Operations | Monitoring | ITSM | DevOps | Cloud

September 2023

Leaky Apps - How Banning Them Builds App Security

Banning apps is sometimes necessary to protect your organization from malicious or misused applications. In particular, leaky apps can be a significant threat, and identifying and banning them is an essential app security measure. Some organizations choose a more flexible approach by allowing employees to use unsanctioned apps and monitor their usage for suspicious activity. Yet others don’t monitor employee app use at all, which is the riskiest approach imaginable.

Embrace Flexible Work, Ivanti Solutions

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Executive Summary with Jeff Abbott, Episode 2: Forcing a Condor Moment, feat. Joel Fulton, Co-Fo...

Ivanti’s research into cybersecurity preparedness found that more than half of security professionals consider phishing, ransomware and software vulnerabilities to be the most important threats they face – but that likewise more than half of security professionals considered themselves well-prepared to deal with those threats.

Demo: How to Find, Fix and Prioritize Healthcare Device Threats

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Proving DEX outcomes in real life #technology #cybersecurity

Trying to establish DEX KPIs is often a sticky point of the budgeting conversation. What can you point to when it comes to actual business impact and outcomes from your digital employee experience initiative? Tony Miller, Ivanti’s VP of Enterprise Services, explains his metrics and methods for proving DEX impact.

Digital employee experience- a fireside chat with an IT leader

Digital employee experience (DEX) is a hot topic across the IT community. So, we sat down with Ivanti’s VP of Enterprise Services, Tony Miller, for an honest discussion about DEX. And it wasn’t short of questions! In this fireside chat: What’s Tony's team at Ivanti doing to improve DEX of their users? What to look for in DEX tools and how to secure budget for the investment. Who should be part of a team leading DEX efforts internally? How to find balance between daily operations and long-term DEX efforts and get started on DEX.

"What made me invest in DEX"- an interview with an IT leader

Everywhere Work has heightened the need for improving the digital employee experience (DEX). Yet, 56% of IT professionals say that they don't have a high level of buy-in from their C-suites for a DEX initiative. This raises the question, how can IT teams secure buy in for their DEX initiatives and become a true strategic business partner? Tony Miller, Vice President of Enterprise Services at Ivanti, sat down to discuss recent research findings and what led him to become an internal ambassador for DEX.

Cloud Security - Indiana Bob's Server Closet Versus Data Centers | Ep.28 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Securing IoMT Devices: Best Practices for Hospitals to Prevent Cyberattacks

The Internet of Medical Things (IoMT) has revolutionized the healthcare industry, connecting medical devices to the internet and allowing for greater patient care. However, with this new technology comes new security threats. Hospitals must be aware of these risks and understand how to find, fix and secure connected medical devices to protect their patients from cyberattacks.

No need for Infosec "Rock stars"

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or, is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders and end users what their cybersecurity teams will do in the next 12 months to secure their organizations.

A stepbystep guide to planning and measuring digital employee experience - DEX

When budgets are closely scrutinized you need to justify every investment, especially the long-term one which results aren’t visible overnight. Digital employee experience (DEX), though a strategic initiative, may prove challenging to push forward without a clear roadmap or measurement of every step. During this 30min webinar we tackle how to plan your DEX initiative, step-by-step. We’ll discuss a staggered approach that instantly helps your IT and security operations, whilst improving DEX in the long term.

See Yourself in Cybersecurity - How 3 Experts Transitioned into InfoSec Ep 27 | Security Insights

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

The future of AI malware #shorts #malware #ai

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Expanding ITSM to allow for the Management of Governance, Risk, and Compliance

Meeting a large variety of external, internal and best practice standards to ensure the safety of your organization’s data is vitally important to maintain reputation and avoid costly regulatory penalties. However, often meeting these needs is a manual process. What if you could automate many of the tasks to enable your organization to see and maintain its standards? In this webinar you will learn about how Ivanti can help you to meet your governance, risk, and compliance needs.

Gain and Improve Compliance with the ACSC Essential 8

At Ivanti, we always say that cyber security best practices involve listening to the experts. That starts with the industry standard Essential 8 security framework from the Australian Cyber Security Centre (ACSC) – which leads the Australian Government's efforts on national cybersecurity. In a world of increasing threats, Shane Wescott and Abdul Azize demonstrate how the experts' recommendations on a risk-based approach can be applied at your organisation – saving you time and reducing costs and risks.

Learn Why Comprehensive Patching Matters #shorts

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

The Landscape of Zero Trust Adoption: Insights from Our 2023 Zero Trust Progress Report

Organizations are responding to the changing cybersecurity landscape. And zero trust is at the heart of this change, with 68% of respondents saying they’re planning or actively working towards adopting a zero trust access model. In collaboration with Cybersecurity Insiders, Ivanti surveyed 421 US-based IT and cybersecurity professionals to identify the latest enterprise adoption trends, challenges, gaps and solution preferences related to zero trust security.

Ethics of Telemetry Collection for Employee Experience Improvement

Data collection has become an increasingly essential tool for businesses, allowing them to gather insights about their customers and employees. But it also raises the question of ethics: what data should be collected, how should it be used and who should have access to it? In this article, we'll explore the ethical implications of collecting employee experience data through telemetry.

Phishing 2.0: How to How Stop Cyberattacks Even Pros Can't Catch

The information gap is broadening. According to Ivanti’s 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022!