<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/aruna-kureti/rss" /><link>https://www.ivanti.com/blog/authors/aruna-kureti</link><item><guid isPermaLink="false">2407256b-094c-45de-a2b1-309ed2f901cf</guid><link>https://www.ivanti.com/blog/how-ai-automation-improve-endpoint-visibility</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><title>Inventory to Intelligence: How AI and Automation Improve Endpoint Visibility</title><description>&lt;p&gt;Endpoint visibility has always been foundational to IT and security. You&amp;nbsp;can’t&amp;nbsp;secure,&amp;nbsp;patch&amp;nbsp;or&amp;nbsp;support what you&amp;nbsp;can’t&amp;nbsp;see.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But as environments have become more distributed and complex, what visibility means has evolved. It’s no longer enough to know that a device exists — IT teams and organizations as a whole need to understand its health, its&amp;nbsp;risk&amp;nbsp;posture&amp;nbsp;and&amp;nbsp;its impact on both security and user experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;AI and endpoint automation&lt;/a&gt;&amp;nbsp;start to make a practical difference. By moving endpoint visibility from static inventory to continuous intelligence, organizations can shift from reactive discovery to proactive, even autonomous operations.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why traditional discovery practices fall short&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Traditional discovery practices were built for&amp;nbsp;a very different&amp;nbsp;IT reality. Their approach is designed for relatively static environments, clearly defined&amp;nbsp;perimeters&amp;nbsp;and&amp;nbsp;manual processes. That strategy&amp;nbsp;doesn’t&amp;nbsp;scale well in today’s hybrid, cloud-first world.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Manual discovery workflows often produce incomplete or outdated inventories. Ivanti’s 2026&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management Advantage Report&lt;/a&gt;&amp;nbsp;reinforces this reality:&amp;nbsp;Only&amp;nbsp;52% of organizations report using&amp;nbsp;an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;endpoint management solution&lt;/a&gt;&amp;nbsp;today, leaving many environments with limited centralized visibility and persistent blind spots across unmanaged or shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In practice, this fragmentation shows up in&amp;nbsp;very familiar&amp;nbsp;ways. Teams often juggle multiple inventories, one from an on-prem client management tool, another from an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;MDM platform&lt;/a&gt;&amp;nbsp;and&amp;nbsp;yet another from identity or access systems, leaving gaps that widen as environments grow more complex.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Common challenges&amp;nbsp;in manual device discovery&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Manual discovery relies heavily on human input, which introduces inconsistency and error. As environments grow more distributed, these processes struggle to evolve with them, making it difficult to keep inventories&amp;nbsp;accurate&amp;nbsp;as devices are added,&amp;nbsp;reassigned&amp;nbsp;or&amp;nbsp;accessed remotely. Reconciling changes across large estates becomes time-consuming and brittle, increasing the likelihood that devices fall out of view entirely.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these limitations compound.&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/best-practices-for-it-asset-discovery-and-inventory-management"&gt;Discovery&lt;/a&gt;&amp;nbsp;becomes episodic rather than continuous, and visibility&amp;nbsp;lags behind&amp;nbsp;reality. By the time inventories are reconciled, the environment has already changed.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Visibility gaps and security risks&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;These gaps&amp;nbsp;aren’t&amp;nbsp;theoretical. Ivanti’s research shows that many organizations still struggle with foundational&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;endpoint visibility&lt;/a&gt;&amp;nbsp;even after deploying multiple management tools. Endpoint data exists across scanners, MDM&amp;nbsp;platforms&amp;nbsp;and&amp;nbsp;access systems, but it is rarely centralized, continuously updated, or trusted across teams. As a result, shadow IT, unmanaged devices&amp;nbsp;and&amp;nbsp;unknown access paths&amp;nbsp;remain&amp;nbsp;persistent sources of security and compliance risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Blind spots create real risk. Many organizations struggle to&amp;nbsp;identify&amp;nbsp;which devices are vulnerable or even actively accessing their environments.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;When teams&amp;nbsp;can’t&amp;nbsp;reliably understand device exposure or access patterns, security decisions are made using incomplete or outdated data, increasing&amp;nbsp;risk&amp;nbsp;and delaying remediation. In fact, the above-mentioned Ivanti report highlights how common these blind spots are:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of organizations report challenges&amp;nbsp;identifying&amp;nbsp;shadow IT&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;41% struggle to&amp;nbsp;identify&amp;nbsp;vulnerabilities across devices&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% say data blind spots make it difficult to determine patch compliance.