Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Fighting Ransomware: Using Ivanti's Platform to Build a Resilient Zero Trust Security Defense - Part 2

Within the initial blog in this series, we discussed ransomware attacks and their remediation on Android mobile devices. Part 2 addresses potential ransomware exploits and their remediation on iOS, iPadOS mobile devices and macOS desktops.

A Question of When vs If: The Need for Your Security Incident Management Plan

Should all incidents be treated the same? Seems like a simple question, but the answer can have big implications. Think about an employee who contacts the service desk, complaining they can’t log onto their email. If the issue is due to a ‘stale’ password, dropped connection or configuration issue after an update for the email server, then the impact on the organization can be quantified to the lost productivity for the impacted employee or employees.

Ivanti Recognized as a Leader in the 2021 Gartner Magic Quadrant for IT Service Management Tools

It’s official! Gartner just published the latest Magic Quadrant for ITSM Tools and once again, we’re proud to have been named a Leader. This is no flash in the pan, but rather more validation for Ivanti’s completeness of vision and our ability to execute. At Ivanti, we’re committed to enabling the Everywhere Workplace so that teams around the globe can focus on what they do best.

City of Seattle: Adding ITAM to Its ITSM Platform Improves Service Delivery While Optimizing Assets

Anyone thinking about embarking on the journey to extend their IT Service Management (ITSM) with IT Asset Management (ITAM) should have a sit-down with Jenny Rock from the City of Seattle. A 27-year technology veteran who began her career in the telecommunications industry, Jenny has been with the City of Seattle for 15 years — the last four as Product Engineer in what is now known as the Collaboration and Workplace Technologies division.

Ivanti Device and Application Control (IDAC) now supports MacOS!

In case you haven't heard the news.... Our beloved Ivanti Device and Application Control (IDAC) is no longer limited to just Microsoft Windows! With the release of IDAC 5.3 earlier this month, we have now expanded the platform support with a brand new MacOS agent. And with all the exciting features already included in the 5.3 release earlier this year (you can read more about the IDAC 5.3 release here) we have increased the functionality even more with the recently released Update 1 for IDAC 5.3.

Spend Intelligence: Enjoy the Ride!

Every product is a never-ending journey and Ivanti Neurons for Spend Intelligence is no exception to the rule. From the very beginning, our teams have set out to target core fundamental problems that we hear people in asset management struggling with on a day-to-day basis. To imagine this on more metaphorical level, just think for a moment: you are going on a road trip and your next destination is an amazing seaside resort with fabulous weather with your every want and desire close at hand.

Ivanti Named as a Visionary in the 2021 Gartner Magic Quadrant for Unified Endpoint Management Tools

Have you heard the news? The latest Gartner Magic Quadrant for Unified Endpoint Management Tools (UEM) is out, and here at Ivanti we’re thrilled to be recognized in the Visionary quadrant for completeness of vision and ability to execute. We’re especially proud to be positioned as a Visionary as we feel this reflects the forward momentum we bring to the market.

Facility Management Software: Everything You Need to Know

In today's increasingly complex work environment, facility managers play an ever-growing role in ensuring that organizations have access to the tools and services that they need to function at their best, especially when it comes to the return to the office. If you've met or spoken to the facility manager at your organization, you may have noticed they're one of the hardest people to get a hold of.

Humans Can be Hacked. So Stop Using Passwords, Already!

Humans are the weakest link in the cybersecurity chain. Where have you heard that before? Humans can be hacked! That too? Yes, I am also one of those weak links in the constant battle against malicious cyber criminals and it can be attributed to just being lazy. It’s human nature and we can easily be socially engineered into giving up our precious online user credentials to the bad guys.