If you are like most companies, your IT Security and Configuration Management operations are managed by different groups and to different goals. That is a problem. Configuration Management may take requests and requirements from IT Security and vice versa, but when a security breach occurs, the relationship between the two becomes painfully clear. How quickly…Read more
Fearless IT Service Ops at ITSM Fusion 2016
We had the opportunity to attend Fusion 2016 at the MGM Grand hotel in Las Vegas last week with Effect-Tech as our booth sponsor. We met hundreds of attendees and demoed Service Advisor to dozens of individuals that were interested in solving issues faster, with less effort, and driving down mean time to resolution. Virtually…Read more
Webinar Replay: Simplified Application Services to Dramatically Reduce Incident Resolution
During this 3-part webinar series, we've introduced a roadmap for IT organizations to turn data into actionable insights and demonstrated how to reduce troubleshooting time by at least 50%. In this session, we focus on defining applications and their underlying infrastructure components using a simplified format that can be completed in 1 day. Please join…Read more
Configuration Management – How Mature Are You?
How mature is your configuration management strategy? Do you know what applications you have and how it is connected? Does your configuration support IT management, operations and security easily? Or is your Configuration Management team overwhelmed and getting too much information too fast? Configuration Management is like any process: an organization needs to “crawl,” then…Read more