Hi [[ session.user.profile.firstName ]]

Ivanti

  • Date
  • Rating
  • Views
  • Actionable Steps to Elevating your IT Service Management
    Actionable Steps to Elevating your IT Service Management
    Kevin J Smith, Senior Vice President at Ivanti & David Martinez, Sr. Product Marketing Manager at Ivanti Recorded: Nov 15 2018 60 mins
    Every organization goes through a process of improving its operation. Despite this, many ITSM projects fail to deliver the level of effectiveness and the value promised. You have to ask why do so many ITSM projects fail to deliver the value IT teams know they can realize?

    Join this session to learn:

    • The approach and organizational capabilities required to continually increase ITSM efficiency and effectiveness
    • The building blocks to create institutional processes and a culture of shared learning and accountability needed to deliver optimized ITSM that delivers more value to the business
  • Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Phil Richards, CISO and Leslie Bonsteel, Senior Director, Marketing Recorded: Nov 15 2018 57 mins
    As companies become increasingly sophisticated in tracking private data, customer sensitivity and government oversight requires that they improve privacy protection and monitoring standards. This interactive conversation with Ivanti CISO Phil Richards will cover topics such as:

    - How to recognize, control, and protect personal data
    - The importance of asset discovery in your privacy program
    - Workflows for managing transactions involving private data
    - Educating other departments on their role in privacy protection
    - The importance of control frameworks for protecting private data
  • November Patch Tuesday Analysis
    November Patch Tuesday Analysis
    Chris Goettl, Todd Schell, Brian Secrist Recorded: Nov 15 2018 60 mins
    Each year in the states we fight to give our intrepid Thanksgiving holiday breathing room between Halloween and the impending onslaught of the Christmas season. So, as “Turkey Day” approaches for Ivanti’s Patch Tuesday team, we’ll take a quick moment now to give thanks for the latest updates that keep us employed. November Patch Tuesday offers up a bountiful selection of CVEs, including 60+ vulnerabilities resolved by Microsoft, Apache updates thrown in to add a pinch of third-party flavor to the affair, and in this mix a zero day and a dash of public disclosures. Take note, though: Like the turkey that will be front and center on our tables in a matter of days, all Patch Tuesday eyes should focus first on the Windows OS and Edge updates.
  • How to Stay on Top of Users’ Identities and their Access Rights
    How to Stay on Top of Users’ Identities and their Access Rights
    Dave Bryant, Product Management Director, Ivanti Recorded: Nov 14 2018 53 mins
    With the widespread adoption of cloud services and mobile devices, today’s modern IT environment has experienced rapid change. Your users now need access to dozens of applications to do their jobs from day one. Onboarding users has become more complex and time-consuming for IT, especially if undertaken manually. And when users leave or change roles, deprovisioning access to applications is often last on the list of tasks or slips through cracks completely.

    How do you give an increasingly diverse and mobile group of users, access to the applications they need and stop them circumnavigating IT to get what they want? To keep your users productive, the best solution is a policy-driven identity and access management (IAM) system to ensure they are accurately identified from day one and to automatically remove access when a user leaves. By providing access to only the systems, applications and data your users need you also reduce the attack vector, common when users have more entitlement than required.

    Join Dave Bryant, product management director for Ivanti Identity Director, in this introductory webcast to understand:

