

Ivanti's Vice President of Solutions and Technical Marketing Crystal Miceli sits down with Forrester analyst Steve Turner to have a chat about all things Zero Trust. This webinar is designed to seek the truth when it comes to Zero Trust with an understanding that Zero Trust is a marathon, not a sprint. Plus, no conversation with be complete without providing a simple roadmap on how to get started. Topics include.

Introducing Nexthink Flow: IT Orchestration for Efficient IT

Go beyond automation and bridge the gap between monitoring and management. Real-time, AI-powered data combined with a powerful, low code orchestration engine that continuously optimizes complex workflows, monitors progress, handles exceptions, and ensures that all tasks are completed in the right sequence and with the right dependencies. By automating repetitive and manual tasks, EUC teams can optimize resource allocation, capitalize on opportunity costs, and enable EUC teams to shift-left and effortlessly maintain desired state.

What is Infrastructure Monitoring : Comprehensive Guide

Tired of being a firefighter in your IT department who is always battling issues after they erupt? Well, you’re not the only one. With IT infrastructure becoming more complex day by day, IT managers across the globe face the same challenge. But not anymore. Infrastructure monitoring tools are here to save the day by empowering IT managers to not only predict but also prevent IT infrastructure issues. But how?

3 ways to maximize efficiency with hyperautomation

Efficiency is the bedrock of success for any organization. In the continuous pursuit of streamlined operations and increased productivity, ServiceNow Automation Engine serves as a valuable asset, enabling ServiceNow platform owners and automation leaders to quickly and cost-effectively connect or automate any system, document, or task with minimal code.

Best GRC Software Options For 2024

Governance, Risk, and Compliance (GRC) are the practices that help protect your organization, ensuring that it meets its regulatory and legal requirements and operates transparently. As you can probably guess, GRC software can help you make these processes more effective and efficient. In this article, we will take a look at what these solutions look like and which are the must have software features they should include. Then we will break down the ten best GRC software solutions in the market for 2024.

Stefan Kempter on What is YaSM, Yet Another Service Management Model

In the dynamic field of IT Service Management (ITSM), innovation takes center stage through groundbreaking ITSM frameworks. YaSM, Yet Another Service Management Model, is one such remarkable approach that stands as a beacon of simplicity and adaptability. In the 69th episode of Ticket Volume, our host and InvGate Product Specialist, Matt Beran, dives into a captivating conversation with the visionary behind YaSM – none other than Stefan Kempter himself.

S2E3: Implementing visual life cycles and workflows in ServiceDesk Plus - Masterclass 2023

In this episode, we'll explore the ways organizations can streamline and automate various ITSM practices using visual life cycles and workflows. These practices include incident management, service request fulfillment, change, release, and more. You will learn how to create life cycles and workflows on a graphical, user-friendly canvas, enabling IT teams to follow organizational processes accurately and minimize errors.

S2E3: Utilizing visual life cycles and workflows to standardize ITSM practices - Masterclass 2023

In this episode, we'll explore the ways organizations can streamline and automate various ITSM practices using visual life cycles and workflows. These practices include incident and problem management, service request fulfillment, and change, release, and asset management. You will learn how to create life cycles and workflows on a graphical, user-friendly canvas, enabling IT teams to follow organizational processes accurately and minimize errors.

How to Identify Your Organization's Attack Surface

Our glossary page on attack surfaces defined the terms associated with the concept. This post provides information that'll help your organization identify its attack surface. Much like your lawn after a good rain, your attack surface will grow rapidly if left unchecked. Along with increases in attack surface size comes an increase in cybersecurity risk. That risk can’t be eliminated as attack surfaces are always evolving, but it must be carefully managed.

Enhance Your Customer Service with PagerDuty for ServiceNow CSM

In today’s fast-paced, digital-first landscape, delivering exceptional customer experience is paramount to business success. For customer service teams, that means maintaining service level agreements (SLAs) and ensuring swift responses to customer issues that can make or break your company’s reputation. Fortunately, PagerDuty has improved the way companies handle customer service teams and has built applications into ServiceNow’s CSM platform.

Planning and measuring digital employee experience - DEX, short clip

When budgets are closely scrutinized you need to justify every investment, especially the long-term one which results aren’t visible overnight. Digital employee experience (DEX), though a strategic initiative, may prove challenging to push forward without a clear roadmap or measurement of every step. During this 30min webinar we tackle how to plan your DEX initiative, step-by-step. We’ll discuss a staggered approach that instantly helps your IT and security operations, whilst improving DEX in the long term.

When should you upgrade to a CMBD

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or, is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders and end users what their cybersecurity teams will do in the next 12 months to secure their organizations.

Which Gen Is Most Tech-Savvy? A Workforce Dilemma

Part one of a four-part series covering Ivanti’s latest research. Get the full series: According to new cybersecurity research by Ivanti, the employees who are the most tech-savvy aren’t necessarily the ones we’d presume, demographically speaking. Why is that? And what are the issues it creates for an enterprise?

Red Flag Reluctance: The Risk to Cybersecurity

Part two of a four-part series covering Ivanti’s latest research. Get the full series: Keeping an organization safe means getting near-real-time information about security incidents or breaches. But new research shows some employees are less inclined than others to report red flags, which puts your business at risk. Will your employees get in touch quickly if they have a security concern?

International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries

Part three of a four-part series covering Ivanti’s latest research. Get the full series: An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level. As we’ve seen in the previous posts in this series, employee demographics and their willingness to report security risks are hidden threats to your cybersecurity posture.

Demo ITSM & ITAM The Powerful Duo

Service-desk tickets. Lost laptops. End-user complaints. Sometimes it can feel like you can barely keep your head above water. But what if you could be proactive instead of simply reactive? During this practical demo webinar you’ll learn how your IT team can gain insights they need to solve business problems proactively with IT Service Management (ITSM) and IT Asset Management (ITAM) working together.

The Ins And Outs of Software Compliance

Software compliance protects your organization from legal, regulatory, and reputational damage. Done well, it stands as a fundamental pillar of your IT Asset Management (ITAM), by helping you keep track of your software assets and manage licenses effectively. Here, we will explore what this practice entails and how it can benefit your business both from an administrative and a financial perspective.

Double Down on Your Backups

In August, a ransomware attack hit another company. Unfortunately, it hit a regional cloud provider in Europe this time, and we can call this a “critical hit.” So far, we know a virtual server got compromised and used as a jump host; from there, the attacker started to encrypt all volumes in the same domain. Based on pure luck or some profound reconnaissance, the same server migrated into a different data center and continued its unplanned job from there.

Proactively improve your DEX

A great digital employee experience (DEX) can positively impact productivity, talent acquisition and retention, security and operational agility. What if you could effectively measure and proactively optimize the experience that employees get through the devices, operating systems and applications they rely on in their Everywhere Workplace? IT and security operations teams are increasingly tasked with delivering improved DEX. However, many struggle to effectively quantify and optimize it. How do you measure the employee experience in your organization?

Fighting the Good Fight for a Resilient Digital Future

This Cybersecurity Awareness Month, cybercriminals have far too much to celebrate. Attacks are rising in sophistication and brazenness, and no company or organization is immune. We could panic. Or we could lock arms, fight the good fight and put customers first. I vote for the latter.