The realisation of an ITSM system network brings enormous advantages in the monitoring of systems, automatic initialisation of processes and control of information. The i-doit CMDB has numerous interfaces to directly connect third-party applications such as monitoring...
Klaus Wockenfoth
Ransomware – documenting to prevent digital malware
The media are increasingly reporting successful ransomware attacks. Most recently, the Ceconomy Group, which includes Media-Markt and Saturn, was severely hit in November 2021. In this attack, around 3,100 servers were encrypted by the malware Hive. This led to...
Validation of data and inputs
A CMDB should link information and keep it centrally available for departments and employees. When recording assets, a previously defined quality should of course be achieved and maintained. Ideally, these are documented in the so-called Configuration Management Plan...
Successful IT using ITIL baselines
The "Baseline" concept is firmly anchored in the IT Infrastructure Library (ITIL). It is not self-explanatory. And trying to make the term more understandable with "measurement basis" does not lead anywhere either. Instead, this is why we look at the concept of ITIL...