Operations | Monitoring | ITSM | DevOps | Cloud

January 2024

What is ServiceNow AIOps?

Could ServiceNow’s AIOps be the solution to anticipate incidents better, minimize events, and slash your resolution time? When deployed correctly, this popular AIOps tool offers many benefits to IT operations teams. We’ll explain everything you need to know to understand ServiceNow AIOps, its main product features, benefits, and common use cases. Discover how AIOps outperforms traditional IT operations tools in today’s dynamic IT environment.
Sponsored Post

Revolutionizing the Digital Employee Experience: Almaden and Selbetti Join Forces in MSP Partnership

In the ever-evolving landscape of digital employee experience (DEX), staying ahead of the curve is not just a competitive advantage but a necessity. Almaden, a pioneer in DEX solutions, is thrilled to announce its exciting new Managed Service Provider (MSP) partnership with Selbetti, a leading player in the managed IT services industry. This strategic alliance is set to reshape the DEX landscape, enhancing the way businesses empower their workforce.

Continuous Monitoring Best Practices

In today’s dynamic digital landscape, where security breaches pose great financial threats, adopting the best monitoring practices becomes a strategic necessity for your business. By safeguarding your business from security vulnerabilities, software bugs, and potential risks, continuous monitoring for cybersecurity lays a strong foundation for the sustained growth and success of your organization’s security.

5 Ways to Tackle Digital Transformation With ITSM

IT Service Management (ITSM) is a fundamental piece in your digital transformation puzzle. In short, it provides a structured approach to managing digital services, ensuring they align with your organization’s digital transformation goals. When embarking on such a journey, you will be leveraging different technologies to improve and optimize business processes, enhance customer experiences, and drive overall organizational efficiency.

Elevating DEX: Nexthink's AppLearn Acquisition Marks a New Era

In the early days of Nexthink we had a whimsical way of articulating what we were working to achieve. “We want to develop a kind of digital guardian angel,” we’d say, “sitting on the shoulder of the employee, ensuring they are getting the most out of every working hour: productive and enjoying their work, without sacrificing a single minute to IT issues or application problems.".

Ivanti Neurons for MDM: Protecting Samsung Devices from Phishing #shorts

A Samsung device is safeguarded by registering it to Ivanti Neurons for MDM with an activated threat defense. The Android work profile container uses Tunnel, which is powered by a Cloud-based anti-phishing engine. Google Chrome and Firefox are used to access a feed of malicious links, but the on-device URL handler and the Cloud-based lookup engine successfully block all phishing attempts.

Question Time: GenAI for Customer Experiences | ServiceNow

Yes, generative AI is a BIG deal. Brian Solis, head of global innovation at ServiceNow, shares how every organization is going to have to reimagine their business for an AI-first world. Plus, get some practical examples of how AI can improve the customer experience (like giving people what they want before they even know they want it!). Take Brian’s advice and allow your curiosity to run wild — reply in the comments with creative ways you plan to use #GenAI.

Question Time: GenAI for Developing on the Now Platform | ServiceNow

Sometimes you have to see it to believe it. That was the case for Tom Freeman, a self-proclaimed generative AI skeptic and director of technical marketing here at ServiceNow. Tom sits down to answer questions about how genAI will impact developing on the Now Platform, the value of our large language model, and what’s coming next in this space. See it to believe it.

Question Time: GenAI for IT | ServiceNow

The consensus is in: Generative AI is a game-changer. Rajeev Sethi, VP of digital technology and emerging technologies at ServiceNow, discusses how genAI can improve KPIs across the business from employee satisfaction to mean time to resolution (MTTR). Now, we turn the question to you — what are some ways your workplace is using generative AI?

Question Time: GenAI and the Future of Work | ServiceNow

AI isn’t new to ServiceNow — we’ve been innovating in the space for nearly a decade. ServiceNow’s Chief Transformation Officer Kelley Steven-Waiss shares how generative AI will help employees focus on the work that matters most, get the right insights, and take the right actions. Watch until the end for her personal favorite way to use Now Assist. Now it's your turn in the hot seat — Have you discovered any innovative uses of AI at work? Drop your knowledge in the comments.

