<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Service Management</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/topics/service-management/rss" /><link>https://www.ivanti.com/en-gb/blog/topics/service-management</link><item><guid isPermaLink="false">1c7af279-dbf0-42c0-a65f-3d302c404e82</guid><link>https://www.ivanti.com/en-gb/blog/agentic-ai-for-it-not-all-agents-are-created-equal</link><atom:author><atom:name>Meeta Dash</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/meeta-dash</atom:uri></atom:author><category>Service Management</category><title>Not All Agents Are Created Equal: Getting Agentic AI Right for IT</title><description>&lt;p&gt;Three months ago, a CIO told me her organisation had “already deployed agents.” Her endpoint team assumed she meant the telemetry clients on every managed laptop. Her service desk thought she meant AI chatbots. Meanwhile, her security architect heard “autonomous decision-making.” They were all right and all talking past each other.&lt;/p&gt;

&lt;p&gt;This is the agent confusion problem. It sounds like a semantics issue, but it creates real misalignment when teams try to get serious about implementing agentic AI. So, let’s untangle it.&lt;/p&gt;

&lt;h2&gt;Three types of “agents” for IT — and how they fit together&lt;/h2&gt;

&lt;h4&gt;1. Endpoint agents&lt;/h4&gt;

&lt;p&gt;Endpoint agents are the lightweight clients that have run silently on managed devices for decades — collecting telemetry, executing policies, applying patches. If you run a modern &lt;a href="https://www.ivanti.com/blog/unified-endpoint-management-uem-service-management-itsm-critical-connections" target="_blank" rel="noopener"&gt;endpoint management platform&lt;/a&gt;, they’re already across your fleet doing the quiet, continuous work. They're your infrastructure layer: always listening and reporting but &lt;i&gt;not &lt;/i&gt;making decisions.&lt;/p&gt;

&lt;h4&gt;2. Automation bots and workflows&lt;/h4&gt;

&lt;p&gt;Automation bots and workflows handle the repetitive, structured processes IT runs on: proactive issue identification, self-healing, password resets, account unlocks, software provisioning, approval chains. These aren’t legacy limitations to apologise for. A well-built password reset bot is fast, predictable and exactly right for that job. They're your execution layer: reliable, auditable and purpose-built.&lt;/p&gt;

&lt;h4&gt;3. AI agents&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-digital-assistant"&gt;AI agents&lt;/a&gt; are something genuinely different. Where endpoint agents collect data and automation bots execute tasks, AI agents coordinate both. Orchestrated by large language models (LLMs), they understand intent, reason across context from multiple systems, plan multi-step actions and decide when to escalate an issue that requires human expertise.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;But here’s the nuance that matters:&lt;/i&gt; a well-designed AI agent doesn’t replace the automation bot; it &lt;b&gt;&lt;i&gt;calls &lt;/i&gt;&lt;/b&gt;it. When an employee asks to reset their password through a conversational interface, the AI handles the dialogue, verifies identity, applies policy logic and then triggers the existing workflow to execute. Intelligence orchestrating automation. That’s the architecture worth building toward. Add endpoint telemetry, and the picture gets richer.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Here’s what this looks like in practice:&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;An employee messages: “&lt;i&gt;My laptop has been crawling since the last patch.&lt;/i&gt;”&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The AI agent:&lt;/b&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Interprets the intent, recognises this as a performance issue potentially triggered by a recent change.&lt;/li&gt;
	&lt;li&gt;Pulls real-time CPU load, disc usage and startup process data from the endpoint layer.&lt;/li&gt;
	&lt;li&gt;Triggers a targeted remediation. Not a guess. A data-informed, auditable action.&lt;i&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;i&gt;That’s &lt;/i&gt;what self-healing IT looks like at the conversational layer.&lt;/p&gt;

&lt;h2&gt;What makes agentic AI for ITSM work&lt;/h2&gt;

&lt;p&gt;Getting agentic &lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank" rel="noopener"&gt;AI for IT service management&lt;/a&gt; right comes down to a few critical foundations.&lt;/p&gt;

&lt;h4&gt;Start with clean, current knowledge&lt;/h4&gt;

&lt;p&gt;An AI agent is only as good as what it knows and what context it has. Before enabling any agentic capability, &lt;a href="https://www.ivanti.com/blog/the-importance-of-accurate-data-to-get-the-most-from-ai" target="_blank" rel="noopener"&gt;audit your knowledge base&lt;/a&gt; and ask these key questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Is it current?&lt;/li&gt;
	&lt;li&gt;Is it tagged by use case?&lt;/li&gt;
	&lt;li&gt;Is it maintained after major changes?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Outdated knowledge leads to wrong outputs that quickly destroy employee trust. That said, these same AI agents can be used to accelerate knowledge creation, too. Every resolved ticket is a draught article. Every question the agent can't confidently answer is a knowledge gap it just surfaced for you. The agent becomes a contributor to your knowledge base, not just a consumer of it.&lt;/p&gt;

&lt;h4&gt;Provide context&lt;/h4&gt;

&lt;p&gt;Knowledge alone isn’t enough. Agents need real-time context across your entire IT environment. This includes device data from your CMDB, role and access information from HR systems and ticket history from ITSM. With this context layer, it’s possible to move from a smart-sounding bot to an agent that can close the loop.&lt;/p&gt;

&lt;h4&gt;Set governance guardrails&lt;/h4&gt;

&lt;p&gt;Having control and &lt;a href="https://www.ivanti.com/en-gb/blog/ai-governance-framework-responsible-ai-guardrails"&gt;AI guardrails&lt;/a&gt; is not optional. Be deliberate about what the agent handles autonomously, what needs a human approval step and what always escalates. Having a human in the loop isn’t about being overly cautious. Rather, it’s a deliberate, intelligent design. For anything security-sensitive like MFA changes, privilege adjustments or data access requests, the agent should surface the decision, &lt;i&gt;not &lt;/i&gt;make it unilaterally. Companies must build those thresholds from the start, not try to retrofit them later.&lt;/p&gt;

&lt;h4&gt;Change management&lt;/h4&gt;

&lt;p&gt;Even with the perfect setup, deployment fails when companies don’t consider change management.&lt;/p&gt;

&lt;p&gt;Your service desk team needs a clear mental model of what the agent handles and where they take over. You might think of it like any other division of labour: you don't want overlap. You don't want humans burning cycles on tasks the agent can knock out instantly, and you definitely don't want the agent making calls where policy says a human needs to be in the loop. Clean boundaries keep both sides working at their highest value.&lt;/p&gt;

&lt;p&gt;Your employees need to trust that context won’t be lost mid-conversation when an issue is escalated from agent to human. Immediately letting agents do more than foundational support is how a promising pilot becomes a painful rollback. Start narrow and earn the right to expand.&lt;/p&gt;

&lt;h2&gt;Here’s what success looks like&lt;/h2&gt;

&lt;p&gt;To prove ROI with agentic AI, organisations should focus on operational metrics that reflect real impact and can be improved through better orchestration.&lt;/p&gt;

&lt;p&gt;Ticket deflection shows how effectively agents resolve common requests end to end without human involvement. Auto-remediation highlights when systems can diagnose issues and take approved corrective action, reducing manual effort and queue volume. Mean Time to Resolution (MTTR) reflects how much the system shortens the path from request to outcome by removing handoffs and tool switching.&lt;/p&gt;

&lt;p&gt;Together, these metrics indicate whether agentic AI is truly reducing work, not just shifting it. But the most important measure is end-user satisfaction (CSAT). Speed without satisfaction simply creates faster friction.&lt;/p&gt;

&lt;p&gt;The best agentic AI is invisible. Employees ask for help, get what they need, and move on without noticing the workflows, checks, or automated actions behind the scenes. Organisations that achieve success design agentic systems intentionally, with clear guardrails and a strong understanding of how autonomy reshapes operations.&lt;/p&gt;

&lt;h2&gt;Next steps&lt;/h2&gt;

&lt;p&gt;If you are evaluating the role of self‑service agentic AI in your IT ecosystem, a conversational entry point is often the most practical place to begin. Consolidating incident creation, service requests, knowledge access, and status checks into a single interface can reduce friction for employees while still respecting policies and existing workflows.&lt;/p&gt;

&lt;p&gt;This approach lays the groundwork for a broader agentic platform. For IT leaders under pressure to do more with less, this is the moment to deliberately define how AI should operate, where autonomy adds value, and where guardrails are required.&lt;/p&gt;

&lt;p&gt;Ready to take the next step in your agentic AI journey? Get our &lt;a href="https://www.ivanti.com/resources/whitepapers/navigating-the-shift-to-agentic-ai-in-it-service-management" target="_blank" rel="noopener"&gt;whitepaper&lt;/a&gt; for the framework, maturity model and implementation roadmap you need to succeed.&lt;/p&gt;
</description><pubDate>Wed, 08 Apr 2026 13:00:06 Z</pubDate></item><item><guid isPermaLink="false">c24b27a5-5e73-4e33-a54b-c392e25d7830</guid><link>https://www.ivanti.com/en-gb/blog/it-visibility-see-it-all-or-risk-it-all</link><atom:author><atom:name>Cristiane Villar</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/cristiane-villar-ramos-da-silva</atom:uri></atom:author><category>Service Management</category><title>See It All or Risk It All: The Truth About IT Visibility</title><description>&lt;p&gt;In everyday life, ignoring what you cannot see may feel harmless. In IT, it creates a false sense of security and a costly illusion.&lt;/p&gt;

&lt;p&gt;Although many organisations use some form of &lt;a href="https://www.ivanti.com/en-gb/products/discovery"&gt;asset discovery&lt;/a&gt;, 2026 security research from Ivanti reveals that more than 1 in 3 IT professionals (38%) report having insufficient data about devices accessing their networks, and 45% say they lack adequate information about &lt;a href="https://www.ivanti.com/en-gb/blog/shadow-ai"&gt;shadow IT&lt;/a&gt;. This lack of visibility leaves critical assets at risk of going undetected and unmanaged.&lt;/p&gt;

&lt;p&gt;Yet hybrid environments now span offices, homes, clouds and data centres. As devices, identities, cloud workloads and SaaS tools move across these spaces, many of them fall outside the scope of traditional discovery methods. Unmanaged laptops linger on the network. SaaS tools are adopted without oversight. Cloud resources appear and disappear before the &lt;a href="https://www.ivanti.com/glossary/cmdb" target="_blank" rel="noopener"&gt;CMDB&lt;/a&gt; is updated. The result is an environment filled with assets that are present, influential and completely unseen.&lt;/p&gt;

&lt;p&gt;The cost of partial visibility is far greater than most organisations realise. Any asset that is not tracked or understood becomes a source of risk, unplanned spending and operational inefficiency.&lt;/p&gt;

&lt;p&gt;The scope of this challenge is clearly illustrated in Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank" rel="noopener"&gt;2025 Securing the Borderless Digital Landscape Report&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;3 in 4 IT workers say that personal device use, or BYOD, is a regular occurrence at their organisation. However, just 52% of this same group say their organisations explicitly allow it.&lt;/li&gt;
	&lt;li&gt;At companies where BYOD is&lt;i&gt; not&lt;/i&gt; permitted, 78% of employees disregard the prohibition entirely.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;The issue of shadow technology is increasing even further with the exponential rise in AI use in the workplace. According to that same Ivanti study, nearly a third (32%) of people who use generative AI tools at work admit to keeping their use of AI a secret from their employer.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The good news&lt;/b&gt;&lt;b&gt;:&lt;/b&gt; complete, continuous visibility is possible, and organisations that achieve complete visibility reduce operational costs, eliminate blind‑spot-driven risks and strengthen compliance readiness. Modern discovery approaches now give IT the ability to see every asset, understand its context and manage it with confidence.&lt;/p&gt;

&lt;h2&gt;The hidden costs of partial IT visibility&lt;/h2&gt;

&lt;p&gt;&amp;nbsp;Many organisations assume that achieving visibility over “most” of their assets is good enough, yet when some assets are unseen and unmanaged, critical risks can be hiding right under your nose. Examples of common &lt;a href="https://www.ivanti.com/en-gb/blog/attack-surface-visibility-gaps"&gt;visibility blind spots&lt;/a&gt; include everything from undetected laptops that can appear intermittently on IT scanners, newly-acquired SaaS tools adopted without IT involvement, orphaned cloud workloads that never make it into the CMDB and over-provisioned identities that go unnoticed and unpremeditated.&lt;/p&gt;

&lt;p&gt;When even a small portion of your environment remains unaccounted for, four big problems surface immediately:&lt;/p&gt;

&lt;h4&gt;1. Security weakens&lt;/h4&gt;

&lt;p&gt;Unseen or intermittently visible assets miss patches, skip scans and create openings for attackers. Blind spots slow incident response and make aligning &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank" rel="noopener"&gt;patching priorities&lt;/a&gt; difficult. According to a &lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank" rel="noopener"&gt;2026 global study from Ivanti&lt;/a&gt;, 38% of IT workers say inaccessible and siloed data causes difficulty tracking patch status and rollouts.&lt;/p&gt;

&lt;h4&gt;2. Compliance falters&lt;/h4&gt;

&lt;p&gt;Adding to these security challenges, that same &lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank" rel="noopener"&gt;report&lt;/a&gt; finds that 35% of IT organisations feel that data visibility gaps make it much more challenging for them to maintain compliance.&lt;/p&gt;

&lt;p&gt;Audit evidence becomes fragmented across disconnected tools, spreadsheets and inboxes. Without the ability to confidently track where data lives, it becomes impossible to prove compliance.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;h4&gt;3. Software spend leaks value&lt;/h4&gt;

&lt;p&gt;Even with SaaS management or inventory tools in place, incomplete usage and entitlement data cause overspending. Companies lose roughly 25% of their SaaS budgets to unused entitlements, redundant tools and underutilised licences, according to &lt;a href="https://zylo.com/reports/2025-saas-management-index/" rel="noopener" target="_blank"&gt;Zylo’s 2025 SaaS&amp;nbsp;Management Index&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;2025 Technology at Work&lt;/a&gt; research found that nearly one in three IT workers (31%) say their organisations do not track unused/underused software licences, possibly because they may not have a complete inventory of the total. Moreover, 39% of IT teams say that outdated hardware drives wasteful IT budget spend.&lt;/p&gt;

&lt;p&gt;Every resource you &lt;i&gt;cannot&lt;/i&gt; see — or cannot verify — quietly drain your budget.&lt;/p&gt;

&lt;h4&gt;4. Operations lose efficiency&lt;/h4&gt;

&lt;p&gt;Conflicting or incomplete data forces teams to recheck device information, chase outdated records and remediate issues on the wrong assets. This slows service delivery and increases rework.&lt;/p&gt;

&lt;p&gt;Partial visibility doesn’t just obscure reality. It creates hidden risks, hidden costs and hidden delays.&lt;/p&gt;

&lt;h2&gt;Why IT visibility gaps continue to grow&lt;/h2&gt;

&lt;p&gt;Unfortunately, visibility gaps are widening for many companies. As headcounts, devices, identities and SaaS usage grow, it becomes increasingly difficult for IT teams to maintain complete visibility. Several factors contribute to growing visibility issues, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Shadow IT and SaaS sprawl accelerating faster than IT can keep up.&lt;/li&gt;
	&lt;li&gt;Cloud resources appearing and disappearing within minutes.&lt;/li&gt;
	&lt;li&gt;Remote and hybrid workers connecting to networks outside the corporate network. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Identity sprawl expanding across dozens of apps and platforms.&lt;/li&gt;
	&lt;li&gt;Legacy discovery tools capturing only a fraction of the environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These pressures compound quickly. Employees adopt convenient tools before IT can approve them. When devices, servers, or apps are created in Cloud environments and deleted in minutes, they can be missed by security checks and monitoring. As a result, these short-lived resources might not get patched or protected, creating blind spots that attackers could exploit before anyone notices. Remote workers may never even touch the corporate network. SaaS, identity and device ecosystems expand far faster than legacy discovery tools were designed to track. Without &lt;b&gt;continuous, multi-source visibility&lt;/b&gt;, organisations fall behind almost immediately.&lt;/p&gt;

&lt;p&gt;To close these widening gaps, organisations must shift from reactive, point‑in‑time inventories to a model built on continuous, contextual, real‑time visibility. This is where understanding and achieving true visibility over your entire IT estate becomes critical.&lt;/p&gt;

&lt;h2&gt;IT visibility is more than just an inventory&lt;/h2&gt;

&lt;p&gt;Real visibility is not a list of assets. It is complete, current and trusted intelligence that every team can act on. Total visibility requires identifying every device, SaaS app, identity, cloud workload, configuration and usage signal; no matter where it lives or how long it exists.&lt;/p&gt;

&lt;p&gt;It also means understanding relationships: who owns an asset, what data it touches, its risk level, its compliance impact and whether it is actually being used. This is the foundation that turns discovery from information into operational control.&lt;/p&gt;

&lt;h2&gt;How complete visibility transforms workflows&lt;/h2&gt;

&lt;p&gt;Once visibility becomes continuous and contextual, the entire environment transforms. Modern IT environments require more than passive observation. As threats, workloads and assets scale at unprecedented speed, organisations need intelligent, automated actions to turn visibility into real outcomes. &lt;a href="https://www.ivanti.com/en-gb/ai"&gt;AI-driven insights&lt;/a&gt; and automated workflows empower teams to proactively address security threats, remediate issues and optimise operations without waiting for manual intervention.&lt;/p&gt;

&lt;p&gt;With the right approach, organisations can move beyond partial visibility and finally see:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;every device, application, identity and cloud workload.&lt;/li&gt;
	&lt;li&gt;normalised and reconciled data presented as a single source of truth.&lt;/li&gt;
	&lt;li&gt;vulnerabilities tied to the exact assets and owners affected.&lt;/li&gt;
	&lt;li&gt;automated workflows that trigger patching, quarantines, &lt;a href="https://www.ivanti.com/blog/the-critical-role-of-the-cmdb-in-security-and-vulnerability-management" target="_blank" rel="noopener"&gt;CMDB updates&lt;/a&gt; and ticket closure with proof.&lt;/li&gt;
	&lt;li&gt;discovery that spans agent, agentless, active and passive methods to cover every corner of the hybrid environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How every team benefits from unified asset visibility&lt;/h2&gt;

&lt;p&gt;With unified, reliable asset data, every team benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;b&gt;Security &lt;/b&gt;can map exposures to real assets and respond faster.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;IT operations&lt;/b&gt; can close the loop from discovery to remediation to verification.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;Endpoint teams&lt;/b&gt; can enforce policies consistently.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management"&gt;&lt;b&gt;ITAM&lt;/b&gt;&lt;/a&gt;&lt;b&gt; employees &lt;/b&gt;can optimise spending using accurate usage and entitlement insights, eliminating waste.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;Compliance teams&lt;/b&gt; can produce automated, audit-ready evidence without manual effort.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Achieving complete IT visibility today&lt;/h2&gt;

&lt;p&gt;This level of clarity is achievable today. By using modern discovery approaches that combine agent, agentless, active and passive methods, unified asset intelligence ensures that IT teams achieve complete visibility, even as environments become more complex and distributed.&lt;/p&gt;

&lt;p&gt;Unified asset intelligence ingests up-to-date data from every corner of the organisation, including devices, identities, SaaS applications, cloud workloads and network signals. This data is normalised and consolidated into a single, trusted source of truth.&lt;/p&gt;

&lt;p&gt;Instead of managing partial or fragmented inventories from multiple tools, organisations gain a real-time, holistic view. Each asset is accurately represented with its key details and context, removing blind spots and allowing teams to confidently secure and manage the entire environment; eliminating guesswork, reducing risk and restoring control.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;See how &lt;/b&gt;&lt;a href="https://www.ivanti.com/en-gb/products/discovery"&gt;&lt;b&gt;Ivanti Neurons for Discovery&lt;/b&gt;&lt;/a&gt;&lt;b&gt; can deliver complete visibility to your environment.&lt;/b&gt;&lt;/p&gt;
</description><pubDate>Mon, 06 Apr 2026 12:00:02 Z</pubDate></item><item><guid isPermaLink="false">026e4ef0-d376-42ae-ab9f-7490b91013c7</guid><link>https://www.ivanti.com/en-gb/blog/how-agentic-ai-for-itops-unlocks-value-at-scale</link><atom:author><atom:name>Sterling Parker</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/sterling-parker</atom:uri></atom:author><category>Service Management</category><title>How Agentic AI for ITOps Unlocks Value at Scale</title><description>&lt;p&gt;Here’s&amp;nbsp;a paradox for the AI era:&amp;nbsp;organisations&amp;nbsp;are obsessed with the promise of AI&amp;nbsp;as the key to unlocking productivity and&amp;nbsp;enterprise&amp;nbsp;transformation,&amp;nbsp;and IT teams are all-in&amp;nbsp;on the advantages&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank" rel="noopener"&gt;AI and automation&lt;/a&gt;&amp;nbsp;offer — yet those same organisations are the&amp;nbsp;ones holding&amp;nbsp;that transformation back.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While&amp;nbsp;the majority of&amp;nbsp;IT&amp;nbsp;workers&amp;nbsp;advocate for&amp;nbsp;AI&amp;nbsp;adoption, operational,&amp;nbsp;cultural&amp;nbsp;and budgetary barriers&amp;nbsp;stand in the way of enterprises&amp;nbsp;implementing AI at&amp;nbsp;scale.&amp;nbsp;The result: most companies today have yet to operationalize&amp;nbsp;breakthrough&amp;nbsp;AI and automation&amp;nbsp;use&amp;nbsp;cases that&amp;nbsp;deliver&amp;nbsp;true business value.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s&amp;nbsp;not to&amp;nbsp;say;&amp;nbsp;most companies&amp;nbsp;aren’t&amp;nbsp;using AI — but&amp;nbsp;mainly for&amp;nbsp;completing&amp;nbsp;lower-level&amp;nbsp;tasks and boosting individual productivity. While&amp;nbsp;this is&amp;nbsp;an important step,&amp;nbsp;enterprises will need to think bigger and longer-term to&amp;nbsp;see significant ROI and&amp;nbsp;digital transformation&amp;nbsp;from&amp;nbsp;their&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist" target="_blank" rel="noopener"&gt;AI investments&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Automation&amp;nbsp;and outputs&amp;nbsp;vs.&amp;nbsp;agentic AI&amp;nbsp;autonomy&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;IT teams are ahead of the curve when it comes to generative AI adoption.&amp;nbsp;84% of IT professionals use generative AI tools at work, according to&amp;nbsp;a&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank" rel="noopener"&gt;2025 Ivanti research report.&lt;/a&gt;&amp;nbsp;That same research shows that IT professionals are&amp;nbsp;also overwhelmingly&amp;nbsp;positive&amp;nbsp;toward AI and automation:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;83% expect AI to boost productivity in the next year.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;70% say it will make their work more satisfying.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/25089836"&gt;&lt;/div&gt;

