Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Asset Management, Device Management and related technologies.

Detachable Carts Unleash the Full Potential of AMR-Assisted Picking

Although there’s a growing understanding of how autonomous mobile robots (AMRs) can reduce warehouse travel, we need to be asking a much more important question. How can a real-world operation transform the efficiency of its fulfillment workflows by optimizing both robots and people? If you’ve ever talked to anyone on our team in person, you know this is a challenge we’re passionate about solving.

Flexibility beyond remote vs. in-office debates, Dennis Kozak, CEO, Ivanti

How can companies balance the need for oversight and in-person collaboration with the flexibility and autonomy that many employees grew accustomed to during the pandemic? Ivanti CEO Dennis Kozak shares original research from Ivanti’s 2025 Technology at Work Report (ivanti.com/TechAtWork) to examine how company leadership needs to handle the new return-to-office pressure while still granting employees autonomy and flexibility over their work.

The cost of IT inefficiency, Sterling Parker, SVP Global Technical Support, Ivanti

What are the major challenges contributing to IT efficiency and IT spending? Sterling Parker, Ivanti Senior VP of Global Technical Support explores the major causes of IT inefficiency and IT spend revealed by the new IT research in Ivanti’s 2025 Technology at Work Report (ivanti.com/TechAtWork). With trillions invested in technology annually, it's crucial for organizational leaders and CIOs to address the major problem of wasteful IT spending caused by issues like tech sprawl, tech debt, and organizational silos.

AI Smart Search: Find and Filter Your Assets Quicker Using Natural Language!

Say goodbye to tedious manual searches and hello to effortless asset discovery. With Smart Search, you can use natural language queries to find what you need in seconds. Simply type "computers in Buenos Aires" or any other everyday phrase to get instant results. Designed specifically for IT environments, Smart Search understands and processes industry-specific terminology. Learn more about how this feature can simplify your daily operations.

Why You Can't Afford to Ignore Software Supply Chain Attacks

Ivanti’s 2025 State of Cybersecurity Report revealed that just 1 in 3 organizations feel prepared to protect themselves from software supply chain threats. With attackers increasingly targeting third-party dependencies, supply chain attacks may become a painful Achilles heel for cybersecurity if organizations continue to overlook them.

Windows 10 Support: What You Need to Know

Windows 10 Support: What You Need to Know Windows 10 is approaching its end of support, with the final update set for October 14th. Users can access extended security updates for three years via an annual subscription, which requires a key for installation. Ivanti will also offer support for these updates, providing an add-on license for existing users. It's recommended to plan for the initial updates, which will start in November.

Enhancing Service Request Workflows with Automation for ITSM and Neurons

Enhancing Service Request Workflows with Automation, ITSM, ITAM and LOB 2025 Neuron spots integration updates improve service request workflows by enabling automation through bots. Users can now utilize a self-service UI to request software distribution by selecting devices and submitting requests. The workflow includes approvals and other steps, focusing on software distribution. A dedicated bot automates application distribution, triggered by service requests, showcasing the broader potential of automation bots.

(Full Episode) IT Horror Stories: Confessions of an Adversary Ep5 S1

In this episode, Dr. Chase Cunningham, aka DrZeroTrust, joins us to shed light on what a horror story looks like from an adversarial perspective. In drawing on his extensive red teaming and NSA background, he explores why doing the basics and applying them intelligently does matter, why people should abandon the notion of perfect security, and what controls and practices organizations can adopt and follow to make it a bad day for bad actors.