<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/david-pickering/rss" /><link>https://www.ivanti.com/blog/authors/david-pickering</link><item><guid isPermaLink="false">56622a28-a46b-46f3-965f-c460ac322610</guid><link>https://www.ivanti.com/blog/experience-level-agreements-xlas</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>DEX</category><category>Service Management</category><title>The Rise of Experience-Level Agreements (XLAs) in Practice: A Deep Dive into ITSM Transformation</title><description>&lt;p&gt;For decades, the backbone of &lt;a href="https://www.ivanti.com/glossary/itsm"&gt;IT Service Management (ITSM)&lt;/a&gt; has been the Service-Level Agreement (SLA). While effective for tracking the nuts and bolts of IT delivery, SLAs have one critical blind spot: they say little about how users actually feel about their IT experiences.&lt;/p&gt;

&lt;p&gt;This is where Experience-Level Agreements (XLAs) and &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex"&gt;Digital Employee Experience (DEX)&lt;/a&gt; fill in the rest of the picture. They provide a new paradigm that's rapidly gaining traction, promising to transform ITSM by focusing on the human experience behind the numbers.&lt;/p&gt;

&lt;p&gt;But what exactly are XLAs and how do they differ from traditional SLAs? Moreover, how does Digital Employee Experience factor into successful XLAs?&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What are XLAs?&lt;/h2&gt;

&lt;p&gt;Experience-Level Agreements are a set of metrics and commitments designed to ensure that the end-user experience is consistently positive and meets (or exceeds) expectations.&lt;/p&gt;

&lt;p&gt;While you should use XLAs and traditional SLAs in tandem, the latter focuses on technical performance and uptime. XLAs prioritize the user's overall experience, including factors like ease of use, responsiveness and emotional satisfaction.&lt;/p&gt;

&lt;p&gt;By focusing on the user's perspective, XLAs help organizations align their services with user needs, driving satisfaction and loyalty.&lt;/p&gt;

&lt;h2&gt;Understanding how SLA, XLA and DEX work together&lt;/h2&gt;

&lt;p&gt;XLAs, SLAs and DEX work in tandem to provide you with a 360-degree view of your technical and user experience metrics.&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;&lt;/th&gt;
			&lt;th scope="col"&gt;Description&lt;/th&gt;
			&lt;th scope="col"&gt;Example metrics&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Service-Level Agreements (SLAs)&lt;/td&gt;
			&lt;td&gt;A contractual agreement between service providers and customers that define the expected service quality, availability and responsiveness. SLAs focus on technical metrics.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Uptimes.&lt;/li&gt;
				&lt;li&gt;Response times.&lt;/li&gt;
				&lt;li&gt;Resolution rates.&lt;/li&gt;
				&lt;li&gt;Etc.&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Experience-Level Agreements (XLAs)&lt;/td&gt;
			&lt;td&gt;A contractual agreement between providers and customers that focuses on end-user experience, measuring the quality of service from the user's perspective. XLAs include not just technical performance, but also factors like usability, accessibility and overall satisfaction.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;End user satisfaction score.&lt;/li&gt;
				&lt;li&gt;Net promotor score (NPS).&lt;/li&gt;
				&lt;li&gt;Digital experience score (DEX).&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;Unlike SLAs and XLAs, &lt;strong&gt;Digital Employee Experience (DEX)&lt;/strong&gt; is not another type of agreement. DEX refers to the quality of digital experiences employees have while performing their job functions. It encompasses the technology, tools and digital environments they interact with daily.&lt;/p&gt;

&lt;p&gt;Based on their experiences across these tools and environments, a DEX score is created (which is measured as part of the XLA).&amp;nbsp; A positive DEX is crucial for employee productivity, engagement and overall job satisfaction.&lt;/p&gt;

&lt;h2&gt;How DEX enables successful XLAs&lt;/h2&gt;

&lt;p&gt;Digital experience analytics are an important metric in the success of XLA's. By ensuring that employees have a positive digital experience, organizations:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Improve productivity&lt;/strong&gt; — When employees can work efficiently and effectively, they're more likely to deliver excellent service to customers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhance customer experience&lt;/strong&gt; — A positive DEX often translates to a better customer experience, as employees are better equipped to meet customer needs.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Drive business outcomes&lt;/strong&gt; — By focusing on DEX, organizations can drive business outcomes, such as increased revenue, reduced costs and improved competitiveness.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Best practices for implementing XLAs&lt;/h2&gt;

&lt;p&gt;Implementing XLAs requires a careful, strategic approach to ensure that you not only measure user satisfaction effectively, but also drive meaningful improvements in service delivery.&lt;/p&gt;

&lt;p&gt;By following the best practices below, organizations can successfully integrate XLAs into their operations and foster a culture centered on positive user experiences.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Define clear user experience metrics:&lt;/strong&gt; Identify the key metrics that you will use to measure user experience. These should be specific, measurable, and aligned with business goals.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Leverage technology:&lt;/strong&gt; Use advanced analytics, AI and machine learning to gather and analyze user data. These tools can help identify trends and areas for improvement. DEX tools enable you to gather and measure your IT experience across devices, users and the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Engage users:&lt;/strong&gt; Regularly collect feedback from users through surveys, feedback forms and testing. This provides valuable insights into their needs and preferences. Ensure that surveys utilize AI to identify and highlight sentiment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Train and empower IT teams:&lt;/strong&gt; Train your IT teams in user experience principles and give them the autonomy to make decisions that improve the user experience.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuous improvement:&lt;/strong&gt; Treat XLAs as a living document. Review it regularly and update it based on user feedback and changing business needs.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Challenges and lessons learned&lt;/h2&gt;

&lt;p&gt;Implementing XLAs isn’t just about new tools — it's a mindset/cultural change. Common hurdles include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Defining experience — What counts as a “good” experience? It can be subjective and varies across roles.&lt;/li&gt;
	&lt;li&gt;Cultural buy-in — XLAs need sponsorship from leadership and buy-in from front-line IT teams.&lt;/li&gt;
	&lt;li&gt;Continuous improvement — XLAs aren’t static. They require regular review and recalibration as user needs evolve.&lt;/li&gt;
	&lt;li&gt;More than surveys — Surveys are just one method of measurement. Ensure that DEX tools are enabled to capture real technology metrics.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Organizations leading the XLA charge invest in regular feedback loops, co-design goals with business units and link experience outcomes directly to ITSM performance reviews.&lt;/p&gt;

&lt;h2&gt;The future: Why XLAs matter&lt;/h2&gt;

&lt;p&gt;In practice, XLAs and DEX are more than buzzwords — they’re the next evolution of service management. As technology becomes ever more entwined with business success, experience is the product. IT teams empowered by XLAs move beyond “keeping the lights on" to driving employee engagement, customer loyalty and strategic differentiation.&lt;/p&gt;

&lt;p&gt;For any organization focused on ITSM transformation, embracing XLAs means listening harder, acting faster and thinking bigger about the real purpose of technology: enabling people to do their best work.&lt;/p&gt;

&lt;p&gt;Read the &lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;Digital Experience Report&lt;/a&gt; to understand how DEX impacts productivity, satisfaction and retention.&lt;/p&gt;
</description><pubDate>Fri, 21 Nov 2025 15:17:59 Z</pubDate></item><item><guid isPermaLink="false">757ea828-3638-4922-8aac-b1c8fc1ad72a</guid><link>https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>Is Your ITSM Environment Ready for Agentic AI? Probably Not (Yet)</title><description>&lt;p&gt;Agentic AI is making waves across various industries, and its potential to transform ITSM is undeniable. With all the talk about agentic AI capabilities, you are probably daydreaming about streamlining ITSM processes through automated incident management, automated change risk analysis, improved efficiency through service desk automation, or enhanced service quality with predictive maintenance. But you also may start to wonder: How real is all of this? Is my organization truly ready for agentic AI?&lt;/p&gt;

&lt;p&gt;I would suggest that for most organizations, the answer is no!&lt;/p&gt;

&lt;p&gt;Don't get me wrong; organizations are listening to the conversation and are keen on the potential long-term benefits. And some may indeed be ready for to implement agentic AI properly.&lt;/p&gt;

&lt;h2&gt;Ambitious, but underprepared: why most organizations aren’t ready for agentic AI&lt;/h2&gt;

&lt;p&gt;The reason I doubt that organizations are adequately prepared is that for agentic AI to function optimally, you require good clean data, seamlessly automated workflows that are well defined, and comprehensive flexible integration across all systems intended for agentic AI operations.&lt;/p&gt;

&lt;p&gt;We see the importance of clean, integrated data in the acquisition of data management companies by other tech vendors, notably &lt;a href="https://techcrunch.com/2025/05/27/salesforce-acquires-informatica-for-8-billion/" rel="noopener" target="_blank"&gt;Salesforce and Informatica&lt;/a&gt;. Reconciled, normalized data gives AI agents the best possible intelligence to work with so they can provide the best outcomes and most accurate information.&lt;/p&gt;

&lt;p&gt;You should always consider: How will AI agents benefit you and your organization? Can your journey to autonomous work be achieved through workflows? Even Anthropic, a leader in the AI space talks about &lt;a href="https://www.anthropic.com/engineering/building-effective-agents" rel="noopener" target="_blank"&gt;using the simplest solution possible&lt;/a&gt; and only implementing AI agents for complex requirements. In some cases, agents are not only more costly but also less efficient than pre-built workflows.&lt;/p&gt;

&lt;h2&gt;Preparation today, agentic AI tomorrow&lt;/h2&gt;

&lt;p&gt;As you consider pursuing agentic AI, there are several factors to examine. With planning and preparation, you can be successful, and this checklist will help guide you on your journey.&lt;/p&gt;

&lt;h3&gt;Planning&lt;/h3&gt;

&lt;p&gt;When you start your journey to agentic AI, clearly outline your goals for introducing agentic AI into your service management environment while ensuring that they align with your overall organization's goals. Some common objectives are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reduce the workload on IT staff by automating repetitive and time-consuming tasks.&lt;/li&gt;
	&lt;li&gt;Improve the speed and accuracy of incident resolution.&lt;/li&gt;
	&lt;li&gt;Enhance the end-user experience with seamless automated request fulfillment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With your goals defined, what does success look like, and how will you measure it? These will vary based on your expectations and defined goals, but some common metrics could be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;% of tasks successfully automated by AI.&lt;/li&gt;
	&lt;li&gt;Decrease in errors within tasks handled by AI compared to manual tasks.&lt;/li&gt;
	&lt;li&gt;User satisfaction score (CSAT).&lt;/li&gt;
	&lt;li&gt;% of users opting for AI-driven self-service solutions.&lt;/li&gt;
	&lt;li&gt;Reduction in the average cost of resolving a ticket with AI.&lt;/li&gt;
	&lt;li&gt;% of incidents escalated to human agents after AI intervention.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Related content:&lt;/strong&gt; &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;AITSM: How AI Is Redefining IT Service Desk Automation&lt;/a&gt;, part of Ivanti’s Digital Employee Experience Research Report Series&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;Data preparation&lt;/h3&gt;

&lt;p&gt;Within the context of service management, there are many sources of data that may be required, including sources that are purely ITSM-related, such as a CMDB or asset repository. As you move towards the wider enterprise, you may also need data from CRM, HR, facilities, finance or other departments.&lt;/p&gt;

&lt;p&gt;Regardless of where you are getting the data from, you need to consider the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Is your data quality reliable? Is the data consistent? How accurate is the information? Is there a more trusted source (or master) that should be considered as the default? Often data is inconsistent across multiple systems, making it harder for an AI agent to make well-informed decisions.&lt;/li&gt;
	&lt;li&gt;How accessible is your data? How many different data sources are there, and will integration via APIs be required? Are the data sources up to date?&lt;/li&gt;
	&lt;li&gt;Is your CMDB ready to be used by agentic AI? Do you have critical CIs in your CMDB, and more importantly, how up to date are the relationships and the information?&lt;/li&gt;
	&lt;li&gt;Are you required to adhere to data privacy compliance? Do you need to adhere to data protection regulations such as GDPR, CCPA or others? It is possible that regulations may demand that you anonymize sensitive data and keep it within country.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Defined workflows and automation&lt;/h3&gt;

