Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Optimizing SAP EWM with UX on the edge

While technology plays a large part in the efficiency of warehouse operations, employees are the foundation. Prioritizing User Experience (UX) on employees’ mobile data entry devices, from handheld devices to fork truck-mounted barcode scanners, is crucial to maximizing productivity. SAP EWM provides the back-end functionality, but it is on these devices that everything comes together as they determine how, when, and where material handlers move products through the supply chain.

IDC Names Ivanti a Global Leader in UEM Software Support

Hey, here’s some exciting news worth sharing near and far. Industry research firm IDC has positioned Ivanti in the Leaders category in its 2020 IDC MarketScape for Worldwide UEM Software report. This follows on the heels of Gartner placing Ivanti as a Leader in the Gartner Magic Quadrant for IT Service Management Tools in October 2020.

7 Ways UEM Enhances Your Security

Introduction Many things blur the line between endpoint management and security. Examples? Managing an endpoint. Configuring it. Performing application and software management. And patching the endpoint. The fact is, managing and securing a device is so interrelated that it makes sense for these two functions to come together in a single platform that can accomplish these, and other tasks needed in your IT organization. Here are the seven ways Unified Endpoint Management (UEM) can support security.

ITAM vs. ITSM - What's the Difference?

IT Asset Management (ITAM) and IT Service Management (ITSM) are critical for any organization that requires IT capabilities to support business objectives. Both technologies provide IT operational support to an organization; however, the purpose and objectives of these technologies are quite different. Let’s explore the differences and similarities between ITAM and ITSM.

Extending the Zero-Trust Security Framework to Your Home

Mixing your personal and work devices while connected to your home network and accessing the Internet is a risky proposition from a security and privacy standpoint. Why? I frequently monitor my firewall logs. What I observe on my WAN interface are blocked IP addresses sourced from adversarial nation states which makes the hair on the back of my neck stand up.

Adopting an Agile Workplace for the 'New Normal' at Taylor Vinters

There has been a significant amount of change in the IT industry over the past 25 years, from the integration of email, the move to laptops over desktops and the introduction and transition to cloud computing. However, nothing compares to witnessing the rapid change and innovation businesses have adopted throughout the pandemic, including ourselves. Agility, adapting to survive

Extending Microsoft Endpoint Manager with Third Party Updates for Config Manager and Intune

Unpatched security vulnerabilities are utilized in the majority of data breaches and ransomware attacks. In fact, research shows that many CVEs go unfixed for long periods to time leaving companies open to unnecessary exposure. 60% of breaches involved vulnerabilities of which a patch was available but not yet applied. This is why vulnerability management is so important and not only having a plan but selecting the right tools to support your plan.

5G and the Journey to the Edge

Recently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Edge.” Ivanti was thrilled to contribute to the report, which outlines the most pressing security concerns organizations face in a world embracing the revolutionary transformation to 5G and edge technology.

A New Year and a New Ivanti

2020. A year that will never be forgotten and one that has had everlasting impacts on business operations, how we work, and our daily lives. As I reflect on this past year, I realize that 2020 has been the longest test for us all. 365 days long. It’s been the year of rapid change, one where adopting innovative adaptability is critical. I have been thinking about my New Year’s resolution and discovered that 2021 is the year when we make a collective resolution.

Threat Thursdays: 2020 A Year in Review

We can finally bid a not so fond farewell to 2020. Looking back at our Threat Thursday series in reflection there is no way other than to say 2020 was a brutal year in cybersecurity. 2019 had already driven ransomware into high gear, but the seven-figure ransom extorted from Travelex really set the tone for what was to come this year. The New Year is a time to reflect, but most importantly it’s a time to learn from the past to create a safer, more secure future.