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Device discovery vs. device health monitoring&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Discovery is only the first step. Knowing that a device exists&amp;nbsp;doesn't&amp;nbsp;tell you whether&amp;nbsp;it's&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;or&amp;nbsp;even functioning properly.&amp;nbsp;That’s&amp;nbsp;where device health monitoring becomes critical.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Discovery tells you&amp;nbsp;what’s&amp;nbsp;present. Health monitoring adds the context that&amp;nbsp;actually matters, from performance and configuration&amp;nbsp;drift&amp;nbsp;to overall security posture. Research from&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Ivanti’s 2025 Securing the Borderless Digital Landscape report&lt;/a&gt;&amp;nbsp;underscores how significant these visibility gaps&amp;nbsp;remain:&amp;nbsp;Two&amp;nbsp;out of five (38%) of IT professionals say they lack sufficient data about devices accessing the network, and 45% report insufficient visibility into shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;BYOD and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;edge devices&lt;/a&gt;, especially, are a concern. These can be online and still pose significant risk. It may be missing critical patches, running outdated software,&amp;nbsp;drifting from&amp;nbsp;configuration&amp;nbsp;standards&amp;nbsp;or&amp;nbsp;suffering performance issues that impact users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Presence data answers the question, “Is it there?” Health data answers, “Is it safe, compliant, and usable?” Without health insights, organizations are effectively managing endpoints in the dark.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Key indicators of endpoint health&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;To manage endpoints proactively, organizations need continuous visibility into key health indicators.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This includes:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Operating&amp;nbsp;system and application versions&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch&amp;nbsp;and antivirus status&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Configuration&amp;nbsp;drift&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Overall&amp;nbsp;security posture&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;User experience signals such as crashes,&amp;nbsp;latency&amp;nbsp;and&amp;nbsp;performance degradation also provide early warning signs that something&amp;nbsp;isn’t&amp;nbsp;right.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern platforms unify these signals into a single view, allowing IT and security teams to understand not just what devices exist, but how&amp;nbsp;they're&amp;nbsp;performing and where risk is&amp;nbsp;emerging.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The risk of tracking only device presence&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When organizations focus&amp;nbsp;only&amp;nbsp;on device presence, they expose themselves to both security and operational risks. Visibility without context leads to delayed detection, missed compliance&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;reactive management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Negative impacts on security and compliance&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Tracking presence alone increases the likelihood that malware,&amp;nbsp;misconfigurations&amp;nbsp;or&amp;nbsp;policy violations go undetected. Devices that are not enrolled in management or out of compliance may still access sensitive resources, creating gaps in enforcement. When access decisions&amp;nbsp;aren’t&amp;nbsp;tied to device state, enforcement becomes inconsistent by default.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Strong endpoint visibility,&amp;nbsp;access&amp;nbsp;and&amp;nbsp;security ensure that only managed and compliant devices can reach sensitive systems and data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Tying access to management and compliance status is critical. Conditional access,&amp;nbsp;VPN&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust&lt;/a&gt;&amp;nbsp;controls are only effective when visibility and enrollment are enforced consistently across endpoints.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch management&amp;nbsp;is&amp;nbsp;one of the areas where limited visibility creates the most operational strain.&amp;nbsp;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;IT and security research&lt;/a&gt;&amp;nbsp;shows that many IT teams struggle to track patch status across their full endpoint estate and to stay compliant as environments become more distributed. For&amp;nbsp;example,&amp;nbsp;of those we surveyed,&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT and security professionals say they have difficulty tracking patch status and rollouts.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% of teams struggle to stay compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;These challenges&amp;nbsp;aren’t&amp;nbsp;about patch availability alone. They stem from gaps in visibility into device state,&amp;nbsp;ownership&amp;nbsp;and&amp;nbsp;real-world exposure, making it difficult to prioritize and verify remediation.