Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Analytics Plus webinar: How do you measure the business benefits of IT initiatives?

IT is often viewed as an indispensable but challenging expense for a business. Despite continued efforts to resolve issues, streamline operations, and contribute to the organization's overall functionality, IT teams often fail to receive the recognition they deserve. The struggle lies in shifting the perspective of IT from a mere cost center to a significant contributor to business productivity. By leveraging analytics-driven insights, IT managers can effectively communicate and substantiate the value of IT operations in terms of business impact and ROI.

Getting started with ServiceDesk Plus Cloud - Masterclass 2024

In the first episode of Masterclass 2024, you can learn how to setup the basic and essential configurations to get started with ServiceDesk Plus Cloud. Also, during the session, we will showcase simple steps to configure your mail server in the application, setup simple customizations, and implement automation like technician auto-assign.

Analytics Plus webinar: 5 quick steps to drive service desk cost optimization

There's no getting around it—running a mature service desk is expensive. Naturally, a service desk's allocated budget and its yearly expenses are under immense scrutiny, with frequent calls to curtail spending. The good news is, optimizing service desk expenses is straightforward and effortless with analytics-driven service management. IT leaders can eliminate budget wastage, streamline asset management, and enhance service desk operations.

Assessing Biden's recent executive order on A.I.

In October 2023, President Biden issued an executive order on artificial intelligence. The order requires developers of dual-use foundation models (LLMs that pose security risks) to perform red team tests and provide regular reports to the U.S. Department of Commerce. Enterprise analyst John Donegan covers the order's nuances, assessing its positive aspects while also highlighting where it falls short.

PAM Masterclass - Episode 1: Privileged account governance and remote password reset

In the first episode of our masterclass series, we will extensively cover how to discover and onboard all your privileged users and resources in PAM360. We will discuss how you can manage granular access to resources based on user roles and privileges. Additionally, we will delve into the password rotation capabilities of the product, ensuring compliance with both built-in and custom policies and demonstrating how it automatically resets passwords for a wide range of remote resources.

S2E5: Ask Me Anything" (AMA) session with ServiceDesk Plus Cloud product experts - Masterclass 2023

In this episode, we will discuss the latest features and enhancements released in ServiceDesk Plus Cloud followed by the AMA session with Sriram K S, global head of customer success, and Srinath Venkatachalam, global head of product support.

AIOps in IT analytics feat. Rakesh Jayaprakash

Data analytics is essential for an IT department to ensure that its infrastructure is running smoothly while also saving money for the company. In this episode, Rakesh Jayaprakash, Product manager at Analytics Plus, discusses how the application of AIOps and analytics, is transforming how IT operations are managed.

UPS Solutions augments its productivity by implementing ManageEngine OpManager

IT being the backbone of its business, UPS Solutions adopted ManageEngine OpManager to discover and manage its IT infrastructure. Shohel Khan, IT DC solutions manager, says that OpManager is a nimble and efficient system that swiftly and automatically does the job for you from device discovery to security. The company relies on ManageEngine products to carry out IT operations, because they are agile and powerful.

Analytics Plus webinar: Catch critical signs of vulnerable security protocols

Security is all about addressing every potential vulnerability and creating formidable barriers to deter malicious actors from breaching your sensitive data. Given the multitude of vulnerabilities that need attention, security professionals often find themselves inundated with tasks. It's not just a matter of strengthening your infrastructure; it's about ensuring that every potential entry point is securely sealed to thwart malicious actors' attempts to compromise your infrastructure.