We’re an IT consulting company. But we specialize in helping large IT organizations that are trying to meet the service demands of a highly consumerized workforce but find themselves bogged down in the mundane, time-consuming side of IT management. We created a maturity model we call Productive IT…
Reporting is the backbone of any business initiative, and Hardware Asset Management is no exception. This video will discuss how HAMx reporting with ServiceNow gives organizations essential performance metrics that support a proactive, optimized Hardware Asset Management (HAM) practice.
Service Graph Connectors are the new best practice for populating your ServiceNow CMDB, but many factors in your environment could hinder their success. In this video, we'll use the Service Graph Connector for Armis as an example, present common pitfalls that can hinder successful imports, and we'll demonstrate the ITS Service Graph Readiness Tool as a way to report those issues and make them easier to remediate.
As an Asset Manager, are you competing for time or investment with others in your organization? Can you collect accurate information to secure the ITAM investment you need? HAMx will allow you to operate with agility, control cost and risk and gain complete visibility. We know how to get you back on track! HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn't for everyone. But it could be the solution you are looking for. Check out to see how HAMx can improve the life of an Asset Manager. Featured speakers: Chelsea Parker, Business Process Consultant Eric Pett, Business Process Consultant India Tellkamp, Partner Relationship Manager
Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Watch our On-Demand recording to see HAMx in Action: A Demo of ITS' newest Hardware Asset Management program. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn’t for everyone. But it could be the solution you are looking for. Watch our On-Demand recording for a live demo of HAMx! Featured speakers: Paul Dixon, Vice President of Sales Ben LaChance, Technical Consulting Manager more at www.itsdelivers.com/hamx
Managing your hardware assets should not be an endless battle with chaos. Neither should your Asset Management implementation. Join ITS, as we introduce HAMx; a rapid, modular Hardware Asset Management program built on ServiceNow. HAMx is best practice. Decades of experience to guide you through the labyrinth of industry standards. HAMx is prescriptive. Pre-defined objectives provide clarity, confidence, and reduced runtime. HAMx is flexible. You choose the solution that best fits your needs. HAMx isn’t for everyone. But it could be the solution you are looking for. Join us to learn more! Featured speakers: Josh Bernson, Chief Technology Officer Paul Dixon, Vice President of Sales Yvette Mathews, Vice President of Services more at www.itsdelivers.com/hamx
Join ITS and AMI as they host a discussion around how to automate tracking in ServiceNow to have employees attest to what they have and what can be returned! Many asset managers are struggling with hardware assets that went home during the pandemic. Not only do they not know what they have or where it is, but they also don’t know what or how to manage it. This webinar will help you know what your employees have, where it is, and what you need to manage the hardware life cycle. Tom Watson, CEO and founder of AMI, and Yvette Mathews, VP of Services at ITS, will demonstrate how asset managers can automate tracking in ServiceNow to have employees attest to what they have and also know what can be returned, or even what to do to get ready for the return to the office. This adds process control to your asset management and data & analytics that can help manage compliance requirements. Featured speakers: Yvette Mathews, ITS Partners, Vice President of Services Tom Watson, AMI, CEO & Founder More at www.itsdelivers.com
Watch ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your Enterprise Organization. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video, you will learn how: To reduce IT cost To minimize risk by increasing visibility into cloud-based and physical assets The Content Service Library can assist with the automation of models and product lifecycles To quickly gain a return on investment for your organization using out of the box ServiceNow solutions with HAM and SAM applications more at www.itsdelivers.com/hamx
ITS and ServiceNow discuss the management of the end-to-end digital and physical IT assets throughout your enterprise. Learn how to use the Now Platform to manage any IT asset, anywhere – whether it is hardware or software, on-premise or in the cloud, gain value in DAYS starting with SaaS applications, in WEEKS by detecting and consolidating shadow IT, and MONTHS with your largest enterprise IT spend. ServiceNow Asset Management customers have realized millions in cost savings and reduced risk across the enterprise. In this video you will learn how to: Reduce IT Cost. Reduce risk by increasing Visibility into digital and physical assets. Automate the Full Life Cycle Management of digital and physical assets. Learn more at www.itspartners.com
Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. Vulnerability remediation is an arduous process, from tracking progress through spreadsheets and hunting for patches, to manually grouping threats and validating successful remediations - managing your vulnerability response is a pain. After years of helping organizations overhaul their VR, ITS Partners looked at the top qualities of our most successful VR projects. We began to ask, “What is the essential VR workflow that would help IT and SecOps departments rapidly optimize their vulnerability response?” The answer is ITS Partners’ Prescriptive Vulnerability Response™ The team from ITS Partners discusses our new offering, Prescriptive Vulnerability Response™ (PVR). Unlike traditional VR implementations that have immense complexity and solve for multiple levels of maturity, our PVR establishes a baseline of measurable progress in a reasonable amount of time. It sets the stage for future advances in VR maturity. We use our years of experience in vulnerability management to thoughtfully craft a prescriptive VR implementation that eliminates the guesswork and delivers results, fast.
