Operations | Monitoring | ITSM | DevOps | Cloud

October 2022

How to Balance Security With DEX for a Critical Advantage

Raise your hand if you enjoy being kicked out of the application you were working on for an unexpected security patch! No one? We can wait … Really, no one? Okay, we figured. And we’re not surprised. Jamie Whalen, host of the Everywhere Workplace Podcast, recently sat down with Steve Brasen, Research Director for Enterprise Management Associates, to talk about the perceived conflict between Digital Employee Experience (DEX) and security.

Securing Productivity in Supply Chains

Mobile device management – it’s been part of your operational technology portfolio for a long time. You’ve been using it for years – or maybe decades – to stage device configurations, push software updates and more. You might be using our Ivanti Avalanche MDM solution to manage your rugged mobile deployments. The device, OS and app management capabilities remain at the center of your mobility management program, and that isn’t going to change.

Ivanti Browser Manager

Ivanti Browser Manager maximizes the end-user experience by retaining essential web data, so that user favorites are synchronized across all browsers and URLs redirect to an appropriate browser. With Ivanti Browser Manager you can provide a user experience optimized for mobile and remote users in a multi-browser environment across all desktops, physical and virtual instances.

What to Look for With Ivanti's Fourth Quarter Release

In 2004, a joint initiative of the US Department of Homeland Security and the National Cybersecurity Alliance declared October National Cybersecurity Awareness Month to help raise awareness of the best practices to remain safe while working online. Vigilance enables us to maintain privacy and productivity for our own sake and for the organizations we may work for.

Microsoft's Coordinated Disclosure Discussion from BlackHat & DefCon '22: Security Insights

Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices for vendor coordinated disclosures of vulnerabilities for cloud versus on-prem products and much more!

Take Stock During Peak Season

It’s that time of the year again and peak season 2022 feels different. With supply chains and global economies in flux, businesses have a lot to consider. Shipping woes are subsiding in many areas – consider that a year ago, the queue at the Port of Long Beach, California was approaching a peak of 110 vessels, down to eight freighters in September of this year. East coast ports in the US and others around the globe are seeing rising tides.

Privacy, Please! Why a Comprehensive Federal Framework is Essential to Protect Consumer Data Privacy

Laws vary by state. That’s expected. Fairbanks, Alaska, enacted a law prohibiting the provision of alcoholic beverages to moose, so don’t even think about it. In a part of Washington State, good luck trying to kill Bigfoot. (Not because Bigfoot doesn’t exist, but specifically because it’s illegal per a 1969 law.) But what happens when state-specific regulations are used to address a topic that transcends geographic boundaries like, say, the internet?

Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets

In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action.

The Latest Ransomware Stats Are In and It's Not Good News.

Out of 10 key metrics tracked quarterly to establish the state of ransomware activity, only one metric stayed static from Q1 to Q3 2022. The other nine all worsened. That’s an alarming trend, especially given that many business leaders hoped to see ransomware activity taper off after a historic surge during the peak of the pandemic. Ivanti, together with Cyber Security Works and Cyware, collaborated on the just-released report.

Ivanti Neurons for Patch Management

Ivanti Neurons for Patch Management enables you to prioritize and patch vulnerabilities based on active risk exposure, patch reliability, and device compliance, health and risk from a single web interface. In this video we take a firsthand look at this cloud-native patch management solution and its key features and capabilities that help you better protect against data breaches, ransomware and other threats that stem from software vulnerabilities.

Application Control for Windows

Application Control for Windows combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via Service Desk systems lighten the load for IT staff while providing users a streamlined experience.

To Thrive in the Everywhere Workplace, IT and Security Teams Need to Work Together

It’s Cybersecurity Awareness Month. For a CIO, this is like the holidays, and there’s lots to celebrate and lots to do. By reading this, you’re helping me check something off my list: I want everyone in the IT and security landscape to know how these two teams can work together for a more efficient, productive and secure enterprise. To those outside the departments, IT and security teams are often conflated.

Ivanti Neurons for Discovery

Ivanti Neurons for Discovery delivers accurate and actionable asset information in minutes. Enjoy visibility in real-time using active and passive scanning techniques and third-party connectors. In this video we take a look at this cloud-native Ivanti Neurons for Discovery solution and its key features and capabilities that help you better understand your hardware and software estate. Get the most from your asset investments, make informed decisions about the performance and health of your assets, avoid unnecessary purchases, and help to improve your security posture.