Stay up to date with our blog

Subscribe to the InvGate Digest, and receive our monthly newsletter with a packet of knowledge, training, and tools on a new IT topic.

Desirée Jaimovich

The Basics of Vulnerability Management

Vulnerability management is a proactive and continuous process that seeks to keep networks, systems, and general applications as safe as possible from cyberattacks. Vulnerability management ...

14 Most Common Types of Cyber Attacks (and How to Prevent Them)

With the digital transformation in general (and the expansion of the...

Red Team vs. Blue Team: The InfoSec Color Wheel

It is essential to work in teams to strengthen organizations' security....

What Are Red Team Scenarios? Methodology and Examples

Red team scenarios are frameworks companies use to evaluate their level of...

SCP Port: Secure Copy Protocol Definition & Examples

The SCP port has proven to be a very useful tool for SysAdmins. In short,...

7 Patch Management Best Practices

Patch management best practices ensure we do patch deployment effectively...

An Introduction to Patch Management

Patch management is the process of acquiring and applying updates to...

The 5 Phases of Project Management

In IT, project management refers specifically to the planning, scheduling,...

How to Locate a Device Using a MAC Address

Every device on a network has a unique address called IP address, which...

The ABC of Process Improvement

No matter just how well things are going, there is always room for...
Powering top IT teams around the world
KPMG logo NASA logo PwC logo Arcos Dorados logo Toyota logo People's Bank logo U.S. Army logo Collins Aerospace AES Allianz Alaskan Copper
KPMG logo NASA logo PwC logo Arcos Dorados logo Toyota logo People's Bank logo U.S. Army logo Collins Aerospace AES Allianz Alaskan Copper

Evaluate InvGate as Your ITSM Solution

30-day free trial - No credit card needed