Operations | Monitoring | ITSM | DevOps | Cloud

No One Likes Passwords and They are the Leading Cause of Data Breaches

Did you hear about the latest data breach caused by a stolen password? Technically, it was a user account security token used by the malicious cyber threat actors to gain initial access into the company’s chat workspace. Once on the IT chat channel, the threat actors impersonated an employee and then used a simple social engineering tactic to trick an IT support member into providing them with a long-lived login access token onto the corporate network.

Service Management: Firefighting and Fire Prevention

In the face of major disruptive change, the organizations that succeed are those that do more than just react to new circumstances. They evolve. When it comes to addressing the unprecedented challenges that have emerged in 2020 and 2021, the most successful IT teams have risen and will continue to rise to the occasion by recognizing the need for a proactive approach to the waves of disruption.

Wall Street Journal Predicts Dire Cybersecurity Days Ahead, Endorses Zero Trust

Let’s be honest for a second. This is a corporate blog. Yes, we aim to provide our readers with actionable, educational information. And, yes, we strive for complete transparency. But, at the end of the day, we understand if you’re skeptical of some of what’s written here. We’re a business, not a news publication, and it’s impossible for us to be completely unbiased all the time.

Splunk Connector for Ivanti Device Control - Now Available!

Ivanti Device Control is all about securing your endpoints while also providing a detailed overview to quickly identify weak links in your environment. The latter has now become much simpler and quicker to perform! Our new Splunk connector enables you to connect directly to your Ivanti Device Control environment, feeding in all reported events and showing you the most important data in a single dashboard.

Quick Demo: A Day in the Life of a Remote Knowledge Worker

Do you make it a habit of connecting to the free Wi-Fi network at the coffee shop, restaurant, hotel, airport or even in-flight on the airplane to save on your cellular data minutes? Watch this short 2-minute video to see what happens if you connect to a wireless network with a malicious cyber threat actor performing Man-in-The-Middle (MiTM) attacks to unsuspecting victims.

Forrester Research: The Future of Technology Operations

Recently, we had the opportunity to hear from Charlie Betz of Forrester Research about the future of technology operations. He covered the shift from project-based work to product team orientation, the integration between DevOps and IT services and the ways in which the entire enterprise is getting value from investments in artificial intelligence. Check out some of the interesting questions and answers from the discussion and be sure to catch the full conversation in the video below.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 2 of 2

As mentioned in Part 1 of this blog series, IT Service Management (ITSM) and IT Asset Management (ITAM) make a great combo to support IT’s overall plan to maximize operational efficiencies and improve service delivery experiences, while also optimizing compliance and cost. This post discusses the remaining three use-case examples: 3) Tackle Problem Assets with Proactive Management; 4) Effective Change Management; and 5) Complete Lifecycle Visibility.

No pants, no problem: Employees Report More Work Yet More Satisfaction in the Everywhere Workplace

“We want to work remotely.” That’s the major takeaway from Ivanti’s just-released survey on the Everywhere Workplace. Nearly 2,000 consumers across the U.S. and U.K. responded. While most of them were abruptly shifted into remote work due to circumstances outside their control – and those circumstances were scary and confusing – there has been a silver lining. They’re happier at home.

ITSM and ITAM: Great Together, Like Peanut Butter and Chocolate or Gin and Tonic Pt. 1 of 2

Actor 1: “Hey, you got peanut butter on my chocolate.” Actor 2: “Well you got chocolate in my peanut butter.” This 1970’s ad campaign of “Two Great Tastes that Taste Great Together” put Reese’s Peanut Butter Cups on the map. Know what else makes a great combo? IT Service Management (ITSM) and IT Asset Management (ITAM).