10 CMDB TOOLS YOU NEED TO CONSIDER IN 2020

10 CMDB TOOLS YOU NEED TO CONSIDER IN 2020

If you’re striving to adhere to the ITIL framework, you know that configuration management is a key component of success. It’s the heart of ITIL best practices, which is why Configuration Management Database (CMDB) tools are so important for your organization. A CMDB...
10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

As businesses increasingly invest in technology and undertake digital transformation initiatives, the complexity and growth of the IT environment have exploded. Traditional methods for managing and keeping inventory of infrastructure are now out of date....
IMPROVED CLOUD RECOMMENDATION ENGINE AND HYPER RESOURCE UTILIZATION IN V16.08.00

IMPROVED CLOUD RECOMMENDATION ENGINE AND HYPER RESOURCE UTILIZATION IN V16.08.00

We are excited to announce the general availability of Device42 v16.08.00, which includes a number of bug fixes as well as the following enhancements: CRE Annual and Monthly Cost Calculations Available for All Cloud Providers Device42’s Cloud Recommendation Engine...
3 REASONS TO ADD ASSET TRACKING TO YOUR CI/CD PIPELINE

3 REASONS TO ADD ASSET TRACKING TO YOUR CI/CD PIPELINE

If you’ve gotten your CI/CD implementation to a good place, you may be introducing over 100 new releases every day. This is great from a productivity standpoint, but not so much from an organizational standpoint. When your applications are updating faster than your...
PASSWORD POLICY AND STRENGTH ENHANCEMENTS AND MORE IN V16.05.00

PASSWORD POLICY AND STRENGTH ENHANCEMENTS AND MORE IN V16.05.00

We are excited to announce the general availability of Device42 v16.05.00, which includes the following: Password Policy and Strength Enhancements Device42 administrators can now define user password policy requirements and expiration settings to increase password...
RUNNING ON CISCO? TIME TO FIND YOUR VULNERABLE APPLICATIONS

RUNNING ON CISCO? TIME TO FIND YOUR VULNERABLE APPLICATIONS

As far as data center hardware is concerned, Cisco is nearly ubiquitous. You’d be hard-pressed to find a data center that doesn’t use at least one piece of Cisco equipment and a corresponding Cisco application. This is why it’s a good idea to pay attention when Cisco...