In this video Recorded Future's Senior Partner Architect, Wendy Swank, and ServiceNow's Manager, Solution Consulting ITx, Security & Risk Manager, Syra Arif, will demonstrate how to: Prioritize vulnerabilities quickly and accurately with unprecedented intelligence Automate vulnerability threat data collection Use risk scores to focus patching efforts and prevent attacks Reduce risk by monitoring relevant vulnerabilities Set up alerts for vulnerabilities that affect your tech stack Transforming all sources into actionable intelligence Vulnerability enrichment Minimize expensive off-cycle patches. Want to more about how ITS Partners, Recorded Future, and ServiceNow™ can help your organization? Reach out to us at https://www.itsdelivers.com/contact
In this video, the teams from ITS Partners and ServiceNow will discuss using ServiceNow's SecOps and SAM modules to put out fires with an exposure assessment. With the COVID-19 landscape becoming the “new normal”, attacker groups have been quick to capitalize on the chaos. Targeted campaigns are exploiting high-risk vulnerabilities, masked under the guise of the Centers for Disease Control (CDC) and the World Health Organization (WHO). How should you react? Does your security team immediately go into a fire-fighting mode? You're not alone. Organizations may take up to 3-4 weeks to scan the entire network to even know the risk exposure – with severe threats on the horizon, that's too much lost time. Eric Roberts, Business Process Consultant, Jeff Tomsik, Pre Sales Consultant at ITS, Ray Chung, Advisory Solutions Consultant at ServiceNow, and Joe Pizzo, Senior Advisory Solution Architect at ServiceNow, will explain how your team can utilize the ServiceNow Vulnerability Response & Software Asset Management modules to quickly find vulnerable systems and address risk, ahead of your attackers. more at: www.itspartners.com
As remote workforces grow, so does the demand for safe and remote delivery of IT services. For many, this is drawing attention to the fact that Macs still tend to be managed differently than Windows at the enterprise level. With the introduction of version 1.2 of our ITS Jamf Integration, compatible with Orlando and all recent ServiceNow versions, we aim to close that gap with automation and make it easier to deliver services remotely from ServiceNow to your Mac population. The ITS Jamf Integration has been able to automate the import of hardware and software data from Jamf to the ServiceNow CMDB since its initial release – Version 1.2 now also enables remote software delivery (and removal) for Macs from the ServiceNow Service Catalog. Just import policies from Jamf and use our simple wizard to convert them to catalog items. Your end-users get an easy, familiar online shopping experience for software; when they check out, the integration gathers approvals if needed and the user is automatically moved into the Jamf policy that installs the software. As economic uncertainty mounts, cutting costs is more important than ever. This is another area where we can help – the Integration can monitor software usage and remotely uninstall software that isn’t meeting usage requirements. This allows you to redistribute underused licenses instead of purchasing more, saving up to 22% on IT software spending. The software data imported by the integration also gives you great data into compliance as software audits become more common, and Cybersecurity insights into the risk profile of your end-user software vulnerabilities. In this video, we’ll demonstrate: 1) Automated import of CMDB Hardware and Software Install data from Jamf and how that can support your teams 2) Automated Software Delivery from ServiceNow Service Portal 3) Automated Software Reclamation of underutilized or blacklisted software How do your teams benefit?: 1) Cybersecurity can leverage the integration to better analyze software vulnerabilities and remotely remove problematic software 2) Software Asset Managers get accurate data to stay in compliance and reduce software spending during economic uncertainty - these SAM processes can save up to 20% on IT Software spending 3) IT Help Desk becomes more efficient with up-to-date info on user assignments and hardware configuration. 4) Automated Software Delivery frees your Help Desk from email requests and repetitive fulfillment tasks, increasing their bandwidth.