&lt;p&gt;Yet, for all that progress, companies&amp;nbsp;aren’t&amp;nbsp;tapping&amp;nbsp;into the&amp;nbsp;deeper potential of AI-driven technology. Many teams have mastered task-level automation (ticket routing, password resets, log summarization), but few have embraced&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist" target="_blank" rel="noopener"&gt;agentic AI&lt;/a&gt;,&amp;nbsp;which goes beyond execution to autonomous reasoning and optimization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That gap between automation and&amp;nbsp;transformation mirrors&amp;nbsp;a larger&amp;nbsp;problem&amp;nbsp;occurring&amp;nbsp;across industries. While most organisations are already using AI in some capacity, only a few have seen measurable business impact from&amp;nbsp;their AI tools.&amp;nbsp;&lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/seizing-the-agentic-ai-advantage" rel="noopener" target="_blank"&gt;McKinsey&lt;/a&gt;&amp;nbsp;has referred to&amp;nbsp;this&amp;nbsp;situation&amp;nbsp;as&amp;nbsp;“&lt;em&gt;the gen AI paradox&lt;/em&gt;.”&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;disconnect between AI&amp;nbsp;applications&amp;nbsp;and ROI&amp;nbsp;is further&amp;nbsp;validated&amp;nbsp;by an MIT report published in August 2025, which finds that&amp;nbsp;&lt;a href="https://www.axios.com/2025/08/21/ai-wall-street-big-tech" rel="noopener" target="_blank"&gt;a staggering 95% of organizations&lt;/a&gt;&amp;nbsp;found zero return on generative&amp;nbsp;AI despite $30-40 billion worth of investment in it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The reason&amp;nbsp;for the problem is&amp;nbsp;straightforward: generative AI&amp;nbsp;creates. It produces content, automates tasks, and accelerates workflows. However, it&amp;nbsp;doesn’t&amp;nbsp;learn, reason, or adapt on its own. The next phase of enterprise AI will be driven by systems that can interpret, predict&amp;nbsp;and act dynamically:&amp;nbsp;what’s&amp;nbsp;now being defined as&amp;nbsp;&lt;em&gt;agentic&amp;nbsp;AI&lt;/em&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti’s research&amp;nbsp;further underscores the fact that most companies today have yet to integrate more complex AI&amp;nbsp;use&amp;nbsp;cases into their IT workflows.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While 67% of organisations automate ticket routing, fewer than one-third apply AI to root-cause analysis or other predictive use cases. This signals&amp;nbsp;that most teams are still&amp;nbsp;prioritising standard automation for tasks&amp;nbsp;rather than enabling systems to think and act autonomously&amp;nbsp;via&amp;nbsp;agentic&amp;nbsp;AI.&amp;nbsp;&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/25090256"&gt;&lt;/div&gt;

&lt;p&gt;Standard automation&amp;nbsp;and generative AI tools are&amp;nbsp;frequently&amp;nbsp;employed by IT teams to&amp;nbsp;improve individual productivity and handle low-level, repetitive tasks&amp;nbsp;at greater speeds&amp;nbsp;than human intervention alone.&amp;nbsp;The ability to boost efficiency with less time and resources is&amp;nbsp;a critical&amp;nbsp;advantage of AI — particularly for strained IT teams who are&amp;nbsp;always&amp;nbsp;being asked to&amp;nbsp;accomplish&amp;nbsp;more&amp;nbsp;with less. But efficiency gains are only one piece of the puzzle.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti data also reveals a deeper organisational issue:&amp;nbsp;nearly half&amp;nbsp;of IT teams say their organisations lack resilience — the ability to adapt quickly to change, recover from disruption&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;business continuity without excessive manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;True enterprise agility demands autonomous and adaptive&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/ai"&gt;AI&amp;nbsp;solutions&lt;/a&gt;&amp;nbsp;that can&amp;nbsp;anticipate&amp;nbsp;problems, reason through potential&amp;nbsp;solutions&amp;nbsp;and&amp;nbsp;continuously learn how to&amp;nbsp;deliver&amp;nbsp;the most&amp;nbsp;optimal&amp;nbsp;outcomes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where many leading organisations are&amp;nbsp;turning to&amp;nbsp;agentic AI.&amp;nbsp;Autonomous AI agents offer teams the opportunity to&amp;nbsp;reshape&amp;nbsp;traditional IT operations from reactive automation to proactive, goal-driven collaboration.&amp;nbsp;Realising that&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/webinars/2025/revolutionizing-it-service-management-ai-powered-transformation-with-ivanti-neurons"&gt;transforming&amp;nbsp;ITOps&amp;nbsp;with AI&lt;/a&gt;&amp;nbsp;means moving from isolated automation wins to system-wide intelligence.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;High-impact agentic AI use cases in ITSM and&amp;nbsp;ITOps&lt;/h2&gt;

&lt;p&gt;Agentic AI is already moving the needle&amp;nbsp;by reducing&amp;nbsp;downtime,&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/ai-it-cost-management" target="_blank" rel="noopener"&gt;cutting&amp;nbsp;costs&lt;/a&gt;&amp;nbsp;and improving&amp;nbsp;organisational agility.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Five high-impact&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/ai/itsm"&gt;use cases for agentic AI in IT&lt;/a&gt;&amp;nbsp;follow:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Autonomous incident remediation&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/security-controls"&gt;Autonomous remediation&lt;/a&gt;&amp;nbsp;is where AI begins to move from support to strategy. In traditional IT operations,&amp;nbsp;identifying&amp;nbsp;and fixing an issue can take hours of human triage and escalation.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With agentic AI, those same incidents can be detected,&amp;nbsp;diagnosed&amp;nbsp;and resolved in real time&amp;nbsp;—&amp;nbsp;often before users notice any disruption.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agentic AI&amp;nbsp;doesn’t&amp;nbsp;not only&amp;nbsp;detect anomalies within that IT space and diagnose&amp;nbsp;the root&amp;nbsp;cause&amp;nbsp;— it&amp;nbsp;intelligently&amp;nbsp;devises&amp;nbsp;solutions and&amp;nbsp;then&amp;nbsp;executes&amp;nbsp;fixes without human intervention.&amp;nbsp;Moreover, machine learning&amp;nbsp;enables&amp;nbsp;the AI to learn&amp;nbsp;from&amp;nbsp;previous&amp;nbsp;incidents&amp;nbsp;and&amp;nbsp;use this experience to continually refine and improve response efforts going forward.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. Proactive problem prevention&lt;/h3&gt;

&lt;p&gt;Proactive problem prevention&amp;nbsp;happens when&amp;nbsp;AI&amp;nbsp;can&amp;nbsp;anticipate&amp;nbsp;rather than&amp;nbsp;just&amp;nbsp;react&amp;nbsp;to&amp;nbsp;potential tech problems.&amp;nbsp;Instead of&amp;nbsp;solving a known issue,&amp;nbsp;agentic AI continuously&amp;nbsp;monitors&amp;nbsp;data patterns and detects early warning signals in the form of small deviations that might evolve into service disruptions or security issues.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In other words, it moves&amp;nbsp;ITOps&amp;nbsp;toward proactive&amp;nbsp;prevention,&amp;nbsp;monitoring&amp;nbsp;leading&amp;nbsp;indicators&amp;nbsp;and addressing issues before they become significant.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. End-to-end lifecycle management&lt;/h3&gt;

&lt;p&gt;Autonomous AI agents will provide a more comprehensive and effective approach to asset lifecycle management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This lifecycle view of automation extends beyond individual tickets or incidents to touch every stage of IT operations.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;From onboarding new devices to &lt;a href="https://www.ivanti.com/blog/continuous-vulnerability-management" target="_blank" rel="noopener"&gt;patching and decommissioning outdated infrastructure&lt;/a&gt;,&amp;nbsp;agentic&amp;nbsp;AI ensures systems&amp;nbsp;remain&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;and&amp;nbsp;cost-effective.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It not only fixes issues but also detects, diagnoses, and&amp;nbsp;optimises&amp;nbsp;IT systems from provisioning to retirement. It acts as a continuous improvement engine, learning from patterns across the IT ecosystem to proactively&amp;nbsp;optimise&amp;nbsp;resources, streamline&amp;nbsp;updates&amp;nbsp;and reduce the long-term burden on IT staff.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Dynamic change and release management&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Dynamic&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/change-management" target="_blank" rel="noopener"&gt;change and release management&lt;/a&gt;&amp;nbsp;is where agentic AI truly&amp;nbsp;shows&amp;nbsp;its orchestration capabilities. In most enterprises, change management remains a high-friction process, requiring coordination across multiple teams,&amp;nbsp;tools&amp;nbsp;and&amp;nbsp;environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agentic automation&amp;nbsp;transforms&amp;nbsp;this by allowing AI agents to collaborate on complex workflows including cybersecurity incident response and software deployment, working together with minimal human oversight to resolve incidents, provision resources&amp;nbsp;and ensure compliance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These agents act as intelligent coordinators:&amp;nbsp;synchronising&amp;nbsp;updates across systems,&amp;nbsp;validating&amp;nbsp;configurations&amp;nbsp;and rolling back changes automatically when anomalies occur.&amp;nbsp;The result is faster,&amp;nbsp;safer&amp;nbsp;and more predictable change cycles that free IT teams to focus on innovation rather than resource-heavy firefighting.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Autonomous resource and capacity management&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/ai-it-cost-management" target="_blank" rel="noopener"&gt;Resource and capacity management&lt;/a&gt;&amp;nbsp;are some&amp;nbsp;of the most critical&amp;nbsp;—&amp;nbsp;and often overlooked&amp;nbsp;—&amp;nbsp;dimensions of IT performance. Using AI, companies can&amp;nbsp;anticipate&amp;nbsp;future resource needs by analysing historical usage trends, workload fluctuations, and demand surges. Agentic systems can automatically&amp;nbsp;allocate&amp;nbsp;compute power,&amp;nbsp;storage&amp;nbsp;and&amp;nbsp;bandwidth before bottlenecks appear,&amp;nbsp;maintaining&amp;nbsp;optimal&amp;nbsp;performance without constant human oversight.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these self-adjusting systems learn from operational data to continuously fine-tune capacity, reducing waste, minimising&amp;nbsp;costs&amp;nbsp;and ensuring service continuity even during unexpected spikes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Research from IBM’s report,&amp;nbsp;&lt;a href="https://www.ibm.com/downloads/documents/us-en/1443d5c92ec02bcb" rel="noopener" target="_blank"&gt;Agentic AI’s strategic ascent&lt;/a&gt;, underscores this pace of change: by 2027, twice as many executives expect AI agents will make autonomous decisions in workflows. Today, only 24% of executives report that level of&amp;nbsp;autonomy;&amp;nbsp;within two&amp;nbsp;years; 67%&amp;nbsp;expect this to be the norm.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Overcoming barriers&amp;nbsp;and&amp;nbsp;delivering&amp;nbsp;enterprise impact&lt;/h2&gt;

&lt;p&gt;Yet progress often&amp;nbsp;stalls;&amp;nbsp;not for lack of intent, but because of structural barriers. IT leaders must first overcome the obstacles that stand in the way of their evolution to value-focused work. These barriers are multifold: technical,&amp;nbsp;cultural&amp;nbsp;and operational.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even AI-forward IT organisations can lack&amp;nbsp;the structural&amp;nbsp;readiness for deep automation. For&amp;nbsp;example, Ivanti’s “&lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;2025 Technology at Work Report&lt;/a&gt;”&amp;nbsp;found that:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals point to complex tech stacks as an issue in effective IT operations.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;And 72% say their IT and security data&amp;nbsp;is&amp;nbsp;siloed within their organisation.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22342941"&gt;&lt;/div&gt;

&lt;p&gt;Building a sustainable AI strategy requires more than a positive attitude – it demands alignment between IT and the broader business. Successful organisations are the ones aligning technology goals with tangible outcomes, supported by clear data structures, unified processes and teams equipped to manage new AI-driven workflows.&amp;nbsp;Without that alignment, even the best tools struggle to&amp;nbsp;deliver&amp;nbsp;enterprise-wide impact.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/agentic-ai-operating-model" rel="noopener" target="_blank"&gt;IBM research&lt;/a&gt;&amp;nbsp;reveals another layer: 45% of executives cite a lack of visibility into AI decision-making as a major barrier.&amp;nbsp;This AI&amp;nbsp;“black box” problem&amp;nbsp;isn’t&amp;nbsp;just a technical one.&amp;nbsp;It’s&amp;nbsp;also about trust, clear&amp;nbsp;communications&amp;nbsp;and&amp;nbsp;AI guardrails. Scaling agentic AI requires governance frameworks where automated decisions can be understood,&amp;nbsp;audited&amp;nbsp;and explained.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Such transformation must keep humans in focus: design for&amp;nbsp;augmentation&amp;nbsp;— not&amp;nbsp;replacement.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The agentic AI operating model&lt;/h2&gt;

&lt;p&gt;Think of agentic&amp;nbsp;ITOps&amp;nbsp;as much more than an&amp;nbsp;efficiency&amp;nbsp;upgrade, but as a total reshaping of traditional IT workflows.&amp;nbsp;Organisations leading the next phase of transformation are the ones rethinking how their systems make decisions,&amp;nbsp;collaborate&amp;nbsp;and adapt autonomously across the enterprise.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That level of&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report" target="_blank" rel="noopener"&gt;digital&amp;nbsp;transformation&lt;/a&gt;&amp;nbsp;requires leadership from the top. CIOs and executive stakeholders must pivot from experimentation to execution. They must look at embedding agentic AI not as a side project, but as a core operating model that aligns technology,&amp;nbsp;data&amp;nbsp;and people toward shared outcomes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That pivot marks the real test ahead.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The future ROI of agentic AI initiatives&lt;/h2&gt;

&lt;p&gt;Even with the productivity boost enjoyed with generative AI tech, IT teams&amp;nbsp;don’t&amp;nbsp;need&amp;nbsp;more&amp;nbsp;tools. They need intelligence that delivers measurable outcomes. Teams should&amp;nbsp;establish&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/how-to-measure-the-business-impact-of-digital-employee-experience-dex" target="_blank" rel="noopener"&gt;before-and-after metrics that resonate with IT and business leaders&lt;/a&gt;. Beyond efficiency gains (time saved, faster resolution, lower costs), measure labour savings, fewer resource-intensive outages&amp;nbsp;and&amp;nbsp;reduced tool sprawl.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Transformational organisations see greater impact across every business&amp;nbsp;metric,&amp;nbsp;including productivity, efficiency, revenue growth, brand&amp;nbsp;strength&amp;nbsp;and customer loyalty, than those that limit AI to incremental and even superficial gains.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In fact,&amp;nbsp;organisations that excel in three key AI adoption areas are 32 times more likely to achieve top-tier business performance, according to that same&amp;nbsp;&lt;a href="https://www.ibm.com/downloads/documents/us-en/1443d5c92ec02bcb" rel="noopener" target="_blank"&gt;IBM report&lt;/a&gt;&amp;nbsp;referenced earlier.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The bottom line&lt;/h2&gt;

&lt;p&gt;The next 12 to&amp;nbsp;24 months&amp;nbsp;will test IT leaders’ ability to translate experimentation into sustained value. Those who embrace agentic AI early will build organisations that learn faster, adapt continuously, preempt potential&amp;nbsp;issues&amp;nbsp;and&amp;nbsp;recover from disruption&amp;nbsp;instinctively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT has regularly shown that&amp;nbsp;they're&amp;nbsp;fully willing and committed to AI adoption. Now it must lead again, in depth. Agentic AI marks the next maturity stage: self-learning, self-healing&amp;nbsp;and&amp;nbsp;self-optimising systems that enable greater agility and resilience across the enterprise.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn’t&amp;nbsp;“set and forget.” IT teams must build, train, monitor,&amp;nbsp;measure&amp;nbsp;and refine agentic AI to ensure value realisation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To learn more about the role of AI as a transformative tool for IT operations and breakthrough use cases for agentic AI and automation&amp;nbsp;in IT, see Ivanti’s research report: “&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank" rel="noopener"&gt;AI: The Future of ITSM Automation&lt;/a&gt;.”&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 05 Jan 2026 17:00:02 Z</pubDate></item><item><guid isPermaLink="false">6ce75b29-a266-424a-a327-552466aa6ba7</guid><link>https://www.ivanti.com/en-gb/blog/itam-cybersecurity</link><atom:author><atom:name>Julian Critchfield</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/julian-critchfield</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>ITAM: Your Unexpected First Line of Cyber Threat Defence</title><description>&lt;p&gt;When the conversation turns to cybersecurity, people often think of firewalls, intrusion detection systems or state-of-the-art endpoint protection. Yet, beneath these sophisticated shields is an essential (and often unsung) foundation: &lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management"&gt;robust IT Asset Management (ITAM)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For CIOs guiding mid-sized and enterprise organisations through an increasingly perilous digital landscape, ITAM offers not just operational clarity, but a powerful first line of cyber threat defence.&lt;/p&gt;

&lt;p&gt;Below, we’ll explore how comprehensive ITAM delivers critical visibility into your organisation’s technology environment, strengthens your defences against evolving cyber threats, supports regulatory compliance and accelerates security operations. Read on to discover how making ITAM a core part of your strategy can help prevent costly breaches and build true cyber resilience.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Global cyberattacks rose &lt;a href="https://nordlayer.com/blog/cybersecurity-statistics-of-2024/" rel="noopener" target="_blank"&gt;30% YoY&lt;/a&gt;, and ransomware attacks now average 20–25 major incidents per day.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Why ITAM matters: Cybersecurity challenges start with obscured visibility&lt;/h2&gt;

&lt;p&gt;Cyber threats almost invariably exploit the weaknesses organisations can’t see. Shadow IT, obsolete devices, rogue software and unauthorised access points are invisible vulnerabilities that slip through the cracks of traditional security. A comprehensive asset inventory isn’t just good housekeeping — it's the starting point for effective cyber risk management.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Despite &lt;a href="https://www.securitysolutionsmedia.com/2024/02/02/lack-of-visibility-still-a-major-cause-of-cyber-risk-exabeam-idc-report/" rel="noopener" target="_blank"&gt;90% of organizations&lt;/a&gt; claiming strong detection capabilities, 57% still suffered major security incidents due to lack of full visibility.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Consider this: in the &lt;a href="https://www.verizon.com/business/resources/Tbd7/reports/2023-data-breach-investigations-report-dbir.pdf" rel="noopener" target="_blank"&gt;2023 Data Breach Investigations Report&lt;/a&gt;, Verizon noted that a significant proportion of intrusion incidents stemmed from neglected assets — servers went unpatched because they were forgotten, endpoints were provisioned without visibility into their lifecycle, etc.&lt;/p&gt;

&lt;p&gt;Here, ITAM is an invaluable early warning system. By providing a real-time, continually updated map of all hardware, software and cloud assets, it allows IT leaders to spot risks before attackers do.&lt;/p&gt;

&lt;h2&gt;The benefits of ITAM for cyber resilience&lt;/h2&gt;

&lt;p&gt;Below we’ll look at how the various benefits of robust ITAM result in a stronger security posture for your organisation.&lt;/p&gt;

&lt;h3&gt;Lifecycle management eliminates weak links&lt;/h3&gt;

&lt;p&gt;Assets don’t just pose risks at the moment of acquisition. The lifecycle (from onboarding, maintenance, and update to eventual retirement) is fraught with opportunities for mismanagement that can result in potential doorways for cyber adversaries. Obsolete systems without vendor support, end-of-life software still running mission-critical apps, devices decommissioned without wiping — these are common in complex environments.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;45% of organisations &lt;a href="https://www.cybersecurity-insiders.com/2024-application-security-report-fortinet/" rel="noopener" target="_blank"&gt;lack confidence&lt;/a&gt; in knowing all applications in use, creating blind spots that attackers exploit.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Robust ITAM ensures that every asset gets tracked, routinely assessed and decommissioned securely, closing off both accidental exposures as well as sophisticated attacks that target legacy infrastructure.&lt;/p&gt;

&lt;h3&gt;Regulatory compliance proves control and prevents penalties&lt;/h3&gt;

&lt;p&gt;Increasingly, CIOs face regulatory environments that demand demonstrable control over IT assets. Frameworks such as &lt;a href="https://www.ivanti.com/blog/nist-zero-trust" target="_blank" rel="noopener"&gt;NIST&lt;/a&gt;, ISO 27001 and GDPR all emphasise asset visibility as a prerequisite for effective control of sensitive data and critical infrastructure. A mature ITAM practice maps directly onto these requirements, providing the documentation and provable oversight needed for audits and regulatory inquiries.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Over &lt;a href="https://www.cybersecurity-insiders.com/2024-attack-surface-threat-intelligence-report-cogility-tacitred/" rel="noopener" target="_blank"&gt;80% of breaches&lt;/a&gt; are linked to gaps in attack surface management, driven by vulnerable internet-facing assets and poor asset inventory practices.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For example, under GDPR, the ability to swiftly identify and remediate vulnerable assets that process personal data is not just good security practice, it’s a legal necessity.&lt;/p&gt;

&lt;h3&gt;The ITAM-security partnership: More than just inventory tracking&lt;/h3&gt;

&lt;p&gt;True ITAM goes beyond keeping lists. Integrated asset management feeds context directly into security operations tools. Vulnerability scanners depend on accurate inventories to detect exposures. Incident response hinges on knowing precisely which systems are implicated. Security policy enforcement relies on a clear understanding of asset roles and relationships.&lt;/p&gt;

