<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/authors/marcel-shaw/rss" /><link>https://www.ivanti.com/en-au/blog/authors/marcel-shaw</link><item><guid isPermaLink="false">37a0e67e-5d76-4842-831b-d8e912ea9457</guid><link>https://www.ivanti.com/en-au/blog/whats-difference-itil-itsm</link><atom:author><atom:name>Marcel Shaw</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/marcel-shaw</atom:uri></atom:author><category>Service Management</category><title>ITSM vs ITIL: What's the Difference Between ITIL and ITSM?</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank" rel="noopener"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/02/cta.survey.160x600.png"&gt;&lt;/a&gt;For organizations that are building or expanding their &lt;a href="https://www.ivanti.com/en-au/service-management" target="_blank" rel="noopener"&gt;IT Service Management&lt;/a&gt; offerings, it is important to understand the difference between ITIL (Information Technology Infrastructure Library)&amp;nbsp;and ITSM (IT Service Management). And because ITIL and ITSM are constantly changing, it is critical to keep up with the latest technology.&lt;/p&gt;

&lt;p&gt;Many years ago, I worked as an IT support analyst helping companies with a software product that managed their documents on the network. When customers called for help, I used a software program to open an incident that described:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The issue&lt;/li&gt;
	&lt;li&gt;The caller’s identity &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The date and time the incident was opened&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The IT department I worked for supported our organization and our customers with all their IT needs. This included helping customers with IT issues, creating knowledge articles, and providing assets to employees so they could do their jobs.&lt;/p&gt;

&lt;p&gt;For those supporting IT, you often hear terms such as "ITIL" and "ITSM" when discussing IT Service Management.&lt;/p&gt;

&lt;p&gt;So you might be wondering...&lt;/p&gt;

&lt;h2&gt;What is&amp;nbsp;ITIL and ITSM?&lt;/h2&gt;

&lt;p&gt;Let's start here...&lt;/p&gt;

&lt;h2&gt;What is ITIL (IT Infrastructure Library)?&lt;/h2&gt;

&lt;p&gt;In the 1980s, IT Service Management best practices emerged as most organizations were migrating or planning to migrate to digital technology. The term ITIL was later introduced to refer to these best practices.&lt;/p&gt;

&lt;h3&gt;Definition of ITIL:&lt;/h3&gt;

&lt;p&gt;IT Infrastructure Library (ITIL) refers to a group of documents that provide a framework and best practices for building an IT Service Management (ITSM) solution. Organizations supporting an IT infrastructure can increase efficiency while reducing service management costs if they follow recommended ITIL processes.&lt;/p&gt;

&lt;p&gt;In addition to best practices, ITIL provides common terminology, such as “Incident,” “Problem,” “Change,” “Configuration Item (CI),””Knowledge,” and “Configuration Management Database (CMDB),” all of which are examples of terms used by those who support IT.&lt;/p&gt;

&lt;p&gt;Education that focuses on ITIL best practices is available for people who wish to gain a better understanding of ITIL. Furthermore, ITIL certifications can be valuable to have on a resume and are offered in a variety of areas (see below).&lt;/p&gt;

&lt;h2&gt;What is ITSM (IT Service Management)?&lt;/h2&gt;

&lt;p&gt;IT Service Management (ITSM) is sometimes mistaken as a software solution. In reality, ITSM is about process, people, and technology. Software is one component of an ITSM solution.&lt;/p&gt;

&lt;h3&gt;Definition of ITSM:&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.techtarget.com/searchitoperations/definition/ITSM" target="_blank" rel="noopener"&gt;IT Service Management&lt;/a&gt; is a strategic approach for designing, delivering, managing, and improving the way information technology (IT) is used within an organization. The goal of IT Service Management is to ensure that the right processes, people, and technology are in place so that the organization can meet its business goals.&lt;/p&gt;

&lt;h3&gt;Components of ITSM Software&lt;/h3&gt;

&lt;p&gt;ITSM software tools usually come with several components such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Database&lt;/li&gt;
	&lt;li&gt;Business Objects (u, groups, roles, etc.)&lt;/li&gt;
	&lt;li&gt;Process Engine&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These software solutions that support ITSM are typically designed to align with ITIL best practice recommendations.&lt;/p&gt;

&lt;h2&gt;ITIL &amp;amp; ITSM Certifications&lt;/h2&gt;

&lt;p&gt;Organizations such as &lt;a href="https://www.pinkelephant.com/en-US/" target="_blank" rel="noopener"&gt;Pink Elephant&lt;/a&gt; provide ITIL certification services for ITSM software providers.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Agile&lt;/li&gt;
	&lt;li&gt;Lean IT&lt;/li&gt;
	&lt;li&gt;ITIL® &amp;amp; ITSM&lt;/li&gt;
	&lt;li&gt;And more&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Summary&lt;/h2&gt;

