Operations | Monitoring | ITSM | DevOps | Cloud

January 2022

Ivanti Provides Critical Support for HoloLens2 with Windows Autopilot

We are excited to announce that Ivanti Neurons for MDM now fully supports all Windows Autopilot modes. This includes Autopilot pre-provisioned and self-deploying mode, in addition to the previously supported user driven mode. In particular, this self-deploying mode works seamlessly to automatedly enroll and configure HoloLens2 and Windows PC devices.

Major New Features and Enhancements Now Available for Ivanti Workspace Control

We have just released Workspace Control 2022.1 (10.8.0.0), which contains three major new features and several bug fixes. We’ve also included several workflow improvements based on User Voice requests which were submitted via the Product Ideas page on the Ivanti Community.

Who is Most Vulnerable to Ransomware Attacks? New Report Reveals Latest Trends.

No one will be surprised to hear that ransomware is, once again, on the rise. The last two years have seen a stratospheric increase in both the frequency and sophistication of attacks. In a just-released report from Ivanti, Cyber Security Works and Cyware, 2021 closed out with alarming statistics including a 29% increase in CVEs associated with ransomware, and a 26% increase in ransomware families compared to the previous year.

Evolve to a Risk-Based Vulnerability Remediation Strategy with a Cloud-Native Patch Management Solution - Now Available from Ivanti

Ransomware attacks are increasing in frequency and severity every year. The impact to companies is devastating. These attacks typically lead to lost business for companies as they often cause increased customer turnover, system downtime, diminished reputation and other adverse side effects.

9 Types of Phishing and Ransomware Attacks-And How to Identify Them

Cyberattacks have become more pervasive globally, evolving quickly in sophistication and scale, and are now more lucrative than ever for cybercriminals. Not only has The Everywhere Workplace extended the cyber risk and threat landscape—especially for data privacy and its protection—but a lot of Agile software developers, many of whom lack any DevSecOps process, are publishing untested or poorly tested software that can be exploited as zero-days by criminal gangs.