Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Service Management, Service Desk and related technologies.

Find Any Setting in Seconds #admin #search

Find any admin setting instantly! With Smart Search, locate where to manage users and roles, set branding, tweak specific workflows, or adjust any other setting in your Alloy Navigator -- in seconds. Perfect for admins who want full control right from their browser and love speed. Admin Search and other great features arrived in the Fall 2025 release of Alloy Navigator, for both Enterprise and Express editions.

Why Choose an Inventory Management Software with a Mobile App and Barcodes?

Inventory management is at the heart of every organization’s operations. Yet many companies still rely on Excel files or manual processes to track their equipment, tools, or materials. These outdated methods often lead to errors, losses, and a lack of visibility. Today, inventory management software with a mobile app and barcode system allows you to centralize and automate asset management while making operations faster and more reliable.

Why SELinux Matters in Enterprise Security

When evaluating cybersecurity products, it's easy to focus on surface-level features like dashboards, alerts and integrations. But real strength often lies more deeply, in the architecture itself. One embedded capability that demonstrates rigorous security design principles is Security-Enhanced Linux (SELinux). Originally developed by the U.S. National Security Agency (NSA) and released to the open-source community, SELinux is a mandatory access control (MAC) framework built into the Linux kernel.

Measuring Clicks Is Not Measuring Productivity: The Misconception Behind "Screen Time" Metrics

In recent years, some organizations have adopted metrics such as inactivity time and the number of clicks to assess productivity. But does this truly reflect how productive an employee is — or merely how closely they are being monitored? At first glance, it might seem like a reasonable approach: if someone goes a long time without clicking, perhaps they’re not working.

AI-Driven IT Cost Management: Aligning Spend with Strategic Value

Optimizing IT costs is now the top priority for IT teams, according to Ivanti’s 2025 Technology at Work Report. Our survey found that cost optimization was cited as a critical strategic goal for 2025, outranking improving cybersecurity, investing in infrastructure and deploying AI / ML technology.

Live in Boston: Data, DEX, and a Few Fist Fights @ Nexthink Experience

Tim and Tom host another special live edition of The DEX Show, this time from the Omni Boston Hotel, recorded during last week’s Experience Boston. Joined by Christina Lahr (Bayer), James Krick (Campbell’s), and Ryan Way (Warburg Pincus), the hosts dig into more real-world stories of data-led IT excellence, once again in-person. In between, listeners can learn a few unexpected facts about Tim — has he ever been in a fist fight, starred in a play, or been thrown out of a bar? Listen now to find out...

What's New in Ivanti's Exposure Management and Endpoint Security Portfolio

To view the schedule for upcoming meetings, Click here. The agenda includes updates on endpoint security, EPM, Neurons, and EASM. Key features for EPM include Windows ARM support and improved management options. Upcoming 2024 features are discussed, along with enhancements in security controls and package visibility. Neurons improves patch management capabilities. Feedback from RBBM and ESM leads to new onboarding widgets and enhanced report generation. Community scanning and advanced filtering functionalities are also introduced.

Webinar Highlight: Unleashing ITSM, ITAM, and Discovery for Unstoppable IT Operations

Discover the top challenges impacting IT teams today—from automating manual tasks and managing complex integrations, to improving visibility and controlling costs. See how uniting service management, asset management, and discovery delivers greater transparency, streamlined workflows, and proactive, value-driven IT operations.

Unpatchable Vulnerabilities: Key Risk Mitigation Strategies

Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete? That’s not the world we live in. Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.