&lt;p&gt;Not only is having high-quality data vital, but having good, functioning workflows to drive tasks is a critical component of successful agentic AI. In some cases, your existing workflows can be repurposed for use within an agentic AI process; however, some workflows will need to be modified to meet the request/response requirements of an AI agent.&lt;/p&gt;

&lt;p&gt;Some things to consider for workflows:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are your workflows able to be used by AI agents?&amp;nbsp; Your existing workflows may not be structured in the most effective way for AI agents to utilize the entire workflow to deliver accurate results.&lt;/li&gt;
	&lt;li&gt;Will the workflows only be working with data within your organizations, or will it need to access external data sources? When accessing external data sources, what security measures are in place to ensure the security and accuracy of the data within the responses?&lt;/li&gt;
	&lt;li&gt;Ensure all agent AI and related workflows have audit trails enabled, so you can log and monitor AI actions and decisions. This ensures the correctness of the AI and can be used in the event of compliance or security issues.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Governance and compliance&lt;/h3&gt;

&lt;p&gt;Earlier we discussed compliance requirements for data and the need to meet regulatory or statutory requirements. Governance and compliance must also apply to the entire AI ecosystem within your organization to deliver responsible, secure and trusted responses and actions.&lt;/p&gt;

&lt;p&gt;Here are a few things to consider:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Define policies for how AI is to be used within your organization and assign people or teams who are accountable for protecting the data and evaluating ethical considerations.&lt;/li&gt;
	&lt;li&gt;Ensure that regulatory or statutory compliance standards are understood across the entire AI workflow and met. For example, if an AI agent requires access to health-related data and data collected from European users, then you would need to consider both HIPAA and GDPR.&lt;/li&gt;
	&lt;li&gt;Identify potential risks throughout your environment and meticulously mitigate those linked with the AI deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Testing and validation&lt;/h3&gt;

&lt;p&gt;Start your journey to agentic AI in a controlled environment. Set up a pilot program to test the functionality, ensuring you measure against your goals and gather feedback from users. It is important to have a continuous improvement program in place for adjustments and enhancements. Be patient, as good results may take time as the AI learns and adjusts. Always monitor and adjust as required and define a process for handling issues or failures.&lt;/p&gt;

&lt;h2&gt;Agentic AI is an evolution, not a revolution&lt;/h2&gt;

&lt;p&gt;Discussion around AI is everywhere, and while there is a lot of interest from organizations, many are still rightly cautious about how to proceed and what is best for their organization. As we have seen over the last few years, AI has progressed very quickly from generative to agentic. Keeping up with emerging technologies and planning for future enhancements is vital.&lt;/p&gt;

&lt;p&gt;Ivanti is well positioned with AI capabilities that can enable you to grow. &lt;a href="https://www.ivanti.com/ai/itsm"&gt;Find out more about what Ivanti can offer for your AI journey.&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 16 Jul 2025 16:01:36 Z</pubDate></item><item><guid isPermaLink="false">903e2c9c-6fa5-4211-997b-39542521ca59</guid><link>https://www.ivanti.com/blog/3-keys-to-adopting-enterprise-service-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>3 Keys to Evolving Toward Enterprise Service Management</title><description>&lt;p&gt;With businesses scaling up operations amid the increase in remote work, extending IT services across business units to HR, Facilities and beyond is essential.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Enter &lt;a href="https://www.ivanti.com/glossary/enterprise-service-management"&gt;enterprise service management (ESM)&lt;/a&gt;, extending the proven principles of &lt;a href="https://www.ivanti.com/glossary/itsm"&gt;IT service management (ITSM)&lt;/a&gt; across various departments and functions within an organization.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The benefits of ITSM&lt;/h2&gt;

&lt;p&gt;Ivanti’s experience with ITSM offers clues to the benefits that ESM can spread across an organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;30%&lt;/strong&gt;&lt;/p&gt;

			&lt;p&gt;faster ticket resolution with automation and improved workflows.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;20%&lt;/strong&gt;&lt;/p&gt;

			&lt;p&gt;improvement in resolving issues on the first contact.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;50%&lt;/strong&gt;&lt;/p&gt;

			&lt;p&gt;reduction in tickets by empowering users with self-service options.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;Properly managed ITSM creates efficient standardization and commonalities within processes and assets. These can include the IT services catalog, knowledge management repository, forms, reviews and approvals and self-service portals.&lt;/p&gt;

&lt;h2&gt;Why evolve to ESM?&lt;/h2&gt;

&lt;p&gt;With the success of ITSM, it makes perfect sense to extend its benefits to other parts of the organization. ESM goals are very similar, if not identical, to those of ITSM:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Simplify access to services:&lt;/strong&gt; Improve operational efficiency using simplified workflows and streamline access to services and support by removing complexity.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Engage employees anywhere:&lt;/strong&gt; Streamline self-service to enable employees across any digital experience and remove barriers for employee engagement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Support hybrid work:&lt;/strong&gt; Enable support for employees regardless of location. Automate and simplify processes to facilitate work from the home, office or remote location.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Begin with a solid ITSM foundation&lt;/h2&gt;

&lt;p&gt;To evolve toward ESM, start with a firm foundation in ITSM best practices. Only once you’ve optimized core processes can you be sure you can explore expanding that success into other business areas.&lt;/p&gt;

&lt;p&gt;It's not effective to promise solutions to other units if the IT department is known for not delivering on time or if users encounter constant digital employee experience (DEX) issues. Additionally, some employees are simply reluctant to change their processes, especially if they believe their current methods are working well. They might not see a need to seek external help; sometimes, it's easier for them to do nothing.&lt;/p&gt;

&lt;h2&gt;Is ESM really needed?&lt;/h2&gt;

&lt;p&gt;When looking at a specific organizational unit, are you positive they need ESM?&lt;/p&gt;

&lt;p&gt;To answer that question if you’re an IT manager, ask yourself: How do you currently interact with the department(s) in question, such as HR or Facilities? Do they have multiple locations? Are interactions only via email? How long do they take? How much visibility is there into processes? And in dealing with them, how does it make you feel?&lt;/p&gt;

&lt;p&gt;Some complimentary questions that should be asked on the line of business (LOB) side: How does a manager know a team’s workload? How is work prioritized? Are communications recorded and audited? What workflows are automated? How do teams conduct handovers? How is service delivery measured?&lt;/p&gt;

&lt;p&gt;Answers to these questions will tell you if you should move forward with ESM.&lt;/p&gt;

&lt;h2&gt;Keys to ESM adoption&lt;/h2&gt;

&lt;p&gt;If ESM implementation is warranted, observe these key steps:&lt;/p&gt;

&lt;h3&gt;Start simple&lt;/h3&gt;

&lt;p&gt;New ESM users within a different department might have to be gradually acclimated to the new tools being provided, so begin with these foundational functions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Segregate email intake:&lt;/strong&gt; Make emails automatically generate a case or query; this is readily accomplished using a full-featured ESM solution.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build reporting and dashboards:&lt;/strong&gt; This not only provides visibility into processes so users can identify and address issues, but also lets them track performance against KPIs to justify expanding services and promoting ESM adoption to other units.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Knowledge management and policies:&lt;/strong&gt; This is the stage where it makes sense to put the right systems in place to record (and share) how issues are remediated and what best practices should be followed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Evolve ESM capabilities&lt;/h3&gt;

&lt;p&gt;Once ESM has proven its value and gained traction with its new users, then:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Implement self-service:&lt;/strong&gt; “Shift left” is eminently desirable in ESM, too, so provide tools such as a self-service portal where everyone in that unit or department can access a knowledge base that’s specific to their group or submit requests.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automate:&lt;/strong&gt; Automating basic or oft-repeated responses will cut costs, minimize errors and accelerate remediation. Analyze incidents within each business unit to find its specific common cases that should be automated: HR and Facilities, for instance, won’t have the same issues.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Set up chat:&lt;/strong&gt; Users should be able to request a chat session with a live analyst via the self-service portal.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish SLAs:&lt;/strong&gt; In extending ESM to different business units, establish SLAs specific to that unit so there are clear expectations, service standards and objectives.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Integrate&lt;/h3&gt;

&lt;p&gt;Integration is key, especially when it comes to seamlessly aligning HR, Facilities and IT systems. A good ITSM/ESM solution should &lt;a href="https://www.ivanti.com/blog/how-to-simplify-itsm-integrations-with-ipaas"&gt;offer&lt;/a&gt; integration platform as a service (iPaaS) tools that make it easy to connect with enterprise systems that include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;HRMS&lt;/li&gt;
	&lt;li&gt;Payroll management&lt;/li&gt;
	&lt;li&gt;Employee onboarding&lt;/li&gt;
	&lt;li&gt;Other LOB systems&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Use their terminology&lt;/h3&gt;

&lt;p&gt;Understanding the unique terminology and requirements of different business units is vital. Don’t throw IT jargon at them; use language they’re familiar with. An HR staffer might want to open a “case,” while a Facilities worker will think in terms of a “work order.”&lt;/p&gt;

&lt;p&gt;Tailoring communication fosters better buy-in and engagement and helps prevent the wrong lingo from confusingly popping up in their forms and processes.&lt;/p&gt;

&lt;h3&gt;Know their services&lt;/h3&gt;

&lt;p&gt;To help them enable better service delivery, it's crucial to wrap your head around their service offerings. One action you’ll need to take is to build a service catalog that contains a centralized list of all ESM services available to employees of that business unit, clearly organized and presented.&lt;/p&gt;

&lt;p&gt;Prioritize the services listing so the most important or commonly requested services are first and users won’t have to search for them.&lt;/p&gt;

&lt;h2&gt;A strategic move: Begin with HR and Facilities&lt;/h2&gt;

&lt;p&gt;These departments typically have a wide variety of service needs that can benefit from ESM. Each deals with a diverse assortment of needs that provide excellent use cases that can demonstrate tangible benefits to support broader ESM initiatives.&lt;/p&gt;

&lt;h3&gt;HR pain points&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Reducing the time to fill open positions by streamlining recruitment, improving candidate tracking and accelerating hiring processes.&lt;/li&gt;
	&lt;li&gt;Improving employee experiences through proactive HR services, self-service options and transparent communication.&lt;/li&gt;
	&lt;li&gt;Reducing employee turnover through proactive employee engagement strategies and improved talent management.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Facilities challenges&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Reducing maintenance costs via preventive maintenance and efficient work order management.&lt;/li&gt;
	&lt;li&gt;Improving space utilization by optimizing space allocation and tracking space usage.&lt;/li&gt;
	&lt;li&gt;Enhancing occupant satisfaction by addressing comfort and safety concerns promptly.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Overcoming resistance&lt;/h2&gt;

&lt;p&gt;Transitioning from ITSM to ESM is not without challenges. Common hurdles include resistance to change, budget constraints and the need for IT departments to earn credibility.&lt;/p&gt;

&lt;p&gt;By focusing on delivering a better employee experience and showcasing the value of ESM through tangible metrics, you can drive successful ESM adoption.&lt;/p&gt;

&lt;h2&gt;Beyond initial implementation&lt;/h2&gt;

&lt;p&gt;As organizations navigate toward wider ESM adoption, continuous improvement and collaboration are in order. Regular check-ins and metrics tracking will help monitor progress and refine strategies over time and further prove ESM’s value.&lt;/p&gt;

&lt;p&gt;By empowering business units with visibility, reporting and efficient workflows, ESM can be a catalyst for organizational growth and innovation. This journey from ITSM to ESM is really a strategic evolution of an organization’s operational DNA, resulting in a business that’s more agile and responsive across the board.&lt;/p&gt;
</description><pubDate>Mon, 02 Dec 2024 21:58:37 Z</pubDate></item><item><guid isPermaLink="false">91652577-7d28-4961-a8ab-a038b9b63a23</guid><link>https://www.ivanti.com/blog/the-critical-role-of-the-cmdb-in-security-and-vulnerability-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>The Critical Role of the CMDB in Security and Vulnerability Management</title><description>&lt;p&gt;Effective security and &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;vulnerability management&lt;/a&gt; is crucial to safeguard organizations from ever-evolving cyber threats. At the core of these practices lies the &lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;Configuration Management Database (CMDB)&lt;/a&gt;, a powerful resource that offers a centralized view of an organization's IT infrastructure.&lt;/p&gt;

&lt;p&gt;The CMDB plays a pivotal role in upholding robust security and vulnerability management strategies – empowering organizations to proactively identify, evaluate and address risks to their IT systems and data.&lt;/p&gt;

