Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Tech Confessions - The Paper Trail | Crazy IT Asset Discovery Stories

WHY was there a HIDDEN PRINTER underneath one executive assistant’s desk? Watch this Tech Confession video to learn why and how employees’ ghost assets might put a company at serious productivity loss and compliance risk! When an executive assistant was asked by her boss to print out all his emails, she unwittingly created headaches for her IT team. Why? Because they had to wade through reams of (personal) messages to see if company secrets were being exposed.

There's a Bot for That

Ivanti Neurons Bots provides powerful hyper-automation capabilities for IT departments, and with a no-code/low-code interface and rich out-of-the-box content, organizations can start solving many challenges across the IT landscape in minutes. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

AI vs. AI: The Future of Cyber Security Podcast Ep. 14

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

How to Use Service Tickets to Improve Your Digital Employee Experience

What can you expect when you shift ITSM to the rest of your organization? Watch Bob Grazioli, Ivanti's Chief Information Officer, break it down in this video. Explore how the move from on-prem to the cloud has driven improvements in the employee experience and IT efficiency at Ivanti.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.

How to overcome obstacles on your Enterprise Service Management (ESM) journey

Expanding ITSM beyond IT isn’t a walk in the park. There are countless roadblocks that you’ll need to overcome. Phil Bowermaster, Director of Solutions Marketing at Ivanti, and Mark Temple, Assistant Director for Service Management at the University of Glasgow, share their experiences and give advice on how to make your ESM initiative a successful one.

How to implement Enterprise Service Management (ESM) at your organization

ESM applications are growing in prominence. So, what’s the best way to implement it at your organization? In this video, Ivanti’s Phil Bowermaster and Mark Temple from University of Glasgow dive into the easiest way to start and expand that ITSM environment to manage non-service workflows.

The Next Evolution of Patch Management: Security Insights Podcast Ep. 13

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.