This article was originally published here on July 24, 2019.

IT asset management (ITAM) and configuration management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets, but focus on different things.

Configuration management can exist without IT asset management, and in fact does in many organizations as it has been in existence and in use for a much longer time. …

This article was originally published here on January 23, 2021.

Some people think that an IT service desk is the same thing as an IT help desk. It isn’t, as I’m going to explain. Sure, there are some similarities, but there are also many differences. Let’s start by exploring what a service desk is and what a help desk is.

What is an IT help desk?

A help desk is a function within an organization that is responsible for providing help to the users who contact it. A service desk also does this. The help provided by the staff of the IT help desk includes giving…

This article was originally published here on January 23, 2019.

When enterprise service management is the subject, the discussion almost always veers quickly toward technology and vendors. But success here requires more than just the best available technology.

Service management begins with business processes

Great service management technologies are designed, selected, and implemented with one overarching goal: to improve business operations. To do this, your chosen service management solutions must be driven by business processes and business goals.

This can require ventures into new areas of collaboration and cooperation between your IT and business leaders and teams.

After all, your IT people don’t — and shouldn’t…

This article was originally published here on December 05, 2017.

Virima Technologies, an innovator in data center transformation (DCT) and IT operations management (ITOM), continues to help enterprises take the guesswork out of managing today’s complex IT environments with the addition of two significant features to Virima, its enterprise-level ITAM and ITSM tool

First, Virima’s agentless discovery of network devices via Simple Network Management Protocol (SNMP) has been enhanced to include Windows, Unix, and Linux servers as well as other SNMP enabled systems. Now, more device types and their attributes can be inventoried without the need for administrative authentication credentials…

This article was originally published here on February 24, 2016.

IT services consist of many components — some you own and others you obtain from 3rd parties. Like a chain that is only as strong as its weakest link, your services are only as strong as your weakest components.

To provide service assurance to users and business stakeholders, your IT staff must understand not only how your services are constructed, but also their weaknesses.

Here we discuss some common elements that IT organizations should monitor.

Availability in the IT environment

Most components in your IT ecosystem aren’t designed to work continuously 24×7. They require backups…

This article was originally published here on February 24, 2016.

Change management is great — funneling changes through a common set of processes to ensure the proper reviews occur and your CMDB is updated; however, how do you know what your change management process is missing? It’s the proverbial question: How do you know what you don’t know? The answer: Seek another point of view. Do your IT discovery tools alert you to unplanned changes? If not, then you may need some new tools.

IT Discovery can show you what Change Management missed

If you have decent change management, then your CMDB will generate a picture of your current…

This article was originally published here on December 05, 2017.

Major incidents are a normal part of business, particularly for companies with a large dependency on technology and data.

When major incidents happen, business processes, the ability to deliver products and services to customers and/or the ability to ensure the security and integrity of company data are often compromised.

The effects of major incidents may be most immediately visible in the form of operational impacts, but the big and lasting impacts are your company’s reputation with shareholders, regulators and customers.

Managing reputational impact effectively must be a central goal of…

This article was originally published here on December 05, 2017.

Loss of company assets and employee devices can be frustrating, but when missing or stolen devices appear on your company network, the situation can become scary.

If a hacker wants to access an open enterprise like a hospital from a parking lot over WiFi, then what better device than an authenticated laptop?

Multi-factor authentication is great at providing an added level of protection to your company’s operations and data without overly impacting ease for end users. …

This article was originally published here on October 24, 2019.

IT Asset Management Tools are a must!

Incidents in your IT environment happen every day. Some are minor issues impacting a single user or a small group while larger incidents can impact an entire business function or your entire company. The goal of your incident management processes is to minimize the impact of the event on your users and your company — restoring normal activities as quickly as possible. …

This article was originally published here on December 05, 2017.

The IT asset discovery phase is the critical first stage of a data center transformation project. In a complex environment, this phase can last months, particularly if performed manually. But businesses are not static.

“Doesn’t the IT department already know what hardware and software they have, how it interacts, and which users those assets support? After all, IT supports its systems every day.”

It’s a valid question, and the answer, unfortunately, is probably “no.” …

Mike Bombard

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store