Operations | Monitoring | ITSM | DevOps | Cloud

June 2023

Security Customer Fireside Chat with Dr. Joel Fulton, CEO of Lucidum

Join Ivanti's own Brad Fleeman, Vice President Americas, Security Solutions Group, and cybersecurity expert Dr. Joel Fulton as they discuss the top priorities for cybersecurity in 2023. Dr. Fulton, renowned for his work with leading organizations like Boeing, Starbucks, and Google, shares his insights on building a strong foundation and the importance of basic security practices.

Why Trust Zero Trust Ep. 16

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Understanding your IT environment with Discovery, Service Mapping, and, ITSM

Having visibility of assets accessing your organization’s network is one thing. But understanding their potential impact on your IT environment is a different story. Knowledge is power. Especially in the Everywhere Work model, when employees use on average 2.6 devices to do their job every day. In this practical demo webinar, Everett and Steven will showcase how pairing service and asset management platforms with comprehensive discovery and service mapping solutions can help you identify and visualize relationships and dependencies of assets in your IT environment.

How to Use Generative AI for Knowledge Management

In the blog “How Generative AI Can Benefit Knowledge Management”, we looked at the benefits of AI to knowledge management to enhance the quality, automating the creation of content and enabling more engaging content. In enabling generative AI to become part of the knowledge management framework introduces concerns about accuracy, data bias, privacy and security. Now, it’s time to look at how we can make it work well together...

The Challenge of Digital Nomads and Work-from-Home Environments

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

Phishing 2.0: How to Stop Cyberattacks Even Pros Can't Catch

According to Ivanti's 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing attack – despite virtually every organization getting phished last year! Today’s phishing campaigns use sophisticated social engineering techniques and the latest AI advances with devastating effectiveness, tricking your most valuable users out of sensitive information, network access and personal credentials.

Employee Performance Management and Remote Work

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

How Cloud Migration Helps Improve Employee Experience

The old saying goes, “practice what you preach.” When Ivanti started its "Customer Zero" initiative, Bob Grazioli, Chief Information Officer, saw it as a perfect opportunity to test the products and services consumed by customers. For example, during Ivanti’s move to the cloud, Grazioli and the team experienced the same issues that customers would’ve experienced in their migration process. This first-hand experience allowed them to make improvements along the way.

Expand your ITSM: Key learnings for building connected enterprise workflows

After several years of increasing tech stack complexity, the pendulum is finally swinging back towards simplifying the IT landscape - and the best place to start is with the low-hanging fruit. A natural consideration for IT teams is extending ITSM to support the broader organization. But consolidating tools and connecting enterprise workflows doesn't come without its challenges.

Tech Confessions - Ancient Artifacts

What was the ANCIENT SECRET hidden within one company’s IT estate? In this Tech Confession, hear how an entire payroll system was at the mercy of one admin’s “voodoo” techniques to provide payment via seriously antiquated hardware and software. What were the risks? Keeping the system cranking was a ticklish proposition: Accidentally running an OS update once put the productivity of the whole organization at risk. That was just one of the hazards of running a key process on a hidden device that was invisible to the network.

How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities

The security of your organization’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations. Ensuring compliance requires you to know what’s on your network. But how can that be done when only 48% of leaders and security professionals say they run their asset discovery program at least once per week?

Work From Home Winning Top-Tier Talent

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

Tech Confessions - ET, Phone Home | Crazy IT Asset Discovery Stories

See the OUT-OF-THIS-WORLD reason why one company’s software was “running like a dog.” And how to control your IT estate before it controls you. All it takes is one person abusing your systems, or one unsecured endpoint, to create risk and bottlenecks for everyone. In the era of Everywhere Work, it’s vital to have total visibility into every corner of your IT estate so you can identify risk, correct inefficiencies, control costs and maximize performance.

The 8 Best Practices for Reducing Your Organization's Attack Surface

Increases in attack surface size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk. While some attack surface management solutions offer remediation capabilities that aid in this effort, remediation is reactive. As with all things related to security and risk management, being proactive is preferred. The good news is that ASM solutions aren't the only weapons security teams have in the attack surface fight.

How Implementing Risk-Based Patch Management Prioritizes Active Exploits

Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organizations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong. The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities. Risk-based patch management is the answer to this issue.

