<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=314913&amp;fmt=gif">

Productive IT Management Insights

What do cybersecurity vulnerabilities and seafood have in common?

Neither one ages very well when neglected. From the moment your favorite sashimi is fished from the water, the freshness clock begins to tick. The longer it sits in the sun, the less likely you will have an enjoyable experience later. The same is...

Video: Learn How ServiceNow’s Phishing Response Workflow works in the London Release

The Security Incident Phishing Workflow allows you to perform a series of tasks designed to handle spear phishing emails on your network.  Join us as we will be demoing the new Security Incident Console available from the London Release. In this...

Video: How ServiceNow Security Operations Can Help Unify and Accelerate Your Incident Response

Despite major organizational investment in security and vulnerability management toolsets, surveys and studies everywhere show that companies are still taking too long to respond to important signals from all of these. Oversights of too much...

Ready, Set, Automate Security Response!

Not so fast. First let me say that I am an accomplished lifetime angler, deeply connected with the technical requirements, science and art that apply in various types of fishing. I have fished in over half of the country, instructed clinics, built...

Video: ServiceNow Security Incident Response: Symantec and Splunk Demo

Get a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in “operationalizing security” by extending their leading...

Video: ServiceNow Vulnerability Response with Tenable IO Demo

Get a glimpse into what Security Operations can do to unify and accelerate your response, getting even more value out of the platform. ServiceNow customers are starting to change the game in “operationalizing security” by extending their leading...

How Lots-to-Lose Used Automatic Task Assignment with ServiceNow

  THE STICKING POINT: Lots to Lose Inc. was losing time manually assigning tasks to people for each step of the incident response process. Even with a standard, codified response process, it was difficult to find resources with capacity to do the...

How Lots-to-Lose Automated Incident Prioritization with ServiceNow

  THE LEAKY FAUCET: Manually prioritizing incidents was time-consuming and required a highly-experienced security analyst to get right. Some incidents pose serious threats to the security of Lots to Lose Inc., others not as much. Recognizing high...

How Lots-to-Lose aggregated incident and threat data with ServiceNow

  THE HORNET'S NEST: Security analysts were spending too much time monitoring and correlating incident data from multiple tools. Lots-to-Lose, Inc. already had several tools for incident detection, but many of the tools had their own siloed console....

How Lots-to-Lose Leveraged ServiceNow's SLA Engine

  THE SPILLED MILK: Critical incidents weren’t being resolved with the necessary speed and urgency, due to a lack of accountability between teams. At Lots to Lose, Inc., the security, and IT teams didn’t always agree on the urgency of incident...