{"version":"1.0","provider_name":"Cataligent","provider_url":"https:\/\/cataligent.in\/blog","author_name":"cat_admin_usr","author_url":"https:\/\/cataligent.in\/blog\/author\/cat_admin_usr\/","title":"What Are ITSM Processes - Cataligent","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"F7NEHeHapH\"><a href=\"https:\/\/cataligent.in\/blog\/it-service-management-itsm\/what-are-itsm-processes\/\">What Are ITSM Processes<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cataligent.in\/blog\/it-service-management-itsm\/what-are-itsm-processes\/embed\/#?secret=F7NEHeHapH\" width=\"600\" height=\"338\" title=\"&#8220;What Are ITSM Processes&#8221; &#8212; Cataligent\" data-secret=\"F7NEHeHapH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cataligent.in\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/cataligent.in\/blog\/wp-content\/uploads\/2025\/02\/15-What-Are-ITSM-Processes-1024x576.png","thumbnail_width":1024,"thumbnail_height":576,"description":"The performance of a business now depends heavily on IT service management, or ITSM. The foundation of how companies plan, provide, oversee, and enhance IT services to satisfy the demands of their clients and staff is ITSM procedures. These procedures guarantee that IT solutions are adequately provided, in line with corporate objectives, and regularly enhanced [&hellip;]"}