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Operational inefficiencies&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;From an operational perspective, limited visibility leads to inefficiency. IT teams spend time troubleshooting issues that automation could resolve, chasing devices that should have been discovered automatically, and reacting to incidents rather than preventing them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Without health data, teams are forced into a firefighting mode, responding to problems after they&amp;nbsp;impact&amp;nbsp;users instead of addressing them proactively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is exactly where AI and automation can begin to change the equation.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How AI and endpoint automation improve endpoint visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation turn endpoint visibility from a one-time discovery exercise into a continuous, self-sustaining capability. They enable teams to unify data, detect&amp;nbsp;anomalies&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;accurate&amp;nbsp;inventories without manual effort.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Unified telemetry across multiple sources&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Modern endpoint management platforms with AI and automation capabilities&amp;nbsp;consolidate&amp;nbsp;telemetry from discovery, UEM, MDM, patching,&amp;nbsp;vulnerability&amp;nbsp;and&amp;nbsp;security tools into a unified, continuously updated view. This unified telemetry&amp;nbsp;eliminates&amp;nbsp;the need to reconcile siloed inventories and provides a shared, reliable view for both IT and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By normalizing data across desktop, mobile, server&amp;nbsp;and&amp;nbsp;IoT devices, organizations gain holistic visibility that&amp;nbsp;supports&amp;nbsp;faster, more confident decision-making.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;autonomous&amp;nbsp;endpoint management (AEM)&amp;nbsp;research&amp;nbsp;&lt;/a&gt;also shows that organizations make the most progress when endpoint visibility is treated as a shared&amp;nbsp;objective. Teams that track metrics such as time to discovery, percentage of fully managed endpoints&amp;nbsp;and&amp;nbsp;exposure duration through shared dashboards are better able to align IT and security around the same data. This shared visibility turns endpoint management from siloed reporting into a coordinated, data-driven process.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;AI-Powered&amp;nbsp;automation and&amp;nbsp;autonomous&amp;nbsp;bots&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Automation plays a critical role in keeping visibility current.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/bot-library"&gt;AI-powered bots&lt;/a&gt;&amp;nbsp;can automatically rediscover devices, reconcile duplicates, update ownership and&amp;nbsp;location&amp;nbsp;and&amp;nbsp;detect anomalies across the environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When agents stop reporting or profiles break, automated workflows can repair or reinstall them without human intervention. This ensures that visibility&amp;nbsp;doesn’t&amp;nbsp;degrade over time and reduces the operational burden on IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Self-healing&amp;nbsp;workflows for IT&amp;nbsp;productivity&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Self-healing workflows extend automation to the endpoint itself. Common issues such as failed updates, stopped services&amp;nbsp;or&amp;nbsp;configuration drift can be detected and resolved automatically, often before users notice a problem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Endpoint automation enables these self-healing workflows to&amp;nbsp;operate&amp;nbsp;continuously in the background, resolving common issues without waiting for human intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By resolving these issues without tickets, organizations reduce downtime, improve user&amp;nbsp;experience&amp;nbsp;and&amp;nbsp;free IT staff to focus on higher-value initiatives.&amp;nbsp;In fact,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;over two-thirds of IT teams&lt;/a&gt;&amp;nbsp;today believe that&amp;nbsp;AI and automation&amp;nbsp;in ITSM&amp;nbsp;will&amp;nbsp;allow them to deliver better service experiences&amp;nbsp;and&amp;nbsp;give them more time to support business objectives.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365781"&gt;&lt;/div&gt;