Today is about solving your organization's immediate needs and about building asset maturity into your organization over the long term. Do you know if all your users have the right hardware and software entitlements needed for work from home? Are you accounting for assets possibly outside your established process? In this video, Fritz and Yvette will answer those questions and will also discuss: Getting clarity on the challenges of managing the assets for a remote workforce Strategies you can use and actions that you can take right now? Understanding how Remote Asset Management fits into your broader Asset strategy. How to move forward with Asset management maturity Your employees are using devices that have never been used for work or a device that IT knows nothing about. These devices might not check into the network regularly or at all, and how you should handle it. Figuring out what's urgent and what is important regarding your remote assets. How you can enable more mature asset management in your organization. These foundational workloads free IT and how the best people in your enterprise should move from the mundane to innovation and how these workloads are the basis of your security program. These foundational workloads, optimizing business as usual, is the key to digital transformation. Asset management saves money and risk for hardware and software. IOT is coming, and it looks a lot like mature asset management.
Emergency Response Operations. Optimize staff and resources to support emergency response for public agencies and other organizations.
Emergency Exposure Management. Identify and manage exposure risk when an employee is diagnosed with an illness.
Emergency Outreach. Distribute information and confirm employee safety and location through email or a mobile app.
Emergency Self Report. Enable employees to report illnesses and readiness to return, and initiate workflows to help managers respond.
Installation and Configuration of ServiceNow Emergency Response Apps
The team from ITS Partners will discuss how to Optimize your CMDB for ServiceNow’s most intriguing offerings. We all know that a strong ServiceNow platform starts with a strong CMDB at its core. In this video we will hear from industry experts as they discuss CMDB principles and how to better utilize ServiceNow’s hottest offerings: Software Asset Management Professional and Security Operations. Join ITS Partners as we share the secret sauce that they have derived from companies seeing high value from ServiceNow. More at www.itsdelivers.com
Vulnerability Response is only as good as the information available to you. Better data matters because it enables better prioritization decisions and quicker remediation. RBS’ VulnDB Vulnerability Database has data on over 200,000 vulnerabilities, including over 68,000 that aren’t found in the National Vulnerability Database (NVD / CVE) which feeds most scanner tools. In this video, Jay Wigard, Product Development Leader from ITS Partners, and Jake Kouns, CISO at Risk-Based Security discuss the new VulnDB Vulnerability Integration. Developed by ITS Partners, the VulnDB Vulnerability Integration can enrich your ServiceNow Vulnerability Response program with greatly improved data and arm your analysts with the information needed to quickly mitigate vulnerability risks.
Many organizations are leveraging Jamf Pro to help manage their Macs, but they frequently experience headaches trying to import Jamf asset data into their CMDB. With our new Jamf integration, you can be up and running in minutes and simplify the process of bringing your Mac software and hardware data into ServiceNow. In this video, Jay Wigard, Product Development Lead at ITS, discusses 3 of the key productivity-driving outcomes delivered by the integration and you’ll get to see it live in action!
