Operations | Monitoring | ITSM | DevOps | Cloud

August 2024

Avoiding the Costs of a Cyberattack | Security Insights Ep. 42

Avoiding the Costs of a Cyberattack | Security Insights Ep. 42 Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) to cover the dreaded costs of a cyberattack, and how organizations can work to proactively avoid them by addressing three strategic imperatives: attack surface, vulnerability prioritization, and data silos. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Understanding the CrowdStrike Incident: Enhancing Security Measures with Microsoft Azure

In today's video, we're diving into the CrowdStrike event and its connection with Microsoft Azure, highlighting the critical lessons learned about risk mitigation in content release. We'll explore how the incident led to Microsoft being blamed and the importance of implementing stronger validation and deployment strategies to prevent similar issues in the future.

Cloud Migration: Achieving Uninterrupted Enterprise Service Management

Uninterrupted Enterprise Service Management (ESM) is essential to maintaining business productivity, efficiency and employee satisfaction. Traditional on-premises ESM systems can be limited in scalability, lack updated security measures and be hard to maintain and upgrade. Relying on on-premises systems raises the additional risk of complete data loss and reduces service availability due to the reliance on only one or two potential failure points.

Exploring Time Series and Generative AI in Campaigns and Surveys

The presenter delves into advanced concepts, emphasizing the importance of time series in campaigns using bot hierarchies. They highlight the collection and branching of surveys based on user feedback, and the use of generative AI. The exploration and configuration of survey results, including filtering and splitting based on attributes, are demonstrated. The creation of custom dashboards with device data is introduced. The talk also touches on sustainability and green IT initiatives.

Exploring User Workspace Management and its Capabilities

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere. Exceptional employee experiences Any device. Any location. Ensure proactive, efficient service so employees can work how they want.

Service Request Management Best Practices

Service request management is a critical component of IT service management (ITSM) that enables the efficient handling of employee-initiated requests. Ivanti research shows that 56% of IT professionals have seen an increase in service requests, while one in three professionals knows someone who has resigned due to feeling burned out, according to Ivanti’s 2024 Everywhere Work Report.

Understanding Device Management and Security in the Remote Work Era

Understanding Device Management and Security in the Remote Work Era The discussion delves into device management and security, highlighting the shift in management functionalities due to the increase in endpoints and remote workforce. It underscores the importance of securing devices and data, visibility, and cost optimization. The zero trust security model is introduced, emphasizing verification at multiple levels. The capabilities of Avanti EEM in managing various operating systems and devices are also explored.

SDP and Zero Trust: The Dynamic Duo for Application Security

Until relatively recently, enterprises relied on fixed perimeters using firewalls and VPNs to control access to networks and resources. Traditional network security assumed that everything within the network could be trusted, while external users were granted access with simple password protection.

The Importance of Business Planning in Product Distribution

The importance of business planning in delivering solutions to resellers and customers is highlighted. This involves extensive planning with vendor partners to understand objectives and build a robust plan. The corporate vision of vendors is understood to identify improvement areas and leverage data and relationships. The plan's execution explores specific verticals, uses customer data, and collaborates with resellers and specialists.

WWDC 2024: What IT Admins Need to Know About Apple's Announcements

Apple's announcements at this year’s Worldwide Developers Conference have surprised everyone with new capabilities designed to make the IT admin's life easier for managing and securing devices. As we expected, Apple kept expanding declarative management configurations and capabilities for securing iPhones and iPads and robust management of macOS in the enterprise.

Effective Modern Patch Management Processes and Best Practices for Patch Operations

Running a risk-based vulnerability management program is essential to maintaining a secure business computing environment. In a previous blog, “How Implementing Risk-Based Patch Management Prioritizes Active Exploits,” I provided perspective on how to prioritize vulnerabilities. Honing the operational aspect of securing your systems is essential to that process. Conducting patch operations in your organization can be a complicated process.