&lt;h2&gt;What is a CMDB and why is it important?&lt;/h2&gt;

&lt;p&gt;The CMDB is a vital resource for organizations aiming to fortify their security stance and manage vulnerabilities with confidence. The CMDB serves as a central repository for all pertinent data on an organization's IT assets and the intricate web of relationships among them, empowering sound decision-making and a more effective approach to vulnerability management.&lt;/p&gt;

&lt;p&gt;The CMDB meticulously tracks all IT configuration items – from software to hardware and network components – to ensure a thorough grasp of your IT environment. With clear asset relationships, you have a firm understanding of each asset's criticality and its impact on business services. This insight also enables the identification of assets frequently associated with vulnerabilities, empowering IT to deploy effective remediation strategies.&lt;/p&gt;

&lt;p&gt;The CMDB also helps to provide visibility into an organization's security and compliance posture. Through comprehensive reporting and customizable dashboards, key stakeholders can see the organization's security and compliance posture clearly and concisely. With this knowledge, decision-makers can quickly identify gaps in security controls or compliance requirements, then take action to protect the organization from cyber threats and potential compliance violations.&lt;/p&gt;

&lt;h2&gt;Security and vulnerability management challenges&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Organizations everywhere are struggling to manage cybersecurity effectively. The relentless growth of assets combined with the discovery of new vulnerabilities leaves even the most capable teams with critical security gaps.&lt;/p&gt;

&lt;p&gt;Security teams receive an overwhelming number of findings each day, making it difficult to ensure vulnerabilities and security events are appropriately triaged and ranked based on their potential impact and criticality. Oversights can lead to critical vulnerabilities being overlooked.&lt;/p&gt;

&lt;p&gt;Understanding the relationships between assets and vulnerabilities presents significant challenges, making effective vulnerability management even more difficult. It is crucial to comprehend the relationships, dependencies and connectivity among assets to accurately evaluate the potential consequences of vulnerabilities. This knowledge enables organizations to prioritize, respond to and mitigate vulnerabilities effectively. Without this understanding, organizations risk overlooking critical, widespread and exploitable vulnerabilities.&lt;/p&gt;

&lt;h2&gt;Using the CMDB to enhance cybersecurity&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&amp;nbsp;The CMDB is a critical component of vulnerability management. It provides a single source of truth for information about IT assets, their relationships and their configurations. This information can be used to identify assets that are vulnerable to specific threats, prioritize vulnerabilities based on their potential impact and track the status of vulnerability remediation efforts.&lt;/p&gt;

&lt;p&gt;Although a vulnerability management tool provides a list of known vulnerabilities, their severity and their risk rating against assets, it can't identify the actual impact to the business without a CMDB.&lt;/p&gt;

&lt;p&gt;Let’s look at two examples:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Vulnerability management identifies a finding that affects SQL Server databases. This vulnerability may be due to its high severity and critical risk rating. While the vulnerability management tool knows that all SQL Server assets need to be remediated, it does not specify which ones should be prioritized. If there are hundreds of databases, remediating the most critical ones should be the top priority.&lt;br&gt;
	&lt;br&gt;
	In this example, the CMDB becomes crucial for decision-making because of the relationships it uncovers. It can identify which SQL Server databases affect critical production systems. These can then be prioritized over test and development environments. While it is essential to remediate across all environments, identifying and prioritizing production systems should always be considered critical.&lt;/li&gt;
	&lt;li&gt;A hacker has discovered an API with improper security configurations, enabling unauthorized entry to SQL Server databases across a network. Given the potential for stored personally identifiable information and even credit card information, it's clear API security and token management demand immediate attention to prevent the exposure of sensitive data and protect customers.&lt;br&gt;
	&lt;br&gt;
	In this instance, the CMDB becomes an essential tool for pinpointing the specific business applications affected by the SQL Server API exposure. Given that the CMDB captures relationships with compliance and controls, the organization can swiftly notify the appropriate authorities – ensuring a seamless and efficient response across the board.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The CMDB serves as a robust tool within the cybersecurity framework, fortifying an organization's security posture and mitigating the likelihood of security breaches. By establishing a centralized and trustworthy repository of IT asset information, the CMDB empowers organizations to make informed decisions in protecting their assets from vulnerabilities and align with defined policies and controls that might be required to meet an organization’s governance, risk and compliance requirements.&lt;/p&gt;

&lt;h2&gt;Bringing IT and Security together through the CMDB&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Seamlessly integrating the CMDB with security tools brings IT and Security into a single, centralized view – a strategic move that elevates an organization's cybersecurity posture&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The CMDB is a critical foundation of an IT service management solution that supports best practices and processes such as incident, problem, change, knowledge, security events and security incidents, among others. These processes define and execute workflows across the business, as well as maintain and use the records within the CMDB.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The CMDB's capability to map assets and connections provides a powerful tool to anticipate potential disruptions. Moreover, it is an invaluable resource in identifying patterns and behaviors. From security events to patches, the CMDB's linkage of data allows for the recognition of systemic issues or vulnerabilities within assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Building a robust CMDB requires integration across multiple tools to enable a centralized and single view of IT assets and relationships.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/products/discovery"&gt;Asset discovery&lt;/a&gt;:&lt;/strong&gt; This is the fundamental requirement from which both an asset repository and CMDB are built. The discovery solution must retrieve assets across software and hardware and be able to incorporate new inventory when it's discovered or identified. Best practice typically involves a combination of agent-based and agentless discovery, actively and passively, to ensure that known and unknown assets are identified.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/products/it-service-mapping"&gt;Service mapping&lt;/a&gt;:&lt;/strong&gt; Often called relationship discovery or application dependency mapping, this discovery capability uses agentless discovery techniques to identify both infrastructure relationships and application relationships. This allows the CMDB to be populated with the necessary relationships to understand the impacts of security events and vulnerabilities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Security information and event management (SIEM):&lt;/strong&gt; The integration of the CMDB with Security Information and &lt;a href="https://www.ivanti.com/glossary/event-management"&gt;Event Management&lt;/a&gt; solutions offers organizations real-time threat monitoring capabilities. SIEM solutions collect and analyze data from various sources to identify potential security threats and their potential impact to business systems.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Patch management&lt;/a&gt;:&lt;/strong&gt; Integrating with patch management, organizations can gain insight into which patches have been recently deployed. This information can be valuable in identifying potential issues that may arise because of a recent patch. Furthermore, integration with patch management enables change management teams to approve and control the deployment of patches to production systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Vulnerability management:&lt;/strong&gt; The CMDB plays a crucial role in enhancing vulnerability scanning and assessment processes. By integrating the CMDB with vulnerability scanning tools, organizations can efficiently identify and prioritize vulnerabilities that pose risks to their business systems. Additionally, the CMDB assists in tracking the progress of vulnerability assessments, guaranteeing timely remediation and minimizing the likelihood of exploitation.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Security events:&lt;/strong&gt; The CMDB serves as a central point for security event management. By correlating data from the CMDB and security tools, organizations can quickly identify and investigate security incidents. This centralized approach streamlines incident response, reduces the impact of security breaches and enables proactive security measures.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/products/grc-management"&gt;Governance, Risk and Compliance (GRC)&lt;/a&gt;:&lt;/strong&gt; GRC is not a direct security solution, but it is essential for ensuring an organization’s adherence to internal policies, statutory requirements and regulatory controls. Many of these standards require specific protocols for handling security incidents, vulnerabilities and software patching. By integrating GRC with the assets stored in the CMDB, we can not only understand these requirements but also document our efforts to address and remediate them.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Breaking down barriers with the CMDB&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The CMDB facilitates the breakdown of barriers between IT and Security teams by providing critical insights across IT assets. This enables organizations to reduce security risks, ensure compliance with industry standards and regulations, improve their security posture, protect sensitive data and enhance their preparedness to address the &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;evolving cybersecurity landscape&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Find out more about how &lt;a href="https://www.ivanti.com/solutions"&gt;Ivanti solutions&lt;/a&gt; can enable your organization to break down barriers between IT and Security so Everywhere Work can thrive.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 23 Jul 2024 07:00:00 Z</pubDate></item><item><guid isPermaLink="false">378c5bbd-8700-4d9c-bfc4-53ffce949fde</guid><link>https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Artificial Intelligence</category><title>AI Knowledge Management: How to Use Generative AI for Knowledge Bases</title><description>&lt;p&gt;Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy.&lt;/p&gt;

&lt;p&gt;Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.&lt;/p&gt;

&lt;p&gt;One area in which gains can be immediate: &lt;a href="https://www.ivanti.com/glossary/knowledge-management"&gt;Knowledge management&lt;/a&gt;, which has traditionally been challenging for many organizations. However, AI-based knowledge management can deliver outstanding benefits – especially for IT teams mired in manually maintaining knowledge bases.&lt;/p&gt;

&lt;h2&gt;How generative AI and knowledge management intersect&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Generative AI&lt;/strong&gt; refers to a type of artificial intelligence that can create new content, such as images, video, text or music, based on existing data. It uses machine learning algorithms to analyze and learn from large datasets, then uses that to generate new content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Knowledge management&lt;/strong&gt; is the process of capturing, organizing and sharing knowledge within an organization. It involves collecting information from various sources, storing it in a centralized database and making it easily accessible to employees as needed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Many organizations carry out knowledge management manually, resulting in out-of-date or poorly written content. By automating knowledge management processes, generative AI can improve their efficiency and effectiveness.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Generative AI knowledge management benefits&lt;/h2&gt;

&lt;p&gt;Here are some of the specific ways generative AI can achieve these ends:&lt;/p&gt;

&lt;h3&gt;Automate creation of knowledge articles&lt;/h3&gt;

&lt;p&gt;Generative AI can automatically draft knowledge articles from existing data sources like product documentation, customer support tickets and employee training materials. This frees IT professionals for more strategic tasks, such as developing new knowledge management initiatives and improving existing articles.&lt;/p&gt;

&lt;p&gt;With &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;56% of IT workers&lt;/a&gt; saying that helpdesk ticket volume is up, and 78% blaming hybrid/remote work for the jump, enhancing a knowledge base can enable quicker and more effective issue resolution and free teams to address more strategic tasks.&lt;/p&gt;

&lt;h3&gt;Create more personalized and engaging content&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI can personalize content for each user to improve his or her experience. Knowledge articles, particularly for HR, can be personalized by region or language. Being able to generate content unique to an employee persona will enhance that employee’s usage and experience.&lt;/p&gt;

&lt;h3&gt;Improve the quality of knowledge&lt;/h3&gt;

&lt;p&gt;Generative AI can identify and correct errors, add context and additional information to knowledge articles and archive outdated information. So, employees will only access accurate and up-to-date information.&lt;/p&gt;

&lt;h3&gt;Generate new ideas and insights&lt;/h3&gt;

&lt;p&gt;Generative AI can combine existing knowledge in new ways. For example, HR, Facilities and IT might all have articles about onboarding and offboarding employees. Generative AI can use these to produce a merged knowledge article that covers all three departments, so an employee won’t have to search through multiple articles.&lt;/p&gt;

&lt;h3&gt;Solve problems quicker&lt;/h3&gt;

&lt;p&gt;Generative AI can rapidly solve problems by identifying data patterns to help improve decision-making and performance. For instance, it might examine IT incidents over a given period and identify a common resolution for similar issues. It can then generate a knowledge article for service desk agents on how to expedite resolutions, or for employees on how to do so via self-service.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improve search accuracy&lt;/h3&gt;

&lt;p&gt;Generative AI can improve search accuracy by personalizing knowledge delivery based on each employee’s needs and preferences. Since an average worker spends &lt;a href="https://venturebeat.com/business/report-employees-spend-3-6-hours-each-day-searching-for-info-increasing-burnout/#:~:text=Special%20Issues%20Jobs-,Report%3A%20Employees%20spend%203.6%20hours%20each,searching%20for%20info%2C%20increasing%20burnout" rel="noopener" target="_blank"&gt;3.6 hours a day&lt;/a&gt; searching for information, any time savings here is a win that enhances their digital experience.&lt;/p&gt;

&lt;h3&gt;Enhance automation&lt;/h3&gt;

