Operations | Monitoring | ITSM | DevOps | Cloud

Tech Confessions - ET, Phone Home | Crazy IT Asset Discovery Stories

See the OUT-OF-THIS-WORLD reason why one company’s software was “running like a dog.” And how to control your IT estate before it controls you. All it takes is one person abusing your systems, or one unsecured endpoint, to create risk and bottlenecks for everyone. In the era of Everywhere Work, it’s vital to have total visibility into every corner of your IT estate so you can identify risk, correct inefficiencies, control costs and maximize performance.

Tech Confessions - Attack of the Toasters | Crazy IT Asset Discovery Stories

Watch this JAW-DROPPING story about how unknown devices nearly provoked a panic for one IT team in the defense industry. They nearly shut down their entire network after receiving an alert about mystery endpoints they couldn’t identify. The lesson to be learned? You can't afford to miss ANY device on your network if you’re hoping to keep your IT estate safe and secure. Before you raise alarm bells, find what’s hidden on your network with Ivanti Neurons for Discovery.

Tech Confessions - The Paper Trail | Crazy IT Asset Discovery Stories

WHY was there a HIDDEN PRINTER underneath one executive assistant’s desk? Watch this Tech Confession video to learn why and how employees’ ghost assets might put a company at serious productivity loss and compliance risk! When an executive assistant was asked by her boss to print out all his emails, she unwittingly created headaches for her IT team. Why? Because they had to wade through reams of (personal) messages to see if company secrets were being exposed.

There's a Bot for That

Ivanti Neurons Bots provides powerful hyper-automation capabilities for IT departments, and with a no-code/low-code interface and rich out-of-the-box content, organizations can start solving many challenges across the IT landscape in minutes. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

AI vs. AI: The Future of Cyber Security Podcast Ep. 14

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

A CIOs Perspective on ITSM

In this video, Bob Grazioli, Ivanti’s Chief Information Officer, explains how Ivanti's ITSM environment has been expanded to include lines of business workflows and security. You’ll also learn how ITSM can accumulate vulnerabilities in tickets during the build process, allowing for insights into the severity of the tickets and for secure deployments into the operating environment.

How to Use Service Tickets to Improve Your Digital Employee Experience

What can you expect when you shift ITSM to the rest of your organization? Watch Bob Grazioli, Ivanti's Chief Information Officer, break it down in this video. Explore how the move from on-prem to the cloud has driven improvements in the employee experience and IT efficiency at Ivanti.

How to overcome obstacles on your Enterprise Service Management (ESM) journey

Expanding ITSM beyond IT isn’t a walk in the park. There are countless roadblocks that you’ll need to overcome. Phil Bowermaster, Director of Solutions Marketing at Ivanti, and Mark Temple, Assistant Director for Service Management at the University of Glasgow, share their experiences and give advice on how to make your ESM initiative a successful one.

How to implement Enterprise Service Management (ESM) at your organization

ESM applications are growing in prominence. So, what’s the best way to implement it at your organization? In this video, Ivanti’s Phil Bowermaster and Mark Temple from University of Glasgow dive into the easiest way to start and expand that ITSM environment to manage non-service workflows.