&lt;p&gt;IT support departments that only provide &lt;a href="https://www.ivanti.com/customers/service-corporation-international" rel="noopener" target="_blank"&gt;Incident Management&lt;/a&gt; are often referred to as a &lt;a href="https://marcelshaw.com/2016/03/help-desk-vs-service-desk-whats-difference/" rel="noopener noreferrer" target="_blank"&gt;Help Desk&lt;/a&gt; or ticketing solution. IT support organizations that follow the majority of ITIL best practices are typically referred to as a Service Desk solution. Although some ITIL recommendations might not be practical for every organization, when building an IT Service Management solution, ITIL best practices are a good place to start.&lt;/p&gt;

&lt;p&gt;Be sure to subscribe to news feeds and forums that discuss ITSM technology in order to stay informed about the latest technology updates and trends regarding ITIL and ITSM.&lt;/p&gt;</description><pubDate>Mon, 02 Mar 2020 18:01:42 Z</pubDate></item><item><guid isPermaLink="false">cd49bf21-ac50-4240-b10d-7a227077b795</guid><link>https://www.ivanti.com/en-au/blog/10-reasons-why-it-asset-management-is-key-to-cybersecurity</link><atom:author><atom:name>Marcel Shaw</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/marcel-shaw</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>10 Reasons Why IT Asset Management is Key to Cybersecurity</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank" rel="noopener"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-experts.png"&gt;&lt;/a&gt;The foundation of an effective cybersecurity strategy is knowledge about the environment. IT asset management (ITAM) enables organizations to know what assets they have and where they are located, ensuring that all assets are tracked so they can be secured properly. Below are 10 reasons to include ITAM in your cybersecurity strategy:&lt;/p&gt;

&lt;h3&gt;1. Mitigates Risk&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Uncertainty about security threats, legal liabilities, and unpredictable events are much worse for IT security administrators when they don’t know where assets are located, how they are managed, and if they are vulnerable. ITAM provides a picture of the IT assets being used in the common operating environment. When IT assets are properly tracked, administrators can lower the security risks that come from unknown, lost, or misconfigured IT assets.&lt;/p&gt;

&lt;h3&gt;2. Provides Software Asset Cost Control&lt;/h3&gt;

&lt;p&gt;When organizations know what software they have, they can reclaim unused software and reallocate it and avoid purchasing a new license for the requested software. Managing too many software applications increases the security risks that come from outdated software or software that hasn’t been patched. With proper IT asset management, organizations are better equipped to control software requests and software purchases.&lt;/p&gt;

&lt;h3&gt;3. Helps Ensure Software is Updated and Patched&lt;/h3&gt;

&lt;p&gt;Older versions of software, and software that isn’t properly patched can be a security risk for an organization. ITAM tracks assets in production and assets in storage. With accurate and complete inventory data, IT administrators can verify that all IT assets are counted and configured with the appropriate tools that will keep software applications up-to-date.&lt;/p&gt;

&lt;h3&gt;4. Provides Hardware Asset Control&lt;/h3&gt;

&lt;p&gt;Unauthorized or unknown IT assets can introduce a security risk to the network. ITAM along with network discovery tools will help IT administrators see all devices that connect to the network. When administrators know what is connecting to the network, they can put checks in place to verify that assets are compliant with security controls and updates.&lt;/p&gt;

&lt;p&gt;Assets that don’t check into the network for a period of time can also introduce a security risk. With ITAM, administrators can be notified if an asset doesn’t report into the network, allowing them to investigate missing assets that have been stolen or lost. In addition to unexpected legal costs or fines, missing IT assets with sensitive data could become a public relations nightmare for an organization.&lt;/p&gt;

&lt;h3&gt;5. Locates IT Assets&lt;/h3&gt;

&lt;p&gt;ITAM helps IT administrators see where assets are physically located. It shows who is using the asset as well as the associated cost center or department where the asset is used. When IT assets don’t report into the network, or if they don’t respond properly to network security updates, it’s important to know where the asset is located so that technicians can quickly locate the asset to perform a visual inspection.&lt;/p&gt;

&lt;h3&gt;6. Maps the Purpose of IT Assets so that Appropriate Security Controls are Applied&lt;/h3&gt;

&lt;p&gt;ITAM enables administrators to document the purpose of an IT asset. ITAM solutions can associate IT assets to projects or to an IT service, providing security administrators the information they need to properly secure each asset. For example, servers purchased for a testing environment could require security controls that are much different than servers purchased to provide web services in a live environment.&lt;/p&gt;

&lt;h3&gt;7. Maps Software Assets&lt;/h3&gt;

&lt;p&gt;ITAM will report what software packages are licensed by the organization, in addition to what the software does for the organization. When software titles are mapped to software assets, IT administrators can avoid purchasing redundant software. Reducing the quantity of software applications that IT is required to support will lower security risk.&lt;/p&gt;