&lt;p&gt;Generative AI can help automate routine tasks, even those not directly related to creating knowledge management articles. Spiraling workloads are why &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;92% of IT workers&lt;/a&gt; see automation as “necessary” or “very necessary,” so identifying new ways of streamlining processes can free them from routine tasks to tackle other work while cutting costs.&lt;/p&gt;

&lt;h2&gt;Generative AI knowledge management drawbacks&lt;/h2&gt;

&lt;p&gt;Generative AI for knowledge management has the potential to revolutionize many industries and fields – but it’s not without issues that are important to address in implementation.&lt;/p&gt;

&lt;h3&gt;Security and privacy&lt;/h3&gt;

&lt;p&gt;AI knowledge management systems might contain sensitive or confidential information, so it's crucial to ensure they’re secured against cyberthreats. Also, there may be privacy concerns if the AI is generating content using personal or identifying information.&lt;/p&gt;

&lt;h3&gt;Quality and accuracy&lt;/h3&gt;

&lt;p&gt;While generative AI models can produce impressive outputs, quality and accuracy can vary widely depending on the quality of input data and task complexity.&lt;/p&gt;

&lt;h3&gt;Risk of misinformation&lt;/h3&gt;

&lt;p&gt;Generative AI can potentially produce incorrect or misleading information, leading to serious consequences for IT – for example, by introducing malware or incorrectly recommending turning off functionality used to secure the IT environment against malicious actors. Say a user is trying to install a printer driver and asks AI for help. Among its instructions, AI might tell the user to disable antivirus software or a firewall, providing a window for malware to be installed.&lt;/p&gt;

&lt;h3&gt;Dependence on AI-generated content&lt;/h3&gt;

&lt;p&gt;Companies that are too reliant on this may not prioritize human-generated content or critical thinking skills, potentially leading to lost expertise. Human oversight is still essential in validating and approving AI-generated outputs.&lt;/p&gt;

&lt;h3&gt;Data bias&lt;/h3&gt;

&lt;p&gt;Generative AI models can inadvertently reflect biases present in their training data, leading to skewed or inaccurate results. This can be an issue in knowledge management, where accuracy is critical. If an AI knowledge management model is trained on data predominantly from the United States, for instance, it may generate outputs less relevant to people in other countries.&lt;/p&gt;

&lt;h3&gt;Ethical concerns&lt;/h3&gt;

&lt;p&gt;These include potential bias in AI knowledge management training data, perpetuating existing inequalities.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Get the Interactive Report: &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;AITSM: How AI is Redefining IT Service Desk Automation&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Making AI knowledge management work&lt;/h2&gt;

&lt;p&gt;Despite the concerns, generative AI knowledge management can be a powerful tool. By carefully considering potential drawbacks and taking steps to mitigate them, organizations can make good use of generative AI in knowledge management.&lt;/p&gt;

&lt;p&gt;Here are five things to consider when deploying AI knowledge management:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identify data types used to train the generative AI model&lt;/strong&gt;: Identification of data types will help to ensure that the data used is accurate and reliable. Are you going to use existing knowledge articles, incident data, problem data or a combination of types?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ensure identified data is accurate, complete and up to date&lt;/strong&gt;: Generative AI is only as good as the data it's trained on; “garbage in, garbage out” still applies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monitor the output of your generative AI knowledge management model&lt;/strong&gt;: Check it for bias, misinformation, completeness and accuracy to ensure the information being generated is reliable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Develop policies and procedures to manage risks&lt;/strong&gt;: This is crucial to address issues such as data security, privacy, and ethical considerations in using generative AI for knowledge management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Put an approval process in place&lt;/strong&gt;: Review and authorization must happen before any generated outputs are shared publicly.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Implementation tips for generative AI knowledge management&lt;/h2&gt;

&lt;p&gt;There’s no doubt that generative AI knowledge management can be a valuable tool – or that there’s still much to be learned about both its benefits and possible pitfalls.&lt;/p&gt;

&lt;p&gt;An organization must evaluate the potential impacts and pick an AI knowledge management solution that satisfies its distinct needs for privacy, accuracy, and security.&lt;/p&gt;

&lt;p&gt;That said, there are a few more best practices to support successful adoption:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Start small and scale up&lt;/strong&gt;: It's best to start with a small generative AI knowledge management pilot project, then scale up as you gain experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get buy-in from stakeholders&lt;/strong&gt;: It's important to get stakeholder buy-in before deploying generative AI to assure it's used effectively and its outputs are trusted.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Continuously improve the model&lt;/strong&gt;: It's vital to continuously enhance your AI knowledge management model by retraining it on new data and addressing any potential problems that might crop up.&lt;/p&gt;
</description><pubDate>Mon, 10 Jun 2024 20:33:57 Z</pubDate></item><item><guid isPermaLink="false">e87babfb-2c3c-489e-84a1-99c505fc6e45</guid><link>https://www.ivanti.com/blog/how-to-simplify-itsm-integrations-with-ipaas</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>How to Simplify ITSM Integrations with iPaaS</title><description>&lt;p&gt;Integration is a crucial aspect of modern IT service management. By linking their ITSM platform with external applications, businesses can simplify their IT operations, enhance efficiency and flexibility, and provide better customer service. Real-time integration allows businesses to quickly adapt to changing circumstances and ensure that IT services align with business requirements.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, ITSM integration can be complex and difficult. Traditional integration methods often involve custom development and integration work, which can be costly and time-consuming. iPaaS offers a solution to these challenges and makes ITSM integration more manageable.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is iPaaS?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;iPaaS stands for Integration Platform as a Service. It's a cloud-based service that provides a set of tools and services that make it easy to connect applications and automate workflows. iPaaS can be used to integrate ITSM tools and applications with other business systems, such as CRM, ERP and HR systems. This can help to improve efficiency, reduce costs and improve customer service.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;iPaaS works by providing a central platform that allows businesses to connect applications and automate workflows. This platform provides several features and services that make it easy to integrate applications, including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Pre-built connectors: IPaaS platforms offer a library of pre-built connectors that simplify the process of connecting to commonly used applications. These connectors are designed for applications like Salesforce, Oracle, SAP and Workday.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Data transformation: iPaaS platforms are essential for converting data between various applications to maintain consistency and accuracy during integration across multiple systems.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Workflow automation: IPaaS platforms can automate workflows between applications, improving efficiency and reducing the need for manual intervention.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How iPaaS makes ITSM integration easy&lt;/h2&gt;

&lt;p&gt;IPaaS simplifies ITSM integration by providing a centralized platform with built-in connectors and templates, eliminating the need for complicated point-to-point connections. This saves time and effort when connecting multiple systems, without requiring advanced coding or technical expertise.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With IPaaS, data can be synchronized in real-time between ITSM tools and other business systems. This ensures that all systems have the most up-to-date information. Real-time integration improves the accuracy and efficiency of ITSM processes, allowing businesses to quickly and effectively address customer requests and problems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Moreover, iPaaS offers scalability and flexibility for ITSM integrations. As businesses grow and their IT needs change, they can easily add or remove ITSM tools and applications without disrupting existing integrations. This enables companies to adapt their ITSM integrations as needed, maintaining efficient processes.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Common use cases for iPaaS within ITSM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Common integration-centric use cases that are good applications for iPaaS within ITSM include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;eBonding/ticket forwarding: This facilitates two-way integration with other ITSM or ticketing systems – internally and externally. This is common for service providers who need the ability to directly integrate their service management platform with a customer's platform. This typically involves bidirectional incident integration, but it can also include changes and assets/CIs, depending on the agreement between the customer and service provider. Typically, this type of integration would be between Ivanti Neurons for ITSM and ServiceNow or BMC Helix.&lt;/li&gt;
	&lt;li&gt;Procurement: To streamline service requests, service fulfillment, and asset lifecycle workflows, it may be necessary to integrate with a procurement system like SAP or a similar solution. Additionally, integration with external providers like Dell or CDW can facilitate procurement requests with vendors.&lt;/li&gt;
	&lt;li&gt;Onboarding: When bringing a new employee into your organization, it's important to involve not just HR, but also IT, payroll, facilities and any other necessary departments. Streamlining the onboarding process across all these areas can be achieved through automation, regardless of the specific applications being used (such as Workday, SAP, Ivanti Neurons for ITSM, or ADP). This allows for seamless integration and handling of all necessary tasks.&lt;/li&gt;
	&lt;li&gt;DevOps: Streamlining development processes is crucial for the success of the DevOps/DevSecOps process. Automation is essential for achieving a streamlined and efficient process throughout application development (using tools such as Jira and Azure DevOps); deployment (with GitHub and Jenkins); operations (using ITSM); and security (with tools like ASOC and BlackDuck).&lt;/li&gt;
	&lt;li&gt;Communication/collaboration: Many organizations use various collaboration tools such as Microsoft Teams or Slack for instant messaging, and virtual agents like Espressive and Moveworks. When these tools can communicate with one another, that allows employees to use their preferred tool and improves their overall experience. It also ensures that no communication is lost. It is important to enable these tools to automatically integrate and communicate with service management, as it is a crucial capability.&lt;/li&gt;
	&lt;li&gt;Operations management: Many organizations use multiple solutions to monitor their operational environment. These solutions often cover network, server, application and security monitoring. It is crucial to ensure that these tools are communicating with service management to provide accurate and timely information to the appropriate teams. Integration with these solutions should allow for updates to be shared in both directions, ensuring consistency across all environments.&lt;/li&gt;
	&lt;li&gt;Request fulfillment: Expand the scope of request fulfillment beyond ITSM to include external third-party solutions for processes such as approvals and procurement, and external vendor systems such as CDW, Lenovo or Dell. Create a smooth workflow that spans various external systems to improve the efficiency of your request fulfillment process.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti Neurons iPaaS makes integration easy&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons iPaaS, powered by Workato, is a cost-effective, efficient, agile, scalable and secure integration platform for Ivanti Neurons for ITSM (SaaS), enabling integration across ITSM, ITAM and Line of Business applications. It’s seamlessly integrated into the ITSM admin experience to make development, monitoring and troubleshooting extremely easy in the context of ITSM, ITAM or Enterprise Service Management use cases. By leveraging Ivanti Neurons iPaaS, businesses can streamline their IT operations, improve service delivery and gain a competitive advantage in today's dynamic technology environment.&lt;/p&gt;

&lt;p&gt;The Ivanti Neurons for ITSM platform will continue to support industry standard open APIs such as REST API, SOAP and Webhooks. Ivanti Neurons iPaaS extends and enhances your API and integration capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Learn more about how &lt;a href="https://www.ivanti.com/products/ivanti-neurons-ipaas"&gt;Ivanti Neurons iPaaS can transform your ITSM integration&lt;/a&gt; approach.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 29 Feb 2024 18:03:46 Z</pubDate></item><item><guid isPermaLink="false">42e4f752-fc80-41ae-b3b4-3f68f62776c1</guid><link>https://www.ivanti.com/blog/how-to-accelerate-deployment-with-an-itsm-github-integration</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>How to Accelerate Deployment with an ITSM-GitHub Integration</title><description>&lt;p&gt;GitHub is one of the most popular version control systems used today, allowing developers to collaborate on projects and quickly deploy their code. However, deploying code through GitHub can also be time-consuming and risky if not done properly.&lt;/p&gt;

&lt;p&gt;In this blog, we’ll cover how IT teams can reach across the aisle to your colleagues in development to accelerate and protect their GitHub deployment by integrating with the service management software you already use.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The basics of GitHub deployment&lt;/h2&gt;

&lt;p&gt;If you work in IT, you’ve probably heard of GitHub — but unless you have a background in development, you might be less familiar with what it does.&lt;/p&gt;

&lt;p&gt;GitHub is a popular web-based version control system for software development. It gives developers a platform to collaborate on projects, store code and deploy changes more easily. Developers can keep track of changes made to their codebase and discuss and review changes before they are integrated into the codebase.&lt;/p&gt;

&lt;p&gt;Version control systems like GitHub are essentially a way to store all versions of a project in one place. Every time a new change is made to the project (e.g., code added or deleted), a new version is created and stored alongside&amp;nbsp;the old&amp;nbsp;versions so that if any issues arise due to a recent change, these can be&amp;nbsp;reverted&amp;nbsp;quickly without having to manually re-enter all the previous work. This makes debugging easier and helps speed up development cycles overall.&lt;/p&gt;

