NYSE-ICE Case Study

When Intercontinental Exchange decided to take its IT compliance and security to the next level, it decided to leverage its existing ServiceNow (NYSE: NOW) ITSM platform. The company was also working with UpGuard, a leading cyber resilience platform provider and ServiceNow partner, to ensure the integrity of its IT environment.

Read More

The technical nature of cyber risk makes it inaccessible to those without advanced skills and knowledge, leaving ...
The Buyer's Guide To Third Party Risk Management
Nov 07 - 16 min read
With the DevOps buzzword now reaching into job postings and position titles, it's time to learn what is expected ...
The DevOps Career Guide
Jul 04 - 10 min read
Data breaches have been increasing steadily over the past five years. Simply adding more layers is not a ...
Cyber Resilience for the C-Suite
Jun 07 - 15 min read
Get your enterprise up to date with improved ITIL processes using DevOps. This eBook will step through the major ...
The ITIL Guide To DevOps
May 03 - 10 min read
Regardless of what stage of digital transformation an enterprise finds itself at, the same risks and challenges ...
The Executive's Guide to Managing Cyber Risk
Apr 24 - 13 min read
Learn key insights on the similarities and differences between Agile and DevOps as well as some key challenges ...
DevOps Pushes Agile to IT's Limits
Apr 24 - 14 min read
DevOps bridges the gap between developers, operations and QA in IT teams. As an executive, you always need to ...
DevOps Lessons for CIOs
Apr 24 - 8 min read
With a variety of functions to fill, and jillions of tools to choose from, selecting the minimum number of tools ...
The DevOps Toolchain
Apr 24 - 12 min read
Companies have responded to these attacks with various tools, such as anti-virus, malware and other endpoint ...
The Corporate Consequences of Cyber Crime: Who's Liable?
Apr 24 - 14 min read
Over time, IT systems and their configuration items (CIs) invariably move towards a state of disorder. Left ...
Guide to Managing Configuration Drift
Apr 04 - 5 min read
Fending off cyber attacks and maintaining security may be business as usual for enterprise IT, but vigilant ...
Continuous Security Monitoring for DevOps
Feb 20 - 13 min read
As more Windows/Microsoft solutions move toward open source, you can certainly expect Windows-centric team ...
DevOps for Windows
Sep 06 - 17 min read
Like drivers and the inevitable car accident, all businesses will likely suffer a data breach at some point.
A Beginner's Guide to Cybersecurity Insurance
Jun 29 - 9 min read
Since the inception of PCI DSS, organizations have struggled to understand, implement, and comply with its ...
PCI Compliance Without The Headache
Jun 27 - 12 min read
You’ve certainly heard it before, but it’s worth repeating again: unpatched and out-of-date systems are a leading ...
Patch Management for DevOps
May 30 - 8 min read
You don’t need to be an IT security expert to grasp the fundamentals of cyber risk. Learn foundational knowledge ...
The Non-Technical Guide to Cyber Risk
May 08 - 11 min read
For systems and network administrators, DevOps tends to evoke a certain degree of apprehension; many even claim to ...
The Network Administrator's Guide To DevOps
May 05 - 16 min read
Information technology is a crucial albeit costly endeavor for HIPAA-impacted organizations. Let us help you ...
HIPAA Compliance Without The Headache
Apr 06 - 11 min read
Before you say "shut up and take my money" to the DevOps thought lords, you might want to spend a second learning ...
The Four Prerequisites for DevOps Success
Mar 09 - 16 min read
Banking and financial organizations face daunting challenges as the industry continues to transition into the ...
IT Compliance for Banking and Finance
Jan 25 - 14 min read
You’ve heard about DevOps. Some of it sounds good, some of it sounds like bullshit. This book cuts through the ...
DevOps: A Cynic's Guide
Jan 25 - 13 min read
The Burgess Group experiences rapid growth and as a result introduced new sources of configuration drift in their ...
Case Study
Fighting Configuration Drift in Healthcare IT
Jul 28 - 5 min read
When Intercontinental Exchange decided to take its IT compliance and security to the next level, it decided to ...
Case Study
UpGuard and ServiceNow at ICE-NYSE
Jul 18 - 5 min read
An Australian bank needed to migrate a data center they acquired. Naturally this was a sensitive project with huge ...
Case Study
How to Migrate a Data Center in 48 Hours
Jul 04 - 5 min read
Discovering configuration changes and managing drift is critical–but the ability to correlate them to poor user ...
Case Study
Change Detection and Integrity Monitoring
Jul 04 - 5 min read
A financial services provider started using UpGuard to keep an eye on Apache servers that had grown difficult to ...
Case Study
Containerizing Apache with Docker
Jul 04 - 5 min read
One hundred of Liquidity’s Linux servers were in need of visibility and consistency and they were not willing to ...
Case Study
Getting Visibility and Preventing Drift
Jul 04 - 5 min read
What cloud computing offered was a way to outsource the data center to a platform that could operate at scale. ...
The Resilient Cloud: Using AWS and S3 in the Enterprise
Jul 12 - 16 min read
Unaddressed risk will eventually lead to a major incident— data breach, cloud leak, business outage. These ...
The Executive Guide to Third Party Cyber Risk
Jul 11 - 14 min read
Technology and information bring great value to business, but can cause detrimental damage if data is exposed. How ...
Breaches, Risk, and Resilience: Building a Sustainable Digital Business in the Cloud
Jun 25 - 13 min read
Chances are you have a LinkedIn account, and if you had one back in 2012, it was probably one of the compromised ...
Password Security Checklist
Jun 15 - 10 min read
Servers might run okay out of the box, but before you put it in production, there are 10 steps you need to take to ...
Server Security Checklist
Jun 05 - 7 min read
Email is as important as the website when it comes to security. As a channel for social engineering, malware ...
Email Security Checklist
May 22 - 15 min read
Putting a website on the internet means exposing that website to hacking attempts, port scans, traffic sniffers ...
Website Security Checklist
May 10 - 9 min read
The fact that one has to “make a case” for Microsoft in the DevOps sphere puts them at a disadvantage, especially ...
Microsoft's DevOps Toolchain
Jun 26 - 6 min read
A properly configured, secured and tested environment not only makes compliance easier and less costly, but can ...
Understanding NERC Compliance
May 30 - 12 min read
The very software you’ve put in place to protect your data is exposing it instead. This nightmare scenario has ...
When Your Security Provider Gets Hacked
Apr 28 - 8 min read