&lt;h3&gt;8. Sets Asset Priority by Categorizing IT Assets&lt;/h3&gt;

&lt;p&gt;Not all assets are equal in an IT environment. ITAM can categorize IT assets by their operational function. For example, an IT asset categorized as critical to IT service operations could be associated with a configuration item (CI), then managed in a configuration management database with configuration management processes to ensure that any changes, updates, or modifications are approved and scheduled using a change management process.&lt;/p&gt;

&lt;p&gt;IT assets that contain sensitive or proprietary information should be categorized accordingly to ensure they are stored in a secure location and, if compromised, assigned to the appropriate incident-response process with the correct level of urgency. When properly categorized, IT assets with sensitive information can be assigned to relevant disposal processes that ensure data is properly removed from a device before it is discarded.&lt;/p&gt;

&lt;h3&gt;9. Improves Reporting Accuracy for Security Administrators&lt;/h3&gt;

&lt;p&gt;ITAM can improve the accuracy of reports created by security administrators. Consider using the IT asset management database as a source of truth to verify that each asset has been counted and configured with the appropriate security controls. Assets that go unnoticed might not get the proper security controls, creating a security risk to the network.&lt;/p&gt;

&lt;h3&gt;10. Tracks Non-traditional IT Components, Such as IoT&lt;/h3&gt;

&lt;p&gt;Non-traditional IT devices, such as IoT, continue to flood the network. IT administrators need to document all devices, both traditional and non-traditional, so they can assess the security risk accurately.&lt;/p&gt;

&lt;p&gt;Although security risks associated with a smart lightbulb may seem minimal, software that controls the smart lightbulb could be compromised easily if not properly secured. ITAM keeps non-traditional IT devices visible to security administrators, ensuring that all devices, such as IoT hardware and its supporting software, are properly secured and kept current with the latest software and security updates.&lt;/p&gt;
</description><pubDate>Thu, 31 Oct 2019 19:01:46 Z</pubDate></item><item><guid isPermaLink="false">deebd78f-4a2c-4aa4-b0f7-b5adf275fbf3</guid><link>https://www.ivanti.com/en-au/blog/uem-vs-itam-what-s-the-difference</link><atom:author><atom:name>Marcel Shaw</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/marcel-shaw</atom:uri></atom:author><category>Service Management</category><category>Endpoint Management (UEM)</category><title>UEM vs. ITAM – What’s the Difference?</title><description>&lt;p&gt;In 1996, Washington, DC and its surrounding communities were hit with a tremendous snow storm causing businesses to shut down across the entire region. Today, advances in technology allow people to work from almost anywhere, eliminating “snow day” shutdowns for most office workers.&lt;/p&gt;

&lt;p&gt;Mobility solutions, cloud solutions, and light weight laptops have given employees access to the tools they need to do their jobs from almost any location. However, today’s technology advancements are straining IT departments as they try to support various IT solutions across multiple platforms.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Demands on IT administrators will not slow down this year as most organizations are driving their digital transformation strategy to keep up with competitors and customer demands. To achieve digital transformation, organizations are implementing &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank" rel="noopener"&gt;Unified Endpoint Management (UEM)&lt;/a&gt; solutions along with &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank" rel="noopener"&gt;IT Asset Management (ITAM)&lt;/a&gt; solutions. Although both strategies are focused on IT assets, their objectives are not the same. What’s the difference?&lt;/p&gt;

&lt;h2&gt;Unified Endpoint Management (UEM)&lt;/h2&gt;

&lt;p&gt;To support IT assets, IT administrators have to maintain and configure devices to use VPN services, email services, and connectivity services such as Wi-Fi. However, maintaining devices requires administrators to enforce access policies, install updates, control applications, deploy and manage legacy applications, enforce encryption, manage printers, and to perform audits.&lt;/p&gt;

&lt;p&gt;The challenge faced by administrators is to perform these tasks across a diverse environment with multiple platforms and operating systems. The objective of UEM is to simplify the process of managing a diverse set of IT assets through a single interface.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gartner.com/doc/3883574/magic-quadrant-unified-endpoint-management" target="_blank" rel="noopener"&gt;According to Gartner&lt;/a&gt;, “UEM refers to a new class of tools that can act as a single management interface for mobile, PC, and other devices.”&lt;/p&gt;

&lt;p&gt;UEM solutions are vital for IT departments trying to manage the influx of IT assets coming on to the network. Without a UEM solution, IT administrators would have to learn and understand multiple tools in order to complete a single task. For this reason, many organizations are turning to UEM solutions as a way to deploy, manage, and a secure their IT assets across multiple platforms.&lt;/p&gt;

