becon BLOG

CMDB

DataGerry | Release 3.0.0

DataGerry | Release 3.0.0

The DataGerry 3.0.0 major release brings new features such as a fully integrated ISMS module, the interactive CI Explorer, support for many-to-many relationships and a completely redesigned reporting system. Manage risks, visualize dependencies and analyze your data even more efficiently.

read more
CMDB and ITIL: Best practices for successful IT service management

CMDB and ITIL: Best practices for successful IT service management

Effective IT service management (ITSM) is essential for the success of companies. The Configuration Management Database (CMDB) and the ITIL (Information Technology Infrastructure Library) framework play a central role in this. These two elements help companies to manage their IT services efficiently, improve service quality and optimize operating costs.

read more
Update VIVA2 3.2.4 | New minor release available

Update VIVA2 3.2.4 | New minor release available

In the new version 3.2.3 of the VIVA2 add-on, the main focus was placed on improving the export functionalities of the protection requirement inheritance. Furthermore, the visual appearance has been adapted to the new layout of i-doit and an incompatibility of the installation routine with current i-doit versions has been rectified.

read more
Maximum security and efficiency: ISMS and compliance with i-doit

Maximum security and efficiency: ISMS and compliance with i-doit

Compliance and information security standards are critical tasks for organizations of all sizes. We take a look at two key concepts that help companies overcome these challenges: A powerful information security management system (ISMS) and a clear compliance tool that helps meet IT policies and standards as straightforwardly and clearly as possible.

read more
Update ISMS 1.5.5 | New minor release available

Update ISMS 1.5.5 | New minor release available

With the new version 1.5.5 of the i-doit add-on ISMS, in addition to fixing the compatibility problems, standard requirement texts can now also be formatted and risk owners can be documented in the risk assessment.

read more

Abonnieren Sie unseren Blog!

Erhalten Sie Informationen zu OpenCelium Updates, Releases, neuen Whitepapern, Tutorials und aktuellen Events.

Abonnieren Sie unseren Blog!

Erhalten Sie Informationen zu OpenCelium Updates, Releases, neuen Whitepapern, Tutorials und aktuellen Events.