ServiceNow has a full portfolio to capitalize on this age old problem. In this video we'll be discussing some of the best practices around Software Asset Management (SAM), Software Asset Management Professional (SAM-P), CMDB and leveraging a Discovery tool. ITS Partners is ServiceNow’s specialized partner for SAM and SAM- P implementations. Yvette Mathews, ITAM/CMDB ServiceNow Practice Manager, will be leading the discussion around best practices for Asset Management programs. More at www.itsdelivers.com
Join us for a demonstration of ServiceNow's Phishing Response Workflow. The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network. We will also be demoing the New Security Incident Console available from the London Release. We will provide a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in “operationalizing security” by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management. More at www.itsdelivers.com
Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these. Oversights of too much information are delaying security teams ability to identify, mitigate and remediate critical incidents and aging vulnerabilities. In the last 18 months, enterprises have mobilized to take security process and procedure into a SOC workbench with a maturity plan, but the reality is a majority are still mired down in siloed dysfunction and manual or mundane processes. Automation is a dream many are simply unprepared for, meanwhile, Integration is at a high point in our time…let’s leverage it! The challenges organizations face, lie in these core areas: Ineffective collaboration between IT, Network and Security Lack of business context on critical incidents or vulnerabilities Under-processed signals versus noise from underutilized toolsets Lack of management visibility into the overall efficacy of the team ServiceNow customers are starting to change the game in “operationalizing security” by extending their leading Service Platform into the underserved areas of day-to-day incident response and vulnerability lifecycle management! More at www.itsdelivers.com
Does your CMDB look like an attic, filled with old junk and cobwebs? Do you feel like you are missing things in your CMDB? A healthy CMDB is foundational to an excellent Asset Management strategy. On this video, our SACM Lead Architect, Yvette Mathews, will share 5 easy to implement tips and tricks to improve your CMDB’s foundation, along with some best practices to follow in order to maintain it. More at https://www.itsdelivers.com
We learned a lot of lessons about protecting within the 4 walls of the enterprise, but the digital transformation is changing the game, and companies are changing how they play it. Some organizations made some real headway in their privacy programs, others are using the cloud movement to get more serious. Prioritizing protection for the various control points and what we attempt to detect and respond to is much clearer now, but another level of hard work must be done to evolve and adapt with the times. The organizations leading the way in this transformational opportunity have: Made it somewhere down the risk reduction maturity scale Are able to treat data loss prevention as another security tool Put more focus on process and the longer-term investment: people. In this video, Matt Reid, VP of Risk Management at ITS reflects on some notable moments in DLP adoption and discusses the most productive companies that we work with who are building true Insider Threat programs.
Symantec solutions are essential for helping organizations protect and detect security incidents across the enterprise. But every incident still needs a response from the organization—and in some cases, the response needs to be lightning fast. The challenge is that most companies are still responding at “people speed”—following long runbooks, relying on multiple sources of data, moving data between spreadsheets, responding to long email threads, and creating manual reports. The incident response function is a chronically unstructured and unproductive process. But it doesn’t have to be. In this video, we’ll address the challenges and dysfunction majority of organizations face responding to security incidents and events. In particular, how to operationalize Symantec tools and services in conjunction with ServiceNow Security Incident Response from ITS. Leverage our specialized expertise in helping IT break free of the mundane. Learn how at http://its.partners/2DfKNDP
18:49 clean security,operations,symantec,servicenow,secops Security Operations Incident Response allows organizations to work through Security Related Incidents as they happen in a repeatable manner. Many individuals and departments may need to be involved in any Security Related Incident. ServiceNow’s Security Incident Response allows organizations to prioritize incidents, assign remediation tasks and follow the necessary runbooks that your organization requires during any security-related incident. 6 7 full Pat McPherson cdupin@itsdelivers.com (ITS Partners)