&lt;p&gt;GitHub makes it easy for developers to deploy their code quickly and reliably in various environments such as production servers or staging environments without having to manually deploy every time there are updates or bug fixes needed in the app or website they are working on. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;This helps save time and effort while ensuring that deployment goes smoothly with no unexpected errors appearing along the way due to manual mistakes in copying over files incorrectly or omitting certain files during deployment processes.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why automate DevOps processes using ITSM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;GitHub deployment is a crucial part of the software development process, and automating and protecting it can make the difference between success and failure.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automation streamlines the entire deployment process. By taking care of mundane tasks like pushing out updates or checking for bugs, automation lets you do more complex work, faster. It also eliminates the risk of human error, which can lead to costly mistakes down the line.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automation also makes it easier to track changes over time so you can identify issues quickly and get ahead of potential problems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Best practices in change management tools like &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;Ivanti Neurons for ITSM&lt;/a&gt; can ensure that all changes are tracked and logged for improved compliance and oversight. With these tools at hand, businesses have more confidence knowing their systems are secure against malicious actors or unintended changes throughout their development cycle.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Integrating GitHub and Ivanti Neurons for ITSM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons for ITSM helps automate the deployment process through change management, which allows IT to keep track of the deployment’s history, approvals, and rejections.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In a traditional application development environment, application development would manage the release process through ITSM manually by creating a change request within ITSM. Since this is a manual process, it doesn't guarantee a change request is created whenever a deployment request is raised or the change is approved before the deployment is initiated, which may result in unauthorized or incorrect deployments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By extending ITSM’s automated change approval process to DevOps, application development teams can work at speed, without unnecessary bottlenecks and frustrations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The integration between GitHub and Ivanti Neurons for ITSM uses GitHub’s custom deployment protection rules and Ivanti Neurons for ITSM webhooks to automate processes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Custom deployment protection rules are powered by GitHub Apps and run based on webhooks and callbacks. The custom apps subscribe to the deployment protection rule event, which is emitted when a deployment is triggered for a particular environment, based on which they are configured to emit certain events. These events can be forwarded to a webhook, which will integrate with Ivanti Neurons for ITSM.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once you have created a custom deployment protection rule and installed it on your repository, the custom deployment protection rule will automatically be available for all environments in the repository.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once a change is created within Ivanti Neurons for ITSM, it'll go through the change approval process. If the change is approved, the integration automatically notifies GitHub of the approval and changes the status of the GitHub package to allow the deployment to automatically proceed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="The data flow between GitHub and Ivanti Neurons for ITSM in an automated change management process." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/11/github1.jpg"&gt;
&lt;figcaption&gt;The data flow between GitHub and Ivanti Neurons for ITSM in an automated change management process.&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h2&gt;Unlock the potential of an ITSM and GitHub integration&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Service management tools like Ivanti Neurons for ITSM can be invaluable for GitHub deployments. Automation and protection are essential for stability, reliability and efficiency, and these tools provide the features needed to ensure your deployment is secure and successful.&lt;/p&gt;

&lt;p&gt;With Ivanti Neurons for ITSM, businesses can create a complete audit trail that records every change made to the codebase. This feature helps with debugging any errors in the code as well as pinpointing potential security vulnerabilities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM is designed for automating changes across multiple systems in a unified platform. It allows users to quickly identify changes needed in their system and track progress on those changes from start to finish. This reduces complexity while also ensuring that all deployments are compliant with company policies and standards before they go live.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM can also automate your end-to-end DevSecOps process from identification and prioritization of a vulnerability, managing the vulnerability across development, operations&amp;nbsp;or security teams&amp;nbsp;—&amp;nbsp;automatically integrating with development tools such as Jira or Azure DevOps and automating the change management process and approvals before deployment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Using Ivanti Neurons for ITSM gives businesses more confidence in their GitHub deployment process — whether they're deploying new code directly or using specialized CI/CD pipelines by providing automation, protection and visibility into processes and reporting capabilities. Additionally, these solutions offer auditing capabilities that help maintain compliance with industry regulations such as GDPR or HIPAA.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Unlock the full potential of your service management tools like Ivanti Neurons for ITSM and take your&lt;/p&gt;

&lt;p&gt;Unlock the full potential of your service management tools like Ivanti Neurons for ITSM and take your &lt;a href="https://help.ivanti.com/ht/help/en_US/ISM/2023/admin/Content/Configure/GITHub-Integration.htm" target="_blank"&gt;GitHub deployment process&lt;/a&gt; from good to great!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Fri, 03 Nov 2023 17:04:45 Z</pubDate></item><item><guid isPermaLink="false">936c81f4-a2af-471a-b421-50bc87c4b2b6</guid><link>https://www.ivanti.com/blog/the-need-for-enterprise-service-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>The Need for Enterprise Service Management</title><description>&lt;h2&gt;Key takeaways&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;ESM is the practice of managing technology services to ensure that they meet the needs of the organization and its employees.&lt;/li&gt;
	&lt;li&gt;It ensures services are delivered consistently, efficiently and cost-effectively – while meeting the needs of the business and customers.&lt;/li&gt;
	&lt;li&gt;The benefits of Enterprise Service Management (ESM) include increased employee satisfaction, boosted employee engagement, reduced costs, increased efficiency&amp;nbsp;and improved compliance.&lt;/li&gt;
	&lt;li&gt;Comprehensive processes and automation help ensure your organization provides the highest quality of service to customers while optimizing available resources.&lt;/li&gt;
	&lt;li&gt;There are four key components of an effective ESM strategy: clear goals and objectives, comprehensive processes, automation and monitoring and feedback.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Organizations today are becoming more reliant on technology to provide quality services to their employees. As a result, there is an increased need for Enterprise Service Management (ESM).&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is Enterprise Service Management?&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/glossary/enterprise-service-management"&gt;Enterprise Service Management&lt;/a&gt;&amp;nbsp;is a set of processes and practices used for managing the delivery of an organization’s technology services. ESM ensures services are delivered consistently, efficiently&amp;nbsp;and cost-effectively – while meeting the needs of the organization and customers.&lt;/p&gt;

&lt;p&gt;Employees expect a similar experience in their day-to-day business life, whether they engage with IT or any of the many other service providers in a company. This includes &lt;a href="https://www.ivanti.com/products/hr-service-management"&gt;human resources (HR)&lt;/a&gt;, Legal, &lt;a href="https://www.ivanti.com/products/facilities-service-management"&gt;Facilities&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/project-portfolio-management"&gt;project management&lt;/a&gt;, security, sales, marketing, R&amp;amp;D and finance departments.&lt;/p&gt;

&lt;h2&gt;Benefits of Enterprise Service Management&lt;/h2&gt;

&lt;p&gt;The benefits of Enterprise Service Management&amp;nbsp;are numerous. Some of the most important include:&lt;/p&gt;

&lt;h3&gt;1. Improved employee satisfaction&lt;/h3&gt;

&lt;p&gt;ESM looks at &lt;strong&gt;how technology helps or hinders&lt;/strong&gt; employees when doing the work they need to do - when they need to do it. ESM ensures services are delivered consistently and efficiently, leading to improved employee productivity and satisfaction. By providing clear expectations, enhancing communication and creating a sense of ownership, ESM enables employees to feel more engaged with the teams who are delivering the services they have requested.&lt;/p&gt;

&lt;p&gt;For example, if an employee can see the status of a request, they know what stage it is in and when it can be expected to be finished This allows employees and business departments to focus more on providing business value and &lt;strong&gt;ensuring that IT boosts productivity&lt;/strong&gt; versus hindering employee efficiency.&lt;/p&gt;

&lt;h3&gt;2. Boosted employee engagement&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Delivering an omnichannel experience across a self-service portal, Microsoft Teams, virtual agent, and email allows employees to &lt;strong&gt;choose the way they work that best fits their needs&lt;/strong&gt; and preferences, increasing their engagement by providing an easy way to find and request information and services across a variety of modes.&lt;/p&gt;

&lt;h3&gt;3. Reduced costs&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;ESM can help reduce costs significantly by streamlining processes and eliminating unnecessary complexity.&amp;nbsp;&lt;strong&gt;Automation is key&lt;/strong&gt; here; ticket classification, assignment and flexible workflows can be automated, ensuring the right team is handling the ticket from the beginning. This not only reduces costs but leads to improved efficiency and customer satisfaction.&lt;/p&gt;

&lt;h3&gt;4. Increased efficiency&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;ESM helps increase efficiency and reduce errors by ensuring &lt;strong&gt;services are delivered on time&lt;/strong&gt; and meet the organization's priorities. This can be achieved through standardized workflows, documented processes, automated assignments&amp;nbsp;and interconnected systems, resulting in higher quality services across the organization.&lt;/p&gt;

&lt;h3&gt;5. Improved compliance&lt;/h3&gt;

&lt;p&gt;ESM enables organizations to &lt;strong&gt;meet industry regulations and standards&lt;/strong&gt;. Through detailed auditing and reporting, organizations can ensure their compliance with service levels, security protocols and other regulations. This helps organizations protect their data and assets and gain&amp;nbsp;&lt;/p&gt;

&lt;p&gt;a competitive advantage in the market by ensuring compliance with relevant regulations.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Features of an effective Enterprise Service Management strategy&lt;/h2&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="z0ddSVqCy6k"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Employees expect easy and instant access to IT and non-IT services and automatic fulfilling of their requests.&lt;/p&gt;

&lt;p&gt;While the IT&amp;nbsp;service desk or help desk&amp;nbsp;are top of mind when discussing service management, this is only one element for an &lt;strong&gt;ESM strategy&lt;/strong&gt;. Some other key capabilities, which are an opportunity for introducing Enterprise Service Management to non-IT services, include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Self-service portal.&lt;/li&gt;
	&lt;li&gt;Easy knowledge access.&lt;/li&gt;
	&lt;li&gt;Ticket automation.&lt;/li&gt;
	&lt;li&gt;Case&amp;nbsp;management.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An effective ESM strategy must have four key components:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Clear goals and objectives&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;It is&amp;nbsp;essential to have a comprehensive understanding of an &lt;strong&gt;organization's goals and objectives&lt;/strong&gt; when it comes to ESM. This could begin with Human Resources (HR) or Facilities having an explicit idea of advantages.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To start small, if email is the normal form of communication, it would make sense to incorporate &lt;strong&gt;automated email creation&lt;/strong&gt; into the new ESM platform and implement the &lt;strong&gt;self-service portal or virtual agent &lt;/strong&gt;as a second step.&lt;/p&gt;

&lt;p&gt;However, it is even more important to enhance the backend processes by utilizing automation and workflow technology. This will allow for streamlined operations and more efficient processes, resulting in greater productivity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, having a well-defined ESM strategy helps ensure the organization keeps up with the ever-changing needs of the customer base and offers high-quality service all the time.&lt;/p&gt;

&lt;h3&gt;2. Comprehensive processes&lt;/h3&gt;

&lt;p&gt;From the initial design to the final delivery, ESM processes should be comprehensive and detailed, encompassing a wide range of service delivery stages. It is important to &lt;strong&gt;document and outline&lt;/strong&gt; the services and processes that your organization plans to offer. These services and processes may be limited at first, but they will inevitably expand as your organization matures.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, it is essential to identify the most significant processes that will give the best employee satisfaction and the highest efficiencies. Having comprehensive processes in place helps ensure your organization can provide the highest quality of service to the customers while &lt;strong&gt;optimizing the resources available&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;3. Automation&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Enabling automation in your organization will streamline processes and reduce errors. Automatically assigning work to the right team will significantly reduce response and resolution time and improve turnaround time for customer requests. Workflows that automatically manage approvals, tasks and notifications help maintain&amp;nbsp;high levels&amp;nbsp;of accuracy and quality.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Combining automation with existing manual steps&lt;/strong&gt; will significantly improve the speed, accuracy and quality of organizational operations and improve the employee experience.&lt;/p&gt;

&lt;h3&gt;4. Monitoring and feedback&lt;/h3&gt;

&lt;p&gt;It is important to monitor the performance of ESM processes and provide feedback to ensure that they are meeting the organization's goals and objectives. To do this effectively, it is necessary to put in place &lt;strong&gt;dashboards, analytics and other reporting tools&lt;/strong&gt; that will provide visibility into the team's workload and identify any imbalances or inconsistencies.&lt;/p&gt;

