Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti

WWDC 2024: What IT Admins Need to Know About Apple's Announcements

Apple's announcements at this year’s Worldwide Developers Conference have surprised everyone with new capabilities designed to make the IT admin's life easier for managing and securing devices. As we expected, Apple kept expanding declarative management configurations and capabilities for securing iPhones and iPads and robust management of macOS in the enterprise.

Effective Modern Patch Management Processes and Best Practices for Patch Operations

Running a risk-based vulnerability management program is essential to maintaining a secure business computing environment. In a previous blog, “How Implementing Risk-Based Patch Management Prioritizes Active Exploits,” I provided perspective on how to prioritize vulnerabilities. Honing the operational aspect of securing your systems is essential to that process. Conducting patch operations in your organization can be a complicated process.

Optimize Your ESM Workflows with Automation

Sick of the lost time outmoded workflows cause your IT team? Automation is the secret weapon you've been waiting for to streamline manual processes, free your IT staff and dramatically improve service quality across your organization. Join our live webinar moderated by Ivanti’s Phil Bowermaster and featuring real-world success stories from SCI's Jesse Miller and NCC Group's James Wooltorton — who’ll explain how you can optimize your workflows and take your ESM strategy to new heights.

Cyber Defense 202: Exploit Vulnerabilities | Security Insights Ep. 41

Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris' and Robert's hearts.

Combining MDM and MTD for Strategic Security

The mobile threat landscape is constantly evolving, with advanced threats like CryptoChameleon emerging all the time. To effectively combat these challenges, organizations need a comprehensive solution – and that’s where combining Mobile Threat Defense (MTD) and Mobile Device Management (MDM) comes in. While MTD can identify potential threats on mobile devices, it often lacks the capability to take proactive measures to address them once they’ve been identified.

Exploring Cloud Migration: Opportunities, Challenges, and Investment Priorities

Exploring Cloud Migration: Opportunities, Challenges, and Investment Priorities The discussion kicks off with the potential of 'lift and shift' in cloud migration, tackling worries about reinventing processes and saving costs. It delves into investment priorities such as assets, discovery, and enhancing the digital employee experience. The latest additions to the portfolio offer a unified dashboard, making customer interactions more straightforward.

The Critical Role of the CMDB in Security and Vulnerability Management

Effective security and vulnerability management is crucial to safeguard organizations from ever-evolving cyber threats. At the core of these practices lies the Configuration Management Database (CMDB), a powerful resource that offers a centralized view of an organization's IT infrastructure. The CMDB plays a pivotal role in upholding robust security and vulnerability management strategies – empowering organizations to proactively identify, evaluate and address risks to their IT systems and data.

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment The discussion explores the role of IT and security teams in technology and the challenge of translating these efforts into business understanding for resource allocation. It emphasizes the need to reinvent approaches to bridge gaps between IT, security, and business understanding. The importance of breaking down organizational silos, adopting the Secure by Design standard, and aligning with the CIO and CISO to enhance security is highlighted.

Voice Picking: The Evolution of Mobile Productivity in the Warehouse

Voice-directed picking is an established method for hands-free order fulfillment in warehouses around the world. If you haven’t explored it to boost productivity, now's the time. As it has evolved, voice-based data entry – both text-to-speech and speech-to-text – can be installed into warehouse workflows quickly and economically, without changing your existing warehouse management or other enterprise systems.