vScope 3.7 makes it easier for IT organizations to distribute information to people with limited insights in the datacenter.
About email@example.comThis author has not yet filled in any details.
So far firstname.lastname@example.org has created 88 blog entries.
Optimize Azure license utilization and set Discovery schedules, you will be able to customize the inventory as you want it.
vScope has a world leading discovery engine. To manage it you will need to understand how Discovery Manager functions. These are the key concepts you need to started.
This guide will help you get started with vScope Cloud Spend and teach you the basics of how to optimize your cloud spending.
3.5 Billing of IT resources and automatic documentation of IIS services vScope 3.5 bridges the gap between infrastructure and services with support for IIS web services. It also introduces support for billing and enhanced cost control of IT. Bring transparency and accuracy to IT billing Streamline your IT billing
How We Saved $8000/Year in Licensing Costs Through a Quick Directory Audit with vScope Optimizing licensing costs can be a tough challenge to track. You may currently be wasting your IT budget on licenses that are not in use, without knowing it! In this guide I will show you how to quickly make
New collaboration features were introduced in vScope 3.4 that provided major improvements to the reporting functionality in vScope.
Customize views and limited insights in vScope by using different user permissions. Perfect for automatic sharing of certain tables with colleagues.
With just a few weeks left before GDPR enforcement day (25 May 2018), we've received a lot of enquiries related to how vScope can be used in GDPR purpose. In order to do so we are posting numerous content on our website to help you get started!
GDPR and IT Operations Pt. 3 - Resources This is a blog series of three on the topic of GDPR, and more specifically some of the practical challenges it can pose to IT Operations when it comes to auditing and documenting access control. Part 1: What users in your network has access to