Category: Blog

Improve IT Service Management: How IT inventory supports you working in a service desk

2024-02-27T15:01:52+00:00

BLOG Improving your IT Service Management: How IT inventory helps those working in Service Desk The Service Desk is the IT department's primary interface with the business. It is to a Service Desk that the end-user turns when they have problems, questions, or technical concerns. For those working in a Service Desk,

Improve IT Service Management: How IT inventory supports you working in a service desk2024-02-27T15:01:52+00:00

What is CMDB: A comprehensive guide to configuration management database

2023-11-29T12:34:58+00:00

BLOG What Is a CMDB: A Comprehensive Guide to Configuration Management Database The Configuration Management Database (CMDB) is a crucial component of IT Service Management (ITSM). It serves as a central repository for storing and managing information about the various configuration items (CIs) within an organization's IT infrastructure. In this comprehensive guide,

What is CMDB: A comprehensive guide to configuration management database2023-11-29T12:34:58+00:00

The Ultimate Guide to IT Asset Inventory: Best Practices and Tools

2023-11-28T09:01:18+00:00

BLOGThe Ultimate Guide to IT Asset Inventory: Best Practices and ToolsIn the ever-evolving world of technology, managing and maintaining IT assets is crucial for the smooth functioning of any organization. From hardware devices and software licenses to network equipment and digital resources, IT asset inventory plays a significant role in ensuring optimal

The Ultimate Guide to IT Asset Inventory: Best Practices and Tools2023-11-28T09:01:18+00:00

Getting started with Custom SQL

2023-10-27T12:18:39+00:00

Custom IT inventory: Collecting more assets from any SQL database By using vScope's Custom SQL integration, you can collect more assets and tags from any SQL database. This is an easy way to connect vScope to more IT management systems, or to customize your IT inventory even further. This guide will show you, step-by-step, how

Getting started with Custom SQL2023-10-27T12:18:39+00:00

Streamlining ISO 27001 Compliance: A Comprehensive Guide

2023-11-17T08:03:07+00:00

Streamlining ISO 27001 Compliance using IT inventory: A Comprehensive Guide In today's digital age, data security is paramount. Organizations are continuously striving to safeguard their sensitive information and maintain the highest standards of data security. ISO 27001 is a globally recognized framework for information security management that helps organizations meet these goals. In this

Streamlining ISO 27001 Compliance: A Comprehensive Guide2023-11-17T08:03:07+00:00

Mobile Device Management Explained

2023-10-24T05:54:53+00:00

IT Asset Management: Mobile Device Management Explained (MDM) As the modern corporate landscape has evolved through the years the number of mobile devices has rapidly increased. Some research suggests that almost three quarters of internet users will access the internet solely via their smartphones by 2025. Globalization and current international supply

Mobile Device Management Explained2023-10-24T05:54:53+00:00

Everything you need to know about ITSM

2023-10-30T15:42:59+00:00

Everything you need to know about ITSM How can IT organizations better align their operations to support the main business objectives? How can technology facilitate more efficient workflows in the company as a whole and how can IT staff continuously improve its operations to deliver better IT services? These questions are some of

Everything you need to know about ITSM2023-10-30T15:42:59+00:00

Why IT Inventory Matters to Your Organization

2024-02-27T13:29:30+00:00

Why IT inventory matters to your organization In today's digital age, IT inventory has become an integral part of every business organization. IT inventory refers to the collection of all hardware, software, and network assets within an organization. It plays a crucial role in ensuring the security of the organization's data, complying with regulations, and

Why IT Inventory Matters to Your Organization2024-02-27T13:29:30+00:00

Two reports to find out where you are using Log4j

2023-10-11T13:42:52+00:00

PRODUCT Two reports to find out where you are using Log4j A flaw in Apache Log4j allows an attacker to execute arbitrary code by injecting attacker-controlled data into a logged message. Though vScope does not inventory specific files on servers, it can be of great help identifying applications and systems that

Two reports to find out where you are using Log4j2023-10-11T13:42:52+00:00

Sharing IT Service Documentation to restricted users

2023-10-30T14:33:12+00:00

Sharing IT Service documentation to restricted users Do you want to share limited view access to IT services with people with restricted IT visibility? In this guide we will show you how you can use the group Service Mapping Viewers to provide people limited view access to your IT Service documentation. Some people in

Sharing IT Service Documentation to restricted users2023-10-30T14:33:12+00:00