ITSM

upguard

What Is Configuration Management and Why Is It Important?

Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. Configuration management is a form of IT service management (ITSM) as defined by ITIL that ensures the configuration of system resources, computer systems, servers and other assets are known, good and trusted. It's sometimes referred to as IT automation.

nnt

Change Management's 'Dirty Little Secret'

Change Management is blind. It is a key IT Service Management process and, undeniably, it's beneficial to plan and schedule changes. But Change Management’s ‘dirty little secret’ is that, despite the comfort blanket of documentation and approvals, you never know what’s really going on. You have no idea what was actually changed, either during the Change Window or at any other time.

nnt

Change and Configuration Management Best Practices Guide

Systems are constantly changing. Change and configuration management best practices allow organizations to keep track of configuration changes in a way that allows for rapid feature updates without any service outages, but many organizations struggle to find the ideal formula to make this process successful. So, what are the best practices in change and configuration management?

siemplify

Connecting the SOC to IT with Digital Workflows via ServiceNow

A common challenge security operations centers face is competing remediation and recovery actions fast. If the analyst has the authority to personally take action, this isn’t usually a problem. However, in many organizations, analysts don’t have unfettered power to make changes across the organization. Instead, analysts commonly submit a change request to the IT department to fulfill.

NNT & BMC Delivering Automated Intelligent IT Service Management

NNT’s intelligent integration module seamlessly integrates with BMC’s security and ITSM products to effectively mitigate security risks and service downtime and availability. The collaboration of products enables your teams to prioritize and remediate critical vulnerabilities, and systematically address compliance violations whilst improving operational integrity, security and compliance.
tripwire

Developing an Effective Change Management Program

Detection of change is easy… There, I said it. Anyone can do it. One thousand monkeys with keyboards can pound out scripts to detect change. What is not so easy, what the monkeys can’t do, is reconcile change. Even worse, it’s usually the monkeys who make the changes that bring everything crashing down around your knees. It’s the reconciliation of change that most organizations have the most trouble with. What was the change? When was it made? Who made it? Was it authorized?

nnt

Embracing Configuration Management & Closed-Loop Intelligent Change Control

Nearly all organizations, regardless of size, struggle with configuration management and change control. The need to review and approve changes in advance of making them, to formulate impact analysis, testing procedures and contingency plans all serves to slow things down. It’s no wonder most IT professionals acknowledge the potential benefits of Change Control, but simply do nothing about it.