Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

A New Era of Software Asset Management

Do you remember when all applications were on-premises applications? Do you remember quarterly BSA (The Software Alliance) audits and press releases that identified companies for being out of compliance? Do you remember when big software manufactures were in the news because they were auditing school districts for software compliance? Have you read about any of this recently? Probably not.

I've Been Everywhere, and the Risks it Can Bring to your Workplace

The song “I’ve Been Everywhere” was written by an Australian country singer, Geoff Mack, back in 1959, where he sang about all the towns he visited across Australia. It became famous in the US in 1962 by the country singer Hank Snow where the song hit number one. He of course did make some changes as the names of the towns were now all based in the US. And since then, many versions have been created. You will by now be wondering what has this to do with an Ivanti blog?

A New Kind of Employee Experience

When you read the phrase “employee experience” (or even just good-old “user experience”), what comes to mind? One of the first things most of us think about, at least in an IT setting, is probably a system’s user interface. How hard or easy is the software to use? How intuitive is it? How appealing is its design? These are important considerations, but a good experience requires more than a good interface.

New report: Ransomware continues to rise. Here's how to get ahead of it.

Ransomware experienced a stunning surge in prevalence and sophistication throughout the pandemic. Threat actors capitalized on a frequently shaky transition to a remote, digital business landscape. With so many businesses prioritizing basic functionality over proactive security, vulnerabilities have been unprecedented – and very much exploited.

Remote Work is Here to Stay. Learn How Ivanti Can Help Take the Pain Out of It.

Today many enterprise businesses suffer from security attacks but don’t understand how to protect their applications from being exposed. The most common attacks today are simple to execute such as a SQL injection, network Distributed Denial of Service (DDoS), Cross Side Scripting (XSS) and more. These are common attacks that can be mitigated by setting up a security framework to protect enterprise assets.

Don't Let Cybersecurity Threat Actors Ruin Your Halloween!

It’s the scariest time of year. But forget about ghosts and goblins and zombies. If you really want to be as scary as possible this spooky season, we know exactly what your costume should be and how you should decorate your yard. Here are some hints: What are they? Cybersecurity threat actors. *Cue terrifying music.* Before you roll your eyes, stick with us. This is worth a quick read.

Co-Existence: Using Legacy VPN with Neurons for Zero Trust Access through the Neurons for Secure Access Platform

There are three aspects of co-existence to discuss. The gateway deployment co-existence, the end user workflow co-existence, and the administrative management co-existence. We will walk through all three of these aspects.

App Control for Linux Opens Up a Whole New World

Ivanti Application Control is known for enabling IT control over endpoints, reducing security risk, and providing a great user experience. Up to now, that experience has always been for users of Windows environments. But with the introduction of Ivanti App Control for Linux, we are opening up a whole new world of possibilities. Ivanti Application Control for Linux brings the major benefits of App Control for Windows to Linux environments.

Ivanti Desktop and Service Management 2021.1 is Now Available!

The new major release of Ivanti Desktop & Server Management (DSM) is now available! This release focuses on more cloud functionality and therefore moves DSM to the future. We have greatly enhanced the DSM connector for Ivanti Neurons to use the collected DSM data directly in Ivanti Neurons for Patch Intelligence. This will allow you to have a much better overview of your environment from the security side.