Posts

Showing posts from March 24, 2013

Penggunaan SDP, dari helpdesk hingga frontdesk

Image
Dalam tahun ke 8 kami memegang produk ini, hal menarik kami temukan. Yang pertama adalah pengguna sistem helpdesk sekarang tidak hanya lingkungan IT saja, melainkan telah meluas ke bidang lain.

Kami menemukan beberapa kenyataan penggunaan meluas dari ServiceDesk Plus yang digunakan tidak hanya untuk support user di lingkungan IT, tetapi juga di unit kerja lain. Ada beberapa yang menggunakannya untuk Call Center untuk mendukung customer. Ada yang menggunakannya untuk unit frontdesk yang berhubungan langsung dengan nasabah / customer. Bahkan ada yang menggunakannya untuk lingkungan General Affair untuk menangani request / permintaan barang. Bahkan ada yang menggunakannya untuk meminta layanan supir.



Wow. Sisi kreatifitas dari sistem telah dikembangkan sedemikian. Dengan sistem yang baku pun, tidak perlu banyak customisasi, sistem ServiceDesk Plus telah digunakan dan dieksplorasi melebihi yang kami pikirkan.

Yang kedua, Zoho dalam beberapa tahun semakin memperkuat produk. Salah satunya m…

Mengontrol USB Devices di Desktop Central

Control USB Devices Block/Disable USB Devices in the Network Today, the usage of portable devices is a growing reality. It poses two main concerns to organizations: a threat of data theft and the possiblity of viruses and Spyware these devices can bring into the network. Desktop Central's Secure USB feature would help administrators limit the scope of USB device usage, selectively based on the various roles and departments. Secure USB feature enables administrators to centrally control the usage of various USB devices in the network by blocking/disabling the USB devices to prevent unauthorized download and upload activities through these local computer devices. The restriction can be set both at the computer level and at the user level, providing more levels of security. With Desktop Central, you can now effectively reduce data theft, reduce virus threats and increase compliance to regulatory standards. Supported USB Devices Desktop Central currently supports enabling or disabling…

Update terbaru dari Desktop Central 8 Build 80226

Image
We are happy to announce the latest hotfix to Desktop Central 8 - Build 80226. Here's the complete list of enhancements & bug fixes over previous hotfix: Enhancements USB Audit, a new feature, has been added to audit the usage of USB devices in the network. A new profile to configure the Access Point has been added for iOS devices. Ability to restrict the access of data based on its ratings has been included for iOS devices. Patch Scanning has been optimized to reduce the CPU/memory usage and scanning time.Patch Deployment has been optimized System Manager, a new feature, is added to view the currently running process and services of remote computers. SoM policy is enhanced with options to sync only the modified data and sync all data. You will now be able to query the Postgres database used by Desktop Central programatically. Query Report has been enhanced to fetch reports for the current month. You will…

Apa yang diproteksi, di monitor dan di test ??

Image
Business priorities: what to protect, monitor and test Peter Wood
Information security and IT professionals are being swamped with new challenges that appear to have no easy answers.  Cloudsocial networking and bring your own device (BYOD) are obvious concerns, and there are many more equally complex scenarios. Yet budgets and resources are limited.  How do you decide what to focus on? Which systems need additional protection or monitoring? What should we test and how? The business wants to take advantage of the cost savings and convenience of cloud, the flexibility and productivity of BYOD and the sales and marketing benefits of social networking.  Security staff want to ensure the business is safe from data breaches, secure against attack and compliant with relevant legislation.  If we are not careful, the divide between the business and IT and security will get wider and the organisation will find itself at even greater risk. All too often, there is also a lack of commitment from …

Open source network monitoring: SLAs push network pros to new tools

Image
Open source network monitoring: SLAs push network pros to new tools By Heather Clancy, Contributor As virtualized infrastructure and cloud computing force businesses to reevaluate the broader issue of acceptable network service levels, open source network monitoring tools are attracting heightened interest. Both network administrators and open source advocates say the flexibility these tools promise at a relatively reasonable cost has made them a viable alternative to software offered by some of the largest enterprise technology companies. "When I first needed a network monitoring tool, I had no funding for a commercial alternative," said David Nalley, a Unix administrator for document management solution provider KeyMark in Liberty, S.C., who uses the Zenoss open source management tool. Zenoss, which recorded a 150% increase in revenue during 2009, counts 300 enterprise customers and more than 1 million downloads of its Zenoss Core open source project code. Another well-kno…

7 tantangan dalam network traffic monitoring

Image
Top seven network traffic monitoring challenges Richard Bejtlich
Network traffic monitoring is often touted as a way for enterprises to meet performance, security and compliance goals. But implementing network traffic monitoring tools can also pose a series of challenges that range from difficulty in creating network baselines to trouble finding the right tools and strategies for monitoring content in a proxied environment. Here are the top seven networking traffic monitoring challenges: Challenge 1: Network baselines. Frequently network and security practitioners hear that the start of any network-centric project is to baseline the network. Just what is this supposed to mean? Simplistic approaches concentrate on bandwidth utilization over time, typically focusing on spikes and troughs. Some try to describe traffic in terms of protocols and port numbers. More advanced approaches try to classify traffic according to flows or even content. Regardless, there is no single accepted taxonomy…