&lt;p&gt;Anecdotally, one financial institution saw its incident response time halved after integrating ITAM data into its SIEM platform, enabling security teams to immediately pinpoint and isolate affected assets during a breach. The value here is measurable and repeatable.&lt;/p&gt;

&lt;h2&gt;Resilient cyber defence means robust asset management&lt;/h2&gt;

&lt;p&gt;IT Asset Management is not merely operational hygiene. It is an essential component of a proactive, resilient cybersecurity strategy. For CIOs, investing in a robust &lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management"&gt;ITAM solution&lt;/a&gt; can mean the difference between surface-level security and genuine risk mitigation.&lt;/p&gt;

&lt;p&gt;If you’re ready to discover how our ITAM solution can reinforce your organisation’s security posture from the ground up, &lt;a href="https://www.ivanti.com/en-gb/lp/demo"&gt;contact our team&lt;/a&gt; today and take the first step toward building true cyber resilience.&lt;/p&gt;
</description><pubDate>Tue, 16 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">771f56ae-666c-4ba9-bc5c-124701e1f7d3</guid><link>https://www.ivanti.com/en-gb/blog/experience-level-agreements-xlas</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>The Rise of Experience-Level Agreements (XLAs) in Practice: A Deep Dive into ITSM Transformation</title><description>&lt;p&gt;For decades, the backbone of &lt;a href="https://www.ivanti.com/glossary/itsm" target="_blank" rel="noopener"&gt;IT Service Management (ITSM)&lt;/a&gt; has been the Service-Level Agreement (SLA). While effective for tracking the nuts and bolts of IT delivery, SLAs have one critical blind spot: they say little about how users actually feel about their IT experiences.&lt;/p&gt;

&lt;p&gt;This is where Experience-Level Agreements (XLAs) and &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex" target="_blank" rel="noopener"&gt;Digital Employee Experience (DEX)&lt;/a&gt; fill in the rest of the picture. They provide a new paradigm that's rapidly gaining traction, promising to transform ITSM by focusing on the human experience behind the numbers.&lt;/p&gt;

&lt;p&gt;But what exactly are XLAs and how do they differ from traditional SLAs? Moreover, how does Digital Employee Experience factor into successful XLAs?&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What are XLAs?&lt;/h2&gt;

&lt;p&gt;Experience-Level Agreements are a set of metrics and commitments designed to ensure that the end-user experience is consistently positive and meets (or exceeds) expectations.&lt;/p&gt;

&lt;p&gt;While you should use XLAs and traditional SLAs in tandem, the latter focuses on technical performance and uptime. XLAs prioritise the user's overall experience, including factors like ease of use, responsiveness and emotional satisfaction.&lt;/p&gt;

&lt;p&gt;By focusing on the user's perspective, XLAs help organisations align their services with user needs, driving satisfaction and loyalty.&lt;/p&gt;

&lt;h2&gt;Understanding how SLA, XLA and DEX work together&lt;/h2&gt;

&lt;p&gt;XLAs, SLAs and DEX work in tandem to provide you with a 360-degree view of your technical and user experience metrics.&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;&lt;/th&gt;
			&lt;th scope="col"&gt;Description&lt;/th&gt;
			&lt;th scope="col"&gt;Example metrics&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Service-Level Agreements (SLAs)&lt;/td&gt;
			&lt;td&gt;A contractual agreement between service providers and customers that define the expected service quality, availability and responsiveness. SLAs focus on technical metrics.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Uptimes.&lt;/li&gt;
				&lt;li&gt;Response times.&lt;/li&gt;
				&lt;li&gt;Resolution rates.&lt;/li&gt;
				&lt;li&gt;Etc.&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Experience-Level Agreements (XLAs)&lt;/td&gt;
			&lt;td&gt;A contractual agreement between providers and customers that focuses on end-user experience, measuring the quality of service from the user's perspective. XLAs include not just technical performance, but also factors like usability, accessibility and overall satisfaction.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;End user satisfaction score.&lt;/li&gt;
				&lt;li&gt;Net promotor score (NPS).&lt;/li&gt;
				&lt;li&gt;Digital experience score (DEX).&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;Unlike SLAs and XLAs, &lt;strong&gt;Digital Employee Experience (DEX)&lt;/strong&gt; is not another type of agreement. DEX refers to the quality of digital experiences employees have while performing their job functions. It encompasses the technology, tools and digital environments they interact with daily.&lt;/p&gt;

&lt;p&gt;Based on their experiences across these tools and environments, a DEX score is created (which is measured as part of the XLA).&amp;nbsp; A positive DEX is crucial for employee productivity, engagement and overall job satisfaction.&lt;/p&gt;

&lt;h2&gt;How DEX enables successful XLAs&lt;/h2&gt;

&lt;p&gt;Digital experience analytics are an important metric in the success of XLA's. By ensuring that employees have a positive digital experience, organisations:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Improve productivity&lt;/strong&gt; — When employees can work efficiently and effectively, they're more likely to deliver excellent service to customers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhance customer experience&lt;/strong&gt; — A positive DEX often translates to a better customer experience, as employees are better equipped to meet customer needs.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Drive business outcomes&lt;/strong&gt; — By focusing on DEX, organisations can drive business outcomes, such as increased revenue, reduced costs and improved competitiveness.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Best practices for implementing XLAs&lt;/h2&gt;

&lt;p&gt;Implementing XLAs requires a careful, strategic approach to ensure that you not only measure user satisfaction effectively, but also drive meaningful improvements in service delivery.&lt;/p&gt;

&lt;p&gt;By following the best practices below, organisations can successfully integrate XLAs into their operations and foster a culture centred on positive user experiences.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Define clear user experience metrics:&lt;/strong&gt; Identify the key metrics that you will use to measure user experience. These should be specific, measurable, and aligned with business goals.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Leverage technology:&lt;/strong&gt; Use advanced analytics, AI and machine learning to gather and analyse user data. These tools can help identify trends and areas for improvement. DEX tools enable you to gather and measure your IT experience across devices, users and the organisation.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Engage users:&lt;/strong&gt; Regularly collect feedback from users through surveys, feedback forms and testing. This provides valuable insights into their needs and preferences. Ensure that surveys utilise AI to identify and highlight sentiment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Train and empower IT teams:&lt;/strong&gt; Train your IT teams in user experience principles and give them the autonomy to make decisions that improve the user experience.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuous improvement:&lt;/strong&gt; Treat XLAs as a living document. Review it regularly and update it based on user feedback and changing business needs.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Challenges and lessons learned&lt;/h2&gt;

&lt;p&gt;Implementing XLAs isn’t just about new tools — it's a mindset/cultural change. Common hurdles include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Defining experience — What counts as a “good” experience? It can be subjective and varies across roles.&lt;/li&gt;
	&lt;li&gt;Cultural buy-in — XLAs need sponsorship from leadership and buy-in from front-line IT teams.&lt;/li&gt;
	&lt;li&gt;Continuous improvement — XLAs aren’t static. They require regular review and recalibration as user needs evolve.&lt;/li&gt;
	&lt;li&gt;More than surveys — Surveys are just one method of measurement. Ensure that DEX tools are enabled to capture real technology metrics.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Organisations leading the XLA charge invest in regular feedback loops, co-design goals with business units and link experience outcomes directly to ITSM performance reviews.&lt;/p&gt;

&lt;h2&gt;The future: Why XLAs matter&lt;/h2&gt;

&lt;p&gt;In practice, XLAs and DEX are more than buzzwords — they’re the next evolution of service management. As technology becomes ever more entwined with business success, experience is the product. IT teams empowered by XLAs move beyond “keeping the lights on" to driving employee engagement, customer loyalty and strategic differentiation.&lt;/p&gt;

&lt;p&gt;For any organisation focused on ITSM transformation, embracing XLAs means listening harder, acting faster and thinking bigger about the real purpose of technology: enabling people to do their best work.&lt;/p&gt;

&lt;p&gt;Read the &lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report" target="_blank" rel="noopener"&gt;Digital Experience Report&lt;/a&gt; to understand how DEX impacts productivity, satisfaction and retention.&lt;/p&gt;
</description><pubDate>Fri, 21 Nov 2025 15:17:59 Z</pubDate></item><item><guid isPermaLink="false">63e30bd1-7140-4303-9837-28708ac1f057</guid><link>https://www.ivanti.com/en-gb/blog/ai-it-cost-management</link><atom:author><atom:name>Scott Hughes</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/scott-hughes</atom:uri></atom:author><category>Service Management</category><title>AI-Driven IT Cost Management: Aligning Spend with Strategic Value</title><description>&lt;p&gt;Optimising IT costs is now the top priority for IT teams, according to Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;2025 Technology at Work Report&lt;/a&gt;. Our survey found that &lt;a href="https://www.ivanti.com/en-gb/blog/it-cost-optimization-for-cios"&gt;cost optimization&lt;/a&gt; was cited as a critical strategic goal for 2025, outranking improving cybersecurity, investing in infrastructure and deploying AI / ML technology.&lt;/p&gt;

&lt;p&gt;However, despite many organisations viewing AI and automation in terms of short-term operational improvements, many organisations haven't yet tapped into AI’s full potential to transform how IT manages, predicts and optimises costs.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22444035"&gt;&lt;/div&gt;

&lt;p&gt;It’s clear that IT teams are already bullish on AI's value in everyday operations. IT is currently leading the charge in AI &lt;em&gt;implementation&lt;/em&gt;, with &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai" rel="noopener" target="_blank"&gt;36% of IT teams using generative AI&lt;/a&gt;, according to McKinsey research from March 2025 — more than any other function.&lt;/p&gt;

&lt;p&gt;While IT teams regularly use AI for coding, support tickets and other day-to-day work, many organisations don’t see beyond these short-term efficiency gains. Too often IT leaders overlook AI's untapped potential for enterprise-wide optimization.&lt;/p&gt;

&lt;p&gt;This shift from incremental productivity gains to strategic cost optimization frees resources and grants IT leaders the flexibility to focus on innovation, long-term transformation and consistent alignment of operations with fast-evolving business strategy.&lt;/p&gt;

&lt;p&gt;With CIOs under mounting pressure to “do more with less,” AI-driven IT cost optimization has the power to reduce wasteful IT spending, justify investments and deliver strategic value across the entire organisation.&lt;/p&gt;

&lt;p&gt;However, before this transformation can happen, companies must first understand the biggest sources of inefficient spending and identify the most valuable areas where they can use AI capabilities to better allocate resources and make the most of their IT budget.&lt;/p&gt;

&lt;h2&gt;Major barriers to IT cost optimization&lt;/h2&gt;

&lt;p&gt;Cost management challenges are systemic. Inefficient IT spending results from compounding breakdowns across systems, processes and leadership structures. More than half of IT professionals said that wasteful IT spending was a significant problem at their organisation, according to 2025 Ivanti research.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22523269"&gt;&lt;/div&gt;

&lt;p&gt;Wasteful IT spend is especially egregious in high-complexity sectors like telecoms and government, where legacy systems and sprawling vendor relationships make it difficult to track and control spend. These sectors face greater pressure to cut costs, as unchecked waste limits their ability to fund strategic initiatives and modernise critical infrastructure.&lt;/p&gt;

&lt;p&gt;Monthly vendor reviews, quarterly budget reconciliations and annual contract negotiations struggle to keep pace with today's dynamic IT landscape. Organisational cloud spend can spike overnight, and tech complexity compounds rapidly due to decentralised procurement, shadow IT and &lt;a href="https://www.ivanti.com/en-gb/blog/attack-surface-visibility-gaps"&gt;poor asset visibility&lt;/a&gt;. For instance, &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;38% of IT professionals Ivanti surveyed&lt;/a&gt; pointed to “tech complexity” as a major barrier to effective IT operations.&lt;/p&gt;

&lt;p&gt;Looking toward the future of AI-powered ITOps, many IT professionals recognise AI's transformative potential to meet these challenges and eliminate unnecessary spending.&lt;/p&gt;

&lt;h2&gt;AI and machine learning for predictive cost management&lt;/h2&gt;

&lt;p&gt;Manual cost reviews alone are backward-looking, labour-intensive and prone to human error. Human oversight alone cannot recognise and analyse patterns that emerge through large-scale AI data analysis. AI-powered cost management flips the script. Instead of reporting overspending after it happens, &lt;a href="https://www.ivanti.com/en-gb/ai"&gt;AI predictive analysis can detect potential anomalies&lt;/a&gt; and provide organisations with accurate budget forecasting to avoid redundant, unnecessary spending. AI can also surface redundant tools, highlight lifecycle costs and flag spending anomalies that human reviews would likely miss.&lt;/p&gt;

&lt;p&gt;Consider this scenario: you can use AI to analyse your &lt;a href="https://www.ivanti.com/glossary/itam" target="_blank" rel="noopener"&gt;IT asset management&lt;/a&gt; data to uncover shelfware and unused software licences, or to mine support tickets for patterns showing when certain device types typically begin to fail. Those insights can inform smarter replacement cycles, reduce downtime and ensure you only pay for what you actually use.&lt;/p&gt;

&lt;p&gt;The speed difference is dramatic. Organisations using AI-driven cost optimization are &lt;a href="https://isg-one.com/articles/ai-powered-cost-optimization--how-smart-companies-are-slashing-expenses-and-boosting-efficiency-in-2025" rel="noopener" target="_blank"&gt;seeing measurable reductions in operational expenses&lt;/a&gt;, while others are still compiling last quarter's reports on spreadsheets.&lt;/p&gt;

&lt;p&gt;Real-time visibility consistently outperforms reactive reviews. When you can predict and prevent waste instead of just documenting it, that's when IT shifts from expense management to strategic value creation.&lt;/p&gt;

&lt;h2&gt;AI cloud cost management and resource management&lt;/h2&gt;

&lt;p&gt;Cloud environments are the single largest source of budget variance and waste. &lt;a href="https://www.cloudzero.com/state-of-cloud-cost/" rel="noopener" target="_blank"&gt;Nearly nine in 10 (88%) of organizations&lt;/a&gt; see significant variance between actual spend and forecasted spend, and only 30% know where their cloud budget is going, according to CloudZero’s State of Cloud Costs in 2024.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;own findings&lt;/a&gt; expand on these IT resource management challenges:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;39% of IT professionals cited outdated hardware as a considerable source of wasteful spend.&lt;/li&gt;
	&lt;li&gt;Outdated, unused and expired software is also a major factor, with nearly one in three (31%) IT professionals reporting their organisations don't track unused or underused software licences.&lt;/li&gt;
	&lt;li&gt;Even more concerning, 48% of IT teams reported that their companies use software that’s reached end of life (EOL).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The combination of multi-cloud environments, unpredictable usage over time, complex and multilateral pricing within the same services and drastically varied costs makes the need for AI and automation clear.&lt;/p&gt;

&lt;p&gt;AI-enabled technology can help cut through this complexity. AI solutions can proactively identify underutilised software licences, over-provisioned cloud resources and redundant applications across environments that'd take human analysts weeks to map.&lt;/p&gt;

&lt;p&gt;What’s more, AI combined with &lt;a href="https://www.ivanti.com/en-gb/products/automation"&gt;ITSM automation&lt;/a&gt; can suggest resolutions to inefficient IT spending through intelligent recommendations for rightsizing and deprovisioning. Leading CIOs use strategic IT cost management to fund high-impact initiatives, and AI automation makes this achievable at scale.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/use-cases/provide-applications-to-users"&gt;Software license optimization&lt;/a&gt; delivers significant returns. AI tracks actual software usage against entitlements, identifies downgrade opportunities and predicts future needs based on growth patterns. Organisations pay for what they use, not what they purchased months ago.&lt;/p&gt;

&lt;h2&gt;AI’s impact on streamlining IT processes&lt;/h2&gt;

&lt;p&gt;While AI adoption increases among IT teams, its cost optimization impacts aren't yet as widespread as basic use cases like predictive maintenance and automating routine self-service tasks — both popular, according to Ivanti research.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22344392"&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/blog/itsm-agentic-ai-readiness-checklist"&gt;Delayed widespread AI adoption&lt;/a&gt; in ITOps prevents organisations from reaping the long-term financial benefits and opportunities for strategic business growth. IT automation solutions can &lt;a href="https://www.bcg.com/publications/2025/amplifying-benefits-of-cost-optimization" rel="noopener" target="_blank"&gt;reduce operational costs by up to 90%&lt;/a&gt;. The technology handles ticket triage and automates incident response while predicting system failures and managing routine maintenance.&lt;/p&gt;

&lt;p&gt;AI elevates IT operations, and the impacts are felt across the entire business. Asset performance monitoring becomes intelligent and proactive. Instead of static thresholds and scheduled checks, AI systems continuously analyse performance data, predict hardware failures and optimise maintenance schedules.&lt;/p&gt;

&lt;p&gt;This prevents both downtime costs and unnecessary replacement spending. Process automation also frees IT time, reducing costs from human error: manual misconfigurations, missed patches and delayed responses caused by limited resources.&lt;/p&gt;

&lt;h2&gt;How AI empowers IT to deliver strategic value&lt;/h2&gt;

&lt;p&gt;IT cost management isn't the endgame. It's the starting point for strategic transformation. &lt;a href="https://www.bcg.com/publications/2025/how-four-companies-use-ai-for-cost-transformation" rel="noopener" target="_blank"&gt;AI enables companies to optimize costs at scale&lt;/a&gt; while freeing up budgets for growth investments.&lt;/p&gt;

&lt;p&gt;Organisations embracing AI for cost management are repositioning how their businesses view and leverage technology. When every investment must justify its existence, AI enables IT leaders to become architects of value, not just managers of expense by cutting costs and creating value. AI promotes agile resource allocation. When wasteful costs are eliminated proactively, IT executives gain flexibility to fund emerging opportunities and respond to changing business priorities.&lt;/p&gt;

&lt;p&gt;Visibility is equally important in transforming IT into a strategic business driver. AI provides the data and insights needed to quantify IT's business value. When investments are tracked and tied to business outcomes, CIOs can demonstrate the true ROI of the IT department and secure strategic support.&lt;/p&gt;

&lt;p&gt;The real transformation happens when IT moves from reactive expense control to proactive value creation. AI-optimised IT operations have become the foundation for innovation, enabling teams to experiment and deliver competitive advantages.&lt;/p&gt;

&lt;p&gt;To learn more about the major challenges contributing to wasteful IT spending and how AI and automation can help IT teams boost efficiency, improve asset visibility and optimise IT cost management, see &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;Ivanti’s 2025 Technology at Work Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 22 Oct 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">92a24606-691e-4cc8-bd34-43fbab8d97e3</guid><link>https://www.ivanti.com/en-gb/blog/automate-windows-11-migration</link><atom:author><atom:name>Dan Lahan</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/dan-lahan</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><category>Service Management</category><title>Your Windows 11 Migration Is Looming – but There’s a Bot for That</title><description>&lt;p&gt;I recently spoke with a CIO who had committed a large amount of IT resources to manually migrating computers from Windows 10 to Windows 11. The process required months of planning, device assessments, compatibility testing and hands-on coordination to avoid disruptions to day-to-day business operations. While their dedication ensured their rollout was on track for the looming Windows 11 end-of-support date, it highlighted the strain such projects place on internal teams.&lt;/p&gt;

&lt;p&gt;My conversation with this CIO isn’t unique. Before becoming an Account Technology Strategist here at Ivanti, I worked in various roles in IT support and still bear the scars of the Windows XP to Windows 7 migration. I also spent years helping organisations plan, execute and troubleshoot OS upgrades — often under tight timelines, with limited resources.&lt;/p&gt;

&lt;p&gt;Automation is key to any major upgrade project. It improves overall IT efficiency, reducing labour costs and human errors. In this blog, I’ll show you how you can use automation in your Windows 11 migration and where Ivanti Neurons bots can help.&lt;/p&gt;

&lt;h2&gt;Assess the fleet&lt;/h2&gt;

&lt;p&gt;Before starting any project, &lt;a href="https://www.ivanti.com/en-gb/use-cases/discover-and-manage-assets"&gt;asset discovery&lt;/a&gt; is key: you can’t upgrade something you don’t know exists or isn’t really there. One Ivanti customer discovered that they had 30% more assets than they expected on their network! This echoes a study from Gartner that found 30% of IT fixed assets are "ghost" assets, or missing and can't be found, which further complicates the task.&lt;/p&gt;

&lt;p&gt;Data that exists outside of the device, such as device warranty, is important too. Perhaps upgrading a device with three months’ warranty left isn’t really worth it — it may be replaced through a refresh cycle soon anyway, leaving more disruption for users.&lt;/p&gt;

&lt;p&gt;A step you can automate is evaluating whether each device meets Microsoft’s minimum hardware requirements, which you can do in &lt;a href="https://www.ivanti.com/en-gb/resources/bot-library/device-optimization/windows-11-upgrade"&gt;Ivanti Neurons using the Windows 11 Upgrade bot&lt;/a&gt;. Then, devices that don’t meet the necessary criteria can be flagged with an automatic ticket in your service or asset management solution. This helps provide the right data to IT-adjacent teams like Procurement for financial planning and purchasing new hardware.&lt;/p&gt;

&lt;h2&gt;Create a baseline for end-user experience&lt;/h2&gt;

&lt;p&gt;Creating a baseline helps IT measure the impact of the upgrade, identify potential areas of improvement to review post-upgrade and ensure that the new operating system meets or exceeds current performance levels. It also provides a point of reference for troubleshooting should any issues arise post-upgrade. This data is gold dust for the service desk team, who will be on hand to support users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One way to create a baseline is with a &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex" target="_blank" rel="noopener"&gt;DEX&lt;/a&gt;, or digital experience, score (which you can do in Ivanti Neurons). This quantifies the quality of an employee’s digital experience by aggregating data from various indicators like CPU usage, memory performance, application crashes, disc space and battery health. For example, excessive CPU usage or frequent application crashes can lower the score, while optimal performance in these areas contributes to a higher score. Sentiment analysis of service management incidents can also provide qualitative data that impacts the &lt;a href="https://help.ivanti.com/ht/help/en_US/CLOUD/vNow/dex-scores.htm" target="_blank"&gt;DEX score&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Surveying the end user bolsters telemetry-based metrics in the DEX score. Surveys provide IT with an early indicator of problems — but you can’t ask too many questions before the end user hits the dreaded mute button! A simple emoji response via Microsoft Teams gives you an empirical response, and a free text field gets user sentiment feedback.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture1.png"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture2.png"&gt;&lt;/p&gt;

