The question that gets to the heart of this is: “Are you confident you know what you’ve got lurking around your networks, and where?” However, this risks oversimplifying what is an incredibly versatile business asset. Let’s examine where we are today, and why Discovery is a tool you should be relying on. So what are typical use cases for intelligent discovery software?
How much confidence do you have that you know what’s lurking in the dark corners of your server room, or in that datacenter you only just realised you’re still paying for? What about sensitive data uploaded to a semi-public cloud that really the HR department should have stopped using several years ago? Efficiency savings, regulatory compliance and a tight security posture are all top priorities for any IT leader. But visibility underpins them all.
It seems to happen almost weekly nowadays: another massive brand hit by a data breach, with no real understanding of how or when it happened, or how many people are affected. The media - and the information management community - have been waiting for a GDPR test case since the legislation was first dreamt up. We sat down with Simon Parkinson, COO at Dot Group, to talk about what goes into a data audit. We talked data maps, asset registers, subject access requests and other tricks that ought to go some way towards keeping you and your organisation out of the headlines!
As the average organisation’s IT stack becomes more and more complex, well-delivered IT service management (ITSM) is increasingly mission critical to the business. ITSM gives an IT department a way to improve internal processes, address and understand the individual needs of different business units, provide more value to its customers, and ultimately move the organisation forward. It is usually the primary point of interaction between an IT department and the rest of an organisation, and as such is vital to get right. In this article, we’ll take a look at what’s coming round the corner in service management, and how you can benefit today.