Enterprises are increasingly under threat from sophisticated attacks. In fact, threats dwell in an organization’s environment an average of 190 days! Security teams also face multiple challenges when attempting to detect and fully expose the extent of an advanced attack. Symantec’s anticipated evolution to full-fledged Endpoint Detection and Response (EDR) is here to address this! There are a lot of enhancements in this latest version of Symantec's ATP, but we will focus on these 5 highlights in this video: 1) Endpoint Activity Recorder - Continuous visibility across SEP endpoints 2) Search, filter and retrieve events for specific endpoints - Search, filter and retrieve events for specific endpoints 3) File-less threat detection - Detect and view suspicious script and memory exploits 4) Hybrid sandboxing - Detonate files on-premises or in the cloud 5) Enhanced APIs and integrations with Splunk, ServiceNow, QRadar - Ease custom integrations and leverage pre-built components Learn more at itsdelivers.com
Let’s face it, Patch Management historically hasn’t been sexy. Despite it being a critical part of any security program, many organizations are still struggling to solve these challenges and often for good reason…it’s complicated and rife with mundane activities and tasks. What’s worse is that a majority of today’s threats are exploiting these well-known and abundant vulnerabilities almost every week. Many are still missing the basics and falling for old tricks that end up causing serious problems. Here’s the good news: a community of companies are mobilized to solve it and solve it correctly. Whether it’s process improvement, or a foundational restart of their patch program, those companies that want to change and mature, very much can. We are seeing it. Working with over 1000 clients in various industries, we have been advising companies in this area of IT for over a decade. Join Bob Rabbitt and Matt Reid, Systems and Risk Management SMEs from ITS, for a video where they will demystify this whole thing and share what the most productive companies are doing to improve in this critical, yet fundamental area. more information at www.itsdelivers.com
If you’re wondering why you still aren’t seeing the value from your DLP investment or can’t seem to move up the maturity scale, you need to watch this video. Many organizations invest in a DLP solution thinking that it will simply plug into their environment and begin preventing data loss. Not true. As with most IT investments, there is more to solving the problem than simply buying a tool. In this webinar we’ll highlight the common mistakes we see organizations make once the dust has settled with an initial DLP implementation. That said, we don’t want to just describe problems without providing solutions! As we discuss the common mistakes made when managing DLP, we’ll also describe how ITS can help you move past those issues and achieve the outcomes you have hoped and dreamed of. more information at www.itsdelivers.com
If your organization has already completed the migration to Windows 10, there’s really no reason to watch this video. Congratulations! However, if you’re unsure, stuck or frustrated, this event is for you. Like… specifically you. 2 million and counting…Over the past several months, we’ve set migrations in motion for over 2 million endpoints. This is a big enough sample size to draw some relevant conclusions and we think it’s time to raise the community consciousness around this set of challenges. If you’re a CIO and you’re not personally involved in your Windows 10 migration, you’re at risk right now. Microsoft is following through on the positions they’ve staked out and the safe havens you thought would be there are gone. Many organizations assume this migration is the same old refresh cycle they know very well, but the couldn’t be more wrong. Need more evidence to watch this video? You already know the endpoint is the number one exploit vector. Wherever end user fingertips touch, they’re going to test your security posture. Windows 10 provides you the best possible footing for security at the endpoint and we find most organizations don’t even know about all the new capabilities at their disposal.
We’ve discovered the launch codes for keeping Windows 10 in orbit in any organization, no matter what systems management solution you use. Here’s the trick – you have to be at the right level for your current maturity. Aim too low and you’ll crash and burn. Aim too high and you’ll just float away into the dark expanse of space… where no one can hear you scream. In this video, Troy Whittaker will be sharing 5 key insights that will help you navigate the significant challenges you’re already facing: 1.) Why there are no more safe havens to avoid migrating to Windows 10 2.) How understanding Microsoft’s philosophy will help you see what’s coming and how it will affect you 3.) Why the traditional on-premise approach to systems management isn’t going to work in the new Windows World 4.) What the new model for systems management will look like 5.) 2 paths forward you can take to get from where you are today to where you need to be more at itsdelivers.com
Coming out of RSA this year, we’re reminded of the saturation of security tools in the marketplace, both old and new. We all have a hangover from it. It’s easy to see how organizations innocently have taken on distractions from newcomers to the marketplace… and that’s just it; it’s become a vast marketplace. But before some shiny new toy gets your attention, make sure that your current tool set couldn’t be better optimized. Or ensure a low hanging legacy technology wouldn’t address a key gap.