&lt;p&gt;So how do you analyse the data at scale? Feeding these insights into AI for sentiment analysis lets you interpret the tone and emotion to detect frustration or satisfaction levels.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture3.png"&gt;&lt;/p&gt;

&lt;p&gt;One big takeaway from any migration is its impacts on end users. IT should want the end user to feel part of the process, if not own it!&lt;/p&gt;

&lt;h2&gt;Put the user at the centre of the W11 migration&lt;/h2&gt;

&lt;p&gt;At this stage, we have devices suitable to upgrade and know our baseline. Now it’s time to interact with the end user.&lt;/p&gt;

&lt;p&gt;IT leaders are all too aware of the potential impact that changes like system upgrades or new software deployments can have on end users, but this awareness doesn’t always translate into action. In the push to beat pending deadlines like Windows 10 End of Support, user experience considerations can be overlooked, leading to disruptions, frustration (reduced CSAT) or decreased productivity.&lt;/p&gt;

&lt;p&gt;You can use automation, like the Windows 11 Upgrade bot, to keep the user in the loop, providing them a reason for the change and allowing them to schedule the upgrade at a convenient time.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/combo.png"&gt;&lt;/p&gt;

&lt;h2&gt;Validate changes with end users&lt;/h2&gt;

&lt;p&gt;When changes like system updates are made to their computers, end users often face disruptions to their familiar workflows. A major change like upgrading to Windows 11 can lead to confusion, reduced productivity and frustration, especially if the upgrade was unexpected or poorly communicated. Users may struggle to find previously accessible features, encounter compatibility issues, or experience slower performance, all of which can create a sense of being unsupported.&lt;/p&gt;

&lt;p&gt;Surveys have shown that knowledge workers experience such issues &lt;a href="/en-gb/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook" target="_blank"&gt;3–4 times per day&lt;/a&gt; and often don’t raise support cases. A bot like the Ivanti Neurons Survey bot can be used here, capturing end user sentiment and feedback. So far, automation has done much of the hard work in your Windows 11 migration, but there will always be humans … as it stands anyway! A survey offers an opportunity to bring a human into the loop where applicable.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture6.png"&gt;&lt;/p&gt;

&lt;h2&gt;Software updates – and more! – with Ivanti Neurons bots&lt;/h2&gt;

&lt;p&gt;So, you’ve read a little of how the &lt;a href="https://www.ivanti.com/en-gb/resources/bot-library/device-optimization/windows-11-upgrade"&gt;Windows 11 bot&lt;/a&gt; works. This is just one use case for an Ivanti Neurons bot. The same principles can also apply to major upgrades of any software, but also to a wide array of automation use cases on devices:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reduce IT operational costs by automating manual steps.&lt;/li&gt;
	&lt;li&gt;Limit opportunities to introduce human error through manual processes.&lt;/li&gt;
	&lt;li&gt;Ensure the user is engaged and, crucially, happy with the process and their new operating system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Neurons bots help IT teams proactively identify, diagnose, and resolve issues across endpoints and devices, often before users even notice the problem. Bots communicate with devices in real time, run queries and perform actions to keep systems healthy and secure.&lt;/p&gt;

&lt;p&gt;You can check out some of the ways our bots help automate, accelerate and enhance IT operations, freeing up time for you to work on what matters, by visiting the &lt;a href="https://www.ivanti.com/en-gb/resources/bot-library"&gt;Bot Library&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 28 Jul 2025 19:31:10 Z</pubDate></item><item><guid isPermaLink="false">532a3188-c5eb-4f4f-ad06-391ddaf2e454</guid><link>https://www.ivanti.com/en-gb/blog/itsm-agentic-ai-readiness-checklist</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>Is Your ITSM Environment Ready for Agentic AI? Probably Not (Yet)</title><description>&lt;p&gt;Agentic AI is making waves across various industries, and its potential to transform ITSM is undeniable. With all the talk about agentic AI capabilities, you are probably daydreaming about streamlining ITSM processes through automated incident management, automated change risk analysis, improved efficiency through service desk automation, or enhanced service quality with predictive maintenance. But you also may start to wonder: How real is all of this? Is my organisation truly ready for agentic AI?&lt;/p&gt;

&lt;p&gt;I would suggest that for most organisations, the answer is no!&lt;/p&gt;

&lt;p&gt;Don't get me wrong; organisations are listening to the conversation and are keen on the potential long-term benefits. And some may indeed be ready for to implement agentic AI properly.&lt;/p&gt;

&lt;h2&gt;Ambitious, but underprepared: why most organisations aren’t ready for agentic AI&lt;/h2&gt;

&lt;p&gt;The reason I doubt that organisations are adequately prepared is that for agentic AI to function optimally, you require good clean data, seamlessly automated workflows that are well defined, and comprehensive flexible integration across all systems intended for agentic AI operations.&lt;/p&gt;

&lt;p&gt;We see the importance of clean, integrated data in the acquisition of data management companies by other tech vendors, notably &lt;a href="https://techcrunch.com/2025/05/27/salesforce-acquires-informatica-for-8-billion/" rel="noopener" target="_blank"&gt;Salesforce and Informatica&lt;/a&gt;. Reconciled, normalised data gives AI agents the best possible intelligence to work with so they can provide the best outcomes and most accurate information.&lt;/p&gt;

&lt;p&gt;You should always consider: How will AI agents benefit you and your organisation? Can your journey to autonomous work be achieved through workflows? Even Anthropic, a leader in the AI space talks about &lt;a href="https://www.anthropic.com/engineering/building-effective-agents" rel="noopener" target="_blank"&gt;using the simplest solution possible&lt;/a&gt; and only implementing AI agents for complex requirements. In some cases, agents are not only more costly but also less efficient than pre-built workflows.&lt;/p&gt;

&lt;h2&gt;Preparation today, agentic AI tomorrow&lt;/h2&gt;

&lt;p&gt;As you consider pursuing agentic AI, there are several factors to examine. With planning and preparation, you can be successful, and this checklist will help guide you on your journey.&lt;/p&gt;

&lt;h3&gt;Planning&lt;/h3&gt;

&lt;p&gt;When you start your journey to agentic AI, clearly outline your goals for introducing agentic AI into your service management environment while ensuring that they align with your overall organisation's goals. Some common objectives are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reduce the workload on IT staff by automating repetitive and time-consuming tasks.&lt;/li&gt;
	&lt;li&gt;Improve the speed and accuracy of incident resolution.&lt;/li&gt;
	&lt;li&gt;Enhance the end-user experience with seamless automated request fulfilment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With your goals defined, what does success look like, and how will you measure it? These will vary based on your expectations and defined goals, but some common metrics could be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;% of tasks successfully automated by AI.&lt;/li&gt;
	&lt;li&gt;Decrease in errors within tasks handled by AI compared to manual tasks.&lt;/li&gt;
	&lt;li&gt;User satisfaction score (CSAT).&lt;/li&gt;
	&lt;li&gt;% of users opting for AI-driven self-service solutions.&lt;/li&gt;
	&lt;li&gt;Reduction in the average cost of resolving a ticket with AI.&lt;/li&gt;
	&lt;li&gt;% of incidents escalated to human agents after AI intervention.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Related content:&lt;/strong&gt; &lt;a href="https://www.ivanti.com/en-gb/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;AITSM: How AI Is Redefining IT Service Desk Automation&lt;/a&gt;, part of Ivanti’s Digital Employee Experience Research Report Series&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;Data preparation&lt;/h3&gt;

&lt;p&gt;Within the context of service management, there are many sources of data that may be required, including sources that are purely ITSM-related, such as a CMDB or asset repository. As you move towards the wider enterprise, you may also need data from CRM, HR, facilities, finance or other departments.&lt;/p&gt;

&lt;p&gt;Regardless of where you are getting the data from, you need to consider the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Is your data quality reliable? Is the data consistent? How accurate is the information? Is there a more trusted source (or master) that should be considered as the default? Often data is inconsistent across multiple systems, making it harder for an AI agent to make well-informed decisions.&lt;/li&gt;
	&lt;li&gt;How accessible is your data? How many different data sources are there, and will integration via APIs be required? Are the data sources up to date?&lt;/li&gt;
	&lt;li&gt;Is your CMDB ready to be used by agentic AI? Do you have critical CIs in your CMDB, and more importantly, how up to date are the relationships and the information?&lt;/li&gt;
	&lt;li&gt;Are you required to adhere to data privacy compliance? Do you need to adhere to data protection regulations such as GDPR, CCPA or others? It is possible that regulations may demand that you anonymize sensitive data and keep it within country.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Defined workflows and automation&lt;/h3&gt;

&lt;p&gt;Not only is having high-quality data vital, but having good, functioning workflows to drive tasks is a critical component of successful agentic AI. In some cases, your existing workflows can be repurposed for use within an agentic AI process; however, some workflows will need to be modified to meet the request/response requirements of an AI agent.&lt;/p&gt;

&lt;p&gt;Some things to consider for workflows:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are your workflows able to be used by AI agents?&amp;nbsp; Your existing workflows may not be structured in the most effective way for AI agents to utilise the entire workflow to deliver accurate results.&lt;/li&gt;
	&lt;li&gt;Will the workflows only be working with data within your organisations, or will it need to access external data sources? When accessing external data sources, what security measures are in place to ensure the security and accuracy of the data within the responses?&lt;/li&gt;
	&lt;li&gt;Ensure all agent AI and related workflows have audit trails enabled, so you can log and monitor AI actions and decisions. This ensures the correctness of the AI and can be used in the event of compliance or security issues.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Governance and compliance&lt;/h3&gt;

&lt;p&gt;Earlier we discussed compliance requirements for data and the need to meet regulatory or statutory requirements. Governance and compliance must also apply to the entire AI ecosystem within your organisation to deliver responsible, secure and trusted responses and actions.&lt;/p&gt;

&lt;p&gt;Here are a few things to consider:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Define policies for how AI is to be used within your organisation and assign people or teams who are accountable for protecting the data and evaluating ethical considerations.&lt;/li&gt;
	&lt;li&gt;Ensure that regulatory or statutory compliance standards are understood across the entire AI workflow and met. For example, if an AI agent requires access to health-related data and data collected from European users, then you would need to consider both HIPAA and GDPR.&lt;/li&gt;
	&lt;li&gt;Identify potential risks throughout your environment and meticulously mitigate those linked with the AI deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Testing and validation&lt;/h3&gt;

&lt;p&gt;Start your journey to agentic AI in a controlled environment. Set up a pilot programme to test the functionality, ensuring you measure against your goals and gather feedback from users. It is important to have a continuous improvement programme in place for adjustments and enhancements. Be patient, as good results may take time as the AI learns and adjusts. Always monitor and adjust as required and define a process for handling issues or failures.&lt;/p&gt;

&lt;h2&gt;Agentic AI is an evolution, not a revolution&lt;/h2&gt;

&lt;p&gt;Discussion around AI is everywhere, and while there is a lot of interest from organisations, many are still rightly cautious about how to proceed and what is best for their organisation. As we have seen over the last few years, AI has progressed very quickly from generative to agentic. Keeping up with emerging technologies and planning for future enhancements is vital.&lt;/p&gt;

&lt;p&gt;Ivanti is well positioned with AI capabilities that can enable you to grow. &lt;a href="https://www.ivanti.com/en-gb/ai/itsm"&gt;Find out more about what Ivanti can offer for your AI journey.&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 16 Jul 2025 16:01:36 Z</pubDate></item><item><guid isPermaLink="false">31ebf237-1755-4aa0-ae90-91db31a698b7</guid><link>https://www.ivanti.com/en-gb/blog/it-cost-optimization-for-cios</link><category>Service Management</category><title>How CIOs Can Optimise IT Costs and Eliminate Wasteful Spending</title><description>&lt;p&gt;When operating in healthy economic environments, business teams are often allowed greater rein to explore how budgets can be allocated. But when times become tough due to geopolitical tensions, &lt;a href="https://www.cio.com/article/3965384/global-tariffs-shake-up-cios-it-agendas.html" rel="noopener" target="_blank"&gt;global tariffs&lt;/a&gt;, tech disruptions, layoffs, restructurings and rising tech costs, there is greater pressure on CIOs to minimise wasteful spending and prove the value of their IT investments — ensuring a louder bang for their buck.&lt;/p&gt;

&lt;p&gt;In all this, leaders and CIOs are pressured to “do more with less” –&amp;nbsp;including &lt;a href="https://www.cio.com/article/3810955/sharply-rising-it-costs-have-cios-threading-the-needle-on-innovation.html" rel="noopener" target="_blank"&gt;growing scrutiny over how IT dollars are allocated and justified&lt;/a&gt;. Being able to measure and communicate the ROI of IT initiatives to stakeholders becomes more important than ever. The paradox of rising expectations paired with reduced resources is the new normal.&lt;/p&gt;

&lt;p&gt;This is especially true in the public and federal sectors, where &lt;a href="https://nationalcioreview.com/articles-insights/extra-bytes/cisa-faces-17-funding-reduction-under-federal-spending-plan/" rel="noopener" target="_blank"&gt;proposed cuts to CISA and tech security budgets&lt;/a&gt; by the US federal government adds to already heightened pressures to align with accountability, regulatory guidelines and compliance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;Ivanti’s 2025 Technology at Work Report&lt;/a&gt; reported that more than half (58%) of IT professionals say wasteful IT spending is a problem in their organisation. Tech sprawl, scope creep, limited asset visibility, siloed teams and redundant operations represent poor IT cost management practices which drain resources that could be committed to strategic innovation.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22346900"&gt;&lt;/div&gt;

&lt;p&gt;Today’s reality is that CIOs are working with less budget across the board. As such, they must focus their energy on finding and reducing inefficiencies in their current spending. But more so, IT cost optimization is shifting from reactive operations to a strategic, future-facing imperative. Leaders are becoming more strategic and targeted with their investments and creating room to fund the initiatives that drive long-term business value.&lt;/p&gt;

&lt;h2&gt;IT cost optimization is a top priority&lt;/h2&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22444035"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s report finds that IT cost optimization is a top priority for enterprise IT teams this year –&amp;nbsp;but at the expense of investment in IT infrastructure and AI / ML. This aligns with trends across industries: CIOs are simply facing increased executive and board-level scrutiny as budget approvals become more centralised and return on spend must be proven faster than ever.&lt;/p&gt;

&lt;p&gt;Additionally, &lt;a href="https://www.gartner.com/en/chief-information-officer/insights/cio-agenda" rel="noopener" target="_blank"&gt;Gartner’s 2025 CIO Agenda report&lt;/a&gt; finds that only 48% of enterprise-wide digital initiatives meet or exceed their business outcome targets – that means there’s&amp;nbsp;plenty of room for improvement. This is prompting forward-thinking CIOs to rethink IT budgeting not just as an optimization exercise, but also as a strategic reallocation of resources.&lt;/p&gt;

&lt;p&gt;IT leaders are looking at ways to tighten spending in some areas to allow for transformation in others and demonstrating measurable business outcomes of their initiatives. While budget cuts are never an easy time for organisations, the need for IT cost optimization could be an opportunity to generate fuel for growth.&lt;/p&gt;

&lt;h2&gt;Top causes of inefficient IT spending&lt;/h2&gt;

&lt;p&gt;Inefficient IT spending is often the result of compounding breakdowns across systems, processes and leadership structures. CIOs looking to optimise their budgets must first identify spending redundancies, inefficiencies and misalignments in their current tech stack and processes. Below, we explore top culprits behind IT budget bloat&amp;nbsp;and how each contributes to mounting costs and diminished returns.&lt;/p&gt;

&lt;h3&gt;Poor asset visibility&lt;/h3&gt;

&lt;p&gt;Lack of visibility into endpoints, devices and SaaS assets leads to overspend and blind spots. This is compounded by the &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management" target="_blank" rel="noopener"&gt;expansion of attack surfaces&lt;/a&gt; as organisations’ external and internal assets continue to grow — oftentimes with unknown or unmanaged visibility gaps.&lt;/p&gt;

&lt;p&gt;This is backed by &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;Ivanti’s Tech at Work research&lt;/a&gt;, Device and licence usage is tracked by just 38% of IT teams, and only 36% track device performance / health.&lt;/p&gt;

&lt;p&gt;Complicating matters further is shadow IT. Unknown and unmanaged use of devices and applications often results in duplicate existing capabilities or go entirely unused, leading to avoidable spend and potential compliance issues.&lt;/p&gt;

&lt;p&gt;Even sanctioned tools lack oversight without standardised &lt;a href="https://www.ivanti.com/blog/it-asset-management-101" target="_blank" rel="noopener"&gt;IT asset management practices&lt;/a&gt;, making it hard to enforce usage policies, track renewals or manage the asset lifecycle efficiently. Many opportunities are then missed to reduce spending through consolidation or retirement of redundant tools&lt;/p&gt;

&lt;h3&gt;Tech sprawl and cloud sprawl&lt;/h3&gt;

&lt;p&gt;Duplicate tools drain resources and fragment the tech stack without adding performance. This adds both cost and complexity to the IT ecosystem. And inaccurate forecasting and poor usage monitoring inflate cloud spend.&lt;/p&gt;

&lt;p&gt;Organisations are often challenged by frequent “swivel chairing” –&amp;nbsp;where employees switch between disconnected tools which leads to wasted time and diminished productivity. For example, an IT support agent might bounce between a ticketing system, an asset management database, a separate knowledge base and a communication platform – copying information between them just to resolve a single issue.&lt;/p&gt;

&lt;h3&gt;Technical debt&lt;/h3&gt;

&lt;p&gt;Without regular vendor audits, redundant or underperforming tools overstay their welcome and legacy systems linger. These drain resources and diminish returns.&lt;/p&gt;

&lt;p&gt;Finally, a lack of integration across overlapping tools contributes to siloed team processes, slower response times and inconsistent or incomplete data. When systems and processes aren’t fully integrated, it’s easy for efforts to be misaligned.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Inefficient processes&lt;/h3&gt;

&lt;p&gt;Inefficient processes in IT workflows can also be a major budget leech. A good portion of standard IT work can be automated, yet isn’t – leading to talented IT workers spending time on easily optimizable workflows including manual ticketing and patching, at the expense of higher-level strategic initiatives. &lt;a href="https://www.cio.com/article/3841636/it-frustration-costs-companies-more-than-100-million-a-year-with-shadow-it-the-only-user-solution.html?utm_source=chatgpt.com" rel="noopener" target="_blank"&gt;A study cited in CIO&lt;/a&gt; found that the average large enterprise lost an estimated $104 million to digital inefficiencies, leading to shadow IT solutions which only augment the above-listed causes of avoidable spend.&lt;/p&gt;

&lt;p&gt;Another process drag comes from siloed work and poorly integrated systems. When teams don’t have a unified platform or standardised protocols, work is duplicated and fixes are delayed. &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;Ivanti’s 2025 research&lt;/a&gt; reported that 37% of IT teams reported that organisational silos reduced collaboration within their company –&amp;nbsp;and 40% of IT professionals said that these silos hamper IT efficiency.&lt;/p&gt;

&lt;p&gt;Moreover, current IT talent shortages augment an already challenging environment. Understaffed teams have to prioritise day-to-day firefighting, leaving little room for other, higher-level work.&lt;/p&gt;

&lt;h3&gt;Poor leadership visibility&lt;/h3&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22343092"&gt;&lt;/div&gt;

&lt;p&gt;A major overarching factor in IT efficiency and wasteful spending is lack of visibility with other executive leaders. The 2025 Tech a Work Report revealed that 57% percent of IT professionals felt that their company leadership did not have high visibility into IT efficiency (or lack of efficiency).&lt;/p&gt;

&lt;p&gt;This lack of collaboration with leadership often leads to misaligned investments that don’t meaningfully contribute to actual growth. This worsens when budgeting is disconnected from KPIs and OKRs. When the ties to business outcomes aren’t clear, CIOs can’t justify their investment choices or show the real impact of their team’s work.&lt;/p&gt;

&lt;p&gt;Fast-paced demands from above without consultation can often push IT leaders to sacrifice long-term stability for short-term speed. And skipping testing and documentation undermines system stability and invites costly breakdowns. This prioritisation of operational efficiency over strategic longer-term business impact is a symptom of poor alignment.&lt;/p&gt;

&lt;h2&gt;Federal and public sector CIOs face unique challenges&lt;/h2&gt;

&lt;p&gt;Across the board, IT leaders are encountering shrinking resources and growing accountability –&amp;nbsp;from healthcare systems to financial services to manufacturing. But, as mentioned above, public sector CIOs operate in a more rigid and scrutinised environment than their private sector peers.&lt;/p&gt;

&lt;p&gt;While private enterprises face similar challenges, public sector IT budget management is usually fastened to annual fiscal cycles, necessitating longer-term decisions and restricting agility. Heightened procurement, compliance and regulatory frameworks bring additional constraints.&lt;/p&gt;

&lt;p&gt;Fragmented ecosystems are an issue here as well. This is highlighted in &lt;a href="https://www2.deloitte.com/content/dam/Deloitte/tw/Documents/public-sector/government-trends-2024-en.pdf" rel="noopener" target="_blank"&gt;Deloitte’s Government Trends 2024&lt;/a&gt; report. Government bodies struggle with limited understanding of the real value that IT brings and the challenge is that ROI is harder to prove in these environments due to complex procurement processes and strict compliance needs – not due to lack of effort or intention from IT leaders.&lt;/p&gt;

&lt;p&gt;Budget constraints are tightening even further, and audits are steadily increasing. CIOs in the public sector must demonstrate cost control and operational efficiency even more diligently than their private-sector peers. Transparent, strategic IT cost optimization frameworks are no longer an option – they’re required.&lt;/p&gt;

&lt;h2&gt;A strategic approach to IT cost optimization&lt;/h2&gt;

&lt;p&gt;It’s time to fully embrace a cost-efficient resolution with an actionable playbook. Addressing IT spending is more than cutting costs; it entails a deeper look at how IT integrates with overall business strategy. In doing this, CIOs must align IT with higher-level goals, uncover the right data to inform decisions and clearly measure outcomes.&lt;/p&gt;

