Blog

The blacklist of company security

Posted by SilverStorm on Oct 9, 2020 8:30:00 AM

Are you really prepared to face the security challenges of the “new normality”? IT risks, company assets, data, and user access are the keys to ensuring that there are no security gaps and that the wrong people cannot access sensitive information. Now more than ever it is time to take charge of this pillar that is essential to the businesses of today, those that have changed the manual for the automatic, the paper for the screen.

Read More

Topics: security, company, blacklist

Don’t Monitor NFV With On-premises Software

Posted by Zenoss on Jun 8, 2018 12:23:14 PM

Every organization looking at using network function virtualization (NFV) needs to consider monitoring. If you’re going to deploy a service, it’s really important that you know if it’s working — and what’s wrong if it’s not. That’s why monitoring — often called assurance — is a key part of every request for information, every request for proposal, every proof of concept, every NFV deal.

Here’s the challenge: the economics of on-premises monitoring are all wrong for the NFV business cycle.


Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

Running IT as a Business using IT4IT and ServiceNow

Posted by ServiceNow on Jun 6, 2018 11:30:54 AM

We've been talking for years about running IT as a business.  Multiple industry standards have taken their shot a guiding customers down this golden path, with varying degrees of success.  The latest, and possibly most promising, is called IT4IT.  This blog is meant as a quick introduction to IT4IT and our suggestions on how to get started.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

GDPR Compliance and Your Zenoss Deployment

Posted by Zenoss on Jun 1, 2018 9:30:37 AM

In the article “Data Masking as Part of Your GDPR Compliant Security Posture” over on DEVOPSdigest, Zenoss talks about how to mitigate your application’s level of compliance by employing data masking or other pseudonymization techniques of personally identifiable information (PII) like names and email addresses. Zenoss suggests giving it a quick read to better understand how that strategy relates to GDPR.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

Best practices for implementing the Incident Management application

Posted by ServiceNow on May 25, 2018 10:22:46 AM

Behind the scenes here at ServiceNow, the Knowledge Management and Multimedia teams work closely with subject matter experts to disseminate critical information to our customers. We've found that certain topics come up frequently, in the form of best practices that can help you keep your ServiceNow instances running smoothly. 

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

Winning at SCALABILITY With Software-Defined IT Operations

Posted by Zenoss on May 11, 2018 10:53:59 AM

IT organizations often find themselves monitoring effectively at small scale, but few have implemented solutions with the flexibility and capability to operate in elastically scaling environments.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

ServiceNow® Project Portfolio Management product enhancements and updates in the Kingston release.

Posted by ServiceNow on May 10, 2018 2:53:48 PM

IProject Portfolio Management provides a simplified, team-oriented approach to Project Portfolio Management and IT development by combining several individual applications. After you upgrade the instance, the default value of the Retain start on constraint on tasks after adding relations property is now set to true and cannot be changed back to false.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

ITSM ServiceNow, improving the user experience

Posted by ServiceNow on Apr 26, 2018 3:50:25 PM

Part of my role, in ITSM Product Management, is delivering roadmap sessions to our customers and partners. I really enjoy this part of the job; showcasing some of the latest features that will be coming out in the next few releases (a glimpse of the future). More importantly, I love the feedback I receive and hearing how our customers are implementing their own new features and migrating applications and business services onto the ServiceNow platform. As I start to hear common themes (for example what’s ServiceNow’s position on SIAM and multi-vendor management?), I have a great opportunity to help influence our product roadmap and define priorities for our core product development teams.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

Using ServiceNow for CRM That Isn't CRM

Posted by ServiceNow on Mar 23, 2018 9:31:28 AM

I think we all understand at this point that the ServiceNow platform can do a whole lot more than just "IT".   Many of you are using the platform for Customer Relationship Management and Customer Service Management.  Are you really, though, using those processes as intended?

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security

Who should be responsible for cybersecurity?

Posted by David de Matias Batalla on Mar 14, 2018 9:00:00 AM

The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout become increasingly familiar: broken trust, ruined brands, class-action lawsuits, and prolonged periods of finger pointing.

Read More

Topics: CIO, Technology, Cloud, CEO, Digitaltransformation, ServiceNow, servicemanagement, devops, security, cyber security, CISO

Subscribe to Blog

Recent Posts

Posts by Topic

See all