&lt;p&gt;Monitoring will help you observe any trends or changes in workload, and measure how well service level targets are being met. This helps ensure that all organizational goals and objectives are achieved. Additionally, it gives managers the ability to make better decisions on how to adjust and prioritize resources accordingly.&lt;/p&gt;

&lt;p&gt;The need for Enterprise Service Management (ESM) is becoming increasingly important as organizations become more reliant on technology to provide quality services to their employees.&lt;/p&gt;

&lt;p&gt;ESM can help to reduce costs, improve employee satisfaction, and increase efficiency, while also ensuring that an organization is compliant with industry regulations and standards. An effective ESM strategy must include clear goals and objectives, comprehensive processes, automation, monitoring and feedback.&lt;/p&gt;

&lt;p&gt;From improving employee satisfaction to significantly reducing cost, implementing an effective ESM strategy helps your organization stay &lt;strong&gt;productive and efficient&lt;/strong&gt; in this new era of Everywhere Work. As IT’s responsibility for managing non-IT assets grows, ESM will help IT teams broaden their influence and deliver business value to the organization.&amp;nbsp;Learn more about&amp;nbsp;how&amp;nbsp;Ivanti can help&amp;nbsp;with your &lt;a href="https://www.ivanti.com/service-management"&gt;Enterprise Service Management&lt;/a&gt; strategy.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="804954784"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Wed, 15 Mar 2023 14:42:49 Z</pubDate></item><item><guid isPermaLink="false">a5680254-a1e9-4dd7-a40a-349014afaaef</guid><link>https://www.ivanti.com/blog/what-is-devsecops-how-great-developers-shift-left-for-security</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><category>Security</category><title>What Is DevSecOps? How Great Developers Shift Left for Security</title><description>&lt;script type="application/ld+json"&gt;
{
  "@context": "https://schema.org",
  "@type": "BlogPosting",
  "mainEntityOfPage": {
    "@type": "WebPage",
    "@id": "https://www.ivanti.com/blog/What-Is-DevSecOps-How-Great-Developers-Shift-Left-for-Security"
  },
  "headline": "What Is DevSecOps? – How Great Developers Shift Left for Security",
  "description": "When organizations prioritize proactive security, their DevOps programs shift left into DevSecOps. Learn what this new term means and why it matters for your Agile operations.",
  "image": "",  
  "author": {
    "@type": "Person",
    "name": "David Pickering",
    "url": "https://www.ivanti.com/blog/author/david-pickering"
  },  
  "publisher": {
    "@type": "Organization",
    "name": "Ivanti",
    "logo": {
      "@type": "ImageObject",
      "url": "https://static.ivanti.com/sites/marketing/media/images/logos/ivanti-logo-red.svg"
    }
  },
  "datePublished": "2022-05-02",
  "dateModified": "2022-05-02"
}
&lt;/script&gt;&lt;script type="application/ld+json"&gt;
{
  "@context": "https://schema.org",
  "@type": "FAQPage",
  "mainEntity": [{
    "@type": "Question",
    "name": "What does shift left mean?",
    "acceptedAnswer": {
      "@type": "Answer",
      "text": "In a traditional DevOps process, security assessments come at the end of the development process. This security-for-last approach:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Slows down the development lifecycle with its reactive, obligatory approach to security; and &lt;/li&gt;
&lt;li&gt;Leads to developers’ distrust and frustration with the security team, since they’ll need to rework almost-shipped code to fix security issues that could have been identified and resolved sooner. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So, organizations have begun to “shift left” – that is, proactively introduce security into the development lifecycle itself, rather than as a last-minute addition. &lt;/p&gt;"
    }
  },{
    "@type": "Question",
    "name": "Is there a DevSecOps tool?",
    "acceptedAnswer": {
      "@type": "Answer",
      "text": "Frankly, no one tool or solution will address the many diverse needs within a Continuous Integration/Continuous Delivery (CI/CD) pipeline. 
DevSecOps covers too many different specialties and potential challenges to have a single technology or application that can cover all areas. As part of an effective DevSecOps protocol, an organization must implement:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Infrastructure scans, &lt;/li&gt;
&lt;li&gt;Dynamic application and code scans, &lt;/li&gt;
&lt;li&gt;Automated penetration tests, and&lt;/li&gt;
&lt;li&gt;API fuzzing. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Many organizations implementing their DevSecOps process find that automating and centralizing this information into a universally accessible and integrated hub empowers all teams – development, operations, and security alike – to work on the right task at the right time while enabling cross-departmental measurement and reporting against key KPIs.&lt;/p&gt;"
    }
  },{
    "@type": "Question",
    "name": "What is DevSecOps?",
    "acceptedAnswer": {
      "@type": "Answer",
      "text": "In a traditional DevOps process, security assessments come at the end of the development process. This security-for-last approach:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Slows down the development lifecycle with its reactive, obligatory approach to security; and &lt;/li&gt;
&lt;li&gt;Leads to developers’ distrust and frustration with the security team, since they’ll need to rework almost-shipped code to fix security issues that could have been identified and resolved sooner. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So, organizations have begun to shift left – that is, proactively introduce security into the development lifecycle itself, rather than as a last-minute addition. &lt;/p&gt;
&lt;p&gt;DevSecOps is a fine balance between allowing development agility and speed, while maintaining a secure application and operational environment. This comprehensive, collaborative process requires awareness and automation between all three teams: Development, Operations, and Security. &lt;/p&gt;"
    }
  }]
}
&lt;/script&gt;
&lt;p&gt;In the alphabet soup of IT buzzwords, DevSecOps is one of the more confusing abbreviations.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Is DevSecOps just a fancy name for a specific tool?&lt;/li&gt;
	&lt;li&gt;Is there a DevSecOps process or best practice?&lt;/li&gt;
	&lt;li&gt;Should DevSecOps be an internal IT department priority, or a broader company philosophy?&lt;/li&gt;
	&lt;li&gt;If a company already leverages DevOps processes and tech stacks, then should it upgrade to DevSecOps – or would that simply complicate an already overburdened process?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More than just a trendy buzzword, DevSecOps is the mature organization’s next evolution in comprehensive development processes.&lt;/p&gt;

&lt;h2&gt;The natural evolution of DevOps from traditional software development lifecycles&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;For context, DevOps – Development-Operations – as an integrated process philosophy gained momentum around 2008.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Traditionally, software development lifecycles (SDLC) followed a structured waterfall approach. Reliance on completion of one section led to bottlenecks, resulting in slower delivery of applications, fixes and changes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To meet market demand and internal deadlines, IT operations and software development needed to get code out the door faster. Products needed quick implementation without major roadblocks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With this increased need for speed, the new Agile Development Methodology gained popularity. This development process involved sprints with smaller more frequent releases as teams developed and tested features in tandem.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These faster deliveries led to a continuous development process through collaboration and automation, leading to today’s integrated DevOps process.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why DevOps must shift left for security&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The speed and automation of a modern DevOps process, however, can produce increased risk and more vulnerabilities and weaknesses.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In a traditional DevOps process, security assessments come at the end of the development process. This security-for-last approach:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;p&gt;Slows down the development lifecycle with its reactive, obligatory approach to security.&amp;nbsp;&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Leads to developers’ distrust and frustration with the security team, since they’ll need to rework almost-shipped code to fix security issues that could have been identified and resolved sooner.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, organizations have begun to shift left – that is, proactively introduce security into the development lifecycle itself, rather than as a last-minute addition.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Despite its universally recognized importance, developers are understandably reluctant to take on security, as this added responsibility would impact their ability to push out new code.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Besides, developers are not security specialists. How can they know which vulnerability should take priority? Why should they be responsible for interpreting possible security risks of data without context?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Development isn’t the only process requiring increased security integration, either. The operations team must also be included in the new security prioritization, since operating systems, databases, web servers and other parts of the technology infrastructure frequently host many potential vulnerabilities and weaknesses.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ultimately, DevSecOps is a fine balance between allowing development agility and speed, while maintaining a secure application and operational environment. This comprehensive, collaborative process requires awareness and automation between all three teams: development, operations&amp;nbsp;and security.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developers &lt;/strong&gt;need to recognize the importance of security – rather than treating it as an anchor weighing down their productivity – and proactively include risk assessments and repairs within the development lifecycle itself.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Security and operations&lt;/strong&gt; together must ensure and facilitate the continuous development lifecycle through efficiencies and prioritization of vulnerabilities and weaknesses.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;There is no universal DevSecOps tool&lt;/h2&gt;

&lt;p&gt;Frankly,&amp;nbsp;no one tool or solution will address the many diverse needs within a continuous integration/continuous delivery (CI/CD) pipeline.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;DevSecOps covers too many different specialties and potential challenges to have a single technology or application that can cover all areas. As part of an effective DevSecOps protocol, an organization must implement:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Infrastructure scans.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Dynamic application and code scans.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Automated penetration tests.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;API fuzzing.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Of course, this list is just the tip of the technology requirements iceberg.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Let’s not forget the many other sources of vulnerability information which must be synthesized, consolidated and acted upon. Inevitably, multiple data sources can cloud a clear understanding of urgency, impact and priority – if reconciled manually, or by a single application.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Prioritizing the DevSecOps philosophy without adding extra work&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ultimately, DevSecOps is not about a one-off tool or single point within the development process, but about automation, collaboration and integration.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, &lt;em&gt;shift left&lt;/em&gt; is not just a term used to describe the process of developers alone thinking about security. Shifting left requires the entire team to consider potential vulnerabilities and weaknesses and risks from the very start of a project.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This shift requires scanning the code while it is in development and fixing issues as they arise as a regular, integrated part of the overall operation. Automated security testing should be executed in parallel with software development, incorporated during code review and added to acceptance testing criteria.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And, if security is to be included as part of general operations and development processes directly, then aggregation and prioritization of vulnerability and weakness&amp;nbsp;data becomes vitally important. Developers and process managers should not need to become security experts to understand what’s important to fix, at which point in the development process.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Likewise, security experts shouldn’t need to know how to code the latest improvements to be able to communicate possible weaknesses within the code currently in review.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s where an organization’s tools and applications can greatly ease many of these implementation road blocks.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The mature DevSecOps program’s automated, integrated tech stack&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;While DevSecOps has no one tool to cover every part of the process, organizations must have a strong tool set to track the work across teams and coordinate critical tasks to eliminate security weaknesses in code before they become public.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Development tends to use specific tools – such as Jira or Azure DevOps – to manage their workload. On the other hand, the operations team is more likely to use and reference &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;a service management solution, such as Ivanti Neurons for ITSM&lt;/a&gt;. Security teams often have an entirely different suite of tools altogether, which may or may not integrate with their counterparts’ tech stacks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For the organization seeking to bridge these different programs into a unified DevSecOps process, modern algorithms and tools offer all three teams an unparalleled ability to automate:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Raw data collection.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Risk prioritization based on the organization’s unique exploitability factors.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Targeted focus on top security priorities based on current ransomware trends, exploitable vulnerabilities and weaknesses, remote code execution and privilege escalation.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Many organizations implementing their DevSecOps process find that automating and centralizing this information into a universally accessible and integrated hub empowers all teams – development, operations, and security alike – to work on the right task at the right time while enabling cross-departmental measurement and reporting against key KPIs.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Empowering development cycles through DevSecOps&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Finally, DevSecOps is about empowering collaboration across development, security and operations teams. For an integrated, shifted left process and lifecycle, all teams must understand the expectations across the board, with common reporting and KPIs.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Developers and operations staff must also receive training on security awareness, with the tools and processes in place to facilitate an early security focus. This transparency is key for a successful DevSecOps process implementation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By empowering the teams to take responsibility for security through the DevOps lifecycle, DevSecOps allows development, security and operations teams to find and remediate security issues faster.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 05 May 2022 16:04:20 Z</pubDate></item><item><guid isPermaLink="false">61ec8492-50a9-4325-b751-1182d65209c1</guid><link>https://www.ivanti.com/blog/why-it-asset-management-is-like-building-a-jigsaw-puzzle</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>Why IT Asset Management is Like Building a Jigsaw Puzzle</title><description>&lt;p&gt;Think about the process of building a jigsaw puzzle. After placing every piece on the table in front of you, different &lt;span data-contrast="none" xml:lang="EN-US"&gt;colors&lt;/span&gt;&lt;span data-contrast="none" xml:lang="EN-AU"&gt; and types, you don’t really know how they’ll form a complete picture—and you certainly don’t know if any are missing. You have little choice but to sort through everything to understand what you have and how each piece relates to another. You can see where you need to go, but nothing looks like what’s displayed on the box. &lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{8cabfd7d-2b12-48d6-892a-d512578008f4}{77}" paraid="1947924348" xml:lang="EN-US"&gt;&lt;span data-contrast="none" xml:lang="EN-AU"&gt;Doesn’t that sound a little a bit like your IT asset management journey? You know what you’d like to accomplish, but there’s no clear understanding of how and where to start. &amp;nbsp;&lt;/span&gt;&amp;nbsp;This blog will provide&amp;nbsp; clarity.&amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{9d3416f7-5d86-47df-8f01-63306a2c3756}{56}" paraid="1145595438" role="heading"&gt;Discovery&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{8cabfd7d-2b12-48d6-892a-d512578008f4}{206}" paraid="88957533" xml:lang="EN-US"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Discovery answers the first question: “What do I have?” &lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{9d3416f7-5d86-47df-8f01-63306a2c3756}{70}" paraid="1908052118"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Within asset management, &lt;/span&gt;understanding what you have is &lt;em&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;the&lt;/span&gt;&lt;/em&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt; critical &lt;/span&gt;starting point. At Ivanti, we have found that many organizations are unaware of up to 30% of their asset landscape. So, like our jigsaw puzzle example, the first thing these organizations must do is tip everything out on a table so they can sort and classify the pieces, with the edge pieces being the most important.&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{a35e0951-dfa5-4461-9cac-b6c2ffbdaca4}{194}" paraid="1759096029" xml:lang="EN-US"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;In IT asset management, this means identifying&lt;/span&gt; your laptops, desktops, servers, network devices, phones, tablets and software, and then sorting to understand what is most important. &amp;nbsp;What constitutes your “edge pieces” can vary depending on your organizational goals. &amp;nbsp;For example, if you’re undergoing a software audit, you would prioritize the sorting of software. &amp;nbsp;On the other hand, if you’re looking to update desktops, sorting through laptop and desktop hardware is most important. &amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{9d3416f7-5d86-47df-8f01-63306a2c3756}{168}" paraid="645479752" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Reconciliation&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{9d3416f7-5d86-47df-8f01-63306a2c3756}{178}" paraid="1761700539"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;In any organization, there is no one repository of data that will give you &lt;/span&gt;all your information, and it is normal to get asset information from multiple different data sources. In fact, we have found most organizations have 12 or more discovery sources. Typical data sources are Microsoft Endpoint Configuration Manager (SCCM), CSV file, Microsoft Active Directory, Intune, Workspace One (AirWatch) or &lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Discovery&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;&lt;strong&gt;. &lt;/strong&gt;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{9d3416f7-5d86-47df-8f01-63306a2c3756}{201}" paraid="1926365393"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;With so many data sources, you don’t want to &lt;/span&gt;end up with multiple duplicate assets. This is where reconciliation comes into play.&amp;nbsp; The right solution, such as&amp;nbsp;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Neurons,&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;&amp;nbsp;enables you to have one trusted record for &lt;/span&gt;each asset, with data gathered from multiple, easily addable or removable&amp;nbsp;data sources.&amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{9}" paraid="473995726" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Normalization&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{19}" paraid="895036804"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;We are up to the third step of the process, having discovered and reconciled assets&lt;/span&gt;. Now, we need to normalize the data. This step is extremely important for software assets because there is no standard for names, applications, and versions of software. &amp;nbsp;The name variations can be minor, like a version number, or maybe the company name. For example, I have a system that returns two records:&amp;nbsp;&lt;/p&gt;

