Operations | Monitoring | ITSM | DevOps | Cloud

June 2024

Ivanti Neurons - Neurons Workspace #shorts

The Ivanti neurons workspace is a tool designed to improve issue resolution within organizations. It offers device and user views, providing telemetry, remote control, and automation tools to analysts. This allows for a better understanding of device activities. A timeline view is also being developed to gather metrics and historical information across key areas. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Data Harmonization is Key to Reduce Your Attack Surface, Srinivas Mukkamala, CPO, Ivanti #goivanti

Ivanti’s Attack Surface Management report offers more expert advice on how to turn actionable data into a mature and effective attack surface management strategy. Dr. Srinivas Mukkamala, Ivanti CPO, discusses the need for organizations to consolidate and harmonize data from multiple sources to gain a comprehensive view of their attack surface. This video offers actionable advice on how to structure, analyze and apply your data to use it to inform your attack surface management strategy and quickly and effectively detect and remediate threats.

Dynamic Priorities: Attack Surface Management, Rex McMillan, VP Product Management, Ivanti #goivanti

Ivanti’s Attack Surface Management report examines the challenges of monitoring and managing expanding attack surfaces and provides strategies directly from IT and security experts into how you can practice comprehensive attack surface management. In this video, Rex McMillan, Vice President of Product Management at Ivanti, shares valuable insights on attack surface management (ASM) and why an attack surface management solution should empower organizations to detect and prioritize high-level risks even as those risks evolve in scope and severity.

A Guide to Apple Declarative Device Management for Enterprises

Apple declarative management introduces a shift from the traditional command-based model to a more autonomous and flexible framework. This approach aims to improve the efficiency and responsiveness of managing Apple devices. The components of Apple declarative management — declarations, assets, predicates and status channels — work together to create a more efficient, scalable and responsive MDM framework.

How to Close Attack Surface Gaps, Daren Goeson, SVP Product Management, SUEM, Ivanti #goivanti

For more valuable insights on reducing an organization's attack surface, check out Ivanti’s Attack Surface Management Report. Daren Goeson, SVP of Product Management, SUEM, Ivanti shares valuable insights on reducing an organization's attack surface and implementing an effective Attack Surface Management (ASM) strategy. From asset discovery to vulnerability management, risk assessment to automation, this video provides essential guidance for organizations to enhance their cybersecurity posture.

Step Into the Cloud-based Workspace Management of the Future

Cloud-based solutions like Ivanti Neurons offer your organization the latest capabilities, scalability and flexibility for software security and endpoint management. To maintain the most modern portfolio of solutions possible, Ivanti announced the retirement of Ivanti Workspace Control (IWC) on Jan. 31, 2024. That decision was rooted in our dedication to your success and the pursuit of innovation.

Ivanti Initiatives Enable Customers to Succeed

Ivanti breaks down barriers between IT and security so you as our valued customer can achieve your business outcomes. To empower you to thrive, we have created a dynamic set of resources ranging from new webinars, ask-the-expert sessions and more to help you flourish with your Ivanti solutions and achieve your desired organizational objectives. It all starts with our quarterly product launches.

Developing Gen AI with NLP for ITSM Platform: A New Era of Admin Analytics

Gen AI, equipped with NLP capabilities, is under development to generate real-time widgets and insights from the ITSM platform for admin analysts. This interface will enable analysts to ask specific questions like ticket resolution stats. Gen AI will provide yearly and monthly insights, interact with Gen AI, and create dashboard charts. This innovative solution, combining Gen AI, NLP, and MLNLP technologies, is expected to launch by year's end.

Ivanti Workspace Control: Migration Paths

With Ivanti Workspace Control (IWC) approaching end of life, easing your organization's migration is front of mind. Lead Sales Engineer Patrick Kaak and Senior Sales Executive Sacoro Fraenk outline why Ivanti is transitioning to User Workspace Manager (UWM) as part of its cloud-first strategy, as well as the three migration paths available to IWC users and what you'll gain from making the switch.

Ivanti Neurons for ITSM powered by AI

Revolutionizing IT Service Management with AI: Ivanti Neurons for ITSM Welcome to a new era of IT service management, transformed by AI. AI streamlines incident processes, minimizes manual effort, and enhances response times by automatically classifying incidents. It also automates troubleshooting, fostering a self-healing environment. An AI-powered system delivers superior employee experiences, while generative AI capabilities summarize incidents and create knowledge articles. This enhanced support benefits both end users and service desk agents.

#CyberDefense 101: Phishing + Credential Attacks | Security Insights Ep. 40

Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

The Importance of Accurate Data to Get the Most From AI

The IT service community is rightly buzzing about the wealth of possibilities AI offers to automate service management operations and better assist customers — especially in this age of expanding Everywhere Work. But without sound data, the path to leveraging AI for IT service management becomes quite daunting. With so many more people working outside a traditional office setting, more end users than ever are logging in more often to access employee services.

