Blacklisting weak and exposed passwords is crucial.

Blacklisting weak and exposed passwords is crucial. Read this business case to learn why blacklisting weak and exposed passwords should be a critical part of making sure your organization’s password policy is successful: Specops Password Policy Business Case Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use…

The King Price IT Service Desk – Underpinning Customer Experience.

The King Price IT Service Desk – Underpinning Customer Experience. Today’s modern business is delivered on a platform of increasingly sophisticated technology powering operations across the organisation and usually resulting in an intimate interface with the customer that allows for the participation in the fulfilment of the service required and delivered. These days, time constrained…

5 Reasons Why Implementing ITSM is More Critical Now Than Ever Before.

5 Reasons Why Implementing ITSM is More Critical Now Than Ever Before. IT Service Management (ITSM) is the most widely followed paradigm for managing IT resources. Why do these organisations implement ITSM? Through a process-oriented approach, ITSM empowers IT teams to take a more structured approach to service management, increase transparency and accountability of the…

Cherwell introduces a Beyond Trust Integration!

Cherwell introduces a Beyond Trust Integration! The BeyondTrust Integration mergeable application (mApp) provides functionality that enables secure, real-time remote support sessions. Using the mApp, CSM technicians and Customers can launch remote support sessions directly from CSM to encourage real-time collaboration and fast resolution of IT issues. Session details (ex: Chat conversation history) can then be…

CMDB – Offline Source of Trusted Data or Ongoing Updated collection of actual Data?

CMDB – Offline Source of Trusted Data or Ongoing Updated collection of actual Data? Many organisations struggle with keeping track of what is within their IT enterprise environment and at best hope that they have a handle on IT asset controls for financial management governance.  Many IT operational groups have their own view of what’s…