&lt;p&gt;Gartner claims that “I&amp;amp;O leaders should expect and plan to replace enterprise mobility management and client management tools with UEM to support modern OS’s.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To achieve endpoint management from a single console, UEM solutions typically require four key components:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Discovery&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because IT assets need to be discovered and documented into the UEM solution, discovery tools are essential. UEM discovery tools work across multiple platforms and operating systems.&amp;nbsp;&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="2"&gt;&lt;strong&gt;Security&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;UEM solutions need to secure the IT assets they manage. To secure IT assets, UEM solutions ensure that applications are kept up to date, that proper security controls are installed, and that policies are applied.&amp;nbsp;&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="3"&gt;&lt;strong&gt;Integration&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Integration is a key component for UEM solutions. This gives administrators the ability to see and manage all IT assets from a single console, thus eliminating endpoint silos. Without integration, administrators would be required to learn and use multiple management interfaces to manage IT assets across platforms.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="4"&gt;&lt;strong&gt;Automation&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When UEM solutions are integrated with other solutions on the network, automation can drastically reduce overhead by automating tasks that are typically performed by a human. For example, when a new employee comes on to the network, a UEM automated task could be triggered by a Human Resource (HR) application to automatically deliver software packages required for the new employee.&lt;/p&gt;

&lt;p&gt;It is important to note that Process Automation is a key component of digital transformation. &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2018/12/19/the-top-digital-transformation-trend-for-2019//#639353ab3481" target="_blank" rel="noopener"&gt;Ashish Deshpande writes about this on Forbes.com:&lt;/a&gt;&amp;nbsp;"Ultimately, people — not technology — drive change. When your people aren’t wasting time on non-core activities or manual workarounds, they can do more of what’s important."&lt;/p&gt;

&lt;h2&gt;IT Asset Management (ITAM)&lt;/h2&gt;

&lt;p&gt;An IT asset refers to both hardware and software used to support an organization’s business objectives. IT Asset Management (ITAM) provides standards, processes, policies, and measurements for the purpose of increasing IT asset control and compliance in addition to reducing risk and costs. Ultimately, ITAM provides organizations with accurate inventory reports.&lt;/p&gt;

&lt;p&gt;With accurate inventory reports, organizations are able to make informed IT purchase decisions. The challenge with managing IT assets is that IT assets are often updated, moved, and refreshed, which makes it difficult to maintain up to date asset information.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Inaccurate IT asset reports expose organizations to unnecessary IT purchases, software audits, and security breaches. ITAM best practices include processes that map IT assets to their contractual and financial information which enables organizations to track the overall cost associated with each IT asset.&lt;/p&gt;

&lt;p&gt;With ITAM, IT assets are tracked from purchase to disposal which is referred to as IT asset lifecycle management. Lifecycle management ensures that when hardware is refreshed, software licenses are properly harvested from decommissioned devices, so they can be redeployed to new devices.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gartner.com/it-glossary/it-asset-management-itam" target="_blank" rel="noopener"&gt;According to Gartner,&amp;nbsp;&lt;/a&gt;“IT asset management (ITAM) provides an accurate account of technology asset lifecycle costs and risks to maximize the business value of technology strategy, architecture, funding, contractual and sourcing decisions.”&lt;/p&gt;

&lt;p&gt;To achieve asset management objectives, ITAM solutions require three key components:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Discovery&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;IT assets need to be documented into the ITAM database when they are acquired and when they change. Without efficient discovery services, IT assets can go unnoticed or get lost, which increases an organization’s security risk&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="2"&gt;&lt;strong&gt;Integration&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Integration gives administrators the ability to see and manage all IT assets from a single solution. Without integration, asset administrators would have to use additional tools, such as spreadsheets to obtain and maintain accurate inventory information.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="3"&gt;&lt;strong&gt;Automation&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Automation reduces human error. Mistakes can lead to inaccurate inventory information which increases risk and costs associated with IT assets. ITAM solutions often use automation tools for asset requests.&lt;/p&gt;

&lt;p&gt;With regards to digital transformation, &lt;a href="https://www.forbes.com/sites/forbestechcouncil/2018/12/19/the-top-digital-transformation-trend-for-2019/" target="_blank" rel="noopener"&gt;Deshpande recommends the following:&lt;/a&gt;&amp;nbsp;“You don't have to automate every process at once. Start with something that's fairly common, involves multiple stakeholders and is performed reasonably often, like a purchase order”&lt;/p&gt;

&lt;h2&gt;Summary&lt;/h2&gt;

&lt;p&gt;UEM and ITAM are important to any organization heavily dependent on technology to achieve business objectives. UEM simplifies endpoint management with a single interface while ITAM reduces IT asset costs by keeping decision-makers informed. Furthermore, both UEM and ITAM are critical for those organizations trying to achieve digital transformation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank" rel="noopener"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/01/hardware.jpg"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 22 Jan 2019 18:59:14 Z</pubDate></item></channel></rss>