Operations | Monitoring | ITSM | DevOps | Cloud

March 2021

Back Again: The Mobile Endpoint Is Now the Policy Enforcement Point in the Everywhere Workplace!

Several years back before the COVID-19 pandemic hit and the work-from-home shift took hold, we wrote a blog about how the mobile-centric zero trust framework removed the traditional perimeter security controls to protect the corporate enterprise network and all connected endpoints from cybercriminals.

Automated Patch Management and Team Swarming are Key Security Practices

In the blink of an eye, you can miss a new business disrupting security incident. We all recognize that cybersecurity breaches are increasing in volume and sophistication. How we respond to them is critical. Security vulnerabilities force organizations to go outside of their daily activities to execute out-of-band responses. We face numerous challenges in managing security risk.

Acquisition with Intent and The Rise of The Everywhere Workplace: Why Ivanti Is Moving Faster Than Ever During a Global Pandemic

It's easy for businesses to drop into reactive survival mode during a crisis like COVID-19. Navigating rapidly changing conditions can make it difficult to think beyond immediate challenges. And yet, even – or perhaps especially – in a crisis, it’s imperative that companies execute strategies that will make them stronger in the long term. In the case of COVID-19, those strategies should support clients as they transition to new working conditions.

Brand New Desktop and Server Management Remote Control Capability

We are very excited to announce the official release of Ivanti Desktop and Server Manager Remote Control - A new Remote Control solution based on Ivanti technology! Ivanti continues to provide useful tools to support our customers in the Everywhere Workplace – especially in times where remote work is more often the norm rather than the exception.

What's New with Ivanti Workspace Control 2021.1?

The past 12 months have seen significant changes and upheaval in the way we live our lives and also in terms of our work environment. Many organizations moved to remote working almost overnight, leaving IT with significant challenges in terms of ensuring users continue to remain productive and secure. Organizations have been increasingly looking to cloud technologies to provide solutions to these challenges.

Optimizing SAP Extended Warehouse Management (EWM) with Better User Experience (UX) on the Edge

Optimizing SAP Extended Warehouse Management (EWM) with Better User Experience (UX) on the Edge While technology plays a large part in the efficiency of warehouse operations, employees are the foundation. Prioritizing User Experience (UX) on employees’ mobile data entry devices, from handheld devices to fork truck-mounted barcode scanners, is crucial to maximizing productivity.

Five Key Identity Governance Features That Your Identity and Access Management Solution Does NOT Support

Since the start of the COVID-19 pandemic, identity management has taken center stage as the key enterprise security practice for enabling remote workforces while protecting company data and IT services.

Enabling Secure Access for the Federal Government - Meeting Comply to Connect Mandates

Government IT organizations must demonstrate and maintain compliance with a large and growing number of regulations and standards around network access control (NAC), ensuring that all connected devices to their environment are not vulnerable is a key requirement. Comply to connect (C2C) simplifies this by enforcing that patches and hardened configurations are applied to devices before they connect and updated continually.

What's New with Ivanti Device and Application Control 5.3

What’s New in Ivanti Device & Application Control 5.3 Nearly every company in the world incorporates a Mac endpoint into the organization. Without a device control solution to manage these stations we see a real possibility for data leakage risk. This loss happens mainly because of insider threats. Ivanti Device and Application Control has historically performed well protecting our customers against these types of threats, but the Mac endpoints can still represent a risk.

From Virtual Reality to Improved Work Life Balance, Here's Why UEM Cloud R76 and UEM Core 11.1 are so Cool

We are excited to announce the availability of the new MobileIron UEM Cloud R76 and UEM Core 11.1, our on-premises offering. As with past releases of MobileIron UEM, our product team continues to focus their efforts on use cases that help our customers to enhance security, improve the admin/user experience and support new use cases driven by OS updates.

Not Another Blog about SolarWinds - 3 Ways Ivanti can Help Protect You

The SolarWinds exploits have been widely reported, fully covered, and basically as we would say in Aussie – Done to Death Mate. But some of the info got me thinking, especially this article from my buddies at Microsoft which gives some great background and flows for that how the attacks were actually working. I’ve been working with Ivanti Application Control – formerly AppSense Application Manager for over 17 years.

Don't Sweat the Small Stuff but Consider This with Sweating IT Assets

Sweating IT assets, ever heard of them? It might seem nonsensical to imagine an IT asset perspiring from being overworked, but it’s actually not a far-off analogy. When a business delays the purchasing of new technology as long as possible, it’s called ‘sweating assets.” Companies have their reasons for this strategy, but it usually comes down to one thing: an attempt at cost-savings. Do sweating assets actually help to achieve this and where do they miss the mark?

Ivanti Insights Episode 3: In the World of Privacy, Nothing is Free - Including Social Media Apps

Did you know there are currently 4.20B social media users globally? That’s 53% of the total global population! From the most popular social media platforms like Facebook and YouTube, to the hottest up and coming platforms like TikTok and Clubhouse, there is one thing they all have in common: privacy regulations and considerations should be and need to be top priority. Ivanti’s Sr.