Are you really prepared to face the security challenges of the “new normality”? IT risks, company assets, data, and user access are the keys to ensuring that there are no security gaps and that the wrong people cannot access sensitive information. Now more than ever it is time to take charge of this pillar that is essential to the businesses of today, those that have changed the manual for the automatic, the paper for the screen.
Every organization looking at using network function virtualization (NFV) needs to consider monitoring. If you’re going to deploy a service, it’s really important that you know if it’s working — and what’s wrong if it’s not. That’s why monitoring — often called assurance — is a key part of every request for information, every request for proposal, every proof of concept, every NFV deal.
Here’s the challenge: the economics of on-premises monitoring are all wrong for the NFV business cycle.
We've been talking for years about running IT as a business. Multiple industry standards have taken their shot a guiding customers down this golden path, with varying degrees of success. The latest, and possibly most promising, is called IT4IT. This blog is meant as a quick introduction to IT4IT and our suggestions on how to get started.
In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.
Behind the scenes here at ServiceNow, the Knowledge Management and Multimedia teams work closely with subject matter experts to disseminate critical information to our customers. We've found that certain topics come up frequently, in the form of best practices that can help you keep your ServiceNow instances running smoothly.
IT organizations often find themselves monitoring effectively at small scale, but few have implemented solutions with the flexibility and capability to operate in elastically scaling environments.
IProject Portfolio Management provides a simplified, team-oriented approach to Project Portfolio Management and IT development by combining several individual applications. After you upgrade the instance, the default value of the Retain start on constraint on tasks after adding relations property is now set to true and cannot be changed back to false.
Part of my role, in ITSM Product Management, is delivering roadmap sessions to our customers and partners. I really enjoy this part of the job; showcasing some of the latest features that will be coming out in the next few releases (a glimpse of the future). More importantly, I love the feedback I receive and hearing how our customers are implementing their own new features and migrating applications and business services onto the ServiceNow platform. As I start to hear common themes (for example what’s ServiceNow’s position on SIAM and multi-vendor management?), I have a great opportunity to help influence our product roadmap and define priorities for our core product development teams.
I think we all understand at this point that the ServiceNow platform can do a whole lot more than just "IT". Many of you are using the platform for Customer Relationship Management and Customer Service Management. Are you really, though, using those processes as intended?
The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined brands, class-action lawsuits, and prolonged periods of finger pointing.