&lt;ol&gt;
	&lt;li paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{65}" paraid="1525123616"&gt;Vendor Name = Mozilla Corporation, Software Name = Thunderbird and Version = 78.10&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol&gt;
	&lt;li paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{82}" paraid="932485252" value="2"&gt;Vendor Name = Mozilla, Software Name = Mozilla Thunderbird 78.10.2 and Version = 78.10&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;

&lt;p paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{91}" paraid="1361357098"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;These titles &lt;/span&gt;come back looking slightly different from discovery but are in fact the exact same software. Using the Software Identification Database, the Ivanti Neurons solution will normalize this data so that we have one record of the software.&amp;nbsp; You can now use this normalized data for a complete understanding of your software licensing costs.&amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{153}" paraid="2066444462" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Visibility&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{163}" paraid="928938647"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Now that we have discovered, &lt;/span&gt;reconciled and normalized our assets, we can be confident in having accurate visibility into the information across hardware and software. &amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{177}" paraid="1729148931"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Without doing any more work and with integration into &lt;/span&gt;&lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Neurons for ITAM&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;&lt;strong&gt;, &lt;/strong&gt;&lt;/span&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;you can &lt;/span&gt;instantly visualize the asset data and start to answer questions you were wanting to understand.&amp;nbsp; For example, how many routers and types do I have? How many Dell laptops are out there? Where are these assets located? And which department owns them?&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{228}" paraid="1105288074"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;You can expand this out to include&lt;/span&gt; other types of specialized assets such as in the medical field and bring in X-ray machines, MRI, etc. This can be done by adding &lt;a href="https://www.ivanti.com/products/medical-device-management" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Neurons for Healthcare&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt; as a data source to discovery.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{357b1f1c-ebd5-4c42-9bc8-714e9e2f2e3e}{251}" paraid="419912102" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Analyzing your assets for optimization&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{6}" paraid="372321351"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Asset managers love this visibility&lt;/span&gt; of their assets and can now look to optimize costs across hardware and software. Utilizing connectors into warranty vendor information, and &lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Neurons for Spend Intelligence&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;, an asset manager can &lt;/span&gt;analyze the data, and understand more complex questions like:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li paraeid="{3e6485c3-c7db-4aaa-b303-50528e9c9394}{255}" paraid="1213508507" xml:lang="EN-US"&gt;What devices are out of warranty, or about to be out of warranty? &amp;nbsp;&lt;/li&gt;
	&lt;li paraeid="{dcb98435-fa97-422c-81e8-74c98a5f4f72}{39}" paraid="1532279659" xml:lang="EN-US"&gt;What devices do we have in stock that are supported and we can reallocate? &amp;nbsp;&lt;/li&gt;
	&lt;li paraeid="{dcb98435-fa97-422c-81e8-74c98a5f4f72}{54}" paraid="61393879" xml:lang="EN-US"&gt;What software is approaching or has already reached end-of-life? &amp;nbsp;&lt;/li&gt;
	&lt;li paraeid="{f7fc1d1b-e5ff-48b3-8e2d-0dab4d89c412}{42}" paraid="960411773" xml:lang="EN-US"&gt;What software are we licensed for and not actually using? &amp;nbsp;&lt;/li&gt;
	&lt;li paraeid="{f7fc1d1b-e5ff-48b3-8e2d-0dab4d89c412}{56}" paraid="871719280" xml:lang="EN-US"&gt;Is there software out there that we can upgrade to the latest release?&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 aria-level="2" paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{81}" paraid="688961268" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Streamlining the asset management lifecycle&lt;span data-ccp-parastyle="heading 2"&gt; process&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{93}" paraid="279036892"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Once you have discovered, reconciled and normalized, you are in a better position to manage your asset management lifecycle processes. Streamlining and automating &lt;/span&gt;the asset management lifecycle enables an organization to gain efficiencies within IT and provide an employee with better experiences. You can identify software that is available and automatically deploy it to the end user or redeploy existing hardware assets to an employee without the long procurement process.&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{133}" paraid="1222402768"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Using the data available and the workflows built into &lt;/span&gt;&lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;&lt;span data-ccp-charstyle="Hyperlink"&gt;&lt;strong&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;Ivanti Neurons for ITAM&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/a&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;, the asset management workflow process is streamlined and optimized.&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2 aria-level="2" paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{152}" paraid="1743511055" role="heading"&gt;&lt;span data-contrast="none" xml:lang="EN-US"&gt;&lt;span data-ccp-parastyle="heading 2"&gt;Gain&lt;span data-ccp-parastyle="heading 2"&gt;ing control over &lt;/span&gt;&lt;span data-ccp-parastyle="heading 2"&gt;your IT &lt;/span&gt;&lt;span data-ccp-parastyle="heading 2"&gt;i&lt;/span&gt;&lt;span data-ccp-parastyle="heading 2"&gt;nvestments&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/h2&gt;

&lt;p paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{170}" paraid="73837106"&gt;&lt;span data-contrast="auto" xml:lang="EN-US"&gt;Gaining control of your IT Investments can only be achieved by having an asset management journey in place to discover, &lt;/span&gt;visualize, optimize and automate the process.&amp;nbsp;&lt;/p&gt;

&lt;p paraeid="{f858dbef-4aa2-4661-ab5e-59629c8af8ce}{186}" paraid="1392778113"&gt;&lt;strong&gt;Want to learn more?&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/avm/c480f6b962054d628361cba329ce70c7"&gt;View this video&lt;span data-contrast="auto" xml:lang="EN-US"&gt;&amp;nbsp;of the key capabilities of the solutions discussed in this blog.&lt;/span&gt;&amp;nbsp;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Wed, 23 Feb 2022 16:57:02 Z</pubDate></item><item><guid isPermaLink="false">a16e953d-3aeb-4619-9891-01349cf0ee54</guid><link>https://www.ivanti.com/blog/i-ve-been-everywhere-and-the-risks-it-can-bring-to-your-workplace</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>I’ve Been Everywhere, and the Risks it Can Bring to your Workplace</title><description>&lt;p&gt;The song&lt;strong&gt; “I’ve Been Everywhere” &lt;/strong&gt;was written by an Australian country singer, Geoff Mack, back in 1959, where he sang about all the towns he visited across Australia. It became famous in the US in 1962 by the country singer Hank Snow where the song hit number one. He of course did make some changes as the names of the towns were now all based in the US. And since then, many versions have been created.&lt;/p&gt;

&lt;p&gt;You will by now be wondering what has this to do with an Ivanti blog?&lt;/p&gt;

&lt;p&gt;At Ivanti we talk about the Everywhere Workplace, and when I think about my work journey over the past 9 years I have worked from a lot of different locations, across hotel lobbies, cafes, airport lounges, offices, the back of an Uber, and of more recent times from home. In many ways I think of myself as a pioneer in the working-from-everywhere workplace as that is what I have been doing for 9 years now. Other than my home and the office, I was always thinking about how and what should I connect to, and how much of a risk is there to my laptop, and the business files that I had in my device.&lt;/p&gt;

&lt;h2&gt;&lt;/h2&gt;

&lt;h2&gt;Balancing Risk and Security with the Employee Experience&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;As organisations are now having to adopt the Everywhere Workplace, many are now trying to work out how to secure the devices connecting into corporate systems, allow a great employee experience for them to be productive, and not overburden the IT department. This is an organisation’s biggest challenge.&lt;/p&gt;

&lt;p&gt;Let’s look at a simple example, which I think many of you may have experienced. When you were at the office, everything worked fine, the printer was setup, the Wi-Fi is configured, and you always had the IT person up the corridor. You get sent home, and the first thing you realise you need is to be able to print to your home printer. And this is when things start to get problematic. IT have set the Standard Operating Environment (SOE) so that you can’t install software onto your work computer, and therefore you cannot install the printer drivers. After various Google searches, and several frustrating hours waiting for IT to set up a Remote Access session, you get the printer drivers installed. There are quite a few things that have happened here. (1) The employee has been unproductive, (2) IT have been overburdened with calls from employees and (3) The employee experience has been, well terrible.&lt;/p&gt;

&lt;p&gt;Before we talk about what we can do to handle these issues, let’s look at another scenario. Jason is the CFO and needs to access the financial systems for end of year reporting. Jason is having to do this from an airport lounge on his way to the board meeting. Normally Jason is always connected via a VPN. Unfortunately, the VPN did not connect, and Jason was unaware, and Jason accesses the financial system across an open airport lounge network. The risk here is that Jason whilst accessing the financial systems is opening up that data to any malicious actor on the network. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Putting Control back into the Employees Hands&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;This might seem counter-intuitive to the scenarios we just discussed but giving control back to your employees will reduce the burden on IT, and greatly increase the productivity and experience for the employee.&lt;/p&gt;

