When it comes to Vulnerability Management, Vulnerability Group Rules can be powerful when configured correctly. However, they may not work the way that you’d expect. I’ve had several situations in which the subject of Vulnerability Group Rules has come up, but the conversation has gotten sidetracked over confusion about how a Vulnerability Group Rule functions. First, a Vulnerability Group Rule is NOT a condition-based filter. You cannot create a Group Rule for just “Windows Server Patches for the Northeast region”, for example (in this case you would want to create […]
ServiceNow’s recently released Vulnerability Management application can be a massively powerful tool for organizations to evaluate and remediate vulnerabilities on the configuration items(CIs) within their network, but it it can be hard for some organizations to get their head(s) around the big picture. It works in conjunction with – and is dependent upon – Qualys, a highly effective vulnerability detection tool. In fact, step one of setting up Vulnerability Management in ServiceNow is setting up Qualys in your environment. However, for the purposes of this blog post, I […]
Too often I have run into organizations who do not have a clear picture of who has access to what. I hear things like “who has admin access in ServiceNow?!” “Who can delete an expense in Concur?” “Uh oh, we are getting audited and we have 300 people with write access to HIPAA data!” “We are paying for 1,000 licenses to Salesforce, but I think we only have 300 employees” and on and on and on…. Wouldn’t it be helpful to have a single source of truth for the applications […]
The challenge for any company on the floor at Knowledge (or any tech show, for that matter) is how to stand out memorably amidst a sea of vendors and specialists, each attempting to share their message as though it were the most essential one at the conference. There’s the traditional “swag” option, where toys, pens, USB adapters, and other branded merchandise are doled out to passers-by willing to put up with a 30-second pitch, in order to build up a kitschy collection for their […]
At last year’s ServiceNow Knowledge conference one of the buzzwords for the week was IoT (Internet of Things) and there was a lot of talk about how ServiceNow was staking a claim in the IoT space. But what is IoT exactly and what’s ServiceNow have to do with it?
IoT is a fascinating concept and it’s happening all around us often without our conscious awareness. The IoT is billions of “things” connected to the internet, collecting and sharing data. “Things” can be anything – an appliance, a vehicle, a device of some […]
Does your organization have a process to handle changes to services, applications and other types of configuration items? Is that process able to withstand compliance audits? Are you able to correlate changes to other ticket types within your organization like incidents and requests? If the answer to any one of these questions is no, it may be time to reevaluate your change process.
Here’s a Nickelback
ServiceNow’s current Change Application has 5 features out of box that can set your organization up for success when implementing Change Management.