Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti

Employee Performance Management and Remote Work

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

How Cloud Migration Helps Improve Employee Experience

The old saying goes, “practice what you preach.” When Ivanti started its "Customer Zero" initiative, Bob Grazioli, Chief Information Officer, saw it as a perfect opportunity to test the products and services consumed by customers. For example, during Ivanti’s move to the cloud, Grazioli and the team experienced the same issues that customers would’ve experienced in their migration process. This first-hand experience allowed them to make improvements along the way.

Expand your ITSM: Key learnings for building connected enterprise workflows

After several years of increasing tech stack complexity, the pendulum is finally swinging back towards simplifying the IT landscape - and the best place to start is with the low-hanging fruit. A natural consideration for IT teams is extending ITSM to support the broader organization. But consolidating tools and connecting enterprise workflows doesn't come without its challenges.

How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities

The security of your organization’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations. Ensuring compliance requires you to know what’s on your network. But how can that be done when only 48% of leaders and security professionals say they run their asset discovery program at least once per week?

Tech Confessions - Ancient Artifacts

What was the ANCIENT SECRET hidden within one company’s IT estate? In this Tech Confession, hear how an entire payroll system was at the mercy of one admin’s “voodoo” techniques to provide payment via seriously antiquated hardware and software. What were the risks? Keeping the system cranking was a ticklish proposition: Accidentally running an OS update once put the productivity of the whole organization at risk. That was just one of the hazards of running a key process on a hidden device that was invisible to the network.

Work From Home Winning Top-Tier Talent

Watch the full clip here. Ivanti’s research into remote work trends found that while 43% of office workers are allowed to work flexibly, 71% say they want to. Why is that 28-point preference gap still with us even after several years of widespread – and widely successful – remote and hybrid work? What barriers are keeping leaders from chipping away at that preference gap, and why should they?

Tech Confessions - ET, Phone Home | Crazy IT Asset Discovery Stories

See the OUT-OF-THIS-WORLD reason why one company’s software was “running like a dog.” And how to control your IT estate before it controls you. All it takes is one person abusing your systems, or one unsecured endpoint, to create risk and bottlenecks for everyone. In the era of Everywhere Work, it’s vital to have total visibility into every corner of your IT estate so you can identify risk, correct inefficiencies, control costs and maximize performance.

The 8 Best Practices for Reducing Your Organization's Attack Surface

Increases in attack surface size lead to increased cybersecurity risk. Thus, logically, decreases in attack surface size lead to decreased cybersecurity risk. While some attack surface management solutions offer remediation capabilities that aid in this effort, remediation is reactive. As with all things related to security and risk management, being proactive is preferred. The good news is that ASM solutions aren't the only weapons security teams have in the attack surface fight.

How Implementing Risk-Based Patch Management Prioritizes Active Exploits

Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organizations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong. The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities. Risk-based patch management is the answer to this issue.

How Generative AI Can Benefit Your Knowledge Management

There has been growing interest in the capabilities of generative AI since the release of tools like ChatGPT, Google Bard, Amazon Large Language Models and Microsoft Bing. With the hype comes concerns about privacy, PII, security and, even more importantly, accuracy. And rightly so. Organizations are treading cautiously with their acceptance of generative AI tools, despite seeing them as a game changer.