What IT leaders can learn from “open world” games like Grand Theft Auto and Minecraft. “Open world” games like Grand Theft Auto and Minecraft have transformed the gaming industry and have made a huge impact on our culture because of one simple reason: They give players freedom and control over how they play. Instead of a linear, structured track controlled by the game developers, players can choose their own path and approach. The equivalent transformation is happening in IT––end users expect freedom in how they work. This new era is bogging down IT Management teams–the status quo isn’t working. Learn how other IT leaders are dealing with the challenge of keeping users productive AND protected. What IT leaders can learn from games like Grand Theft Auto and Minecraft How the productivity demands of digitally-savvy users are changing IT Management Why IT Management is more critical than ever – understanding the rising challenges and costly implications Top reasons why so many IT Management teams are bogged down and struggling to manage everything The 7 key doctrines of IT management followed by the most productive teams on the planet
Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This video will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, this one hour video will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative. Presenters: Yvette Mathews, Senior Consultant, ITAM, ITS Partners Patricia Adams, ITAM Evangelist, LANDESK
In this quick demo, Pat McPherson of ITS Partners, shows how Data Loss Prevention Form Recognition allows organizations to detect sensitive information that is contained on forms in a variety of image formats. Learn more at: https://www.itsdelivers.com/solutions/it-risk-management/
Productivity, not visibility, is the key to maturing risk management. Obviously BigFoot is not happy about the drone bothering his family. Learn more about our IT Risk Management team today.
In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment. Advanced Threat Protection - Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console. Download our ATP whitepaper at https://www.itsdelivers.com/white-paper-the-arms-race-to-stop-advanced-threats/
Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015. Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before. Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk. While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing. Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners. Learn more at www.itsdelivers.com
Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when. Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen:~ Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR)~ 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report)~ On average, data breaches were detected 243 days after they happened (Source: Ponemon)~ And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report) Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!
THE CHALLENGE:Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organizations lack the automation and integration to meet these expectations, instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION:ITS Partners solves this issue with an Actionable Integration between ServiceNow and Microsoft SCCM. This integration automates the SCCM software delivery and client actions from ServiceNow. The integration is compatible with SCCM 2007 through 2012 R2. Automation occurs by executing a SCCM software delivery and client actions from a Service Catalog Software Request or from a link on a form. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. ServiceNow Orchestration is not a requirement. Features of the Actionable Integration: ServiceNow to SCCM1) Execute SCCM software delivery and client actions on computers managed by SCCM and imported from SCCM2) From a link within an Incident record3) From a Service Catalog Item request for Software with automated task deliver from SCCM More info: itsdelivers.com/integrations/servicenow-to-sccm/
Are you implementing with compliance in mind, aiming to protect information? Will it go beyond VPN and embrace the mobile workforce? How do you avoid burdening the IT staff or end users? The consequences of inadequate security are pretty well understood today. Penalties for regulatory noncompliance, loss of confidential information or damage to brand are also top concerns for organizations. But, while many organizations are locking doors with security safeguards such as firewalls and IDS, they are inadvertently opening windows to corporate information via mobile devices, rogue clouds and web 2.0 apps. A 2FA solution must not only provide high levels of protection, it should be adaptive, easy to manage as well as easy to use. In this webinar we’ll dive deep into the 3 key things you should consider when attempting to solve the challenges of strong authentication for your organization. Solution Spotlight will be Validation and Identity Protection (VIP), a market leading 2FA solution offered by Symantec.
