Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti Device Control 5.4 is Now Available!

It's time to talk about a new amazing number (a number I'm very proud of) - the number 10. '10' is not the new version number of Ivanti Device & Application Control - 10 is the number of new features and functionality that we have delivered with our latest product release! We have used all of your valuable feedback to create an even more valuable version of Ivanti Device and Application Control with release 5.4.

Cybersecurity Awareness Month - It's Not Just for October: Reminders that Deserve Year-Round Attention!

Since 2003, with the sponsorship of the U.S. Department of Homeland Security (DHS), October has been recognized as National Cyber Security Awareness Month. As with other important issues that have “designated months,” like Bullying Prevention Month and Domestic Violence Awareness Month (both also recognized in October), these are issues that deserve year-round attention, not limited to 31 days in October.

Why Your Enterprise Needs a GRC Solution

It’s a fact of life, enterprises are facing a growing onslaught of risk every day. Risk is everywhere, from the most visible ransomware attacks to the more subtle changing and growing technology landscape that introduces new challenges. According to a recent article, ransomware attacks have already increased by over 93% since the beginning of 2021.

A Candid Conversation about a Career in Cybersecurity: Q&A with Daniel Spicer

This week is Cybersecurity Career Awareness Week, which is part of October’s Cybersecurity Awareness Month. We sat down with Daniel Spicer, chief security officer at Ivanti, to learn more about what it’s like to work in the cybersecurity world.

Stop the Chase: How Ivanti is Transforming Cybersecurity in the Everywhere Workplace

Threat actors have been a constant, persistent, and ever-evolving part of doing business in a digital world. For the entire history of digital business, security teams have been trying to keep pace with the threats. On a good day, they might be able to get a few steps ahead. But it’s always a chase. And it only takes falling behind one time to lose big.

A 'Friendly Ghost' Fixes IT Issues Before You Notice

Here in North America it’s that spooky time of the year again, Halloween. As always, children look forward to this late-October holiday, the chance to dress up in costumes to go door-to-door and amass large hauls of candy treats, leaving their parents to deal with any later ‘tricks’ from associated sugar highs.

Quick Demo: Android 12 Anti-Phishing Protection

This month is Cybersecurity Awareness Month and at Ivanti we want you to be #BeCyberSmart. We’re focusing on this week’s theme of phishing. In this short video, James Saturnio, Senior Lead Technical Market Advisor at Ivanti, shows the power of Ivanti’s Mobile Threat Defense (MTD) multiple-layered anti-phishing protection to block 10 random phishing URLs from the OpenPhish feed.

Be a Cyber Defender and Protect Your Mobile Devices!

Like zero trust security, being a cyber defender is a personal mindset. One can argue that it might be a form of paranoia, but being situationally aware while connected online is a nice behavioral attribute to have given today’s internet climate with the barrage of news regarding ransomware and data breaches.

Ivanti Insights Podcast: Big Cybersecurity News

We’re back with another episode of Ivanti Insights where I spoke with Chris Goettl, VP of Product Management. This week we talked about some of the news making the biggest headlines in cybersecurity. Topics included the recent critical flaw found in Apple devices, how hackers are using remote code execution to mine for cryptocurrency, and how the SolarWinds hackers may be making a comeback.

3Ps of Security: Protect, Prioritize and Patch

Like a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital assets and data of a business. The other: managing the security risk and vulnerability exposure of these environments and endpoints. The tension between these two lineups keep security and IT very busy. There is a critical shortage of expert security professionals, which means no expanding the bench of talent, even if you can afford it.