    • Why it’s important to adopt an identity-based approach to control user access to systems
    • How automated onboarding and offboarding can improve productivity
    • What are the key components you need in a scalable IAM solution?
  • Contextual Security and Application Control for Virtualized Desktops
    Contextual Security and Application Control for Virtualized Desktops
    Jens Schmidt, Tim Cook Recorded: Oct 30 2018 55 mins
    Daas and VDI continue to provide anwhere, secure access from any device to corporate workspaces. As the user is more mobile than ever before, security, compliance, and licensing requirements demand additional contextual control over virtual applications and desktops. Join this webinar to see how Ivanti and Device Trust can help.
  • Insights into Windows 10 in the Enterprise (October)
    Insights into Windows 10 in the Enterprise (October)
    Rex McMillan, Adam Smith, Recorded: Oct 24 2018 58 mins
    New bi-monthly webinar series offering updates from Windows experts from Ivanti, professional service providers, and your peers from companies like yours. This webinar will feature short, helpful sections including:
    -Insider preview
    -Outside insights
    -Migration tips
    -Best Practices
    -Just Ask Rex
  • There's more to third-party patching than SCCM 1806
    There's more to third-party patching than SCCM 1806
    Chris Goettl Recorded: Oct 18 2018 56 mins
    Given the new Third-Party Updates feature in Microsoft SCCM 1806, our Ivanti security experts are excited to share with you how Ivanti Patch for SCCM will continue to enhance your SCCM solution. With our plug-in, you can more easily patch third-party apps from the SCCM console with no additional infrastructure or training. For example:
    -SCCM 1806 requires that you subscribe to each catalog from each vendor. If there are any issues, you must go back to that vendor for support. Patch for SCCM consolidates all supported vendors and gives you one point of contact for automated patching information.
    -SCCM 1806 has a limited number of vendor catalogs, and each vendor must create its catalog specifically for 1806. Patch for SCCM makes available catalogs from a large number of vendors, and Ivanti adds additional vendors to address customer feedback and market demand. Our new Patch for SCCM release, due out this month, can read in vulnerability scan results from any vendor, view the identified Common Vulnerabilities and Exposures (CVEs) and associated patches, and publish any missing patches to the update server for deployment.
  • The RES Acquisition, One Year Later: A New Introduction to Ivanti Unified IT Sol
    The RES Acquisition, One Year Later: A New Introduction to Ivanti Unified IT Sol
    Steve Morton, Bob Janssen Recorded: Oct 17 2018 44 mins
    It’s been just over a year since Ivanti acquired RES. We’ve enjoyed getting to know so many of you as new members of the Ivanti family. In this special webinar we will discuss the steps we’ve taken to integrate the RES products into the Ivanti portfolio and we’ll introduce you to all Ivanti has to offer. Did you know, for example, that many RES customers have combined RES automation with Ivanti ITSM to transform their IT organization? Or that they are now using Ivanti Patching products to keep their company safe.
    Join Ivanti CMO, Steve Morton, and RES founder and Ivanti Chief Technology Innovation Officer, Bob Janssen, as they discuss the acquisition, answer your questions, and more.
  • The Ivanti ELA: 10 Frequently Asked Questions Answered
    The Ivanti ELA: 10 Frequently Asked Questions Answered
    Duane Newman, Steve Morton Recorded: Oct 4 2018 39 mins
    We launched our new Enterprise License Agreement in January in an effort to Unify IT. The concept is simple: we have 5 major product lines (Operational Security, UEM, IT Asset Management, ITSM, and Identity), and we want you to own them all for one price. Our product team rolled out Unified IT ELA in January. Since then we’ve sold….a ton of it. And we’ve also received a lot of questions about it.
    "In this webinar we’ll address the 10 most commonly asked questions we’ve received about the ELA AND take your questions on the webinar. Join Duane Newman, our VP of Product Management on this very special webinar to ask anything and everything about the ELA and Ivanti’s products.
  • Learning from SamSam Attacks: 5 Steps to Securing Healthcare IT
    Learning from SamSam Attacks: 5 Steps to Securing Healthcare IT
    Chris Goettl, John Rush Recorded: Sep 20 2018 60 mins
    The City of Atlanta was rocked by cybercriminals that locked up critical systems and applications earlier this year. Now, these paralyzing SamSam attacks are targeting the healthcare sector. Just in the last month, 7,000 of LabCorp’s systems were impacted in 50 minutes by a brute force attack. With this target on IT’s back, healthcare organizations must find ways to better secure their environments, and quickly. Join Ivanti’s Chris Goettl, Director of Product Management for Security, and John Rush, Senior Systems Engineer, as they talk taking security to a new level for healthcare IT in just five steps.
    Get insights from recent cyber threats now targeting healthcare, learn why a handful of solutions can protect against up to 95% of cyberattacks

Embed in website or blog