Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti

I've Been Everywhere, and the Risks it Can Bring to your Workplace

The song “I’ve Been Everywhere” was written by an Australian country singer, Geoff Mack, back in 1959, where he sang about all the towns he visited across Australia. It became famous in the US in 1962 by the country singer Hank Snow where the song hit number one. He of course did make some changes as the names of the towns were now all based in the US. And since then, many versions have been created. You will by now be wondering what has this to do with an Ivanti blog?

A New Kind of Employee Experience

When you read the phrase “employee experience” (or even just good-old “user experience”), what comes to mind? One of the first things most of us think about, at least in an IT setting, is probably a system’s user interface. How hard or easy is the software to use? How intuitive is it? How appealing is its design? These are important considerations, but a good experience requires more than a good interface.

New report: Ransomware continues to rise. Here's how to get ahead of it.

Ransomware experienced a stunning surge in prevalence and sophistication throughout the pandemic. Threat actors capitalized on a frequently shaky transition to a remote, digital business landscape. With so many businesses prioritizing basic functionality over proactive security, vulnerabilities have been unprecedented – and very much exploited.

Remote Work is Here to Stay. Learn How Ivanti Can Help Take the Pain Out of It.

Today many enterprise businesses suffer from security attacks but don’t understand how to protect their applications from being exposed. The most common attacks today are simple to execute such as a SQL injection, network Distributed Denial of Service (DDoS), Cross Side Scripting (XSS) and more. These are common attacks that can be mitigated by setting up a security framework to protect enterprise assets.

Don't Let Cybersecurity Threat Actors Ruin Your Halloween!

It’s the scariest time of year. But forget about ghosts and goblins and zombies. If you really want to be as scary as possible this spooky season, we know exactly what your costume should be and how you should decorate your yard. Here are some hints: What are they? Cybersecurity threat actors. *Cue terrifying music.* Before you roll your eyes, stick with us. This is worth a quick read.

Co-Existence: Using Legacy VPN with Neurons for Zero Trust Access through the Neurons for Secure Access Platform

There are three aspects of co-existence to discuss. The gateway deployment co-existence, the end user workflow co-existence, and the administrative management co-existence. We will walk through all three of these aspects.

App Control for Linux Opens Up a Whole New World

Ivanti Application Control is known for enabling IT control over endpoints, reducing security risk, and providing a great user experience. Up to now, that experience has always been for users of Windows environments. But with the introduction of Ivanti App Control for Linux, we are opening up a whole new world of possibilities. Ivanti Application Control for Linux brings the major benefits of App Control for Windows to Linux environments.

Ivanti Desktop and Service Management 2021.1 is Now Available!

The new major release of Ivanti Desktop & Server Management (DSM) is now available! This release focuses on more cloud functionality and therefore moves DSM to the future. We have greatly enhanced the DSM connector for Ivanti Neurons to use the collected DSM data directly in Ivanti Neurons for Patch Intelligence. This will allow you to have a much better overview of your environment from the security side.

Ivanti Endpoint Security Now Integrates with Ivanti Neurons for Patch Intelligence!

It does this by delivering automated insight into your risk exposure and helps you to prioritize, based on adversarial risk. In particular, it provides real-time intelligence on vulnerability exploits that are actively trending in the wild, and those that have ties to ransomware.. Ivanti Neurons for Patch Intelligence combines this risk-based prioritization with patch reliability data to help you focus your testing efforts and reduce the overall time to patch.

Introducing Neurons For Secure Access - Saving Time While Providing Unified Visibility and Management For Distributed Ivanti Connect Secure Deployments

Where were you when VPN went from "nice to have for IT staff to remote in on the weekends" to "mission critical for the entire organization" almost overnight in March of 2020? Many companies were caught off-guard, with admins across the country taking a mad scramble to make sure their VPN solution is modern, sized to fit the demands of the remote workforce, and secure for their users.