&lt;p&gt;Every investment must have a specific impact. A smart IT investment strategy ties spending to results – in increased revenue, more efficient processes, better user experience and bigger-picture thinking. The objective is to move from simple cost-cutting to intentional, strategic allocation of resources.&lt;/p&gt;

&lt;p&gt;The result is a modernised budgeting model that’s aligned with business and driven by real-time data focusing on actual return on investment. Where does tech drive performance? Where does it drag? Where can automation be applied?&lt;/p&gt;

&lt;p&gt;Start by focusing on these actionable steps:&lt;/p&gt;

&lt;h3&gt;Manage and monitor IT assets&lt;/h3&gt;

&lt;p&gt;Establish full lifecycle visibility into hardware, software and endpoints by implementing centralised &lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management"&gt;IT asset management solutions&lt;/a&gt;. Effective IT asset management will allow teams to better consolidate asset data across the overall environment and standardise how assets are discovered, tracked and retired. Real-time monitoring, supported by AI and automation, enables teams to identify underused assets, reduce redundant purchases, remove bottlenecks and proactively manage renewals.&lt;/p&gt;

&lt;p&gt;By integrating &lt;a href="https://www.ivanti.com/glossary/itam" target="_blank" rel="noopener"&gt;ITAM&lt;/a&gt; with service management and configuration databases (&lt;a href="https://www.ivanti.com/glossary/cmdb" target="_blank" rel="noopener"&gt;CMDBs&lt;/a&gt;), leaders can gain a holistic view of asset performance and compliance and minimise security risk and improve budget control.&lt;/p&gt;

&lt;h3&gt;Streamline IT workflows with AI and automation&lt;/h3&gt;

&lt;p&gt;Manual, repetitive work can be readily automated using AI and other technologies. Identify where steps can be automated across service management, endpoint provisioning and patching. &lt;a href="https://www.ivanti.com/en-gb/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;AITSM&lt;/a&gt; capabilities have been proven to improve ticketing, detect anomalies and continuously monitor device performance and health in a faster and more complete way than human oversight alone.&lt;/p&gt;

&lt;p&gt;There are also cases where an IT team may already possess these tools but aren’t utilising their full capabilities due to poor visibility, tech sprawl or lack of standardised IT asset management. Conducting an inventory of all assets and identifying redundancies and inefficiencies then frees up valuable resources for other, higher-level priorities that tie back to impact and ROI.&lt;/p&gt;

&lt;h3&gt;Define and measure IT business value&lt;/h3&gt;

&lt;p&gt;IT cost management requires quantifying how IT actually contributes to the overall business. Start by tracking real outcomes, including revenue growth tied to technology investments, risk mitigation efforts (ticket resolution, patches, thwarted attacks) and tracking the digital experience of customers and employees.&lt;/p&gt;

&lt;h3&gt;Improve collaboration and communication with executive leadership&lt;/h3&gt;

&lt;p&gt;When IT investment strategy is cross-functional and clearly linked to business performance, executive buy-in follows. IT leaders cannot operate in a vacuum, let alone optimise in one. They must define and own measurable KPIs that show the ROI of their investments, be it AI, automation or cloud modernization. And CIOs should proactively set performance benchmarks tied directly to business outcomes. When leaders translate IT strategy into the language of business value, CIOs can shift the perception of IT from a cost centre to a cost enabler and make stronger cases to executive leadership and the board.&lt;/p&gt;

&lt;h2&gt;Aligning IT spend and strategy&lt;/h2&gt;

&lt;p&gt;IT cost optimization isn’t just about trimming fat. The long game of optimising IT efficiency is in building a smarter, more responsive and more valuable IT function that’s recognised as crucial to business outcomes. CIOs who tackle inefficiencies head-on implement more streamlined processes, reallocate budgets and deliver greater ROI for their spend will strengthen their strategic position in their organisation.&lt;/p&gt;

&lt;p&gt;In circumstances where every dollar spent must justify its existence in spades, taking actionable steps to cut down on IT waste and shifting mindsets from reactive cost-cutting to smarter, targeted investments transforms IT departments into an active value generator, even in times of disruption and uncertainty.&lt;/p&gt;

&lt;p&gt;For deeper insights into the root causes of IT budget inefficiencies and how to fix them, check out Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank" rel="noopener"&gt;2025 Technology at Work Report: Reshaping Flexible Work&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 23 Jun 2025 19:20:25 Z</pubDate></item><item><guid isPermaLink="false">27e0712f-f1fe-4e5a-b850-a0d3a54d5017</guid><link>https://www.ivanti.com/en-gb/blog/ivanti-protecto</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How to Safeguard Healthcare Data in ITSM: Ivanti and Protecto</title><description>&lt;p&gt;The healthcare sector, perhaps more than any other, needs to scrutinise the balance between data utility and data privacy. Healthcare organisations must manage large amounts of sensitive data while complying with stringent regulations such as the Health Insurance Portability and Accountability Act (HIPAA). For IT teams seeking to implement AI-augmented service management, that responsibility weighs heavily.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;A notable recent incident involved over four million customers affected by &lt;a href="https://therecord.media/healthcare-data-breaches-blue-shield-california" rel="noopener" target="_blank"&gt;a data breach at Blue Cross Blue Shield&lt;/a&gt;, where Google Analytics had been configured in a manner that allowed member data to be shared with Google Ads, likely including protected health information.&lt;/p&gt;

&lt;p&gt;Forward-looking IT leaders want to take advantage of advanced IT service management capabilities to improve operational efficiency, including emerging AI applications. But to avoid becoming the latest headline, they also need the highest standards of data protection. In this article, we’ll go into how Ivanti integrates with Protecto to do just that.&lt;/p&gt;

&lt;h2&gt;Where healthcare compliance and AI intersect&lt;/h2&gt;

&lt;p&gt;The myriad regulations that healthcare organisations must follow (HIPAA, GDPR, CCPA and others) are designed to protect patient data and ensure that it is handled securely and ethically. Data security and privacy are fundamental aspects of patient trust, and noncompliance can result in significant fines and legal actions.&lt;/p&gt;

&lt;p&gt;At the same time, AI and ML technologies require access to large datasets – data that may include sensitive information that is subject to these stringent requirements. To add another layer of complexity, healthcare organisations are often large and complex, with multiple departments and locations, which means any data privacy solutions need to be able to scale without compromising performance.&lt;/p&gt;

&lt;h2&gt;Healthcare requirements for ITSM&lt;/h2&gt;

&lt;p&gt;IT organisations that want to take advantage of advanced ITSM use cases without fear of compromising data privacy have specific requirements – requirements that the integration between Ivanti Neurons for ITSM and Protecto deliver.&lt;/p&gt;

&lt;h3&gt;Data masking&lt;/h3&gt;

&lt;p&gt;Intelligent data masking identifies and masks sensitive information such as PII and PHI. This lets AI agents operate on data without exposing sensitive elements, preventing data leaks and reducing misuse. Additionally, data masking ensures that the context and utility of the information remain intact, enabling effective analysis and decision-making.&lt;/p&gt;

&lt;h3&gt;Role-based access controls&lt;/h3&gt;

&lt;p&gt;Role-based access controls and policy-driven unmasking ensure data is only accessed by authorised users with appropriate roles. Only users with the necessary permissions can access or unmask sensitive data.&lt;/p&gt;

&lt;h3&gt;Audit trails&lt;/h3&gt;

&lt;p&gt;To comply with regulations, healthcare organisations need a comprehensive audit trail of how sensitive data is accessed, used and protected. Detailed logs simplify compliance workflows and support regulatory audits.&lt;/p&gt;

&lt;h3&gt;Seamless integration&lt;/h3&gt;

&lt;p&gt;Protecto integrates with Ivanti APIs, which allows existing processes to remain uninterrupted – and for IT teams to deliver the best possible service – adding a layer of protection without disrupting operations.&lt;/p&gt;

&lt;h3&gt;Scale&lt;/h3&gt;

&lt;p&gt;A single instance of Protecto can support over 3,000 tenants, safeguarding the data of millions of users. It can handle large-scale deployments while maintaining operational resilience, making it a reliable choice for AI initiatives.&lt;/p&gt;

&lt;h2&gt;Ivanti and Protecto’s partnership&lt;/h2&gt;

&lt;p&gt;The partnership between Ivanti and Protecto brings immense value to Ivanti customers in highly regulated sectors with heightened data privacy concerns.&lt;/p&gt;

&lt;p&gt;Already available features such as custom masking policies, on-premises and private cloud alternatives, and improved audit logs and reports ensure customers can meet compliance requirements with confidence.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our commitment to research and development in AI, machine learning and data protection mean customers will always be at the forefront of managing large-scale datasets.&lt;/li&gt;
	&lt;li&gt;Our work with healthcare organisations, regulatory bodies and technology partners helps customers put in place practical data protection solutions without compromising IT efficiency.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Combining Ivanti Neurons for ITSM with advanced data security and privacy features ensures that our customers’ ITSM operations are both efficient and compliant with the most stringent guidelines, whether they’re in the healthcare industry or any other highly regulated field.&lt;/p&gt;

&lt;h2&gt;Ivanti’s partner ecosystem&lt;/h2&gt;

&lt;p&gt;Ivanti works with a wide range of technology partners like Protecto to help customers make the most of their investment in Ivanti solutions. To learn more, visit the &lt;a href="https://marketplace.ivanti.com/xchange/64b5b48e2ee9d6e08c3e6724" target="_blank"&gt;Ivanti Partner Markeplace&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 02 Jun 2025 17:00:31 Z</pubDate></item><item><guid isPermaLink="false">14a8a4d7-edd6-4d91-96f0-4d91c5c543ff</guid><link>https://www.ivanti.com/en-gb/blog/itsm-features-that-matter</link><atom:author><atom:name>Misti Allison </atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/misti-allison</atom:uri></atom:author><category>Service Management</category><title>The Hidden Gems of ITSM: Features That Matter Most</title><description>&lt;p&gt;Service management doesn't have to just be a buzzword. It can be a foundation of efficient operations where &lt;a href="https://www.ivanti.com/glossary/itsm" target="_blank" rel="noopener"&gt;IT Service Management (ITSM)&lt;/a&gt; plays a crucial role in keeping businesses running smoothly. But what truly sets exceptional ITSM apart from the rest? It’s not just about having a sleek user interface — it’s about the powerful features and functionalities that operate beneath the surface, improving user satisfaction and driving operational excellence. From automated &lt;a href="https://www.ivanti.com/glossary/incident-management" target="_blank" rel="noopener"&gt;incident management&lt;/a&gt; to self-healing capabilities, the true power of ITSM lies in its ability to anticipate and resolve issues before they become problems.&lt;/p&gt;

&lt;h2&gt;The power underneath: what truly matters&lt;/h2&gt;

&lt;p&gt;Beneath the surface of sleek interfaces and user-friendly designs lies what makes service management indispensable. While a polished UI can improve the user experience, it’s the underlying functionality and efficiency that determines the success of any service management system.&lt;/p&gt;

&lt;p&gt;For employees, it’s the speed and effectiveness with which their requests are handled that matters. When an employee submits a request, they expect it to be actioned and resolved quickly. Delays lead to frustration and a decline in productivity, which ripples through the entire organisation.&lt;/p&gt;

&lt;p&gt;Employees also highly value transparency and communication. They expect to be informed of the status of their requests and any potential delays. By providing regular updates and maintaining clear lines of communication, IT teams can significantly improve satisfaction and trust in the service management process.&lt;/p&gt;

&lt;p&gt;For IT professionals, the stakes are equally high. They need the right solutions to efficiently address and resolve issues. The ability to handle incidents at the initial level, often referred to as Level 0 support, is crucial. This means resolving simple issues quickly without escalating them, which can drastically reduce the number of tickets that need to be managed.&lt;/p&gt;

&lt;p&gt;In the end, the true test of employee satisfaction with the service management system is in the results it produces. The speed and efficacy with which issues are resolved, the quality of communication received, and the overall impact on their day-to-day productivity are key metrics.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Beyond the Flashy UI: The Core Capabilities of Service Management&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The underlying architecture and processes are what actually make service management strong. At the heart of any good service management solution is the ability to streamline workflows, which can greatly increase efficiency. When processes are optimised, teams can focus on more important work, reducing the time and effort spent on mundane, repetitive tasks. This not only increases productivity, but also ensures that the IT department can respond more effectively to the needs of the business.&lt;/p&gt;

&lt;p&gt;Automated incident management is another critical component that often goes unnoticed. By automating the detection and resolution of issues, organisations can drastically reduce response times.&amp;nbsp; These self-healing capabilities are a game-changer in modern service management. Ensuring that problems are identified and remediated before users even log them, leading to higher user satisfaction. Additionally, users are less likely to experience disruptions, and when issues do arise, they are resolved quickly and efficiently. This proactive approach not only improves the user experience but also helps in maintaining a positive perception of the IT department.&lt;/p&gt;

&lt;p&gt;Integration capabilities are another essential aspect that often gets overlooked. A &lt;a href="https://www.ivanti.com/en-gb/service-management"&gt;service management solution&lt;/a&gt; that seamlessly integrates with various enterprise applications and services ensures all components work in harmony. This eliminates silos and ensures that data flows smoothly across the organisation, improving overall operational efficiency.&lt;/p&gt;

&lt;p&gt;However, it’s important to note that not all vendors deliver on their low-code/no-code promises. While many claim to offer these features, the reality often involves more coding than advertised. True low-code/no-code solutions should minimise the need for extensive coding, making it easier for IT teams to deploy and manage services without requiring deep technical expertise.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex" target="_blank" rel="noopener"&gt;digital employee experience&lt;/a&gt; is more than just surveys. It involves a comprehensive 360-degree view of how employees interact with various aspects of the service management system, including applications, security and devices. Proactively identifying and addressing issues across these areas can significantly improve the overall employee experience.&lt;/p&gt;

&lt;h2&gt;Features that make service management great&lt;/h2&gt;

&lt;p&gt;But what are the specific features that elevate service management from a mere tool to an indispensable solution? One of the most transformative features is automation. By automating routine tasks and ticket resolution processes, service management solutions can significantly improve user satisfaction while reducing the workload on IT teams.&lt;/p&gt;

&lt;p&gt;Self-service portals are another game-changer. These portals empower users to resolve simple issues on their own, such as password resets or software installations, without needing to involve the IT department.&lt;/p&gt;

&lt;p&gt;Advanced analytics are also crucial for modern service management. By providing deep insights into service performance and user behaviour, these analytics enable organisations to proactively address issues before they become major problems. For example, predictive analytics can identify patterns that may indicate an impending system failure, allowing IT teams to take preventive action.&lt;/p&gt;

&lt;p&gt;Mobile access is also key. With the increasing mobility of the workforce, it’s essential that IT support is always available, no matter where users are. Mobile-friendly service management platforms enable users to submit tickets, track progress and receive updates on the go.&lt;/p&gt;

&lt;p&gt;Finally, AI is increasingly becoming a crucial aspect of successful service management. AI-driven tools can automate more complex tasks, provide intelligent recommendations and even predict and resolve issues before users are even aware of them. However, it’s crucial that these AI systems are transparent and trustworthy, ensuring they operate ethically and in the best interests of the organisation and its users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Ivanti Helps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is where Ivanti comes in. We provide a suite of solutions that not only make service management more efficient but also enhance the core aspects of service management. We do this through our AI-driven service management capabilities that make the service desk smarter, faster and more efficient. With AI-driven capabilities, we can summarise incidents and tickets, generate knowledge articles, classify incidents and even create dashboard widgets.&lt;/p&gt;

&lt;p&gt;In today’s digital world, security is top of mind for all organisations. That’s why we’re the only ITSM vendor to have signed the Secure by Design pledge. We don’t just say we’re secure — we build security into our products.&lt;/p&gt;

&lt;p&gt;Our robust security is complemented by our extensive enterprise integration capabilities. With over 1,000 connectors, our platform can seamlessly integrate with a wide range of third-party systems, both IT and non-IT. Our low-code/no-code approach, powered by the leading iPaaS platform, makes it easy to extend ITSM automation and workflow to external systems without requiring deep technical expertise.&lt;/p&gt;

&lt;p&gt;In addition, we offer five out-of-the-box (OOTB) enterprise workflows for HR, facilities, project portfolio management (PPM), governance, risk, and compliance (GRC) and security operations. These aren't just templates — they're fully functional business objects that can be customised to meet your specific organisational needs.&lt;/p&gt;

&lt;p&gt;The low-code visual editor is a powerful feature that allows organisations to build and modify workflows across all IT and non-IT processes. This capability allows for the creation of custom solutions that align with unique business requirements, minimising administrative effort and maximising productivity. The platform’s integrated DevOps capability, with OOTB bi-directional connectors for Jira, Azure DevOps, GitHub and Jenkins, extends this flexibility to DevSecOps.&lt;/p&gt;

&lt;p&gt;One of the most innovative aspects of Ivanti’s platform is its self-healing capabilities. Proactive service management ensures that issues are identified and resolved before they impact users, significantly reducing mean time to resolution (MTTR). This proactive approach not only improves service quality but also improves the overall digital employee experience. Ivanti is the only ITSM vendor that measures the digital employee experience, providing insights into employee sentiment and the performance of devices, applications and security measures.&lt;/p&gt;

&lt;p&gt;In a landscape of rapid technological change, Ivanti’s solutions offer the flexibility and security required to lead the pack. Through the power of advanced AI, resilient security and seamless integration, Ivanti equips organisations to deliver exceptional service and spearhead digital transformation with confidence.&lt;/p&gt;

&lt;p&gt;Want to learn more? Check out our webinar,&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=Qa2kUTIvpqo" rel="noopener" target="_blank"&gt;Beyond the Surface: Unveiling the True Power of ITSM&lt;/a&gt;,&amp;nbsp;to take a fresh look and elevate your service management game to gain a competitive edge.&lt;/p&gt;
</description><pubDate>Fri, 28 Mar 2025 12:34:36 Z</pubDate></item><item><guid isPermaLink="false">0b970e6f-43be-430c-81aa-a688cfc8e440</guid><link>https://www.ivanti.com/en-gb/blog/how-ai-alleviates-help-desk-workloads</link><category>Service Management</category><title>How AI can alleviate help desk workloads</title><description>&lt;p&gt;&lt;em&gt;Republished with permission from CIO.com&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The rising flood of trouble tickets is straining help desk operations. Yet many still rely on phone calls, outdated knowledge bases and manual processes. Unsurprisingly, this is leading to staff frustration and burnout, dissatisfied end users and persistent security vulnerabilities.&lt;/p&gt;

&lt;p&gt;As many as &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report" target="_blank" rel="noopener"&gt;56% of IT workers&lt;/a&gt; say that help desk ticket volume is up, according to a survey by Ivanti. The reasons include more software deployments, network reliability problems, security incidents/outages and a rise in remote working.&lt;/p&gt;

&lt;h2&gt;Old solutions for new problems&lt;/h2&gt;

&lt;p&gt;Today’s burden is acute because help desks are responding to the same questions and problems in the same way. For many, the main channel of interaction with users is the telephone.&lt;/p&gt;

&lt;p&gt;That means organisations are lacking a viable, accessible knowledge base that can be leveraged, says Alan Taylor, director of product management for Ivanti — and who managed enterprise help desks in the late 90s and early 2000s. “We end up in a cycle of constantly looking back at incomplete or poorly documented trouble tickets to find a solution.”&lt;/p&gt;

&lt;h2&gt;How AI can improve help desk workloads&lt;/h2&gt;

&lt;p&gt;AI can improve many help desk tasks. Yet Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report" target="_blank" rel="noopener"&gt;Everywhere Work Report&lt;/a&gt; found only 40% of respondents were using AI for ticket resolution, 35% for knowledge base management and only 31% for intelligent escalation. With AI, these activities can have a positive impact on help desk operations and end-user satisfaction. Organisations don’t need to overhaul major business processes to achieve these targeted results, says Taylor.&lt;/p&gt;

&lt;p&gt;In fact, there are a number of steps organisations can take to successfully introduce AI to alleviate staff workload.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Start with a small pilot project.&lt;/strong&gt; This could include automating a frequently asked question or ticket routing, to demonstrate the value of AI without overhauling processes. These pilot projects can be expanded as success is proven.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Prioritise automation of routine tasks.&lt;/strong&gt; “AI can have a big impact here,” Taylor says. “Use AI to drive automation for repetitive, low-complexity tasks like ticket classification, prioritisation, and routing. This helps reduce manual effort and improves response times.”&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Educate and train help desk analysts.&lt;/strong&gt; A lot of organisations talk about AI and its benefits at a high level, notes Taylor. “But that rarely filters down to the help desk analysts taking end user calls.” Equip the team with the necessary training to work with AI tools. Ensuring they understand how to use the tools effectively will alleviate concerns and boost engagement.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Prioritise high-quality data&lt;/h2&gt;

&lt;p&gt;Effective AI is dependent on high quality data. “The number one help desk data issue is, without question, poorly documented resolutions,” says Taylor. “High quality documentation results in high quality data, which both human and artificial intelligence can exploit.” Upskilling help desk staff to create good documentation is a critical step in leveraging AI for improved operations.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/automation"&gt;Ivanti’s service automation&lt;/a&gt; offerings have incorporated AI and machine learning. These technologies handle ticket classification, improving accuracy. Accurate classifications, in turn, can be used by AI to route problems consistently for fast resolution. Finally, Ivanti software uses AI to see where and how incidents are clustering, exposing root causes and enabling the help desk to craft a systematic response.&lt;/p&gt;

&lt;h2&gt;The bottom line&lt;/h2&gt;

