Operations | Monitoring | ITSM | DevOps | Cloud

January 2021

Applying Strong Cyber Hygiene Security to IoT Endpoints

The Internet of Things, better known as IoT. You’ve heard of it, right? But do you know what it is? Simply, it is the interconnection of things (or endpoints) on the Internet to send and receive data. Today, experts calculate that there are 31 billion things connected to the insecure Internet, and growing exponentially. Did you know there are different types of IoT applications?

IDC MarketScape Names Ivanti/MobileIron WW Leader in UEM Software

Hey, here’s some exciting news worth sharing near and far. Ivanti/MobileIron has been named to the Leaders Category of the IDC MarketScape: Worldwide UEM Software 2021 Vendor Assessment (doc #US46957820, January 2021) report. This follows on the heels of Gartner placing Ivanti as a Leader in the Gartner Magic Quadrant for IT Service Management Tools in October 2020.

How has the pandemic changed CISO priorities?

The world recently passed the one-year anniversary of the COVID-19 pandemic. Even with vaccines rolling out across the world, global lockdowns and travel restrictions continue unabated. The impact continues to be felt in every kind of business and organization, as workers either continue to work from home or adhere to strict health protocols to minimize transmission of the virus in the workplace.

Ivanti will Acquire Cherwell to Further Enable the Everywhere Workplace

I am excited to share the news that Ivanti has signed a definitive agreement to acquire Cherwell Software, a global leader in enterprise service management (ESM) solutions. This comes on the heels of Ivanti being named a Leader in Gartner’s 2020 Magic Quadrant for IT Service Management Tools report.

Optimizing SAP EWM with UX on the edge

While technology plays a large part in the efficiency of warehouse operations, employees are the foundation. Prioritizing User Experience (UX) on employees’ mobile data entry devices, from handheld devices to fork truck-mounted barcode scanners, is crucial to maximizing productivity. SAP EWM provides the back-end functionality, but it is on these devices that everything comes together as they determine how, when, and where material handlers move products through the supply chain.

IDC Names Ivanti a Global Leader in UEM Software Support

Hey, here’s some exciting news worth sharing near and far. Industry research firm IDC has positioned Ivanti in the Leaders category in its 2020 IDC MarketScape for Worldwide UEM Software report. This follows on the heels of Gartner placing Ivanti as a Leader in the Gartner Magic Quadrant for IT Service Management Tools in October 2020.

7 Ways UEM Enhances Your Security

Introduction Many things blur the line between endpoint management and security. Examples? Managing an endpoint. Configuring it. Performing application and software management. And patching the endpoint. The fact is, managing and securing a device is so interrelated that it makes sense for these two functions to come together in a single platform that can accomplish these, and other tasks needed in your IT organization. Here are the seven ways Unified Endpoint Management (UEM) can support security.

ITAM vs. ITSM - What's the Difference?

IT Asset Management (ITAM) and IT Service Management (ITSM) are critical for any organization that requires IT capabilities to support business objectives. Both technologies provide IT operational support to an organization; however, the purpose and objectives of these technologies are quite different. Let’s explore the differences and similarities between ITAM and ITSM.

Extending the Zero-Trust Security Framework to Your Home

Mixing your personal and work devices while connected to your home network and accessing the Internet is a risky proposition from a security and privacy standpoint. Why? I frequently monitor my firewall logs. What I observe on my WAN interface are blocked IP addresses sourced from adversarial nation states which makes the hair on the back of my neck stand up.

Adopting an Agile Workplace for the 'New Normal' at Taylor Vinters

There has been a significant amount of change in the IT industry over the past 25 years, from the integration of email, the move to laptops over desktops and the introduction and transition to cloud computing. However, nothing compares to witnessing the rapid change and innovation businesses have adopted throughout the pandemic, including ourselves. Agility, adapting to survive

Extending Microsoft Endpoint Manager with Third Party Updates for Config Manager and Intune

Unpatched security vulnerabilities are utilized in the majority of data breaches and ransomware attacks. In fact, research shows that many CVEs go unfixed for long periods to time leaving companies open to unnecessary exposure. 60% of breaches involved vulnerabilities of which a patch was available but not yet applied. This is why vulnerability management is so important and not only having a plan but selecting the right tools to support your plan.

5G and the Journey to the Edge

Recently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Edge.” Ivanti was thrilled to contribute to the report, which outlines the most pressing security concerns organizations face in a world embracing the revolutionary transformation to 5G and edge technology.