&lt;h2&gt;Broader&amp;nbsp;impact on&amp;nbsp;security,&amp;nbsp;productivity&amp;nbsp;and&amp;nbsp;user&amp;nbsp;experience&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When AI and automation are integrated into endpoint visibility, the benefits extend beyond IT operations. Security posture&amp;nbsp;improves&amp;nbsp;and users experience fewer disruptions — and productivity increases.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By combining endpoint visibility and control, organizations can reduce risk while still supporting productivity and flexible operating models.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Closing&amp;nbsp;visibility&amp;nbsp;gaps&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;AI-driven insights&amp;nbsp;eliminate&amp;nbsp;blind spots by continuously&amp;nbsp;monitoring&amp;nbsp;endpoint activity and health. Instead of relying on periodic scans or manual checks, organizations&amp;nbsp;maintain&amp;nbsp;real-time awareness of their endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;continuous visibility&lt;/a&gt;&amp;nbsp;transforms endpoint management from a static inventory project into a living, breathing capability that adapts as the environment changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improving&amp;nbsp;IT&amp;nbsp;operations and&amp;nbsp;end-user&amp;nbsp;satisfaction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/how-ai-alleviates-help-desk-workloads"&gt;Automation reduces ticket volume&lt;/a&gt;&amp;nbsp;and accelerates resolution times, while predictive analytics help prevent downtime before it&amp;nbsp;impacts&amp;nbsp;users. Ring deployments, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;self-service catalogs allow changes to be delivered with minimal disruption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When users experience faster support and fewer interruptions, resistance to endpoint management drops and adoption improves. Over time, this creates a healthier feedback loop where visibility,&amp;nbsp;automation&amp;nbsp;and&amp;nbsp;user experience reinforce each other instead of competing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;autonomous endpoint management&amp;nbsp;takes organizations next. Visibility becomes continuous instead of episodic. Automation keeps inventories&amp;nbsp;accurate, health signals&amp;nbsp;current&amp;nbsp;and&amp;nbsp;risk visible in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With shared data and clear ownership, IT and security teams stop reacting to issues after the fact and start managing endpoints proactively. That shift from inventory to intelligence is what enables autonomous endpoint management, and&amp;nbsp;it’s&amp;nbsp;quickly becoming the standard for modern IT operations.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 03 Apr 2026 13:00:09 Z</pubDate></item><item><guid isPermaLink="false">102f3f22-125a-4763-b596-62b424778efc</guid><link>https://www.ivanti.com/blog/autonomous-endpoint-management-eliminates-patch-silos</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Patch Management</category><title>How AI-Driven Automation Solves Patch Management Silos</title><description>&lt;p&gt;&lt;em&gt;"We see 10,000&amp;nbsp;critical vulnerabilities!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"We patched everything last week!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This conversation happens in enterprise IT departments every single day. Security teams present dashboards filled with red alerts. IT teams show deployment reports at 98% success. Both teams are looking at real data.&amp;nbsp;Both are absolutely correct.&amp;nbsp;And both are&amp;nbsp;totally&amp;nbsp;blind to what's actually happening across the endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn't&amp;nbsp;a&amp;nbsp;people&amp;nbsp;problem — your teams&amp;nbsp;aren't&amp;nbsp;incompetent.&amp;nbsp;It's&amp;nbsp;not a process problem — your workflows&amp;nbsp;aren't&amp;nbsp;broken.&amp;nbsp;It's&amp;nbsp;a technology problem:&amp;nbsp;you're&amp;nbsp;asking two teams to manage the same risk using systems that&amp;nbsp;show them different realities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Security teams are given one version of reality through vulnerability scanners and threat intelligence. Meanwhile, IT teams see things differently when looking at their device management and patch deployment reports.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tricky part is that both views can be&amp;nbsp;correct&amp;nbsp;in isolation and&amp;nbsp;still&amp;nbsp;be&amp;nbsp;misleading&amp;nbsp;in practice.&amp;nbsp;That's&amp;nbsp;how you end up in the familiar stalemate: security reports thousands of critical vulnerabilities; IT reports that patches are successfully deployed. The disconnect lives in the gap between those systems.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why&amp;nbsp;IT&amp;nbsp;and&amp;nbsp;security&amp;nbsp;are misaligned on patching&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Most organizations approach&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;patching misalignment between IT and security&lt;/a&gt;&amp;nbsp;by improving communication between IT and security. They schedule more meetings. They create escalation paths. They implement SLAs. And six months later,&amp;nbsp;they're&amp;nbsp;having the exact same argument with better PowerPoint slides.&lt;/p&gt;

