Operations | Monitoring | ITSM | DevOps | Cloud

April 2021

Quick Demo: Ivanti UEM for Clients

Some of the many ways that malware, including ransomware, is commonly spread is through malicious attachments to business email, unsanctioned apps downloaded from third-party app stores, drive-by downloads via phishing and pharming attacks, employing brute-force tactics using Remote Desktop Protocol (RDP), and network propagation via SMB and CIFS sharing.

Mobile Devices are Ubiquitous, and so are Cyberattacks

We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities. We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives.

The Future of Technology Operations with Charlie Betz of Forrester Research

Recently, we had the opportunity to hear from Charlie Betz of Forrester Research about the future of technology operations. He covered the shift from project-based work to product team orientation, the integration between DevOps and IT services and the ways in which the entire enterprise is getting value from investments in artificial intelligence. Check out some of the interesting questions and answers from the discussion and be sure to catch the full conversation in the video below.

Vaccinating Against the Ransomware Pandemic

Just as our physical world has suffered from a devastating health pandemic, over the last 3 years the digital world has been suffering a ransomware pandemic that grew 7 times in 2020 compared to the same time in 2019. While we have vaccines for our health crisis what are our options to help protect us against this digital threat?

MobileIron, Acquired by Ivanti, Named "Best Solution Partner" by Deutsche Telekom

Industry recognition is always something to strive for, but when the recognition comes from a trusted partner then it means even more. At Ivanti, we’re proud to be recognized by longstanding partner, Deutsche Telekom, as a “Best Solution Partner” of the year. This was the first year that the award was handed down and represents the deep commitment to partnership and execution.

Beware of QR Code Security Risks Lurking in User Mobile Devices

QR codes, those touch-free codes that look like square puzzles or mazes, seem to be everywhere these days. Gaining in popularity over the past few years, their proliferation has exploded with the onset of COVID-19 precautions. These wonder-codes make it easy for our mobile devices to quickly scan a menu, pay a bill, and find information about a product or service. QR codes blend the physical world with the virtual.

To be or not to be? To do - or not to do - an ELP?

Before I start my ramble here, let me tell you something... the day I learned how to construct a manual Effective License Position (ELP) in Excel my life gained a new purpose, and it became the biggest hobby, sport and passion ever! Those who have done manual ELPs in Excel will know that magic feeling! First, it’s hard as you scramble for the data and licensing knowledge, but if you’re lucky enough and at least get some vendor report or purchase summary, it's a good starting point...

The Global Pandemic Has Led to Unprecedented QR Code Security Challenges

Over the past year, we have witnessed remarkable changes brought on by our response to a global pandemic. Along with accelerated digital transformation and the consumerization of technology, Covid-19 has birthed the everywhere workplace, where users work with any device, to connect to business-critical systems and applications. Work has become something you do rather than a place you go.

Patch Management is Integral for Mature Risk-based Prioritization

The term ‘patch’ triggers many familiar images – affixing a rubber patch to a blown bike tire, the ubiquitous duct tape repairs of myriad objects, and so on. While these temporary fixes won’t heal the underlying cause, they are a quick and easy solution. Our applications and software frequently need patches as well, to fix bugs, security flaws and add feature enhancements. However, in this case, patching is not a temporary band-aid, but rather a proactive planned strategy.

Peace of Mind in the Everywhere Workplace

Protect your brand, people and data with an end-to-end, zero trust approach At Ivanti, we make the Everywhere Workplace possible. Our solutions enable fundamental security controls based on zero trust principles and best practices from cloud to the edge. Translation: we secure all endpoints and help organizations move toward an end-to-end, passwordless access authentication experience. Plus, we make it simple.

Service the Everywhere Workplace

Drive outcomes with insights What if you could give employees reliably great experiences while improving outcomes across your organization? You’ve got it with Enterprise Service Management from Ivanti. It arms you with insights and actions that let you dramatically reduce resolution times and give you more time for the cool stuff you love to do.

Make Your Everywhere Workplace Possible with UEM

In today's complex IT world, employees expect to be productive from everywhere they work (think kitchen tables, sofas, coffee shop Wi-Fi or mobile hotspots) any time using various devices from desktop and laptops to PCs tablets and smartphones. And while work is happening everywhere, IT teams are rushing to secure their IT environment as the growth of devices, increased cybersecurity threats, and more data processed at the edge make their jobs even harder.

Possibility is Everywhere

Hi! We’re Ivanti. We may have met before, but we’d like to reintroduce ourselves because a lot of things have changed for us. Between seriously expanded capabilities and a bold, fresh look, we’re a whole new brand. Of course, things haven’t just changed for us; the whole world has changed. For one thing, there’s a good chance you’re reading this from somewhere other than the traditional office space where you camped out prior to spring 2020.

Why We're Embracing Password 3.0...And You Should Too

Password 1.0 was your cat’s name and your birth year and you used it across every endpoint for a decade. We see you, Sprinkles1979. Password 2.0 was SSO and MFA and WTF because literally everyone used Facebook for authentication. We all saw how well that went. It’s time for Password 3.0 We’ve always operated at the leading edge of innovation, and this is no exception. While the industry gets bogged down in sending texts to confirm authorization, we’re moving forward.