MSPs and AIOps: How to get the best of both worlds

MSPs and AIOps, how can we combine both to get the maximum positive result out of any situation? The IT ecosystem has undergone a major change in recent years. Cloud computing, distributed architectures, and a constant evolution of technologies have made it increasingly complex and dynamic. Human oversight alone is no longer sufficient to monitor, manage, and troubleshoot this ever-evolving landscape.

Innovator Preview: Ivanti Neurons for Patch Intune

In this conversation, Charity Tieri discusses two new features related to Patch for Intune. The first feature is the value of third-party patching through Patch for Intune, which provides time and resource savings for organizations using Microsoft Intune. The second feature is scopes in Microsoft Intune, which allows large organizations to operate in silos while sharing the same Microsoft Intune tenant. The third feature is custom application publishing, which enables users to publish applications that are not available in the catalog through Patch for Intune.

Dell Warranty Check: How to do it - And How to Automate it

If your company’s IT infrastructure includes Dell devices, then you need to find a way to do Dell warranty checks efficiently. Sure, you can do it manually, computer by computer. But if you have just received a large batch of them, you can be looking at various days of work ahead.

Continuous Monitoring: A Definitive Guide

Continuous monitoring is the backbone of staying ahead in your business, maintaining a constant watch on your company’s activities. It adapts to the demanding needs of modern times, whether for compliance checks, continuous control, and infrastructure monitoring or defending against cyber threats. However, before the widespread adoption of continuous monitoring, companies relied on periodic audits, manual assessments, and sporadic checks to monitor their systems.

How IT Managers and MSPs can drive transformation with Remote Monitoring and Management (RMM)

Managing multiple vendors in an IT ecosystem can be daunting and fraught with risks. From the complexities of contract negotiations and renewals to the compliance challenges, the process is often time-consuming. In such a scenario, RMM Tools can help, a unified, scalable solution that can streamline various aspects of IT and network infrastructure, reducing the administrative burden and enhancing operational efficiency.

Innovator Preview: Ivanti Neurons for RBVM, ASOC, Patch Management, & Patch Intune

In this conversation, Chris Goettl provides an update on the upcoming release features and demonstrates them. The release focuses on Linux support, with enhancements for Mac OS and Windows patching as well. Chris explains the content-based approach for Linux and the challenges it presents. He also discusses the ability to exclude patches via patch group and the configuration of Linux repositories. Additionally, he covers the Mac OS Sonoma support and the new always reboot option. The conversation includes demonstrations of Patch Intelligence, endpoint vulnerability, and patch configuration for Linux and Mac OS.

Understanding RBVM & Application Security Orchestration & Correlation

The video introduces Risk-based Vulnerability Management (RBVM) and Application Security Orchestration and Correlation (ASOC), tools that integrate third-party data into a SaaS platform for threat analysis and risk scoring. It highlights recent improvements, new export capabilities, UX updates, and custom attributes for data uploads. It also explores the vulnerability response feature, which integrates RBVM and ASOC with ITSM for automatic ticket creation and security incident syncing, and the RBVM and patch integration for CVE analysis and patch management.#Risk-based Vulnerability Management, #Application Security Orchestration and Correlation, #ITSM integration, #patch management, #CVE analysis.
Sponsored Post

Best Service Delivery Management Software for 2024

When it comes to finding the best service delivery management software, you should gravitate toward platforms that offer a full range of features for team members. Effective service delivery management software will equip teams with everything they need to hit the ground running on projects and make rapid progress in no time at all. StartingPoint is one such example of an all-encompassing platform.

Understanding Network Topology: Types, Best Practices

When you Google ‘Topology,’ it’s defined as ‘the way something is arranged or interconnected’. A similar definition extends into the digital world, especially in a computer network. Network topology is the structure and arrangement of the network and its devices. The question is- why should you care about network topologies? The answer is that your whole work depends on the digital realm in this era, and you want everything to run smoothly.