How Generative AI Can Benefit Your Knowledge Management

There has been growing interest in the capabilities of generative AI since the release of tools like ChatGPT, Google Bard, Amazon Large Language Models and Microsoft Bing. With the hype comes concerns about privacy, PII, security and, even more importantly, accuracy. And rightly so. Organizations are treading cautiously with their acceptance of generative AI tools, despite seeing them as a game changer.

Tech Confessions - Attack of the Toasters | Crazy IT Asset Discovery Stories

Watch this JAW-DROPPING story about how unknown devices nearly provoked a panic for one IT team in the defense industry. They nearly shut down their entire network after receiving an alert about mystery endpoints they couldn’t identify. The lesson to be learned? You can't afford to miss ANY device on your network if you’re hoping to keep your IT estate safe and secure. Before you raise alarm bells, find what’s hidden on your network with Ivanti Neurons for Discovery.

Tech Confessions - The Paper Trail | Crazy IT Asset Discovery Stories

WHY was there a HIDDEN PRINTER underneath one executive assistant’s desk? Watch this Tech Confession video to learn why and how employees’ ghost assets might put a company at serious productivity loss and compliance risk! When an executive assistant was asked by her boss to print out all his emails, she unwittingly created headaches for her IT team. Why? Because they had to wade through reams of (personal) messages to see if company secrets were being exposed.

There's a Bot for That

Ivanti Neurons Bots provides powerful hyper-automation capabilities for IT departments, and with a no-code/low-code interface and rich out-of-the-box content, organizations can start solving many challenges across the IT landscape in minutes. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

AI vs. AI: The Future of Cyber Security Podcast Ep. 14

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.

How to Use Service Tickets to Improve Your Digital Employee Experience

What can you expect when you shift ITSM to the rest of your organization? Watch Bob Grazioli, Ivanti's Chief Information Officer, break it down in this video. Explore how the move from on-prem to the cloud has driven improvements in the employee experience and IT efficiency at Ivanti.

Why IT Asset Discovery Is the Foundation of a Risk-Based Vulnerability Management Program

With over 236,000 total vulnerabilities currently known – and an average 61 new vulnerabilities added every day to the NVD – it’s impossible to remediate every single CVE or threat vector that appears. So, how do everyday organizations handle the continuously growing threats to their organization’s end users, customers and data – especially across an increasingly hybrid and remote Everywhere Workplace?

Three Reasons Endpoint Security Can't Stop With Just Patching

With remote work now commonplace, having a good cyber hygiene program is crucial for organizations who want to survive in today’s threat landscape. This includes promoting a culture of individual cybersecurity awareness and deploying the right security tools, which are both critical to the program’s success. Some of these tools include endpoint patching, endpoint detection and response (EDR) solutions and antivirus software.

ITSM's Role in Building a Connected Enterprise: The Perspective of a CIO

With 73% of IT and security professionals reporting an increased workload since hybrid and remote work started, ITSM is a game changer for your organization. By automating workloads and increasing visibility, you’re able to build up the resiliency of your IT operations and proactively resolve problems. But getting started can be hard. That’s why Bob Grazioli, Ivanti’s Chief Information Officer, sat down to share his perspective gathered over more than 25 years in the field.

How to Start a Knowledge Base: Simple Yet Surefire Approach

Early in my career, I made the jump from defense contractor to customer support agent for an up-and-coming IT Service Management solution provider. Being new to the team and industry, I felt completely out of place. After the initial product training, I was pointed to a lab computer and told to start diagnosing a set of customer issues. I felt completely lost. Over time, with significant amounts of studying and leaning on my peers, I figured things out and eventually became one of the go-to analysts.

How to overcome obstacles on your Enterprise Service Management (ESM) journey

Expanding ITSM beyond IT isn’t a walk in the park. There are countless roadblocks that you’ll need to overcome. Phil Bowermaster, Director of Solutions Marketing at Ivanti, and Mark Temple, Assistant Director for Service Management at the University of Glasgow, share their experiences and give advice on how to make your ESM initiative a successful one.

How to implement Enterprise Service Management (ESM) at your organization

ESM applications are growing in prominence. So, what’s the best way to implement it at your organization? In this video, Ivanti’s Phil Bowermaster and Mark Temple from University of Glasgow dive into the easiest way to start and expand that ITSM environment to manage non-service workflows.

The Next Evolution of Patch Management: Security Insights Podcast Ep. 13

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

The Human Element of Preventing Supply Chain Attacks: Security Insights Podcast Ep. 12

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.