Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Practical Demo How Ivanti Maps to CIS Controls Version 8 #ivanti

The webinar introduces the Center for Internet Security (CIS) and its mission, focusing on how Ivanti solutions map to CIS controls. Demonstrations include Ivanti Neurons for External Attack Surface Management, Risk-Based Vulnerability Management, Patch Management, and Incident Response Management. The session also clarifies Ivanti's non-affiliation with CIS, the difference between VRS and VRR, and the integration of EASM with other Neurons products.

Introducing the Ivanti Marketplace: A Platform for Evolving Business Needs

The Ivanti Marketplace, a platform tailored to meet changing business requirements. It boasts a user-friendly interface, handpicked solutions, and self-service features. Ivanti's partners contribute unique solutions to enhance Ivanti's product range. The marketplace showcases numerous solutions categorized with comprehensive descriptions and cross-referencing. Ivanti is dedicated to providing powerful solutions and empowering customers in the everywhere work era.

Introduction to RBVM: A Solution for Vulnerability Management at Ivanti #ivanti

Derek Illum presents the RBVM solution for vulnerability management at Ivanti, detailing its functionality, benefits, and related statistics. The process involves data collection, automation, and integration with other tools. The tool, hosted in the AWS gov cloud, integrates with various systems, including Microsoft Defender for endpoint. Users can explore RBVM, focus on a risk-based approach, and utilize its dashboards and SLA management features.

CSM to ITSM Migration: A Panel Discussion #ITSM #ITSolutions

Three Ivanti customers at various stages of migration – Maxar's Allison Hull, Fareway Stores' Steve Clime, and Memorial Health Ohio's Barbara Munger – give their firsthand perspectives on a successful journey from Cherwell Service Management to Ivanti Neurons for ITSM. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Your BYOD Policy: Key Considerations, Daren Goeson, SVP Product Management, SUEM

See more insights into creating effective and secure BYOD policies in Ivanti’s research report: Secure Unified Endpoint Management. Daren Goeson, SVP Product Management, SUEM at Ivanti explores the essential factors organizations should consider when creating Bring Your Own Device (BYOD) policies and protocols. From use cases to data management, device compatibility to security implications, this video provides valuable insights to help organizations develop effective BYOD strategies.

Priorities for Exposure Management, Chris Goettl, VP Security Product Management, Ivanti

See more insights into exposure management strategy and IT/security alignment in Ivanti’s research report: Secure Unified Endpoint Management. Chris Goettl, Ivanti's VP of Security Product Management shares best practices for secure unified endpoint management and explains why organizations should focus on exposure management to effectively mitigate risks.

Ivanti employees earn 2024 Simpplr award for Most Creative Use of Intranet

Description update: Our highly engaged employees and connected culture earned us the Best of Simpplr 2024 Award! After a spirited competition driven by weekly team challenges curated on our Simpplr-based intranet platform, we crowned three employee champions. Hear what they have to say about this outstanding recognition. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

Data: Your Common Denominator feat. Srinivas Mukkamala, CPO, Ivanti #ivanti

Get the latest research on endpoint management and endpoint security best practices in Ivanti’s research report: Secure Unified Endpoint Management. Data silos and misaligned priorities stand in the way of IT and security teams’ ability to be efficient and innovative according to Srinivas Mukkamala, Chief Product Officer at Ivanti.

2024 Security Report - Ravi Iyer #shorts

Are executives truly bought into cybersecurity? Ivanti CTO Ravi Iyer cites Ivanti’s latest cybersecurity research showing that there is stronger investment than ever in cybersecurity at the executive and board level. Iyer also breaks down the key cybersecurity concepts today’s executives should prioritize to gain a competitive edge.

UEM and Security Are Converging: Now What? #goivanti #webinar

Paul Troisi and Dan Lutter delve into the challenges and trends in the modern workplace, emphasizing the necessity for IT and security operations to unite against increasing cybersecurity threats. They underscore the importance of effective communication, collaboration, and education for a robust security posture, and the role of asset management in maintaining visibility and control over devices and data. The discussion concludes with a look at future trends, including the influence of AI and the need for continuous adaptation to new threats.