THE CHALLENGE Advancements in consumer product and delivery experiences have set high expectations for corporate IT. Today’s employees expect the service desk to know everything about everything connected to the corporate network, and to provide real time delivery on requests. The employees are often disappointed by opaque handoffs, unexplained delays, and lack of consistency. IT’s default solution is to task more people with more work, which usually exaggerates the issues rather than alleviating them. Simply put, IT is over-worked and under-automated. One specific example of this problem is the request and delivery of software to employees. The current online shopping experience that employees use sets an expectation of immediate product delivery upon request. However, most IT organization lacks the automation and integration to meet these expectations; instead they rely upon manual action to fulfill the employee’s request. THE SOLUTION ITS Partners solves this issue with an actionable integration between ServiceNow and Altiris. This integration allows for the import of Altiris Configuration Item data into ServiceNow as well as the automation of Altiris tasks called from ServiceNow. The integration is compatible with Altiris 7 to 7.5. Import Altiris Computer Configuration Items (CIs) along with related drives, network adapters and installed software. The import utilizes ServiceNow Import Sets and runs on a schedule. The CIs are imported to the ServiceNow CMDB in the following classes: Computer, Disk, Network Adapter and Software. Automation occurs by executing an Altiris task from a link on a form or from a Service Catalog request. Automation examples include triggering computer reboots from an Incident or automatically installing software upon a Service Catalog request. This uses a web service call and ServiceNow Workflow to call Altiris. ServiceNow Orchestration is not required. Features of the Actionable Integration: ServiceNow to Altiris: *Import Core Data – Computers Data from Altiris 7.5 *With related Installed Software, Physical and Virtual Disks, & Network Adapters *Execute Altiris tasks on Computers managed by Altiris and imported from Altiris *From a link within an Incident record *From a link within a Computer record *From a Service Catalog Item request for Software with automated task deliver from Altiris
In this instructional video, Rasmus Ronlev shows you how to perform an upgrade to Windows 10 from Windows 7, 8 or 8.1 using System Center Configuration Manager (SCCM).Learn more about our approach and offerings at itsdelivers.com/microsoftCheck out the following articles for more detail:Blog on what’s new with Win10 deployment and Provisioning packagesadameaddy.wordpress.com/2015/07/30/whats-new-in-windows-10-deployment/Blog on different methods for applying provisioning packagesadameaddy.wordpress.com/2015/07/30/applying-windows-10-provisioning-packages/ Blog/Vid on ICD Provisioning Packageadameaddy.wordpress.com/2015/07/31/creating-and-applying-a-windows-10-provisioning-package/
Get to know some of the team members here at ITS on the Managed Services Team including Cory Grant, Jacob Crawford, Mikhail Brunes and Brian Whitacre. For more information, visit itsdelivers.com
Discussion around Symantec Endpoint Protection modules and layered security to better protect your environment. For more information, visit www.itsdelivers.com
In this video, Will VanderLinden and Jake Crawford will demonstrate the System Lockdown component of Symantec Endpoint Protection 12.1.6, and show you how to implement a simple application whitelisting policy for your organization using SEP 12.1.6. For more information visit www.itsdelivers.com
Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications. Learn more at www.itsdelivers.com
How you as a user can make minor changes to ServiceNow lists using Filters, Breadcrumbs, and Personalized List Columns so that you see exactly what you need to get your job done. This video covers: Defining a ServiceNow List Filters and Filter Examples Breadcrumbs Creating a Filter Quick Filter Custom Filter List Search Column Search Saving a Filter Personalizing List Columns
Where exactly IS your Organization in the lifecycle of risk reduction? Is it moving forward? Is your DLP program addressing key areas of risk? How would you know? Are your users embracing security and learning more about how they interact with information assets? Has your DLP program been able to plan and anticipate change? What about cloud? If you’re answering yes to any of these questions, you need to watch this video! With all of the pressures on IT Security teams today, it’s understandable how a DLP program can fall of course or “get stuck”. A comprehensive data loss prevention (DLP) solution is built on a structured, risk-based approach to develop, tune, and expand policies and protection for the company’s sensitive information. Couple that with effective remediation of violations and monitoring of metrics to demonstrate decreased data loss risk back to the business, and you have achieved the right goal. In this video we’ll further explain the common pitfalls or missteps in a successful DLP rollout and share strategies around proper coverage, communications, policies, remediation and metrics.