&lt;p&gt;IT leaders can start breaking the repetitive, exhausting help desk logjam. They can tactically exploit AI and machine learning in small projects that relieve the workload, improve end user satisfaction and build trust in AI’s capabilities. High-quality data is essential for &lt;a href="https://www.ivanti.com/en-gb/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;effective AI&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 24 Feb 2025 16:46:45 Z</pubDate></item><item><guid isPermaLink="false">ab703481-4cb9-41b3-90b1-24a121f5ec6b</guid><link>https://www.ivanti.com/en-gb/blog/attack-surface-discovery</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>How to Identify Your Organisation’s Attack Surface</title><description>&lt;p&gt;Our &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;glossary page on attack surfaces&lt;/a&gt; defined the terms associated with the concept. This post provides information that'll help your organization identify its attack surface.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Much like your lawn after a good rain, your attack surface will grow rapidly if left unchecked. Along with increases in attack surface size comes an increase in cybersecurity risk. That risk can’t be eliminated as attack surfaces are always evolving, but it must be carefully managed.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How do I identify my organisation’s attack surface?&lt;/h2&gt;

&lt;p&gt;Managing that risk begins with identifying your organization’s attack surface. More specifically, you must identify what lurks below the surface — the endpoints, vulnerabilities and other attack vectors that expose your environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quote &lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Critical Security Controls (CIS Controls) v8&lt;/a&gt;: “Enterprises cannot defend what they do not know they have.” But how does one figure out what they have? If you or anyone from your team has ever wondered the same, you’ve come to the right place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the end of this post, you’ll discover the answers to these questions and better understand how to identify your organization’s attack surface using modern best practices:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;How do I identify my organization’s digital attack surface?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;What is attack surface management (ASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;What is cyber asset attack surface management (CAASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#four"&gt;What is external attack surface management (EASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#five"&gt;What are digital risk protection services (DRPS)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#six"&gt;What’s the difference between CAASM, EASM and DRPS?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#seven"&gt;Are there any options beyond ASM offerings for identifying digital attack surfaces?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#eight"&gt;How do I identify my organization’s physical attack surface?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#nine"&gt;How do I identify my organization’s human attack surface?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="one"&gt;How do I identify my organisation’s digital attack surface?&lt;/h2&gt;

&lt;p&gt;Identifying your &lt;a href="https://www.ivanti.com/glossary/attack-surface" target="_blank"&gt;digital attack surface&lt;/a&gt; can be difficult with traditional tools and practices, especially as that surface seems to expand exponentially every year. Fortunately, technology and service providers are mobilizing to meet this moment with attack surface management (ASM) offerings.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;Attack surface management (ASM)&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Gaining visibility into the IT assets deployed across your organization — plus their exposure and associated risk — is essential to achieving a strong cybersecurity posture. Leading security frameworks corroborate this stance. For instance, the first &lt;a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf" rel="noopener" target="_blank"&gt;Function of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) Version 1.1&lt;/a&gt; is Identify, and NIST states, “The activities in the Identify Function are foundational for effective use of the Framework.” Similarly, &lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt; contains the following Controls:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Control 1: Inventory and Control of Enterprise Assets&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 2: Inventory and Control of Software Assets&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 7: Continuous Vulnerability Management&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Such visibility is also the key to defining your digital attack surface. Unfortunately, organizations have long struggled to attain high levels of visibility.&lt;/p&gt;

&lt;p&gt;Research from Randori and Enterprise Strategy Group (ESG) reveals that, on average, organizations have &lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;30% more exposed assets&lt;/a&gt; than traditional asset management programs indicate. That figure stands to grow if companies fail to act as Gartner predicts &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2023-03-28-gartner-unveils-top-8-cybersecurity-predictions-for-2023-2024" rel="noopener" target="_blank"&gt;75% of employees&lt;/a&gt; will acquire, modify or create technology outside IT’s visibility by 2027.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Companies need to close the gap between the number of assets exposed to attackers and the number they know about. They must eliminate those blind spots and unmanaged technology from their environments. ASM does just that. According to Gartner, &lt;a href="https://www.gartner.com/document/4012816" rel="noopener" target="_blank"&gt;ASM aims to answer the question&lt;/a&gt;: “What does my organization look like from an attacker’s point of view, and how should it find and prioritize the issues attackers will see first?”&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is attack surface management (ASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;By taking an attacker’s perspective, ASM enables security teams to gain visibility into assets over which IT lacks governance and control, such as shadow IT, third-party systems and line-of-business applications.&lt;/p&gt;

&lt;p&gt;It works by combining people, processes, technologies and services to continuously discover, inventory and manage an organization’s internal and external assets. By doing so, ASM ensures any newly identified exposures are addressed before they can be exploited by malicious actors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;ASM is comprised of three areas: cyber asset attack surface management (CAASM), external asset surface management (EASM) and digital risk protection services (DRPS). Each area focuses on a specific use case: CAASM for assets and vulnerabilities, EASM for external assets and DRPS for digital assets.&lt;/p&gt;

&lt;p&gt;When combined, their capabilities can greatly help the 47% of security professionals surveyed for Ivanti’s &lt;a href="https://www.ivanti.com/en-gb/resources/v/doc/ivi/2747/a856c631661d"&gt; Government Cybersecurity Status Report &lt;/a&gt; that lack visibility into all the users, devices, applications and services residing on their networks.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="three"&gt;What is cyber asset attack surface management (CAASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;CAASM provides a complete, current and consolidated view of an organization’s internal and external assets, such as endpoints, servers, devices and applications. CAASM products enable this visibility by collecting data from existing internal sources such as asset discovery, IT asset management, endpoint security, vulnerability management and patch management tools as well as ticketing systems via API integrations.&lt;/p&gt;

&lt;p&gt;Collected data is automatically aggregated, normalized and deduplicated, then presented in a single user interface, eliminating the need for IT and security teams to manually gather and reconcile asset data. CAASM products also let those teams query against collected data, identify security vulnerabilities, spot gaps in security controls and remediate issues.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gartner states &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4012816" rel="noopener" target="_blank"&gt;less than 1% of companies&lt;/a&gt; had CAASM functionality implemented in 2022 but anticipates 20% will by 2026. Adoption is thought to be slow as CAASM relies on existing technologies but doesn't replace any of them. It can also likely be attributed to the fact that there are currently &lt;a href="https://www.gartner.com/reviews/market/cyber-asset-attack-surface-management" rel="noopener" target="_blank"&gt;limited vendors in the CAASM space&lt;/a&gt;&lt;/p&gt;

&lt;h2 id="four"&gt;What is external attack surface management (EASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;As its full name implies, EASM focuses on an organization’s external attack surface by employing processes, technology and managed services to discover internet-facing assets and systems plus related vulnerabilities.&lt;/p&gt;

&lt;p&gt;Examples of &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4021245" rel="noopener" target="_blank"&gt;external assets and systems EASM&lt;/a&gt; discovers include web applications, Internet Protocols (IPs), domain names, Secure Sockets Layer (SSL) certificates and cloud services. Additionally, examples of &lt;a href="https://www.gartner.com/reviews/market/external-attack-surface-management" rel="noopener" target="_blank"&gt;vulnerabilities discovered by EASM&lt;/a&gt; include — but aren't limited to — exposed servers, credentials, public cloud service misconfigurations, deep web and dark web disclosures&amp;nbsp;and vulnerabilities in third-party partner software code.&lt;/p&gt;

&lt;p&gt;In addition to asset discovery, EASM products commonly offer &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4007309" rel="noopener" target="_blank"&gt;other capabilities&lt;/a&gt;, including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Active external scanning of cloud, IT, IoT and OT environments.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Analysis of assets to determine if they are risky, vulnerable or behaving in an anomalous manner.&lt;/li&gt;
	&lt;li&gt;Prioritization of assets based on business impact, likelihood of exploitation by a malicious actor and other factors.&lt;/li&gt;
	&lt;li&gt;Remediation workflow and third-party integrations with ticketing systems, security orchestration, automation and response (SOAR) solutions&amp;nbsp;and other tools.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4007309" rel="noopener" target="_blank"&gt;main benefits of EASM&lt;/a&gt; are its ability to provide visibility of unknown digital assets and an outside-in view of an organization’s external attack surface. These benefits have helped 31% of companies with an EASM solution to find unknowingly exposed sensitive data, 30% to discover unknown or third-party hosted web assets, and 29% to discover unknown misconfigurations and vulnerable systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;EASM’s benefits have also driven &lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;34% of organizations&lt;/a&gt; to deploy a dedicated EASM offering. Like CAASM products, EASM products don't replace any existing technologies — meaning they require net-new spending — and there &lt;a href="https://www.gartner.com/reviews/market/external-attack-surface-management" rel="noopener" target="_blank"&gt;aren't currently very many of them on the market&lt;/a&gt;. However, unlike CAASM, EASM products aren't dependent on any existing technologies to operate, making them easier to adopt.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="five"&gt;What are digital risk protection services (DRPS)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;DRPS blends technology and services to protect digital assets and data from external threats. It does so by &lt;a href="https://www.gartner.com/document/code/729072" rel="noopener" target="_blank"&gt;extending detection and monitoring&lt;/a&gt; outside the enterprise perimeter — to the open web, deep web, dark web, social media and app marketplaces — to search for threats to enterprise digital resources, including IP addresses, domains and brand-related assets.&lt;/p&gt;

&lt;p&gt;As organizations engage in more and more online activities, it's critical for security teams to adopt DRPS capabilities and look beyond threats within the enterprise network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gartner.com/document/4007309" rel="noopener" target="_blank"&gt;According to Gartner&lt;/a&gt;, DRPS products don't simply identify threats, but provide actionable intelligence on threat actors as well as the tools, tactics and processes they exploit to carry out malicious activities. Additionally, DRPS also enables security teams to mitigate active threats using a combination of people, process and technology;and carry out activities required to foil future threats and protect digital assets.&lt;/p&gt;

&lt;p&gt;In its &lt;a href="https://info.jupiterone.com/resources/gartner-hype-cycle-security-operations" rel="noopener" target="_blank"&gt;2022 Hype Cycle for Security Operations&lt;/a&gt;, Gartner indicated DRPS is two to five years away from reaching the last key phase of a technology’s life cycle. That phase — deemed the Plateau of Productivity — is &lt;a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle" rel="noopener" target="_blank"&gt;defined as follows&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Mainstream adoption starts to take off. Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Delayed adoption of DRPS plus other ASM solutions like CAASM and EASM can likely be attributed to market confusion on the distinction between such solutions. We'll erase some of that confusion in the next section.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="six"&gt;What’s the difference between CAASM, EASM and DRPS?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;CAASM, EASM and DRPS are all components of ASM. Additionally, they all focus on security asset management and issue prioritization. These similarities have caused confusion in the market between these different solutions.&lt;/p&gt;

&lt;p&gt;The following table highlights the differences between CAASM, EASM and DRPS to help you distinguish between the different solutions:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;table 10px="" border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Feature / Capability&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;CAASM&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;EASM&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;DRPS&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Focus area&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Assets and vulnerabilties&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;External assets&lt;/td&gt;
			&lt;td&gt;Digital risk&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Applicable assets&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Endpoints&lt;/li&gt;
				&lt;li&gt;Servers&lt;/li&gt;
				&lt;li&gt;Devices&lt;/li&gt;
				&lt;li&gt;Applications&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Web applications&lt;/li&gt;
				&lt;li&gt;IPs&lt;/li&gt;
				&lt;li&gt;Domain names&lt;/li&gt;
				&lt;li&gt;SSL certificates&lt;/li&gt;
				&lt;li&gt;Cloud services&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;IP addresses&lt;/li&gt;
				&lt;li&gt;Domains&lt;/li&gt;
				&lt;li&gt;Brand-related assets&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Composition&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
				&lt;li&gt;Services&lt;/li&gt;
				&lt;li&gt;Processes&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
				&lt;li&gt;Services&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Capabilities&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Collect, aggregate, normalize, deduplicate and present data&lt;/li&gt;
				&lt;li&gt;Query against collected data&lt;/li&gt;
				&lt;li&gt;Identify security vulnerabilities&lt;/li&gt;
				&lt;li&gt;Spot gaps in security controls&lt;/li&gt;
				&lt;li&gt;Remediate issues&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Discover assets&lt;/li&gt;
				&lt;li&gt;Employ active external scanning&amp;nbsp;of cloud, IT, IoT and OT environments&lt;/li&gt;
				&lt;li&gt;Analyze assets&lt;/li&gt;
				&lt;li&gt;Prioritize assets&lt;/li&gt;
				&lt;li&gt;Leverage remediation workflow&lt;/li&gt;
				&lt;li&gt;Integrate with third-party ticketing systems, SOAR solutions and other tools&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Detect and monitor for threats outside the enterprise perimeter&lt;/li&gt;
				&lt;li&gt;Gain actionable intelligence on threat actors&lt;/li&gt;
				&lt;li&gt;Mitigate active threats&amp;nbsp;&lt;/li&gt;
				&lt;li&gt;Carry out activities required to foil future threats and protect digital assets&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Data sources&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Passive data collection via API integrations with existing internal tools:&lt;/p&gt;

			&lt;ul&gt;
				&lt;li&gt;Asset discovery&lt;/li&gt;
				&lt;li&gt;ITAM&lt;/li&gt;
				&lt;li&gt;Endpoint security&lt;/li&gt;
				&lt;li&gt;Vulnerability management&lt;/li&gt;
				&lt;li&gt;Patch management&lt;/li&gt;
				&lt;li&gt;Ticketing systems&lt;/li&gt;
			&lt;/ul&gt;

			&lt;p&gt;&lt;/p&gt;
			CAASM tools commonly also collect data from DRPS and EASM tools.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Active Internet-wide scans performed by EASM&lt;/li&gt;
				&lt;li&gt;Passive DNS&lt;/li&gt;
				&lt;li&gt;WHOIS&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Monitoring of:&lt;/p&gt;

			&lt;ul&gt;
				&lt;li&gt;Open web&lt;/li&gt;
				&lt;li&gt;Deep web&lt;/li&gt;
				&lt;li&gt;Dark web&lt;/li&gt;
				&lt;li&gt;Social media&lt;/li&gt;
				&lt;li&gt;App marketplaces&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Sample vendors&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Axonius&lt;/li&gt;
				&lt;li&gt;Balbix&lt;/li&gt;
				&lt;li&gt;JupiterOne&lt;/li&gt;
				&lt;li&gt;Lansweeper&lt;/li&gt;
				&lt;li&gt;Lucidum&lt;/li&gt;
				&lt;li&gt;Noetic Cyber&lt;/li&gt;
				&lt;li&gt;OctoXLabs&lt;/li&gt;
				&lt;li&gt;Panaseer&lt;/li&gt;
				&lt;li&gt;Qualys&lt;/li&gt;
				&lt;li&gt;Resmo&lt;/li&gt;
				&lt;li&gt;runZero&lt;/li&gt;
				&lt;li&gt;Scrut Automation&lt;/li&gt;
				&lt;li&gt;Sevco&lt;/li&gt;
				&lt;li&gt;ThreatAware&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;C2SEC&lt;/li&gt;
				&lt;li&gt;Censys&lt;/li&gt;
				&lt;li&gt;Cyberpion&lt;/li&gt;
				&lt;li&gt;CyCognito&lt;/li&gt;
				&lt;li&gt;FireCompass&lt;/li&gt;
				&lt;li&gt;Palo Alto Networks (Cortex Xpanse)&lt;/li&gt;
				&lt;li&gt;Pentera&lt;/li&gt;
				&lt;li&gt;Randori&lt;/li&gt;
				&lt;li&gt;Reposify&lt;/li&gt;
				&lt;li&gt;RiskIQ (a Microsoft company)&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;BlueVoyant&lt;/li&gt;
				&lt;li&gt;CloudSEK&lt;/li&gt;
				&lt;li&gt;Digital Shadows&lt;/li&gt;
				&lt;li&gt;Group-IB&lt;/li&gt;
				&lt;li&gt;GroupSense&lt;/li&gt;
				&lt;li&gt;HelpSystems (PhishLabs)&lt;/li&gt;
				&lt;li&gt;IntSights (a Rapid7 company)&lt;/li&gt;
				&lt;li&gt;SafeGuard Cyber&lt;/li&gt;
				&lt;li&gt;ZeroFox&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In the future, the distinctions between these solutions may not matter much.&amp;nbsp;Gartner predicts&amp;nbsp;70% of all CAASM, EASM and DRPS functionality will be part of broader, preexisting security platforms by 2026 and not provided by standalone vendors as it is today.&lt;/p&gt;

&lt;h3&gt;Are there any options beyond ASM offerings for identifying digital attack surfaces?&lt;/h3&gt;

&lt;p&gt;Organizations have had a need to identify and manage their digital attack surfaces since before ASM solutions have been available.&amp;nbsp;Instead of&amp;nbsp;ASM solutions, many organizations have leveraged&amp;nbsp;—&amp;nbsp;and continue to leverage&amp;nbsp;—&amp;nbsp;other approaches to do so:&lt;/p&gt;

&lt;table border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Approach used in place of ASM solution&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Pro&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Con&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Asset discovery tools&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Find and inventory hardware and software assets connecting to your network.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;Better than spreadsheets.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Often has blind spots such as shadow IT, third-party systems and line-of-business applications.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://www.gartner.com/reviews/market/breach-and-attack-simulation-bas-tools" rel="noopener" target="_blank"&gt;Breach and attack simulation (BAS)&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Automatically test threat vectors to gain a deeper understanding of security posture vulnerabilities and validate security controls.&lt;/td&gt;
			&lt;td&gt;Generates reports on security gaps and prioritizes remediation based on risk.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.gartner.com/document/4018063?ref=solrAll&amp;amp;refval=364074293" rel="noopener" target="_blank"&gt;Only focuses&lt;/a&gt;&amp;nbsp;on known attacks.&amp;nbsp;Doesn't&amp;nbsp;provide remediation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://cloudsecurityalliance.org/blog/2022/03/23/the-debate-should-you-build-or-buy-caasm/" rel="noopener" target="_blank"&gt;Cloud security posture management (CSPM)&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Understand changes in cloud configurations.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Ability to understand cloud configuration changes.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Doesn't&amp;nbsp;reveal when configurations drift out of compliance or potential impact of emerging threats.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Configuration management database (CMDB)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Track changes made to systems.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Know when configuration changes are made.&lt;/td&gt;
			&lt;td&gt;Doesn't&amp;nbsp;reveal when configurations drift out of compliance or potential impact of emerging threats.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Homegrown approach&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Combine spreadsheets, scripts and manual processes to manage attack surface.&lt;/td&gt;
			&lt;td&gt;Inexpensive or free from a pure cost perspective (overlooking analyst hours).&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Time-consuming and error-prone. Not scalable or real-time.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;IT asset management (ITAM)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Track and monitor assets through their full lifecycle.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Better than spreadsheets.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;Only covers&lt;/a&gt;&amp;nbsp;known and managed assets while overlooking unknown or unmanaged facets of attack surface.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Penetration testing (e.g., automated penetration testing tools and penetration testing as a service)&amp;nbsp;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Identify vulnerabilities within your network and applications by simulating a cyberattack.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.synopsys.com/glossary/what-is-penetration-testing.html#A" rel="noopener" target="_blank"&gt;Provides examples&lt;/a&gt;&amp;nbsp;of security posture and associated budget priorities.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.varonis.com/blog/cyber-kill-chain" rel="noopener" target="_blank"&gt;Only focuses&lt;/a&gt;&amp;nbsp;on the first phase of the cyber kill chain: reconnaissance. Also, results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://www.varonis.com/blog/red-teaming" rel="noopener" target="_blank"&gt;Red teaming&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Provides a comprehensive picture of an organization’s cybersecurity posture by staging a cyberattack simulation against networks, applications, physical safeguards and employees.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Goes beyond penetration testing by focusing on other phases of the cyber kill chain. Also goes beyond digital attack surface and touches on physical and human attack surfaces.&lt;/td&gt;
			&lt;td&gt;Results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Threat intelligence&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Access information on threats and other cybersecurity issues.&lt;/td&gt;
			&lt;td&gt;Arms security experts with intelligence on threats and vulnerabilities.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.gartner.com/document/4007309" rel="noopener" target="_blank"&gt;Geared toward organizations&lt;/a&gt;&amp;nbsp;with highly mature security operations consisting of skilled personnel and extensive resources.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Vulnerability management tools (e.g., scanners)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Identify and manage vulnerabilities within your infrastructure and applications.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;No visibility into unknown assets. Overwhelming amounts of data.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;While these technologies, services and other approaches&amp;nbsp;don't&amp;nbsp;offer all the capabilities and benefits that purpose-built CAASM, EASM and DRPS solutions deliver, most still have their place in an organization’s IT and security practices. In fact, CAASM tools&amp;nbsp;can't&amp;nbsp;function without data from asset discovery, ITAM, vulnerability management and/or patch management tools.&lt;/p&gt;

&lt;p&gt;Similarly,&amp;nbsp;according to Gartner, &lt;a href="https://www.gartner.com/document/4021245" rel="noopener" target="_blank"&gt;EASM complements&lt;/a&gt;&amp;nbsp;a few of&amp;nbsp;the technologies and services listed above. These include threat intelligence and various types of security testing, including breach and attack simulation, penetration testing as a service&amp;nbsp;and automated penetration testing and red teaming tools.&lt;/p&gt;

&lt;h2 id="seven"&gt;How do I identify my organization’s physical attack surface?&lt;/h2&gt;

&lt;p&gt;The first major component of an organization’s physical attack surface is what may be referred to as its&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;endpoint attack surface&lt;/a&gt;&amp;nbsp;as it’s composed primarily of all the endpoints that connect to the organization’s network: desktop computers, laptops, mobile devices and IoT devices.&lt;/p&gt;

&lt;p&gt;Fortunately, this component of the digital attack surface can be identified via any CAASM tool used to identify the same elements of the digital attack surface, eliminating the need to purchase another new technology. Asset discovery and ITAM tools are other, if less capable, options.&lt;/p&gt;

&lt;p&gt;The second major component of an&amp;nbsp;organization's&amp;nbsp;physical attack surface is its offices,&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/cloud-security-indiana-bob-s-server-closet-versus-data-centers-security-insights-podcast-episode-28"&gt;data centers&lt;/a&gt;&amp;nbsp;and other facilities. Again, fortunately, techniques already used in the identification of the digital attack surface overlap with those that can be used to identify the physical attack surface. In this case,&amp;nbsp;that'd&amp;nbsp;be the&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-pen-testing.html#~types-of-pen-testing" rel="noopener" target="_blank"&gt;physical penetration testing&lt;/a&gt; component of red teaming.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="eight"&gt;How do I identify my organization’s human attack surface?&lt;/h2&gt;

