Operations | Monitoring | ITSM | DevOps | Cloud

May 2021

How to Structure Your IT Service Desk to Support Process Improvements

Buying a modern service desk tool won’t solve all your problems in and of itself. Although these tools are designed to ensure general best practices are met, service desk tools must also be configured to address your organization’s specific essential protocols. In a recent Info-Tech study that surveyed 623 organizations worldwide, the most frequently adopted service management processes are.

ITSM Buyers' Guide: 7 Use Cases to Define Your ITSM Goals

Attempting an upgrade or switch to a new ITSM tool is obstacle-ridden for IT directors. From having to address fears surrounding the cost of switching vendors to assessing service management maturity, building a case around why and how an ITSM can advance the business can be a harrowing feat. Thankfully, Info-Tech pulled together this selection guide.

The 30th Anniversary of RSA Would Have Been One Heck of a Party

There is no doubt that a virtual RSA is not the same as catching up with colleagues and partners over great food, and of course meeting up at the W Bar. The good news is we all have or are adjusting to working remotely and we didn’t have to travel to hear what the industry luminaries think, or what our peers are saying they can do to keep the world safe.

Google I/O Announcements - What Do Ivanti Customers Need to Know?

This week Google unveiled a number of exciting announcements at its annual developers’ conference, Google I/O 2021. Announcements included Android 12 and several security and privacy features that are coming to its platforms. At Ivanti, we are particularly excited about what Google is doing to improve user security and privacy. The consistent theme of Google I/O was Secure by default, Private by design, and You’re in control.

MobileIron (acquired by Ivanti) Wins Two Prestigious Marketing Awards!

There are some marketing campaigns that just work. They resonate with their audience, they add value, they’re interesting and topical – but they’re also rare. In 2020, the MobileIron (now Ivanti) communications team launched a new campaign to tell the story of the Everywhere Enterprise (a precursor to Ivanti’s Everywhere Workplace).

Press Pause on Auto-Renewals: How to Brave a Software Switch

One of the biggest reasons organizations don’t try out a new software vendor is the perceived costs of switching. Most cite the fear of implementation being too expensive, too difficult, or too time-consuming—all excuses to justify maintaining a vendor contract, even if that vendor is performing poorly and not meeting expectations. But what’s at risk when organizations simply renew year after year? Who loses if the status quo is maintained?

7 Habits I&O Leaders Should Replace in 2021

As the digital-first operating world evolves, IT organizations are struggling to decide which practices to maintain and which to phase out. This transition from a “plan/build/run” lifecycle to a more agile, team-oriented structure has become the catalyst for organizational conflict, challenging the very foundation of how companies should operate.

The Business Value of Integrating ITAM with ITSM

As organizations experience increasing complexity and expanding perimeters, IT professionals are looking to get a better understanding into their distributed software and hardware assets. IT teams need immediate access to detailed information in context of services and underlying assets they run on to make more intelligent decisions about their IT investments. Having asset visibility at their fingertips enables them to maximize cost savings, secure assets, and improve the employee experience.

Quick Demo: Leaky App Detection and Remediation

Here's a quick two-minute video demonstrating the power of Ivanti's UEM for Mobile and Mobile Threat Defense and this time detecting a leaky app, specifically the very popular video-sharing TikTok app. Tiktok has had a history of vulnerabilities where the personal information of users was exposed and could have potentially been harvested and leaked out by malicious cyber threat actors.

Avoid Market Pressures That Compromise Mobile App Security

The marketplace for mobile apps is a broad and highly competitive one. There are millions of apps available on Apple’s App store, Google Play, and within private enterprise app stores. Expanding market demands continue to drive the pressure to innovate. New iOS and Android updates and mobile device releases, along with myriad apps from companies vying for their customer’s attention, are creating shorter app release cycles.

Pipeline Ransomware. Could I Be Next?

If you have been following the news or trying to buy gas in Atlanta, you probably have already heard about the ransomware attack on one of the most important strategic pipelines in the US. 2020 saw ransomware attacks skyrocket and now 2021 seems to be following the trend. The current situation begs us to rethink how we think about our security practices and mindset. One area of security that you may have heard about is Zero Trust (ZT).

Quick Demo: Updated Magisk Systemless Root Detection and Remediation

Magisk is a very sophisticated systemless rooting technique that can bypass Google's SafetyNet attestation and allow apps like Google Pay, many banking apps, and even Fortnite and Pokémon Go games to be installed on a rooted Android device. Rooting an Android device is popular to allow the user to customize and tweak their device by allowing the installation of third-party apps and tools, removavl of bloatware, and speed up the processor and network.

Ivanti User Workspace Manager Update: 2021.1 Release

Ivanti User Workspace Manager (UWM) 2021.1 is a major release focused on quality, stability and several feature enhancements. As of version 2021.1, Application Control offers a native user interface inside the AC console. This interface presents an aggregated view of events captured from all managed endpoints. The events are filtered and categorized on a per-feature basis and can be seamlessly translated into policy actions via drag-and-drop functionality.

Ivanti Neurons for Spend Intelligence: SaaS Management

You’re probably familiar with the many benefits of licensing software using a SaaS (Software-as-a-Service) model. The most frequently touted benefit is that you pay only for what you use when you use it. Additionally, you don’t have to worry about upgrading, or server maintenance, or security. That’s all taken care of. However, even using a SaaS model, you still need to monitor and manage costs, which can be a challenge if you are working with several suppliers.

Cybersecurity is Fundamental for Modernizing Government

Digital transformation is a strategic initiative of the federal government and has been for years, but adequate funding has never been appropriated. Digital transformation is essential within all areas of government, to deliver services faster, more reliably, and securely. In order to keep up with the global expansion of digitalization, government agencies must modernize their IT and security infrastructure.

Ivanti Gives Voice to IT Incident Management Software

A protracted, exasperating customer service experience popped into my mind while reading this sentence in the Ivanti Voice data sheet: “One of the most frequent customer complaints about call centers is having to repeat information.” Ain’t that the truth. Here’s a brief personal experience.

Quick Demo: Ivanti UEM for Mobile - checkra1n Jailbreak Update for iOS 14.5

The checkm8 vulnerability and the updated checkra1n jailbreak tool are the gifts that keep on giving for Apple devices. Using Ivanti UEM for Mobile and Mobile Threat Defense, you can protect your iPhone 5S through iPhone X, iPad 5th through 7th generations, and iPad Pro 2nd generation, Apple TV 4 and 4K, and iPods up to 7th generation devices.