Innovators Preview: Security Enhancements and Upcoming Events

The innovators preview introduces security enhancements and upcoming events. It highlights opportunities for innovators, including a UX research team session and challenges to share 2024 goals. The preview also announces events like the Avanti neurons innovator preview and the Ivanti Solutions Summit. It discusses Q1 enhancements, including Ivanti neurons for RBVM and ASOC, patch management, and neuros patch management. The preview covers topics related to Linux flavors, testing, security levels, Linux patch configuration, scoping feature, and custom application publishing.

Innovators Preview: Exploring New Features and Enhancements in UEM

The Innovators Preview event offers a comprehensive look at the latest developments in Unified Endpoint Management (UEM). The discussion ranges from product management and OS platforms to updates for Android and Apple devices. Key topics include 5G slicing, carrier support, app configurations, and account-driven device enrollment. The shift to declarative management and the transition from CentOS 7 to Oracle Linux 8 are also highlighted.

How to successfully implement an inventory management software?

For inventory management software to reach its full potential and meet the specific needs of your business, a well-designed and well-executed implementation is essential. This article will provide a step-by-step guide to the successful implementation of inventory management software while emphasizing the importance of customer onboarding.

How to Conduct an IT Audit in 2024

Is your organization looking to up its IT audit game? Conducting it successfully will help you ensure that your IT systems and processes are secure, they comply with relevant regulations and standards, and are aligned with your overall goals and objectives. This practice lies at the core of your IT Asset Management (ITAM) strategy, guaranteeing a robust, safe, and well-managed IT environment across your operations.

Observability vs. Monitoring: Decoding Key Distinctions

In the evolving digital landscape, transformation has become a necessity for businesses in order to stand out and remain competitive. As per stats records, around 91% of businesses use digital technologies and platforms to run their business more successfully. With excessive dependency on digital technologies, there also comes the challenge of navigating through the complex web of dependencies and interactions.

How to Check Lenovo Warranty (And How to Automate it!)

Warranty Management is crucial to the lifecycle of IT assets since it helps you optimize device usage, plan for replacements, and manage your IT budget effectively. In this sense, if your organization has Lenovo laptops and servers as part of its IT inventory, consistent Lenovo warranty checks are a mandatory step in your IT procurement plan. Luckily, the brand offers a straightforward process for checking the warranty status of your laptops.

Warranty Management: How to Automate Hardware Warranty Checks

Warranty Management systematically administers warranties and maintenance contracts for an organization's hardware assets. This practice is also crucial to hardware maintenance and your IT budget since keeping a constant eye on them will contribute to using them when needed (instead of paying for fixes). Now, checking warranties manually leaves too much room for human error. But once again, automation saves the day.

Emerging AI use cases in ITSM Knowledge management, chatbots and self-service

AI experts Louis Columbus and Susan Fung explore AI use cases in IT service management, highlighting how a symbiotic relationship between AI and human intelligence amplifies knowledge management capabilities and enhances user experiences by providing direct answers that synthesize complex information.

11 Best Incident Management Software in 2024

Including Incident Management software in your IT Service Management (ITSM) strategy has become a critical tool for maintaining the seamless operation of business IT systems. This technology isn't just about putting out fires; it's about keeping the digital pulse steady and strong. When IT hiccups occur, this software steps in with a systematic approach to fix it, so that such interruptions don't further interfere with your organization's operations and potentially cause downtime or financial losses.

Hybrid Cloud Monitoring: The Ultimate Guide to Benefits

In the fast-moving tech world, your business faces two main challenges: maintaining control of in-house servers and harnessing the flexibility of cloud computing. It is where “Hybrid cloud monitoring” emerges as a torch bearer, guiding your organization through the complexities of a dual environment. A hybrid cloud monitoring solution functions like the control centre for your business’s digital operations.

Forms in the Velocity Platform: A Guide by Ivanti Wavelink

Josh from Ivanti Wavelink guides us through the use of forms within the Velocity platform. He shows us how to initiate the demo and use the pre-shift checklist for forklift inspections. He also highlights how digitized forms can streamline workflows, facilitate data analysis, and enhance existing WMS processes, ultimately boosting efficiency.#IvantiWavelink #VelocityPlatform #Forms #WorkflowEfficiency #DataAnalysis.