Practical Demo How Ivanti Maps to CIS Controls Version 8 #ivanti

The webinar introduces the Center for Internet Security (CIS) and its mission, focusing on how Ivanti solutions map to CIS controls. Demonstrations include Ivanti Neurons for External Attack Surface Management, Risk-Based Vulnerability Management, Patch Management, and Incident Response Management. The session also clarifies Ivanti's non-affiliation with CIS, the difference between VRS and VRR, and the integration of EASM with other Neurons products.

Healing Bots Take Charge of Solving IT Problems to Enhance Employee Satisfaction

Imagine an Everywhere Work environment in which IT problems seem to magically resolve themselves before end users even realize there were issues. Printers miraculously start working again. Login issues vanish. Access to critical applications is seamless.

Introducing the Ivanti Marketplace: A Platform for Evolving Business Needs

The Ivanti Marketplace, a platform tailored to meet changing business requirements. It boasts a user-friendly interface, handpicked solutions, and self-service features. Ivanti's partners contribute unique solutions to enhance Ivanti's product range. The marketplace showcases numerous solutions categorized with comprehensive descriptions and cross-referencing. Ivanti is dedicated to providing powerful solutions and empowering customers in the everywhere work era.

Introduction to RBVM: A Solution for Vulnerability Management at Ivanti #ivanti

Derek Illum presents the RBVM solution for vulnerability management at Ivanti, detailing its functionality, benefits, and related statistics. The process involves data collection, automation, and integration with other tools. The tool, hosted in the AWS gov cloud, integrates with various systems, including Microsoft Defender for endpoint. Users can explore RBVM, focus on a risk-based approach, and utilize its dashboards and SLA management features.

Cloud Migration: Security Shines a Light on Operations' Dark Networks

Dark networks have provided a measure of security to supply-chain operations for a couple of decades. These networks are closed to the outside world, only accessible via the connections between enterprise systems – think warehouse management, enterprise resource planning, etc. – and the rugged mobile devices carried by workers within these environments. And, everything is managed by on-premises device management products that never connect beyond the business’s facilities.

Generative AI for Knowledge Management: Pros, Cons and Best Practices

Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy. Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.

AI Knowledge Management: How to Use Generative AI for Knowledge Bases

Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy. Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.

CSM to ITSM Migration: A Panel Discussion #ITSM #ITSolutions

Three Ivanti customers at various stages of migration – Maxar's Allison Hull, Fareway Stores' Steve Clime, and Memorial Health Ohio's Barbara Munger – give their firsthand perspectives on a successful journey from Cherwell Service Management to Ivanti Neurons for ITSM. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM

See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management. Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.

Basic Cyber Hygiene: New Definition and Best Practices for the Current World

With the latest changes in regulations and laws, and with cyberattacks becoming more sophisticated, costly and frequent, it’s unavoidable: You must rethink basic cyber hygiene for your organization. Today, effective cyber hygiene requires you to plan and carry out regular and consistent actions to not only meet current challenges but also to keep pace with a threat landscape that is always evolving.

Priorities for Exposure Management, Chris Goettl, VP Security Product Management, Ivanti

See more insights into exposure management strategy and IT/security alignment in Ivanti’s research report: Secure Unified Endpoint Management. Chris Goettl, Ivanti's VP of Security Product Management shares best practices for secure unified endpoint management and explains why organizations should focus on exposure management to effectively mitigate risks.

Ivanti employees earn 2024 Simpplr award for Most Creative Use of Intranet

Description update: Our highly engaged employees and connected culture earned us the Best of Simpplr 2024 Award! After a spirited competition driven by weekly team challenges curated on our Simpplr-based intranet platform, we crowned three employee champions. Hear what they have to say about this outstanding recognition. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Data: Your Common Denominator feat. Srinivas Mukkamala, CPO, Ivanti #ivanti

Get the latest research on endpoint management and endpoint security best practices in Ivanti’s research report: Secure Unified Endpoint Management. Data silos and misaligned priorities stand in the way of IT and security teams’ ability to be efficient and innovative according to Srinivas Mukkamala, Chief Product Officer at Ivanti.

How MDM Can Help Manage the Apple Watch at Work

The Apple Watch has emerged as more than just a personal device. It's a tool that can enhance productivity, streamline communications and bolster security for organizations across various industries. With increased usage comes the need to manage these devices effectively and securely. This is where MDM steps in as a critical solution. Ivanti Neurons for MDM solution provides IT administrators the tools necessary to manage, secure and optimize the use of Apple Watch within their organizations.

2024 Security Report - Ravi Iyer #shorts

Are executives truly bought into cybersecurity? Ivanti CTO Ravi Iyer cites Ivanti’s latest cybersecurity research showing that there is stronger investment than ever in cybersecurity at the executive and board level. Iyer also breaks down the key cybersecurity concepts today’s executives should prioritize to gain a competitive edge.