Operations | Monitoring | ITSM | DevOps | Cloud

Work From Home Winning Top-Tier Talent

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

Tech Confessions - ET, Phone Home | Crazy IT Asset Discovery Stories

See the OUT-OF-THIS-WORLD reason why one company’s software was “running like a dog.” And how to control your IT estate before it controls you. All it takes is one person abusing your systems, or one unsecured endpoint, to create risk and bottlenecks for everyone. In the era of Everywhere Work, it’s vital to have total visibility into every corner of your IT estate so you can identify risk, correct inefficiencies, control costs and maximize performance.

The 8 Best Practices for Reducing Your Organization's Attack Surface

Increases in attack surface size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk. While some attack surface management solutions offer remediation capabilities that aid in this effort, remediation is reactive. As with all things related to security and risk management, being proactive is preferred. The good news is that ASM solutions aren't the only weapons security teams have in the attack surface fight.

How Implementing Risk-Based Patch Management Prioritizes Active Exploits

Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organizations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong. The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities. Risk-based patch management is the answer to this issue.

How Generative AI Can Benefit Your Knowledge Management

There has been growing interest in the capabilities of generative AI since the release of tools like ChatGPT, Google Bard, Amazon Large Language Models and Microsoft Bing. With the hype comes concerns about privacy, PII, security and, even more importantly, accuracy. And rightly so. Organizations are treading cautiously with their acceptance of generative AI tools, despite seeing them as a game changer.

Tech Confessions - Attack of the Toasters | Crazy IT Asset Discovery Stories

Watch this JAW-DROPPING story about how unknown devices nearly provoked a panic for one IT team in the defense industry. They nearly shut down their entire network after receiving an alert about mystery endpoints they couldn’t identify. The lesson to be learned? You can't afford to miss ANY device on your network if you’re hoping to keep your IT estate safe and secure. Before you raise alarm bells, find what’s hidden on your network with Ivanti Neurons for Discovery.

Tech Confessions - The Paper Trail | Crazy IT Asset Discovery Stories

WHY was there a HIDDEN PRINTER underneath one executive assistant’s desk? Watch this Tech Confession video to learn why and how employees’ ghost assets might put a company at serious productivity loss and compliance risk! When an executive assistant was asked by her boss to print out all his emails, she unwittingly created headaches for her IT team. Why? Because they had to wade through reams of (personal) messages to see if company secrets were being exposed.

There's a Bot for That

Ivanti Neurons Bots provides powerful hyper-automation capabilities for IT departments, and with a no-code/low-code interface and rich out-of-the-box content, organizations can start solving many challenges across the IT landscape in minutes. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

AI vs. AI: The Future of Cyber Security Podcast Ep. 14

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.