Modernize your ITSM with the New PagerDuty Application for ServiceNow

We live in an always-on world, where things move fast and break often. Building stronger resilience is critical for operational efficiency and delivering great customer experiences. CIOs have heavily invested in ITSM solutions, but a centralized, queued approach is no longer meeting the needs of modern organizations when it comes to critical, customer-impacting issues.

What are the Latest Asset Management Trends in 2024?

In today's digital age, technology is advancing at an unprecedented pace and the internet has made it possible for everyone to stay connected. This has not only created new opportunities for asset management but has also brought new challenges. In order to maintain compliance and make informed decisions based on accurate data, it is crucial to stay up-to-date with the latest trends in asset management. In this blog, we will explore the latest asset management trends that are shaping the industry.

Enhance Employee Engagement with Parametric Campaigns

In today's digital workplace, IT-employee engagement is crucial for communicating timely information, fixing issues collaboratively, and understanding employees’ experience with technology. At Nexthink, we have met this evolving need with our investments in engagement campaigns. And now, we are pleased to introduce the newest innovation to connect IT and employees: parametric campaigns.

4 GRC Automation Ideas to Protect Your Organization

Keeping up with Governance, Risk, and Compliance (GRC) requirements within an organization can be challenging, as it involves a range of practices that go from meeting regulatory standards to addressing cybersecurity threats. In this context, incorporating GRC automation becomes essential to streamline overall protection and compliance.

Creating Conditional Emails Using Forms: A Step-by-Step Guide

This guide walks you through the process of creating conditional emails using forms. It starts with creating a new forms template and providing server credentials. The form builder is customized by adding fields like check boxes and a picture field. The scenario builder is then set up to send emails based on the form inputs. The form template upload is verified and the forklift checklist is run through, followed by form submission and email confirmation check.#ConditionalEmails #Forms #FormBuilder #ScenarioBuilder #EmailConfirmation.

AIOps in Telecom Industry: Challenges, Benefits, and Use Cases

The telecom industry is rapidly evolving, with network operations becoming increasingly complex. To navigate this complexity, telecom operators are turning to Artificial Intelligence for IT Operations (AIOps) solutions. AIOps combines artificial intelligence, machine learning, and big data analytics to optimize network performance, enhance customer experience, and drive business outcomes.

The Future of Compliance: 10 Trends to Look Out For in 2024

The future of Compliance Management will bring transformed practices and shifts towards new areas of focus. Looking ahead and incorporating them into your strategy will help you guarantee your organization meets its regulatory requirements and avoids harmful consequences. We already explored the upcoming ITAM trends , and now it’s time to zoom in a little further into regulation frameworks and security practices with these the top ten 2024 compliance trends.

What is ITAM? The ABC of IT Asset Management

IT Asset Management (ITAM) is the process of planning and managing the entire lifecycle of all IT assets. In other words, it's the framework that allows organizations to keep track of all their software and hardware from acquisition to disposal, ensuring that nothing falls through the cracks and that they don't waste money in the meantime. The primary goal of ITAM is to optimize the value of an organization's IT investments while minimizing the risks associated with their use.

Applying the 7 Guiding Principles of ITIL 4 to the Service Desk

You may be familiar with the 7 guiding principles in the ITIL framework. You may not be as familiar with how you could apply the principles in your service desk configuration. Here are some common service desk scenarios demonstrating how to practice these guiding principles in your organization.

Cloud Network Monitoring: Ensuring Visibility in a Distributed World

As businesses transition to the cloud, the need for strategic implementation of Cloud Network Monitoring has become essential. This is because IT managers and CIOs across organizations are looking for robust real-time monitoring, performance optimization, and security vigilance for their distributed network. If you’re also thinking of cloud networking monitoring and want to know more about it in detail, continue reading this article further.

Navigating Android's Scoped Storage with Velocity File Assistant

Android's scoped storage feature limits app access to file storage locations, creating difficulties for file management, particularly for MDM apps. Ivanti Velocity encounters problems with MDM clients on newer Android versions, and upgrades can impact file access. The Velocity File Assistant resolves these issues by relocating configuration files to accessible locations, checking specific directories, and copying files as needed. However, it requires file permissions to operate effectively.