Hybrid IT Discovery & Dependency Mapping Platform
Device42 is a comprehensive IT discovery, asset management and dependency mapping platform. It provides insights to optimize infrastructure and applications across data centers and cloud with a single source of truth for your entire IT ecosystem.
Device42
The Hitchhiker’s Guide to IT: Vendor Management and Cybersecurity
Cybersecurity has many facets, and not everyone is familiar with the ins and outs of it. What’s more, it may surprise people to learn that much of cybersecurity does not directly involve technology. As tech advances, new ways to address cybersecurity needs with the help of vendor management emerges. How do these advancements come together…
Sustainability in IT
IT and sustainability aren’t often two words seen together, but they should be. As the world heats up, it’s not only becoming more important for buyers to see environmental, social, and governance (ESG) initiatives in the products they’re purchasing, but it’s also great for the planet. Where should you start? On the latest episode of…
Moving From An On-Premise ITSM To A Cloud ITSM Platform
If you’re a Jira 100-200 service level user, look no further! Migrating your ITSM operation from on-premise to the cloud can be a daunting task. But with the right knowledge, it shouldn’t be. So, how exactly should you go about migrating to a cloud ITSM platform, and what are some red flags to look out…
IT and Data Center Management Best Practices: From the Perspective of an Expert
There used to be a time when all of a company’s data centers were within the same building, always in a room chock full of different devices with heat emanating from within. It was usually very expensive and complex, and often included a host of complications and safety hazards. With the advent of technology,…
Season 1
The Hitchhiker’s Guide to IT: Vendor Management and Cybersecurity
Cybersecurity has many facets, and not everyone is familiar with the ins and outs of it. What’s more, it may surprise people to learn that much of cybersecurity does not directly involve technology. As tech advances, new ways to address cybersecurity needs with the help of vendor management emerges. How do these advancements come together…
Sustainability in IT
IT and sustainability aren’t often two words seen together, but they should be. As the world heats up, it’s not only becoming more important for buyers to see environmental, social, and governance (ESG) initiatives in the products they’re purchasing, but it’s also great for the planet. Where should you start? On the latest episode of…
Moving From An On-Premise ITSM To A Cloud ITSM Platform
If you’re a Jira 100-200 service level user, look no further! Migrating your ITSM operation from on-premise to the cloud can be a daunting task. But with the right knowledge, it shouldn’t be. So, how exactly should you go about migrating to a cloud ITSM platform, and what are some red flags to look out…
IT and Data Center Management Best Practices: From the Perspective of an Expert
There used to be a time when all of a company’s data centers were within the same building, always in a room chock full of different devices with heat emanating from within. It was usually very expensive and complex, and often included a host of complications and safety hazards. With the advent of technology,…
Growth Pains: Standardizing Process and Procedures for a Robust IT Asset Management Program
In this episode of the Hitchhiker’s Guide to IT Podcast, host Michelle Dawn Mooney discusses the challenges and strategies for building a robust IT Asset Management (ITAM) program with special guest Ian Silver, the ITAM manager for the Flynn Group of Companies. They delve into the definition of ITAM, which involves managing technology assets throughout…
Navigating the Complications of Cloud Security
Businesses worldwide are grappling with the need for robust cloud security. The COVID-19 pandemic has accelerated the transition to cloud computing services, leading to aninflux of cybersecurity threats. Today, businesses must navigate the complexities of vendor management concerning their cloud security obligations. Data from Risk Based Security suggests that data breaches exposed 36 billion records…