Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Expand your ITSM: Key learnings for building connected enterprise workflows

After several years of increasing tech stack complexity, the pendulum is finally swinging back towards simplifying the IT landscape - and the best place to start is with the low-hanging fruit. A natural consideration for IT teams is extending ITSM to support the broader organization. But consolidating tools and connecting enterprise workflows doesn't come without its challenges.

Tech Confessions - Ancient Artifacts

What was the ANCIENT SECRET hidden within one company’s IT estate? In this Tech Confession, hear how an entire payroll system was at the mercy of one admin’s “voodoo” techniques to provide payment via seriously antiquated hardware and software. What were the risks? Keeping the system cranking was a ticklish proposition: Accidentally running an OS update once put the productivity of the whole organization at risk. That was just one of the hazards of running a key process on a hidden device that was invisible to the network.

Work From Home Winning Top-Tier Talent

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

Tech Confessions - ET, Phone Home | Crazy IT Asset Discovery Stories

See the OUT-OF-THIS-WORLD reason why one company’s software was “running like a dog.” And how to control your IT estate before it controls you. All it takes is one person abusing your systems, or one unsecured endpoint, to create risk and bottlenecks for everyone. In the era of Everywhere Work, it’s vital to have total visibility into every corner of your IT estate so you can identify risk, correct inefficiencies, control costs and maximize performance.

Tech Confessions - Attack of the Toasters | Crazy IT Asset Discovery Stories

Watch this JAW-DROPPING story about how unknown devices nearly provoked a panic for one IT team in the defense industry. They nearly shut down their entire network after receiving an alert about mystery endpoints they couldn’t identify. The lesson to be learned? You can't afford to miss ANY device on your network if you’re hoping to keep your IT estate safe and secure. Before you raise alarm bells, find what’s hidden on your network with Ivanti Neurons for Discovery.

Tech Confessions - The Paper Trail | Crazy IT Asset Discovery Stories

WHY was there a HIDDEN PRINTER underneath one executive assistant’s desk? Watch this Tech Confession video to learn why and how employees’ ghost assets might put a company at serious productivity loss and compliance risk! When an executive assistant was asked by her boss to print out all his emails, she unwittingly created headaches for her IT team. Why? Because they had to wade through reams of (personal) messages to see if company secrets were being exposed.

There's a Bot for That

Ivanti Neurons Bots provides powerful hyper-automation capabilities for IT departments, and with a no-code/low-code interface and rich out-of-the-box content, organizations can start solving many challenges across the IT landscape in minutes. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

AI vs. AI: The Future of Cyber Security Podcast Ep. 14

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.