&lt;p&gt;Identifying your human attack surface begins by looking at your organizational chart. Anyone associated with your organization that possesses the ability to access your organization’s sensitive information&amp;nbsp;—&amp;nbsp;or to prevent others from accessing that information&amp;nbsp;—&amp;nbsp;can contribute to your human attack surface.&lt;/p&gt;

&lt;p&gt;That includes not just full-time employees but part-time employees, board members, contractors, partners, vendors, suppliers, temps and others as well.&lt;/p&gt;

&lt;p&gt;On top of that, it includes both the people currently in those roles and anyone&amp;nbsp;that's held&amp;nbsp;those roles in the past. &lt;a href="/en-gb/resources/v/doc/ivi/2732/7b4205775465"&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/a&gt;&amp;nbsp;shows nearly half of security professionals believe or know the login credentials for some former employees and contractors are still active, allowing those individuals access to company systems and data.&lt;/p&gt;

&lt;p&gt;The tricky part is that it’s not humans themselves but their actions&amp;nbsp;—&amp;nbsp;or inactions&amp;nbsp;—&amp;nbsp;that make up a human attack surface. Those actions and inactions are hard to spot as they often happen in the moment and out of sight of others, especially with more and more people working remotely.&lt;/p&gt;

&lt;p&gt;Red teaming, a practice used to identify elements of both the digital and physical attack surfaces, can also be used to identify a major component of the human attack surface: employee susceptibility to&amp;nbsp;&lt;a href="https://www.varonis.com/blog/red-teaming" rel="noopener" target="_blank"&gt;social engineering&lt;/a&gt;. Red teamers accomplish this by attempting to manipulate employees into offering up sensitive information such as access credentials via&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them"&gt;phishing, smishing, vishing&lt;/a&gt;&amp;nbsp;and other tactics.&lt;/p&gt;

&lt;p&gt;Improper assignment of user privileges is another major contributor to human attack surfaces. Reviewing the systems and data the people that contribute to your human attack surface&amp;nbsp;&lt;a href="https://elevatesecurity.com/blog-what-is-human-attack-surface-management/" rel="noopener" target="_blank"&gt;have access to&lt;/a&gt;, plus the levels of access they possess, is another way to identify parts of that surface.&lt;/p&gt;

&lt;p&gt;Identifying most other elements of human attack surfaces requires employees to be vigilant for issues and to hold others accountable. For example, say one employee sees that another has written their password on a post-it note and stuck it to their&amp;nbsp;monitor&amp;nbsp;or that an HVAC vendor propped the back door to an office building open.&lt;/p&gt;

&lt;p&gt;That employee should politely inform the others they are in violation of security best practices&amp;nbsp;—&amp;nbsp;and likely company policy as well — and ask them to correct their actions. When necessary, they should also involve the organization’s security team.&lt;/p&gt;

&lt;h2 id="nine"&gt;You’ve identified your organization’s attack surface … now what?&lt;/h2&gt;

&lt;p&gt;With the information in this post, you should be well on your way to identifying your organization’s digital, physical and human attack surfaces. Once you achieve that visibility, it’s time to take the next step: minimizing your attack surface.&lt;/p&gt;

&lt;p&gt;Read&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;The 8 Best Practices for Reducing Your Organization’s Attack Surface&lt;/a&gt; to uncover the technologies and tactics your organization can employ to shrink its attack surface.&lt;/p&gt;</description><pubDate>Thu, 05 Oct 2023 14:59:23 Z</pubDate></item><item><guid isPermaLink="false">efeddb48-01e1-4930-a9c0-dbc1be164a7b</guid><link>https://www.ivanti.com/en-gb/blog/itam-vs-itsm-vs-itom</link><category>Service Management</category><title>ITAM vs. ITSM vs. ITOM: What's the difference?</title><description>&lt;p&gt;IT asset management (ITAM) and IT service management (ITSM) are critical for any organization that requires IT capabilities to support business objectives. Both technologies provide IT operational support to an organization, but the nature and objectives of these technologies are quite different.&lt;br&gt;
&lt;br&gt;
Further, these processes are different than&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itom"&gt;ITOM, or IT operations management,&lt;/a&gt; which encompasses managing the operations of an IT infrastructure and involves the monitoring, troubleshooting and maintenance of IT systems, applications and services.&lt;br&gt;
&lt;br&gt;
Here, we will explore the differences and similarities between&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itam"&gt;ITAM&lt;/a&gt; and&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itsm"&gt;ITSM&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITAM – IT asset management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;An “IT asset” refers to both hardware and software that an organization uses to support its business objectives. When organizations have accurate IT asset inventory reports, they’re able to make informed IT purchase decisions. However, IT assets are often updated, moved and refreshed, making it difficult to maintain up-to-date asset information.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT asset reports are inaccurate, they expose the organization to unnecessary IT purchases, software audits and security breaches. ITAM provides recommendations and best practices for managing IT assets that support the organization’s objectives. So a short definition would be:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;IT asset management involves accounting for, deploying, maintaining, upgrading and disposing of an organization's IT assets as needed. In essence, it's ensuring that all these assets, whether tangible or intangible, are being properly tracked and utilized within the organization.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/it-asset-management"&gt;IT asset management (ITAM)&lt;/a&gt; best practices suggest that an IT asset be linked to its associated contractual and financial information so that organizations can track the overall costs associated with their IT assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Furthermore, ITAM provides guidance to IT asset managers on creating standards, processes, policies and measurements to increase control. This ensures compliance with business objectives and reduces risk, along with containing or reducing costs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When ITAM practices are implemented, IT assets will be tracked from purchase to disposal; often called &lt;a href="https://www.ivanti.com/en-gb/en-gb/en-gb/use-cases/it-asset-lifecycle-management"&gt;IT asset lifecycle management&lt;/a&gt;. For example, an ITAM hardware disposal process will ensure that when old laptops are disposed of during a refresh, the associated software licenses are properly harvested so they can be redeployed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;According to Gartner, &lt;a href="https://www.gartner.com/en/information-technology/glossary/it-asset-management-itam" rel="noopener" target="_blank"&gt;IT asset management (ITAM) provides&lt;/a&gt; an accurate account of technology asset lifecycle costs and risks to maximize the business value of technology strategy, architecture, funding, contractual and sourcing decisions.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Other aspects of ITAM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;To ensure efficient IT asset lifecycle management, ITAM business practices include processes for IT asset requests, approvals, procurement, disposal and redeployment. These processes ensure that IT assets are documented when purchased and properly tracked as they’re deployed and redeployed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In looking at ITAM vs. ITSM, it’s important to remember that most IT service management (ITSM) solutions provide capabilities that support IT requests and approvals. So it’s important that ITAM solutions selected by an organization integrate with the organization’s ITSM solution.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's also important to note that most comprehensive ITAM solutions offered by software vendors provide processes that span multiple departments of an organization. This means that most IT asset management solutions are selected and owned by business executives, not IT managers.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITSM – IT service management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Organizations that require IT assets to support business objectives also require IT services to ensure assets are properly working in the role for which they were purchased. &lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-itsm"&gt;IT service management (ITSM)&lt;/a&gt; is &lt;em&gt;not&lt;/em&gt; just about software tools; it’s also about processes, people and technology. ITSM software is a component of the overall ITSM solution, one we can define as:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;IT service management is a strategic approach for designing, delivering, managing and improving the way you use information technology (IT) within an organization. The goal of IT service management is to ensure that the right processes, people and technology are in place so that the organization can meet its business goals.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;ITSM software solutions come with several components such as a database, business objects (users, groups, roles, etc.) and a process engine. Most ITSM solutions offered by vendors today follow industry&amp;nbsp;best practices.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITOM – IT operations&amp;nbsp;management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;ITOM differs from ITAM or ITSM in that it covers a wide range of activities, from managing the physical hardware to managing the software and applications that run on it. It also involves ensuring the security and availability of IT systems. The ultimate goals of ITOM are to optimize the performance and efficiency of IT systems and to ensure they meet the needs of the organization. ITOM also ensures that IT systems comply with industry standards and best practices.&lt;/p&gt;

&lt;h2&gt;Industry best practices&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another aspect of the ITAM vs. ITSM backstory is that as IT solutions became more widely adopted, a need grew for industry standards. These standards were necessary to define common terminology and establish best practices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;ITAM subscribes to the best practices of the International Association of Information Technology Asset Management (IAITAM), adding a layer of professional insight across its capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Originally, ITSM was aligned only with the IT Infrastructure Library (ITIL). However, it has since expanded to include other standards such as ISO2000, VeriSM&amp;nbsp;and IT4IT.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In terms of compliance processes, ISO 20000 is more stringent and authoritative than ITIL. ITIL, on the other hand, is a set of recommended best practices that organizations can choose to implement to varying degrees, according to their needs and preferences.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;VeriSM&amp;nbsp;is a service management approach for the digital age that helps service providers create a flexible operating model to meet desired business outcomes.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The IT4IT Reference Architecture standard consists of the IT Value Chain and a three-layer reference architecture. The IT Value Chain comprises the four IT value streams, which play a vital role in helping IT control the service model as it advances through its lifecycle.&lt;/p&gt;

&lt;p&gt;All these standards have overlaps across all aspects of best practices while looking at them from slightly different angles.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To help IT service employees stay up to date and educated, each of these industry best practices offers certification and training. These certifications emphasize practical skills and procedures rather than specific products.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These software solutions are typically designed to meet most, if not all, of these industry recommendations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations like Pink Elephant exist to evaluate ITSM software solutions and certify them against industry standards. If you plan to implement best practices, choosing certified ITSM tools is advisable.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;CMDB or ITAM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another point to understand in looking at ITAM vs. ITSM? Comprehensive ITSM solutions offer configuration management capabilities along with a &lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;configuration management database (CMDB)&lt;/a&gt; to support and manage IT assets that provide services to the organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Both&lt;/em&gt; ITAM and ITSM provide guidance for managing IT assets, which can be confusing until you explore the objectives of each practice.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;ITAM objectives focus on managing an IT asset’s overall cost, including ownership, associated contracts with asset lifecycle, warranty and refresh information. ITAM focuses on IT assets from an organization’s financial perspective.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;An ITSM’s configuration management objectives look at IT assets from an operational and support perspective. Asset availability and stability impact an organization’s day-to-day operations, so assets need to be documented along with their configuration and service offerings.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Can you use a CMDB for ITAM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;To answer this question, let’s take a look at how airlines manage their flights. Airlines manage their flights using a database with flight numbers that describe a service. A separate asset database maintains inventory information listing the physical aircraft, along with relevant maintenance information.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When a problem is found with an aircraft, the airline will sometimes swap the aircraft for another. Because they maintain services and equipment in different databases, the airline can switch out the aircraft without having to change the flight number.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Much as it wouldn’t be practical for this airline to manage its flight services in the same database they use to manage its aircraft inventory, it’s not practical to use a CMDB for both ITAM and Configuration Management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most IT assets are refreshed every 3–4 years, while IT configurations with supporting assets are maintained and updated, not replaced. Therefore, you should use a CMDB to maintain and manage the lifecycle of a service while pulling the supporting assets from an IT asset management database.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Summary: ITAM vs. ITSM is really ITAM + ITSM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;ITAM and ITSM are both critical for any organization that uses IT assets to support business objectives. In considering ITAM vs. ITSM, it’s really not a matter of choosing between the two but &lt;a href="https://www.ivanti.com/blog/itsm-and-itam-great-together-pt-1"&gt;combining as a perfect pairing&lt;/a&gt;. Both have an essential role and work more powerfully as a team.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="0c5zunDRNPs"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;When looking to build, expand or change your IT asset management solution or your IT service management solution, you need to be sure to explore integration capabilities for both solutions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With the right tools in place, you can automate and improve IT processes that support IT assets. These improvements increase efficiency and control while reducing the inevitable costs and mistakes that occur from manual tasks being performed by an operator or analyst.&lt;/p&gt;
</description><pubDate>Thu, 31 Aug 2023 17:42:40 Z</pubDate></item><item><guid isPermaLink="false">89fbba43-7cbd-4bb6-95cd-8445ba7edfc3</guid><link>https://www.ivanti.com/en-gb/blog/get-it-right-by-focusing-on-service-strategy</link><atom:author><atom:name>Randal Locke</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/randal-locke</atom:uri></atom:author><category>Service Management</category><title>Get IT Right by Focusing on Service Strategy</title><description>&lt;p&gt;Too often, we in IT get so busy performing the day-to-day work and fighting the many fires that come at us each day that we neglect to take a moment and focus on ways we can be strategic about how we do our jobs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When building or expanding&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/service-management"&gt;IT Service Management&lt;/a&gt;&amp;nbsp;offerings, it’s important to understand how taking time to focus on service strategy can&amp;nbsp;greatly improve the efficiency&amp;nbsp;of service delivery.&lt;/p&gt;

&lt;p&gt;First, let’s begin by defining a few terms.&lt;/p&gt;

&lt;h2&gt;What is ITSM (IT Service Management)?&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.techtarget.com/searchitoperations/definition/ITSM" rel="noopener" target="_blank"&gt;IT Service Management&lt;/a&gt;&amp;nbsp;is a strategic approach for designing, delivering, managing and improving the way information technology (IT) is used within an organization. The goal of IT Service Management is to ensure that the right processes, people and technology are in place, so that the organization can meet its business goals.&lt;/p&gt;

&lt;h2&gt;What is IT Infrastructure Library (ITIL)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;IT Infrastructure Library (ITIL) refers to a group of documents created in the 1980s that provide a framework and best practices for building an IT Service Management (ITSM) solution. By following the recommended ITIL processes, organizations supporting an IT infrastructure can increase efficiency, while reducing service management costs.&lt;/p&gt;

&lt;h2&gt;What is a service strategy process?&lt;/h2&gt;

&lt;p&gt;ITIL defines five major areas to service strategy that can accelerate organizational success:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Strategy management for IT services&lt;/strong&gt;: assessment and measurement of IT strategy&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Service portfolio management&lt;/strong&gt;: defining and documenting IT services.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Financial management for IT services&lt;/strong&gt;: determining IT service costs and budgeting.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demand management&lt;/strong&gt;: forecasting future demand for IT services and budgeting resources.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Business relationship management&lt;/strong&gt;: managing the feedback and improvement of the IT services.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To properly manage your environment, you need to first design a plan, then determine the type of services you are delivering, validate all costs and budgets, forecast demand, learn how to gather feedback and perform continuous service improvements.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How to design a service portfolio strategy&lt;/h2&gt;

&lt;h3&gt;Design the plan&lt;/h3&gt;

&lt;p&gt;Constructing a service portfolio can be one of the most challenging tasks for an IT organization. It is essential to resist the temptation of continuing outdated practices and strive for success.[EC4]&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Try surveying your end user community to understand their&amp;nbsp;challenges and ever-changing needs. You can narrow down the survey results to capabilities you have within your IT organization and put in place services to support these needs. Caution should be taken to ensure that you&amp;nbsp;follow best practice guidelines for enabling services the drive consistency and end-user process improvements.&lt;/p&gt;

&lt;h3&gt;Determine the type of service(s) you are delivering&lt;/h3&gt;

&lt;p&gt;Deciding on the type of service you’re offering today and wish to deliver in the future is a critical piece that will help you understand and minimize how many actual services you are delivering.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consolidate where you can maximize resource usage, improve application management, and simplify the end user’s process for selecting assistance with the desired services. Too many services will complicate the end user’s interactions with the IT support organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensure that you evaluate your current services regularly to determine if they are necessary and consider potential services you may want to add in the future. Additionally, take the time to properly set up your nomenclature to reduce the need for future changes.&lt;/p&gt;

&lt;h3&gt;Validate all costs and budgets&lt;/h3&gt;

&lt;p&gt;Evaluating the cost of services needs to include not only personnel, software, hardware, services, but also soft costs, such as the cost and/or reduction in time for the people consuming those services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Understanding soft costs can make a significant difference in expressing the value of services you’re delivering.&lt;/p&gt;

&lt;h3&gt;Forecast resource demand&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The ever-changing world of IT and the consumers of the services makes resource demand forecasting very challenging. However, by understanding what services you are delivering and the historical need for them, you can extrapolate what your demand could be.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Resource consumption adaptability and tasks automation can minimize the negative impact of any forecast changes.&lt;/p&gt;

&lt;h3&gt;Perform continuous service improvement&lt;/h3&gt;

&lt;p&gt;The only way to improve your capabilities within an organization is with continual service improvement (CSI). Put relevant analysis and reporting in place to better understand the services you are delivering, the SLAs behind them and how they preform from the perspective of end user satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Metrics such as mean time to repair (MTTR), cost per ticket, reopen rate of incidents, call avoidance via self-service, and AI bots and volume by department or location are critically important to help establish improvement initiatives.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With accurate metrics, isolate and focus on areas that require improvement.&amp;nbsp;&amp;nbsp;Lastly, assign a cost to each improvement initiative and prioritize strategically based on cost versus value.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It’s been often stated that “if you fail to plan, you plan to fail.”&amp;nbsp;&amp;nbsp;Although some ITIL recommendations might not be practical for&amp;nbsp;every&amp;nbsp;organization, they are a great place to start when building an IT Service Management solution.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The ITIL service strategy processes focus on planning for an outcome and evaluating your performance against customer expectations. ITIL encourages periodic evaluation and amendments of processes to respond to the ever-changing environment, with the aim of being more effective in delivering service value to your organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 24 Aug 2023 16:06:25 Z</pubDate></item><item><guid isPermaLink="false">2fc44d33-38a8-4dc6-9d22-f5f1d296053d</guid><link>https://www.ivanti.com/en-gb/blog/how-to-use-generative-ai-for-knowledge-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>How to Use Generative AI for Knowledge Management</title><description>&lt;p&gt;In the blog&amp;nbsp;“&lt;a href="https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices"&gt;How Generative AI Can Benefit Knowledge Management&lt;/a&gt;”, we looked at the benefits of AI to knowledge management to enhance the quality, automating the creation of content and enabling more engaging content. In enabling generative AI to become part of the knowledge management framework introduces concerns about accuracy, data bias, privacy and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Now, it’s time to look at how&amp;nbsp;we can&amp;nbsp;make it work well together...&lt;/p&gt;

&lt;h2&gt;How to use generative AI with knowledge management&lt;/h2&gt;

&lt;p&gt;Despite concerns of using generative AI in daily operations, this technology has the potential to be a powerful tool to optimise knowledge management. By carefully considering the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices"&gt;potential&amp;nbsp;drawbacks&lt;/a&gt; and taking steps to mitigate them, organisations can use generative AI to improve their knowledge management practices.&lt;/p&gt;

&lt;p&gt;Here are the five things to consider when using generative AI for knowledge management:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Making&amp;nbsp;sure to&amp;nbsp;&lt;strong&gt;identify the type of data&lt;/strong&gt; &lt;strong&gt;that will be used to train&lt;/strong&gt;&amp;nbsp;the generative AI model. Identification of the data type will help to ensure that the data used is accurate and reliable. Are you going to be using existing knowledge articles, incident data, problem data or combinations of all?&lt;/li&gt;
	&lt;li&gt;Having identified the data type, generative AI is only as good as the data&amp;nbsp;it's&amp;nbsp;trained on. The old saying ‘garbage in, garbage out’ still applies. Ensure that the data&amp;nbsp;you've identified&amp;nbsp;above is&amp;nbsp;&lt;strong&gt;accurate, complete and&amp;nbsp;up-to-date&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitoring the output&lt;/strong&gt;&amp;nbsp;of the generative AI model for signs of bias, misinformation, completeness and accuracy. This can help to ensure that the information generated by the model is reliable.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Developing policies and procedures&lt;/strong&gt;&amp;nbsp;to manage the risks associated with using generative AI for knowledge management. This is an important step in ensuring the success of your project. These policies and procedures should address issues such as data security, privacy and ethical considerations. They should be designed to ensure that using generative AI for knowledge management is conducted in a responsible and ethical way.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Putting an&amp;nbsp;approval process&lt;/strong&gt;&amp;nbsp;in place before any knowledge information is shared publicly to ensure that the generated outputs are reviewed and authorised.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By taking these steps, organisations can use generative AI to improve their knowledge management practices while minimising the risks.&lt;/p&gt;

&lt;h2&gt;Combine generative AI and knowledge management with caution&lt;/h2&gt;

&lt;p&gt;The effectiveness and impact of generative AI on knowledge management will depend on how&amp;nbsp;it's&amp;nbsp;used and implemented.&amp;nbsp;It's&amp;nbsp;important to carefully evaluate the benefits and risks before deciding whether to incorporate it.&lt;/p&gt;

&lt;p&gt;Here are some potential pros and cons:&lt;/p&gt;

&lt;h3&gt;Pros&lt;/h3&gt;

&lt;h3&gt;&lt;strong&gt;1. Automatic generation of relevant content&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can be used to automatically create knowledge articles from existing data sources, such as product documentation, customer support tickets&amp;nbsp;and&amp;nbsp;employee training materials.&lt;/p&gt;

&lt;p&gt;With&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;32% of IT professionals&lt;/a&gt;&amp;nbsp;reporting an increase in helpdesk tickets since the move to remote working, there’s a significant opportunity for enhancement of the knowledge base that can enable quicker and more effective issue resolution, freeing up IT professionals to focus on more strategic tasks, such as developing new knowledge management initiatives and improving the quality of existing knowledge articles.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;2. Improved search accuracy&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can help improve search accuracy by personalising the delivery of knowledge to employees, based on their individual needs and preferences. With an &lt;a href="https://venturebeat.com/business/report-employees-spend-3-6-hours-each-day-searching-for-info-increasing-burnout/#:~:text=Special%20Issues%20Jobs-,Report%3A%20Employees%20spend%203.6%20hours%20each,searching%20for%20info%2C%20increasing%20burnout" rel="noopener" target="_blank"&gt;average employee spending&amp;nbsp;3.6 hours a day&lt;/a&gt;&amp;nbsp;searching for information, any time savings in the way knowledge is delivered to them is a win.&lt;/p&gt;

