Operations | Monitoring | ITSM | DevOps | Cloud

The Evolution of Security Tools at Microsoft

The Evolution of Security Tools at Microsoft The development of security tools like MBSA and HF Net Check Pro addresses the need for effective network-wide security scanning. Microsoft created internal tools to manage vulnerabilities and transitioned to XML for scalability. The rise of malware threats increased the urgency for patch management, leading to the distribution of tools and best practices on CDs. This narrative highlights the shift from physical media to digital formats in update distribution.

Attack Surface Visibility: Research Uncovers Critical Security Blind Spots

You can’t fix what you don’t know is broken. Proactive attack surface management begins with total attack surface visibility, but persistent cybersecurity data blind spots leave organizations vulnerable. Ivanti’s 2025 State of Cybersecurity Report finds that siloed and inaccessible data limits visibility into threats and impedes security efforts and response times.

A Guide to Apple Declarative Device Management for Enterprises

Apple declarative management introduces a shift from the traditional command-based model to a more autonomous and flexible framework. This approach aims to improve the efficiency and responsiveness of managing Apple devices. The components of Apple declarative management — declarations, assets, predicates and status channels — work together to create a more efficient, scalable and responsive MDM framework.

Revolutionizing User Experience with Agentic AI

Revolutionizing User Experience with Agentic AI Agentic AI integration creates prompt-driven interfaces that simplify access to information and ticketing for users. AI incident correlation reduces service downtime, boosting productivity. Ring deployment automates patch management for controlled updates, while lifecycle management of gateways enhances security. Autonomous endpoint management tackles time and data challenges, leading to more efficient operations. The focus is on leveraging technology to innovate and optimize resources.

Swivel-Chair Syndrome Got You Down? Cure It With Ivanti

Swivel-Chair Syndrome Got You Down? Cure It With Ivanti IT professionals know the pain of juggling multiple tools to get a single job done. Streamline your IT operations with Ivanti and eliminate the hassle of swivel-chair syndrome once and for all. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

How to define and measure risk tolerance, Mike Riemer, Field CISO, Ivanti

Ivanti research shows that a large majority of companies (83%) report they have a framework for defining risk tolerance. However, 51% say they do not follow their existing risk tolerance framework. Why is this such a challenge? In this video, Ivanti cybersecurity expert, Mike Riemer addresses the significant challenges security professionals face when measuring and managing risk exposure and offers strategies for cybersecurity teams to develop and follow an organization risk tolerance framework.

Convert security data into insights, Daren Goeson SVP Product Management, SUEM, Ivanti

In today's digital landscape, data is the lifeblood of any organization. However, Ivanti’s new research report, Exposure Management: Transforming Cybersecurity from Subjective to Objective: (ivanti.com/proactive-security) finds that modern enterprises are data-rich but information-poor. So how can data standardization in cybersecurity help organizations break down data silos, improve data quality and ultimately enhance their security posture?