&lt;p&gt;Here's&amp;nbsp;what nobody wants to admit:&amp;nbsp;you&amp;nbsp;can't&amp;nbsp;collaborate your way out of a data fragmentation problem. When IT and security are working from fundamentally different inventories of what exists,&amp;nbsp;what's&amp;nbsp;vulnerable&amp;nbsp;and&amp;nbsp;what's&amp;nbsp;been fixed, adding more coordination overhead just slows down an already broken process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is why the same conversation plays out again and again inside many organizations.&amp;nbsp;Both teams are confident in their data, and both are “right” within the narrow context of the tools they rely on.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And&amp;nbsp;that’s&amp;nbsp;the problem. While both views are “right,” neither reflects the full lifecycle of risk. Vulnerability data&amp;nbsp;doesn’t&amp;nbsp;always reflect whether affected devices are managed or reachable. Patch reports&amp;nbsp;don’t&amp;nbsp;always account for unmanaged,&amp;nbsp;misclassified&amp;nbsp;or&amp;nbsp;newly discovered endpoints that still have access to corporate resources.&amp;nbsp;What’s missing is a reliable answer to the only question that actually matters: which endpoints are exposed right now?&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Technology silos create conflicting realities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Most enterprises manage endpoints through&amp;nbsp;a hodgepodge of&amp;nbsp;systems that&amp;nbsp;have evolved&amp;nbsp;independently over time, each capturing only a fragment of reality.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One system may surface critical exposure without knowing whether the device is&amp;nbsp;being managed. Another may confirm successful remediation without accounting for newly discovered or misclassified endpoints that still have access.&amp;nbsp;The result? No reliable way to trace risk from detection through deployment to actual exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consider this:&amp;nbsp;the&amp;nbsp;average organization manages only 60% of their edge devices, according to Ivanti's&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Securing the Borderless Digital Landscape Report&lt;/a&gt;. That means 40% of potential entry points exist outside IT's view and outside their patch workflows. Security sees them.&amp;nbsp;IT&amp;nbsp;doesn't. That's&amp;nbsp;your&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;vulnerability gap&lt;/a&gt;.&amp;nbsp;Without that continuity, teams are forced to reconcile partial views manually. Data gets debated instead of&amp;nbsp;acted&amp;nbsp;on.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic showing bar charts" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/04/02-unmanaged-edge-devices.png"&gt;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Different data views lead to friction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Imagine&amp;nbsp;it’s&amp;nbsp;Monday morning: Security discovers a critical zero-day in a widely used VPN client. They send an urgent alert to IT: "30,000 vulnerable endpoints detected — patch immediately."&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT checks their deployment console: &lt;em&gt;"VPN client already updated across 28,000 devices last Thursday."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Both statements are true. Security is scanning the entire network — including contractor laptops, BYOD devices&amp;nbsp;and&amp;nbsp;systems that&amp;nbsp;briefly&amp;nbsp;connected to the VPN but&amp;nbsp;aren't&amp;nbsp;under IT management. IT patched everything in their device inventory.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Meanwhile, 2,000 genuinely vulnerable endpoints&amp;nbsp;remain&amp;nbsp;exposed because they exist in Security's view but not IT's.&amp;nbsp;The patch that should have taken 24 hours now requires three days of manual reconciliation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT and security&amp;nbsp;operate&amp;nbsp;from different data sources, misaligned&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;vulnerability management priorities&lt;/a&gt;&amp;nbsp;are inevitable.&amp;nbsp;Security teams focus on vulnerability counts, severity&amp;nbsp;scores&amp;nbsp;and&amp;nbsp;exploit intelligence. IT teams prioritize deployment success, system&amp;nbsp;stability&amp;nbsp;and&amp;nbsp;user impact. Both perspectives are necessary, but without a shared frame of reference, they pull in different directions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What follows&amp;nbsp;isn’t&amp;nbsp;just tension;&amp;nbsp;it’s&amp;nbsp;decision paralysis. Remediation slows while teams reconcile inventories,&amp;nbsp;validate&amp;nbsp;findings&amp;nbsp;and&amp;nbsp;argue about scope. Vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than they should, not because patches&amp;nbsp;aren’t&amp;nbsp;available, but because&amp;nbsp;there’s&amp;nbsp;no single view that connects detection,&amp;nbsp;deployment&amp;nbsp;and&amp;nbsp;exposure.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;risk of misaligned patching priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Misalignment slows collaboration, but more so, it creates measurable risk that extends well beyond internal friction.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management research&lt;/a&gt;&amp;nbsp;reflects this challenge in practice:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals report difficulty tracking patch status.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% struggle to meet remediation timelines due to incomplete endpoint visibility.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than necessary, the window of exposure grows. Attackers&amp;nbsp;don’t&amp;nbsp;wait.&amp;nbsp;The&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA KEV catalog&lt;/a&gt;&amp;nbsp;reveals the&amp;nbsp;difficult truth: 30% of vulnerabilities being actively exploited right now were originally&amp;nbsp;disclosed&amp;nbsp;more than five years ago.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's&amp;nbsp;not a patching problem;&amp;nbsp;it’s&amp;nbsp;a&amp;nbsp;visibility problem. