Operations | Monitoring | ITSM | DevOps | Cloud

Mobile Devices are Ubiquitous, and so are Cyberattacks

We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities. We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives.

The Future of Technology Operations with Charlie Betz of Forrester Research

Recently, we had the opportunity to hear from Charlie Betz of Forrester Research about the future of technology operations. He covered the shift from project-based work to product team orientation, the integration between DevOps and IT services and the ways in which the entire enterprise is getting value from investments in artificial intelligence. Check out some of the interesting questions and answers from the discussion and be sure to catch the full conversation in the video below.

Vaccinating Against the Ransomware Pandemic

Just as our physical world has suffered from a devastating health pandemic, over the last 3 years the digital world has been suffering a ransomware pandemic that grew 7 times in 2020 compared to the same time in 2019. While we have vaccines for our health crisis what are our options to help protect us against this digital threat?

MobileIron, Acquired by Ivanti, Named "Best Solution Partner" by Deutsche Telekom

Industry recognition is always something to strive for, but when the recognition comes from a trusted partner then it means even more. At Ivanti, we’re proud to be recognized by longstanding partner, Deutsche Telekom, as a “Best Solution Partner” of the year. This was the first year that the award was handed down and represents the deep commitment to partnership and execution.

Beware of QR Code Security Risks Lurking in User Mobile Devices

QR codes, those touch-free codes that look like square puzzles or mazes, seem to be everywhere these days. Gaining in popularity over the past few years, their proliferation has exploded with the onset of COVID-19 precautions. These wonder-codes make it easy for our mobile devices to quickly scan a menu, pay a bill, and find information about a product or service. QR codes blend the physical world with the virtual.

To be or not to be? To do - or not to do - an ELP?

Before I start my ramble here, let me tell you something... the day I learned how to construct a manual Effective License Position (ELP) in Excel my life gained a new purpose, and it became the biggest hobby, sport and passion ever! Those who have done manual ELPs in Excel will know that magic feeling! First, it’s hard as you scramble for the data and licensing knowledge, but if you’re lucky enough and at least get some vendor report or purchase summary, it's a good starting point...

The Global Pandemic Has Led to Unprecedented QR Code Security Challenges

Over the past year, we have witnessed remarkable changes brought on by our response to a global pandemic. Along with accelerated digital transformation and the consumerization of technology, Covid-19 has birthed the everywhere workplace, where users work with any device, to connect to business-critical systems and applications. Work has become something you do rather than a place you go.

Patch Management is Integral for Mature Risk-based Prioritization

The term ‘patch’ triggers many familiar images – affixing a rubber patch to a blown bike tire, the ubiquitous duct tape repairs of myriad objects, and so on. While these temporary fixes won’t heal the underlying cause, they are a quick and easy solution. Our applications and software frequently need patches as well, to fix bugs, security flaws and add feature enhancements. However, in this case, patching is not a temporary band-aid, but rather a proactive planned strategy.