Operations | Monitoring | ITSM | DevOps | Cloud

September 2020

Ivanti Announces Strategic Acquisitions of MobileIron and Pulse Secure

In just 24 hours, tech bloggers and news sites everywhere have been sharing Ivanti's latest acquisition announcement. The news has been picked up by several publications including Redmond Magazine, MarketWatch, TechTarget, WSJ Pro Cybersecurity, and Channel Futures. And while we're delighted to be picked up by so many publications (seriously, we feel like the popular kid at school!), we're glad you've found yourself here on the Ivanti blog!

4 Top Patch Management Questions Answered

Our sales team receives handfuls of patching questions so often, we almost brought in the bots to answer. But because the questions below require more explanation, I grabbed a few minutes with Ivanti’s patch management resident expert, Chris Goettl, for answers to questions concerning patching in the cloud, standalone patching, validating patches, and patching remote endpoints.

The Most Important Android Enterprise Features for Supply Chain - Series 2

In my last post, Getting Started With Android Enterprise in Supply Chain – Series 1, we talked about a couple tools you need to understand before jumping into Android Enterprise. Now that we’ve got that sorted out, let’s talk about the features. Not all of the features, but the ones that are going to really matter in supply chain.

Ivanti is a Challenger in UEM Magic Quadrant

I am a challenger. It’s in my DNA somewhere I am sure. To find limits. Evaluate them. Develop an attack angle. Push beyond. Repeat. This is largely due to my hobby of cycling, which I had no idea would further develop my challenger habits when I took it up a handful of years ago. In cycling, it’s easy to find targets for goals. Sprint to the next intersection. Ride up a climb. Complete a 100-mile century. For me, it came in the form of a particular one-day cycling race covering 205 miles.

How Government Agencies Defend Against Increasing Cyberthreats

Whether military, a civilian agency, or even a public education institution, organizations across the public sector have witnessed a substantial increase in cyberattacks. There were a number of hits on education around this time last year, and then on health-related agencies as the COVID-19 pandemic struck. So, how do government agencies ensure their security posture is up to the task of defending against increasingly opportunistic forces of evil?

What Is IT Asset Management?

Even though ITAM has been around for a long time, there are still some very loose interpretations that claim to define IT asset management (ITAM). But, to be fair, the term asset management has different meanings depending upon the audience. When it comes to IT assets, we are specifically referring to those assets that enable the IT side of the business to run.

Looking through Gartner's Magic Quadrant for Unified Endpoint Management

It’s September. Summer in the northern hemisphere is coming to an end. Going outside of your home is still somewhat unusual. And the year has been chaotic with politics, the pandemic, and civil activism. Our emotions are running high—we should probably stop right there in describing 2020. However, as with many things, rarely will you find a full understanding on the surface of a situation.