Operations | Monitoring | ITSM | DevOps | Cloud

The Evolution of Patch Management with Eric Schultze | Security Insights, Ep. 51

Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Understanding Risk Appetite in Organizations

Understanding Risk Appetite in Organizations Risk appetite guides organizations in assessing their risk tolerance and aligning actions with risk management strategies. Frameworks like NIST CSF 2.0 aid in prioritizing risks and measuring outcomes. Organizations need to evaluate security investments against acceptable risk levels, factoring in costs of vulnerabilities. Exposure management offers a comprehensive view of risk, while internal and external influences shape risk decisions. The link between vulnerability scores and exploitability requires careful prioritization of security measures.

Evolving Maintenance Strategies for Cybersecurity #shorts

Evolving Maintenance Strategies for Cybersecurity Maintenance strategies now focus on selective patching and pilot group testing to address vulnerabilities. The rise in data breaches has led to the creation of multiple service level agreements (SLAs) for quick resolutions. Organizations are preparing for future SLAs to handle regular maintenance and priority updates. With frequent browser updates, there is a shift towards continuous maintenance practices, aiming for full automation in managing updates and vulnerabilities.

Understanding Risk Assessments and Endpoint Management #shorts

Understanding Risk Assessments and Endpoint Management Risk assessments help companies identify vulnerabilities, particularly with third-party suppliers. Many organizations misjudge their endpoint count, leading to exposure management challenges. Social management connects technical risks to business outcomes, aiding in prioritization. Traditional methods fall short, requiring actionable insights and continuous monitoring. The evolving attack surface demands new strategies, and AI integration is anticipated to enhance automation and threat detection.

How Ivanti Neurons Revolutionizes Modern IT Management

Transforming Enterprise IT with Hyper-Automation The rapid changes in the world increase demands on enterprise IT, especially with the rise of remote work and cybersecurity threats. Hyper automation, driven by AI and deep learning, addresses these challenges. Enterprises focus on self-healing endpoints and proactive security, improving user experiences and service delivery. Customers experience operational efficiency gains, reduced outages and faster security updates, while automation bots support IT teams in resolving issues proactively.

The Strategic Role of Cybersecurity in Innovation

The Strategic Role of Cybersecurity in Innovation Cybersecurity drives innovation as organizations contend with motivated bad actors like hackers and nation-states. Balancing security with employee productivity is crucial, and the costs of risk mitigation must align with long-term benefits. Visibility in security landscapes is often lacking, complicating threat assessments. Effective exposure management and understanding IoT challenges are vital. Security should evolve into a strategic partner for businesses, enhancing operational efficiency.

Improving Employee Digital Experience with Ivanti Neurons

Improving Employee Digital Experience with Ivanti Neurons Ivanti Neurons improves the digital experience for employees by quickly identifying and resolving device performance issues. A support bot monitors processes, analyzes CPU usage and interacts with employees to clarify problems. It improves application performance by adjusting priorities and informs employees of temporary measures. The bot also generates service tickets for recurring issues, improving the overall employee experience.

Understanding Organizational Security Maturity Levels

Understanding Organizational Security Maturity Levels Organizations display different levels of security maturity, with level four organizations demonstrating a deeper understanding of security threats compared to level one. Increased investment in security is noted among higher maturity levels. Awareness of cyber threats and vulnerabilities is rising, prompting organizations to align their cybersecurity strategies with business goals. A holistic approach to integrating cybersecurity into daily operations is crucial for effective risk management.

Device Management and Security Enhancements

Device Management and Security Enhancements The content outlines key features in device management and security, including external intelligence integration and new restrictions for iOS and Macs. It covers default browser settings, deep link functionalities, and compliance actions for device retirement. Enhancements in single sign-on for Macs and Apple's native SSO are highlighted, along with background scripts and policy-based controls for disk management. Upcoming capabilities and future discussions on app management and Android transitions are also previewed.

Exciting Updates in Ivanti Neurons Dashboard Designer

Exciting Updates in Dashboard Designer Features New features in Dashboard Designer include a patch management dashboard and improved datasets for flexible charting. Enhanced fields support better analysis of device and people scores. Users can now schedule reports with flexible options and receive email notifications. Report templates have been upgraded with unique device counts and filtering for failed deployments. The audit trail is now available, offering additional events and export capabilities for in-depth analysis.

Flexibility beyond remote vs. in-office debates, Dennis Kozak, CEO, Ivanti

How can companies balance the need for oversight and in-person collaboration with the flexibility and autonomy that many employees grew accustomed to during the pandemic? Ivanti CEO Dennis Kozak shares original research from Ivanti’s 2025 Technology at Work Report (ivanti.com/TechAtWork) to examine how company leadership needs to handle the new return-to-office pressure while still granting employees autonomy and flexibility over their work.

The cost of IT inefficiency, Sterling Parker, SVP Global Technical Support, Ivanti

What are the major challenges contributing to IT efficiency and IT spending? Sterling Parker, Ivanti Senior VP of Global Technical Support explores the major causes of IT inefficiency and IT spend revealed by the new IT research in Ivanti’s 2025 Technology at Work Report (ivanti.com/TechAtWork). With trillions invested in technology annually, it's crucial for organizational leaders and CIOs to address the major problem of wasteful IT spending caused by issues like tech sprawl, tech debt, and organizational silos.

Why You Can't Afford to Ignore Software Supply Chain Attacks

Ivanti’s 2025 State of Cybersecurity Report revealed that just 1 in 3 organizations feel prepared to protect themselves from software supply chain threats. With attackers increasingly targeting third-party dependencies, supply chain attacks may become a painful Achilles heel for cybersecurity if organizations continue to overlook them.

Windows 10 Support: What You Need to Know

Windows 10 Support: What You Need to Know Windows 10 is approaching its end of support, with the final update set for October 14th. Users can access extended security updates for three years via an annual subscription, which requires a key for installation. Ivanti will also offer support for these updates, providing an add-on license for existing users. It's recommended to plan for the initial updates, which will start in November.

Enhancing Service Request Workflows with Automation for ITSM and Neurons

Enhancing Service Request Workflows with Automation, ITSM, ITAM and LOB 2025 Neuron spots integration updates improve service request workflows by enabling automation through bots. Users can now utilize a self-service UI to request software distribution by selecting devices and submitting requests. The workflow includes approvals and other steps, focusing on software distribution. A dedicated bot automates application distribution, triggered by service requests, showcasing the broader potential of automation bots.