Operations | Monitoring | ITSM | DevOps | Cloud

July 2024

Optimize Your ESM Workflows with Automation

Sick of the lost time outmoded workflows cause your IT team? Automation is the secret weapon you've been waiting for to streamline manual processes, free your IT staff and dramatically improve service quality across your organization. Join our live webinar moderated by Ivanti’s Phil Bowermaster and featuring real-world success stories from SCI's Jesse Miller and NCC Group's James Wooltorton — who’ll explain how you can optimize your workflows and take your ESM strategy to new heights.

Cyber Defense 202: Exploit Vulnerabilities | Security Insights Ep. 41

Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris' and Robert's hearts.

Combining MDM and MTD for Strategic Security

The mobile threat landscape is constantly evolving, with advanced threats like CryptoChameleon emerging all the time. To effectively combat these challenges, organizations need a comprehensive solution – and that’s where combining Mobile Threat Defense (MTD) and Mobile Device Management (MDM) comes in. While MTD can identify potential threats on mobile devices, it often lacks the capability to take proactive measures to address them once they’ve been identified.

Exploring Cloud Migration: Opportunities, Challenges, and Investment Priorities

Exploring Cloud Migration: Opportunities, Challenges, and Investment Priorities The discussion kicks off with the potential of 'lift and shift' in cloud migration, tackling worries about reinventing processes and saving costs. It delves into investment priorities such as assets, discovery, and enhancing the digital employee experience. The latest additions to the portfolio offer a unified dashboard, making customer interactions more straightforward.

The Critical Role of the CMDB in Security and Vulnerability Management

Effective security and vulnerability management is crucial to safeguard organizations from ever-evolving cyber threats. At the core of these practices lies the Configuration Management Database (CMDB), a powerful resource that offers a centralized view of an organization's IT infrastructure. The CMDB plays a pivotal role in upholding robust security and vulnerability management strategies – empowering organizations to proactively identify, evaluate and address risks to their IT systems and data.

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment The discussion explores the role of IT and security teams in technology and the challenge of translating these efforts into business understanding for resource allocation. It emphasizes the need to reinvent approaches to bridge gaps between IT, security, and business understanding. The importance of breaking down organizational silos, adopting the Secure by Design standard, and aligning with the CIO and CISO to enhance security is highlighted.

Voice Picking: The Evolution of Mobile Productivity in the Warehouse

Voice-directed picking is an established method for hands-free order fulfillment in warehouses around the world. If you haven’t explored it to boost productivity, now's the time. As it has evolved, voice-based data entry – both text-to-speech and speech-to-text – can be installed into warehouse workflows quickly and economically, without changing your existing warehouse management or other enterprise systems.

Bridging the Security Confidence Gap: A Guide for IT Leaders

July Risk Comms Report - Sterling Parker IT executives and security leaders often face a misalignment in investments, leading to a security confidence gap. To bridge this gap, CEOs and CISOs must collaborate and communicate effectively, fostering a strong security culture. Organizations should adopt a proactive security posture, regularly reassessing their guardrails. CISOs play a crucial role in conveying risk management concepts to the board and demonstrating the security strategy for organizational support.

Secure by Design Principles Are More Important Than Ever

The concept of Secure by Design, which means designing software with security built in before it leaves the drawing board, is fundamentally changing how software is developed. Software has often been designed with what’s known as “bolt-on security,” added after products are developed. But that means security is not inherent within the solution. Where there's a conjunction between the core product and a bolt-on, that’s an inflection point for an attack.

Introducing Ivanti's 3 New Secure UEM Solution Packages

Ivanti has launched three new secure UEM solution packages designed to enhance device management, IT efficiency and security. These cloud-based packages let you discover, manage, secure and heal all your devices. Engineered to be ideal for organizations managing a thousand or more users or devices, these solutions bridge the gap between IT operations and security teams and are secure by design. Ivanti's three new Secure UEM solution packages – Secure UEM Professional, Secure UEM Professional Plus and Secure UEM Premium – offer unique features that aim to minimize security risks, boost IT and user productivity and cut operational costs.

What's the Difference Between a Help Desk and a Service Desk?

The differences between a help desk and a service desk might have once seemed clear. But over the years, plenty of things have changed – especially with the arrival of new technologies that have impacted how users and customers receive support. Let's compare help desk vs. service desk models and examine how this ongoing evolution has played out. One area where the distinctions between a help desk and a service desk are apparent comes when discussing IT Service Management (ITSM) solutions.

The Ultimate Guide to Intune Migrations to Ivanti UEM

If you have purchased Ivanti UEM and are migrating to it from Microsoft Intune, you as an IT administrator must understand and execute several critical steps to make that transition smoothly. In this series of blogs, I will be looking from an Intune admin’s perspective at what it takes to migrate from Intune to Ivanti UEM. I will cover practical elements and best practices, translating terminology used across both products to pave the way for a seamless and successful transition.

UWM: What's in the Suite? #ivanti #UWM

IWC is composed of three main components: security, governance, and user workplace manager. The User Workplace Manager offers deployment options and event feedback, while the Pharma Manager optimizes log on and manages user personalization and profile. Performance Manager enhances CPU and memory, and Environment Manager prepares tasks before user login. SQL Server integration and Application Lockdown feature are also included, along with a Start Menu Builder for customization.

3 Key Takeaways From a Business Roundtable with U.S. Cybersecurity Leaders

A new front has opened in American national security. It is being fought in cyberspace, and private businesses in critical industries like energy, healthcare, water and financial services are on the frontlines. This was the message delivered by Congressman Mark Green (R-TN-7) and Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA) at a business roundtable in Nashville, Tennessee, this week.

Practical Demo: Harnessing the Power of #AI and #Automation

Harnessing the Power of AI and Automation This webinar delves into the adoption of generative AI and its role in ITSM, decision making, user experience transformation, ticket classification, self-healing, and virtual agents. It also covers incident summarization, knowledge article generation, and the AI Configuration Hub. The benefits of AI and automation, such as improved data accuracy, analyst productivity, and employee experience, are highlighted.

The ABC's of UEM: Understanding the Best Fit for Your Business

Exploring UEM: A Panel Discussion on Modern Device Management IT professionals from various industries delve into the significance of Unified Endpoint Management (UEM) as a business tool. They discuss its key capabilities such as device management, security, and unified endpoint experience. The conversation also covers metrics for UEM program effectiveness, the shift from traditional to modern device management, and the role of AI in UEM. The panel emphasizes the importance of UEM in enhancing business operations and user experiences.