Posted about Analytics

Ensuring the Health of Endpoint Devices – Part 2

This is Part 2 of a two-part blog on endpoint health. Part 1 can be found here.

Gartner research states that “By 2018, 50% of global enterprises will have deployed machine learning technologies in support of two or more major ITOM functions, up from fewer than 10% in 2015.” (Source: Gartner, Digital Business Initiatives Demand the Use of IT Operations Analytics to Spark Transformation, Colin Fletcher, 26 March 2015).

Read more

Ensuring the Health of Endpoint Devices – Part 1

Over the years, I have heard many analogies used to explain how the typical IT department functions and how they would like to function in an ideal world. The analogy that resonates best for me is the comparison of practicing medicine to that of the IT discipline.

Read more

Nexthink for Continuous Compliance Validation

AdobeStock_32675300

Most organizations conduct some form of periodic security compliance and audit function. Sometimes the evaluation is done for internal purposes and sometimes a formal external audit is required. Regardless of which type of compliance audit you are required to perform, it is generally best practice to use an independent tool to verify that your processes and systems are in compliance with established polices and regulations.

Nexthink End-user IT Analytics allows you to define and monitor in real-time your compliance criteria across Windows, Mac OS and Mobile devices. Nexthink’s unique real-time analytics captures all executions and all network connections being made by your endpoints and provides new visibility and insight into security compliance within your environment.

Check out this demo showing how Nexthink is able to proactively uncover issues related to security and compliance and provides continuous real-time monitoring to ensure your your environment matches your acceptable risk profile.