Blog Entries

07. 08. 2019 Luca Buonocunto ITIL

A Roadmap to Continuous Improvement

To ensure quality in your environment you need to constantly improve. Continuous improvement is measuring key quality and other process indices in all areas, and taking actions to improve them. These indices could include process outputs, customer satisfaction scores, design errors, warranty returns, or any of a number of other measures used to characterize a… Read More

24. 07. 2019 Luca Buonocunto EriZone & OTRS, NetEye, Security

5 Bullet Points for Information Security Incident Management

Modern society has continued its increasing use of digital solutions, and today large amounts of sensitive data are stored digitally.  As the value and sensitivity of this information increases, the number of potential threats will increase accordingly. Verizon Enterprise’s RISK team recently published a report in cooperation with the United States Secret Service (USSS), the… Read More

13. 05. 2019 Luca Buonocunto NetEye

Creating Effective Dashboards

While working with Alyvix and NetEye as a Project manager for several companies, I have found that very often simplicity can make the difference, and in my opinion this is especially true for Dashboards. It is definitely a good idea to rely on dashboards in order to make sense out of your company’s data, but… Read More

06. 11. 2018 Luca Buonocunto EriZone & OTRS, NetEye

NetEye/EriZone as Enterprise Service Management Governance Enablers

Enterprise service management deals not only with IT processes, but also with interrelated end-to-end business processes.  Its main goal is to put into motion policies crafted by senior management in accordance with a specific governance framework in order to bring value and cost savings across the enterprise.  It is important to note that these policies… Read More

01. 04. 2018 Luca Buonocunto EriZone & OTRS

Data Breach vs. ITIL Incident and Problem Management Processes

The GDPR legislation that will come into force on May 25, 2018 introduces, among the various obligations of the Holder of the personal data, the reporting of Data Breach events to the privacy Guarantor within 72 hours (and in any case, without delay), where a data breach includes any event concerning the violation of personal… Read More

Archive