&lt;p&gt;Most organisations have a strict policy, and they remove all administrator rights to an employee’s device. Which may be the right decision on certain devices. In doing this though we raise the burden on IT as we have seen with the printer scenario just discussed.&lt;/p&gt;

&lt;p&gt;Now we don’t want to go and open up a device and give full admin rights to everyone, as that can leave the devices vulnerable, significantly increase security and manageability costs, create legal and liability issues and make compliance difficult.&lt;/p&gt;

&lt;p&gt;The answer is to remove full admin rights, and then provide them with the elevated privileges for the applications and tasks they need (for example add printer). &lt;a href="https://www.ivanti.com/products/application-control"&gt;&lt;strong&gt;Ivanti Application Control&lt;/strong&gt;&lt;/a&gt; provides the ability to set privileges according to these requirements, and will greatly reduce support calls, simplify endpoint security, and reduce TCO.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Dynamic Application Security across your Desktop Device&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Let’s drill into application security further, in our second scenario, Jason the CFO was using the financial system. Now typically the expectation is that the device is on a local network, or a VPN network, and as a result using the financial system would be secured. However, in the “Everywhere Workplace” if the VPN doesn’t connect, and you aren’t aware of that, then you are open to malicious actors.&lt;/p&gt;

&lt;p&gt;What about if we put in place dynamic allow and deny lists? A dynamic allow or deny list will change the behaviour based on the rules you define. In our CFO scenario, we would set up a dynamic list which says, Jason can use the financial application if he is connected to a local network or VPN. If we see Jason is not connected correctly then he is denied the ability to run the application, until he connects to VPN or local office network again.&lt;/p&gt;

&lt;p&gt;Putting in place dynamic allow and deny lists increases security, reduces risk, and provides peace of mind to the business. &lt;a href="https://www.ivanti.com/products/application-control"&gt;&lt;strong&gt;Ivanti Application Control&lt;/strong&gt;&lt;/a&gt; provides a strong capability across allowed and denied lists.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Enabling the Employee&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;As we have witnessed over the past 18 months, we are living in a dynamic environment where one day we are in the office, the next day we aren’t, our roles change, the work requirements change, the applications we use change. And with that the employee may need legitimate access to an application or some sort of administrator access either permanently or for a short period of time. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Application Control integrated with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;&lt;strong&gt;Ivanti Neurons for ITSM&lt;/strong&gt;&lt;/a&gt; allows an employee to request access via the Ivanti Neurons for ITSM Self Service Portal. The request can be full automated for approval, and also the granting of the request. This automated approach ensures fast granting of access, reduces IT burden, and ensures that the appropriate tracking and auditing of changes are kept, and can be reported on against company policies.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Increase Employee Experience in the Everywhere Workplace&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Whether you run Windows or Linux desktops you can secure the applications used across these environments and provide a wonderful employee experience. Find out more about Ivanti Application Control by attending our upcoming webinar on &lt;a href="https://www.ivanti.com/webinars/2021/transforming-the-user-experience-one-desktop-at-a-time" target="_blank"&gt;“Transforming the User Experience …. One Desktop at a Time."&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Learn more about Ivanti Application Control&amp;nbsp;&lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;here&lt;/a&gt;. Or if you’re ready to take a closer look,&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/security/demos/app-control" target="_blank"&gt;schedule a demo&lt;/a&gt;&amp;nbsp;today.&amp;nbsp;&lt;/p&gt;</description><pubDate>Mon, 15 Nov 2021 21:57:25 Z</pubDate></item><item><guid isPermaLink="false">50a4a4a1-8867-4d68-bac4-0a13bc2749ae</guid><link>https://www.ivanti.com/blog/improving-the-employee-experience-with-proactive-service-management-1</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>Improving the Employee Experience with Proactive Service Management</title><description>&lt;p&gt;Recently I was thinking about the topic “How do you improve the employee experience?” Many organisations drive this from an IT perspective with concepts like a Self-Service Portal, or Teams Channels, chatbots, even Social IT boards. These are all great ideas, but are they truly addressing employee experience?&lt;/p&gt;

&lt;p&gt;Let me elaborate on this concept. I have a friend who uses a Service Management solution that has a fantastic Self-Service Portal which allows them to create issues, search the knowledge base, and make service requests such as ordering a new computer. And, the two or three times he has used the Self-Service Portal and interacted with IT he has been happy.&lt;/p&gt;

&lt;h2&gt;Poor Employee Experience&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;But when I asked him what he thought of IT, he said they were never proactive, and he was always having issues with his computer. What? Why? Two weeks earlier, he caught the train into the city; the trip is about 1.5 hours and he had time to work, so out came his laptop and he started working. Thirty minutes later the laptop battery ran out of juice and he could not continue working. Three days later when he powered up his laptop, he received the message, “Your battery can no longer provide sufficient power to your system and needs to be replaced." &amp;nbsp;Six months earlier he had issues with Blue Screen crashes and his motherboard. After the battery issue, he went to the self-service portal, created an issue with IT, who then told him the laptop needed to be replaced and to raise a service request for a replacement laptop.&lt;/p&gt;

&lt;p&gt;Now IT were very quick in identifying what needed to be done and responding to my friend. Within the context of the issue, they did a good job. But my friend was still unhappy with IT. His first comment to me was why couldn’t they be proactive and know about these issues before he did.&lt;/p&gt;

&lt;p&gt;I put a question back to him. If IT was proactive and could see these issues before you did, and even order you a replacement part, or order a new computer without you having to do that, how would you rate them? His comment was a simple 10 out 10. Excellent.&lt;/p&gt;

&lt;h2&gt;Shift Left&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Many organisations talk about the concept of “Shift Left.” What this is trying to do is focus on service excellence and end user empowerment. By just empowering the end user, this only moves the process a very small amount to the left. The largest shift left is proactive identification and resolution of the issues.&lt;/p&gt;

&lt;h2&gt;Automation and Self-Healing&lt;/h2&gt;

&lt;p&gt;Let’s put this into action using &lt;a href="https://www.ivanti.com/products/ivanti-neurons-healing"&gt;&lt;strong&gt;Ivanti Neurons for Healing&lt;/strong&gt;&lt;/a&gt; and see what the process can look like.&lt;/p&gt;

&lt;p&gt;1. An automation process executes against a laptop and based on this process, identifies battery health as poor, terrible, or no longer useable.&lt;/p&gt;

&lt;p&gt;&lt;img alt="stage settings" src="https://static.ivanti.com/sites/marketing/media/images/blog/improving-the-employee-experience-with-proactive-service-management-1.png"&gt;&lt;/p&gt;

&lt;p&gt;2. The results of this then sends a message to the laptop owner via Microsoft teams notifying them of this issue and asking what they would like to do:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Notify IT of the issue&lt;/li&gt;
	&lt;li&gt;Request a new laptop&lt;/li&gt;
	&lt;li&gt;Ignore the issue for now&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="adding a node to stage settings" src="https://static.ivanti.com/sites/marketing/media/images/blog/improving-the-employee-experience-with-proactive-service-management-2.png"&gt;&lt;/p&gt;

&lt;p&gt;3. As a result of this Teams interaction, the automation process will either:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Create a service request for a new laptop&lt;/li&gt;
	&lt;li&gt;Notify IT of the issue&lt;/li&gt;
	&lt;li&gt;Ignore the issue for a while longer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;4. Now of course you could skip the Microsoft Teams interaction but having that notification capability keeps the user engaged and aware of what is happening, and proactively involved.&lt;/p&gt;

&lt;p&gt;Putting this all together what does this automation process look like?&lt;/p&gt;

&lt;p&gt;&lt;img alt="process flow chart" src="https://static.ivanti.com/sites/marketing/media/images/blog/improving-the-employee-experience-with-proactive-service-management-3.png"&gt;&lt;/p&gt;

&lt;p&gt;This shift left move enables the user to work without distraction and interruption. How many times do we as users Google how to fix something on our work laptop? Why? Because we feel we can get this resolved immediately ourselves, rather than having to logon to the self-service portal, log an issue, wait for an IT person to reply, and arrange a common time for the IT person to remote into your computer -- only to have them try the same things you have already tried and tell you what you already know.&lt;/p&gt;

&lt;p&gt;Think about the different issues you have had recently, or maybe colleagues have had. Let’s list a few:&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="NaN"&gt;&lt;strong&gt;Battery Health.&lt;/strong&gt; We’ve already covered this one, but the reality is users don’t know about their battery health until they need a new battery, and sometimes that is during an important presentation.&lt;/li&gt;
	&lt;li value="NaN"&gt;&lt;strong&gt;Print Spooler.&lt;/strong&gt; One recent issue was a vulnerability you may have heard of was with the Windows 10 Print Spooler. Many IT organisations turned off the print spooler, and users found this out when they went to print. Imagine not being able to print that report you were about to give to the CIO.&lt;/li&gt;
	&lt;li value="NaN"&gt;&lt;strong&gt;Blue Screen Crashes.&lt;/strong&gt; How often do you immediately log an issue with IT when you get a blue screen crash? Typically, it would take three to five times before you say enough is enough. But if this happens automatically and, behind the scenes, the automation creates an IT Issue, they will be aware the first time.&lt;/li&gt;
	&lt;li value="NaN"&gt;&lt;strong&gt;Application Crashes.&lt;/strong&gt; Again, how quickly do you really get around to telling IT that the Application crashes? Often this one goes undetected until you are discussing this over the watercooler.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Now I have only listed four scenarios, and I am sure that you can list many more. There are so many trivial untold stories that often never get to IT. Imagine knowing about these issues before the employee raises it, and even better resolving it proactively. &lt;a href="https://www.ivanti.com/products/ivanti-neurons-healing"&gt;Ivanti Neurons for Healing&lt;/a&gt; comes with many predefined checks like the ones described above and also enables you to build your own.&lt;/p&gt;

&lt;h2&gt;A 360-degree view&lt;/h2&gt;

&lt;p&gt;Automation and Self-Healing are two key aspects of driving a better employee experience and another area to consider is having a 360-degree view of the employee. All Service Management platforms have data about an employee. They can tell you their name, email, phone, manager, location, building, the incidents and requests they have initiated, and even the assets they own. While this data is useful, it is static or historical data. How much better would it be if we could get a real time view about the user, the devices, and what is happening at that time: incidents logged, performance of the laptop, and other information.&lt;/p&gt;

&lt;p&gt;&lt;img alt="device detail page" src="https://static.ivanti.com/sites/marketing/media/images/blog/improving-the-employee-experience-with-proactive-service-management-4.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-workspace"&gt;Ivanti Neurons Workspace&lt;/a&gt; enables you to view user device data as well as detailed information like performance, recent incidents logs, software, patches etc. This information gives an IT analyst in-depth and powerful real time information which they can use to quickly identify and remediate.&lt;/p&gt;

&lt;h2&gt;New Employee Experience&lt;/h2&gt;

&lt;p&gt;Finally, what if we could understand the real employee experience? In nearly all service management platforms, this is achieved via sending surveys in response to issues or requests. These are great as point-in-time views, but do not give a true holistic view of a user’s experience. As we discussed earlier, my friend was not happy with IT due to the issues he was having with his computer. If we could bring together all that information into one place and, using analytics, give a score across areas of an employee, then we could have an employee index that gives us the ultimate view of the employee.&lt;/p&gt;

&lt;p&gt;At Ivanti we are putting the employee first, and through improving employee experience, we can empower everyone in the Everywhere Workplace. &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-itsm" target="_blank"&gt;Ivanti Neurons for ITSM&lt;/a&gt; together with &lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;Neurons hyperautomation&lt;/a&gt; (Healing and Workspace) combine to enable proactive service models that makes for a better employee experience. Are you interested in learning more about how Ivanti can help you put your employees first? &lt;a href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=2ahUKEwjSx7vo16LzAhUErJ4KHYtYAmAQFnoECBgQAQ&amp;amp;url=https%3A%2F%2Fwww.ivanti.com%2Fcompany%2Fcontacts&amp;amp;usg=AOvVaw1h1z9O5XyW_r7kq71HZuxF" target="_blank" rel="noopener"&gt;Reach out to us and we’ll be glad to help&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 28 Sep 2021 22:23:26 Z</pubDate></item></channel></rss>