&lt;p&gt;Enabling easier and quicker access to&amp;nbsp;information will ultimately enhance&amp;nbsp;your employees’ digital experience.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;3. Enhanced automation&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can assist in automating&amp;nbsp;routine task – even if it's&amp;nbsp;not directly related to the creation of knowledge management articles.&lt;/p&gt;

&lt;p&gt;With&amp;nbsp;&lt;a href="https://rs.ivanti.com/reports/ema-modern-itam-in-the-modern-workplace-2022.pdf"&gt;85% of IT professionals&lt;/a&gt;&amp;nbsp;rating automation and AI investments as profitable ventures, identifying new ways of streamlining their processes can free up time for IT professionals to focus on more complex issues.&lt;/p&gt;

&lt;h3&gt;Cons&lt;/h3&gt;

&lt;h3&gt;&lt;strong&gt;1. Risk of misinformation&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can potentially produce incorrect or misleading information, which can lead to serious consequences in the IT field. For example, the introduction of malware, or the incorrectly recommending turning off functionality which is used to secure the IT environment from malicious actors.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;2. Dependence on AI-generated content&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;If companies become too reliant on AI-generated content, they may not prioritise the human-generated one or critical thinking skills, leading to a potential loss of expertise. Despite all the discussion around generative AI, human oversight is still required to validate accuracy and approve the generated information.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;3. Ethical concerns&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;There are ethical concerns surrounding the use of generative AI, like potential bias in the data used to train the model, which can perpetuate existing inequalities.&lt;/p&gt;

&lt;p&gt;There’s no doubt that generative AI can be a valuable tool for IT knowledge management and&amp;nbsp;while&amp;nbsp;a new exciting technology,&amp;nbsp;there's&amp;nbsp;still much to be learned about the benefits and pitfalls that it may bring.&lt;/p&gt;

&lt;p&gt;Each organisation needs to review the potential impact individually and choose an appropriate AI solution that meets their own need for privacy, accuracy and security.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Tips for implementing generative AI for knowledge management&lt;/h2&gt;

&lt;h3&gt;Start small and scale up&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;It's better to start with a small pilot project and then scale up using generative AI as you gain experience.&lt;/p&gt;

&lt;h3&gt;Get buy-in from stakeholders&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;It's important to get buy-in from stakeholders before deploying generative AI in production. This will help ensure that the model is used effectively and that its outputs are trusted.&lt;/p&gt;

&lt;h3&gt;Monitor the model's performance&lt;/h3&gt;

&lt;p&gt;It's important to monitor the model's performance after it's been deployed in production. This will help identify any potential problems with the model and improve the model's accuracy.&lt;/p&gt;

&lt;h3&gt;Continuously improve the model&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI models are constantly being improved. It's important to continuously enhance the model by retraining it on new data and addressing any potential problems that may occur.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Learn more about this topic –&amp;nbsp;watch our webinar on&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/generative-ai-for-infosec-hackers-what-security-teams-need-to-know" target="_blank"&gt;Generative AI for InfoSec &amp;amp; Hackers: What Security Teams Need to Know&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 27 Jun 2023 14:30:00 Z</pubDate></item><item><guid isPermaLink="false">061ff086-9328-47bb-9516-06d6653ca2c6</guid><link>https://www.ivanti.com/en-gb/blog/how-it-device-discovery-can-identify-your-network-s-assets-and-vulnerabilities</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities</title><description>&lt;p&gt;The security of your organisation’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensuring compliance requires you to know what’s on your network. But how can that be done when only&amp;nbsp;&lt;a href="/en-gb/resources/v/doc/ivi/2732/7b4205775465"&gt;48% of leaders and security professionals&lt;/a&gt;&amp;nbsp;say they run their asset discovery program at least once per week?&amp;nbsp;One of the most effective tools for identifying assets and vulnerabilities on a network is IT asset discovery.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is IT discovery and why is it important for IT security?&lt;/h2&gt;

&lt;p&gt;IT discovery is the process of identifying and cataloging the various hardware, software and other components that make up an IT infrastructure. This is an essential process to ensure the smooth functioning of IT networks as it allows IT administrators to identify potential issues and plan for future growth.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once this identification and cataloging of IT inventory is completed, you can maintain a comprehensive inventory of all your assets.&amp;nbsp;Keeping track of all the components making up your network in one place means IT administrators can quickly identify any problems and take the necessary steps to fix them.&lt;/p&gt;

&lt;p&gt;And since,&amp;nbsp;on average, up to&amp;nbsp;&lt;a href="https://comparesoft.com/asset-management-software/eliminate-ghost-assets/" rel="noopener" target="_blank"&gt;30% of an organisation’s IT assets&lt;/a&gt;&amp;nbsp;are ghost assets,&amp;nbsp;missing or unaccounted for,&amp;nbsp;it is even more important to have accurate, up to date information about your device landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quickly detect changes in the network and respond to potential&amp;nbsp;threats,&amp;nbsp;it’s worth automating the discovery process&amp;nbsp;—&amp;nbsp;ultimately,&amp;nbsp;it'll&amp;nbsp;ensure&amp;nbsp;a secure and compliant network. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How does IT discovery work?&lt;/h2&gt;

&lt;p&gt;IT discovery&amp;nbsp;typically uses manual scanning or automated scanning tools. Manual scans involve manually entering IP addresses into a scanner, while automated scans are done with specifically designed software programs. These programs will search through an organisation's environment, looking for:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Hardware components such as computers, servers, routers and switches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software components such as operating systems and applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Network connections such as LANs (Local Area Networks) or WANs (Wide Area Networks).&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additionally, as not every asset will be on the network, the ability to discover devices from other sources via connectors is just as critical in providing a comprehensive picture of your entire IT estate.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Benefits of IT discovery for IT security&lt;/h2&gt;

&lt;p&gt;Accurate device information is an essential component of any organisation’s IT network. Without it, organisations are unable to identify and track assets on their networks or ensure compliance with relevant regulations and standards.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By automating the process of discovering devices connected to your&amp;nbsp;network,&amp;nbsp;you can capitalise on the following benefits:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Provide real-time alerts regarding any changes in the device inventory&lt;/strong&gt;.&amp;nbsp;This kind of visibility can help your organisation quickly detect potential threats and respond accordingly. With accurate device information, identifying unknown assets and reducing attack surface by removing outdated or unauthorised hardware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ensure that a network is compliant with relevant security regulation&lt;/strong&gt;s&amp;nbsp;and standards such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act).&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Accurately monitor the performance of IT infrastructure and ensure that it always remains secure&lt;/strong&gt;.&amp;nbsp;With real-time visibility into all the devices connected to the network, your IT team can easily identify problems, even before they become critical issues, and respond quickly when issues arise. This helps reduce downtime for employees, which in turn leads to improved productivity and employee experience across the organisation.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Respond&amp;nbsp;Quickly to Potential Threats&lt;/h2&gt;

&lt;p&gt;When responding to potential threats, it’s important for organisations to act quickly to minimise the impact of the attack. With extended visibility into your entire network, you can quickly locate any malicious actors or vulnerabilities that could lead to an attack.&lt;/p&gt;

&lt;p&gt;This also allows for more accurate and timely monitoring of changes in your network's architecture, which are critical in identifying potential weaknesses before exploitation can occur.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, keeping track of who has access to what parts of your network makes monitoring user activities and maintaining up-to-date user profiles a breeze. With threat actors getting better at disguise, ensuring that only authorised personnel have access to the information they need helps reduce the risk of any unauthorised access or misuse.&lt;/p&gt;

&lt;p&gt;And if a threat occurs, it’s much easier to determine where it originated from and take appropriate action against it.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Finally, providing valuable insights into how your organisation is responding to potential threats can help improve your security strategy. By measuring response time and tracking incidents over time, you can evaluate which strategies are working best and which ones to amend.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hungry for more? Watch our webinar recording and explore&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs"&gt;5 Best Practices From Real‑World RBVM Programs&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 22 Jun 2023 20:09:10 Z</pubDate></item><item><guid isPermaLink="false">e1f415fc-1f15-4401-acf7-ec29e4d6b2be</guid><link>https://www.ivanti.com/en-gb/blog/how-generative-ai-can-benefit-your-knowledge-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>How Generative AI Can Benefit Your Knowledge Management</title><description>&lt;p&gt;There has been growing interest in the capabilities of generative AI since the release of tools like ChatGPT, Google Bard, Amazon Large Language Models and Microsoft Bing. With the hype comes concerns about privacy, PII, security&amp;nbsp;and, even more importantly, accuracy. And rightly so.&lt;/p&gt;

&lt;p&gt;Organizations are treading cautiously with their acceptance of generative AI&amp;nbsp;tools, despite seeing them as a&amp;nbsp;&lt;a href="https://www.forbes.com/sites/brentdykes/2023/04/12/generative-ai-why-an-ai-enabled-workforce-is-a-productivity-game-changer/?sh=53977fdf3a53" rel="noopener" target="_blank"&gt;game&amp;nbsp;changer&lt;/a&gt;. Many businesses are trying to find the sweet spot&amp;nbsp;that&amp;nbsp;enables them to capitalize on the benefits now,&amp;nbsp;while&amp;nbsp;identifying more strategic uses for generative AI for the future; all without compromising on security.&lt;/p&gt;

&lt;p&gt;One area where immediate gains&amp;nbsp;can&amp;nbsp;be obtained within an organization is their&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/knowledge-management"&gt;knowledge management&lt;/a&gt;. This initiative has been challenging for many organizations, yet it’s one that can drive employee productivity and deliver significant benefits to support teams,&amp;nbsp;who'd&amp;nbsp;typically maintain knowledge manually.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How generative AI and knowledge management&amp;nbsp;intersect&lt;/h2&gt;

&lt;p&gt;Generative AI refers to a type of artificial intelligence that can create new content, such as images, text or even music, based on existing data. It uses machine learning algorithms to&amp;nbsp;analyze&amp;nbsp;and learn from large datasets. From there, it generates new content based on that analysis.&lt;/p&gt;

&lt;p&gt;Knowledge management, on the other hand, is the process of capturing, organizing and sharing knowledge within an organization. It involves collecting information from various sources, storing it in a centralized database and making it easily accessible to employees when they need it.&lt;/p&gt;

&lt;p&gt;Many organizations manually maintain their knowledge management, opening the door for out of date or poorly written content. By automating many of the tasks involved in knowledge management, generative AI can help improve the efficiency and effectiveness of your knowledge management processes.&lt;/p&gt;

&lt;p&gt;Some of the specific ways in which generative AI can optimize knowledge management include:&lt;/p&gt;

&lt;h3&gt;1. Automating the creation of knowledge articles&lt;/h3&gt;

&lt;p&gt;Generative AI can automatically create knowledge articles from existing data sources, such as product documentation, customer support tickets&amp;nbsp;and&amp;nbsp;employee training materials. This automation can free up IT professionals to focus on more strategic tasks, such as developing new&amp;nbsp;knowledge management initiatives and improving the quality of existing knowledge articles.&lt;/p&gt;

&lt;h3&gt;2. Improving the quality of knowledge&lt;/h3&gt;

&lt;p&gt;Generative AI can improve the quality of knowledge by identifying and correcting errors, archiving old information, as well as by adding context and additional information to knowledge articles. This can help ensure that employees have access to accurate and up-to-date information.&lt;/p&gt;

&lt;h3&gt;3. Generate new ideas and insights&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI can generate new ideas and insights by combining existing knowledge in new ways. For example, HR, facilities and IT all have articles that talk about onboarding and offboarding employees with an organization.&lt;/p&gt;

&lt;p&gt;Generative AI may look at these and produce a merged knowledge&amp;nbsp;article&amp;nbsp;that&amp;nbsp;discusses&amp;nbsp;the end-to-end process of onboarding and offboarding across all three areas. This can save an employee from having to search across three different areas.&lt;/p&gt;

&lt;h3&gt;4. Solve problems more quickly&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI can quickly solve problems by identifying patterns and trends in data. This can help organizations make better decisions and improve their overall performance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For example, generative AI may look across IT incidents over a defined period of time and identify a common method of resolution for a group of common issues. Based on its findings, it can generate a knowledge article for service desk agents to resolve issues quicker, and for employees to resolve them themselves via self-service.&lt;/p&gt;

&lt;h3&gt;5. Create more engaging content&lt;/h3&gt;

&lt;p&gt;Generative AI can create more engaging content by personalizing it for each user, helping organizations improve their customer experience. Knowledge articles, particularly within HR knowledge, are personalized based on region or language. Being able to&amp;nbsp;generate content unique to their persona will greatly enhance the use and experience to the employee.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;What are the drawbacks to generative AI?&lt;/h2&gt;

&lt;p&gt;Generative AI solutions paired with knowledge management&amp;nbsp;have&amp;nbsp;the potential to revolutionize many industries and fields. However, it&amp;nbsp;isn't&amp;nbsp;without its drawbacks, including:&lt;/p&gt;

&lt;h3&gt;1. Security and privacy&lt;/h3&gt;

&lt;p&gt;Generative AI systems used for knowledge management may contain sensitive or confidential information. So,&amp;nbsp;it's&amp;nbsp;crucial to ensure that they are secure and protected against cyberthreats. Additionally, there may be concerns around privacy, particularly if the AI is generating content that includes personal or identifying information.&lt;br /&gt;
&lt;br /&gt;
For example, generative AI can create realistic-looking malware and phishing attacks. These attacks can be used to steal personal information, financial data or other sensitive information.&lt;/p&gt;

&lt;h3&gt;2. Quality and accuracy&lt;/h3&gt;

&lt;p&gt;While generative AI models can produce impressive outputs, their quality and accuracy can vary widely depending on the input data and the complexity of the task. The old saying of "garbage in, garbage out"&amp;nbsp;still applies. It can also be difficult to ensure that the AI has access to accurate and up-to-date information, which can affect the quality of what it generates.&lt;br /&gt;
For example,&amp;nbsp;training data for ChatGPT is collected from the internet and updated regularly. However, the current version of ChatGPT is trained on data that was collected up to September 2021. This means that ChatGPT may not be able to answer questions about current events or topics that have been in the news since September 2021.&lt;/p&gt;

&lt;h3&gt;3. Data bias&lt;/h3&gt;

&lt;p&gt;Generative AI models can inadvertently reflect the biases and prejudices present in the data&amp;nbsp;they're&amp;nbsp;trained on, leading to biased or inaccurate results. This data bias is especially concerning in knowledge management applications, where accuracy is critical.&lt;br /&gt;
For example, if a model is trained on a dataset of text that's predominantly from the United States, the model may be less likely to generate text relevant to people from other countries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Generative AI provides an organization with opportunities to enhance knowledge management through improved quality, engaging content and automation. But there are cautions along the way. Learn&amp;nbsp;what you need to have in place to successfully &lt;a href="https://www.ivanti.com/en-gb/blog/how-to-use-generative-ai-for-knowledge-management"&gt;use generative AI with knowledge management in your organisation&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Tue, 20 Jun 2023 15:24:02 Z</pubDate></item><item><guid isPermaLink="false">60f4f064-d302-46dc-9034-5e521f0d4248</guid><link>https://www.ivanti.com/en-gb/blog/how-to-start-a-knowledge-base-simple-yet-surefire-approach</link><atom:author><atom:name>Ivanti</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/ivanti</atom:uri></atom:author><category>Service Management</category><title>How to Start a Knowledge Base: Simple Yet Surefire Approach</title><description>&lt;p&gt;Early in my career, I made the jump from defense contractor to customer support agent for an up-and-coming&amp;nbsp;IT Service Management solution provider. Being new to the team and&amp;nbsp;industry,&amp;nbsp;I felt completely out of place. After the initial product training, I was pointed to a lab computer and told to start diagnosing a set of customer issues. I felt completely lost.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over&amp;nbsp;time, with&amp;nbsp;significant amounts of studying and leaning on my peers, I figured things out and eventually became one of the go-to analysts. The challenge with this method was that this vast empirical knowledge was locked in each analyst’s brain. When we lost an employee, we also lost their extensive expertise. Eventually, a knowledge base initiative was started.&lt;/p&gt;

&lt;h2&gt;Why investing time and effort in a knowledge base setup is a good idea&lt;/h2&gt;

&lt;p&gt;While&amp;nbsp;there are some obvious reasons to have a knowledge base, like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Speeding up the resolution time of customer issues.&lt;/li&gt;
	&lt;li&gt;Maintaining employee productivity and satisfaction at work.&lt;/li&gt;
	&lt;li&gt;Increasing analyst time-to-effectiveness.&lt;/li&gt;
	&lt;li&gt;Delivering consistent solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are a few&amp;nbsp;not-so-obvious&amp;nbsp;reasons&amp;nbsp;to maintain it, such as:&lt;/p&gt;

&lt;h3&gt;Eliminating tribal knowledge&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;This is knowledge&amp;nbsp;that's&amp;nbsp;held privately by individuals with the intention of increasing their&amp;nbsp;value,&amp;nbsp;yet&amp;nbsp;makes the organisation vulnerable.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improving the perception of your organisation and products&lt;/h3&gt;

&lt;p&gt;Providing responsive, accurate resolutions can eventually&amp;nbsp;lead&amp;nbsp;to product satisfaction and customer retention.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Reducing IT support costs&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;If the knowledge base is tailored properly and made available to self-service&amp;nbsp;users,&amp;nbsp;whether through a web portal or a virtual assistant (chat bot), then issues may be resolved, without even requiring a call to the service deck.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is sometimes&amp;nbsp;called&amp;nbsp;&lt;a href="https://mobisoftinfotech.com/resources/blog/it-support-levels-0-to-4/" rel="noopener" target="_blank"&gt;Level 0 support&lt;/a&gt;.&amp;nbsp;Also, with analysts closing issues faster, their productivity increases, often eliminating the need for added headcount.&lt;/p&gt;

&lt;h2&gt;Where to start with setting up a knowledge base&lt;/h2&gt;

&lt;p&gt;Most&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/service-management"&gt;modern service management solutions&amp;nbsp;&lt;/a&gt;include an integrated, yet unpopulated, knowledge base repository&amp;nbsp;that's ready to receive your valued input.&lt;/p&gt;

&lt;p&gt;Even though there are many great knowledge base vendors out there, they may not be able to integrate with your service management environment. Also, while not a knowledge base solution, SharePoint offers a knowledge template that can get you started.&lt;/p&gt;

&lt;p&gt;In addition to standalone knowledge base solutions, you may wish to consider populating your knowledge databases with packaged knowledge. These knowledge packs, offered by various companies, focus on topics like Windows, Office 365, Adobe, macOS and others. These&amp;nbsp;concentrated,&amp;nbsp;ready-to-use knowledge packs are highly valuable, assisting young IT support organisations with helping customers and quickly resolving issues.&lt;/p&gt;

&lt;p&gt;While many organisations can utilise pre-packaged knowledge, most organisations also support unique solutions that require specialised knowledge. For an established organisation,&amp;nbsp;that's been&amp;nbsp;providing support for quite some time, they'll&amp;nbsp;already have valuable information in the form of past support tickets that can be quickly put into a knowledge base.&lt;/p&gt;

&lt;p&gt;If the organisation is new or a new solution has recently been released, engineering teams will be heavily relied on for initial support knowledge.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Nearly all modern IT Service Management&amp;nbsp;solutions&amp;nbsp;will have the functionality to initiate new knowledge articles directly from resolved and closed incidents. For example,&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;Ivanti Neurons for Service Management&lt;/a&gt;&amp;nbsp;has an action link ‘button’ that seamlessly moves key incident data into a new knowledge base template.&lt;/p&gt;

&lt;p&gt;It also includes workflows to vet,&amp;nbsp;test&amp;nbsp;and refine articles before publishing. The challenge is that ticket resolution data is often not written in a repeatable step-by-step, easy-to-understand format.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Motivating busy&amp;nbsp;support teams to convert and document past incidents into decent articles and to store undocumented data in a searchable repository is the challenge.&lt;/p&gt;

&lt;h2&gt;How to motivate your teams&lt;/h2&gt;

&lt;p&gt;The organisation mentioned at the beginning of this blog had a wonderfully effective method of extracting information from analysts’ brains. It used the&amp;nbsp;&lt;a href="https://www.collinsdictionary.com/us/dictionary/english/carrot-and-stick" rel="noopener" target="_blank"&gt;carrot and stick approach&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;First,&amp;nbsp;the stick.&amp;nbsp;As part of everyone’s yearly goals, each support analyst was required to produce a set number of original knowledge articles per month. The target was typically&amp;nbsp;5–10&amp;nbsp;per month, which&amp;nbsp;wasn't&amp;nbsp;unreasonable based on our call volume. Not achieving the target number impacted one’s annual review. To ensure superior quality articles were being submitted, articles were first reviewed for duplication.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next, articles were&amp;nbsp;reviewed&amp;nbsp;for accuracy by distributing them to other team members for technical review. Lastly, they received a final review&amp;nbsp;before&amp;nbsp;being made available to the targeted&amp;nbsp;audience,&amp;nbsp;whether it be analysts only or both analysts and customers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next,&amp;nbsp;the carrot. Articles were tracked for usage and analysts were rewarded by the number of times an article was used to successfully resolve an issue. A decent IT service management solution with an integrated knowledge base should support this level of reporting.&lt;/p&gt;

&lt;p&gt;Based on monthly usage, analysts whose articles were used the most during the month to resolve incidents received a substantial prize at the end of the year – some&amp;nbsp;gifts&amp;nbsp;were worth several thousand dollars.&lt;/p&gt;

&lt;p&gt;Throughout the year, campaigns were created to motivate and remind the teams of the&amp;nbsp;requirements&amp;nbsp;and the rewards. The result was the creation of a&amp;nbsp;sizeable,&amp;nbsp;growing and highly valuable repository of&amp;nbsp;product-specific&amp;nbsp;articles in a brief&amp;nbsp;period.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However&amp;nbsp;you go about motivating your teams to create knowledge content,&amp;nbsp;it'll&amp;nbsp;take a concerted effort and constant reinforcement. The rewards for your efforts will be worth it.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;If you’d like to experience all the benefits a modern service management provider can offer, watch the&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/itsm/assets/s3/ivanti-neurons-for-itsm"&gt;full demo&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 13 Jun 2023 18:36:14 Z</pubDate></item></channel></rss>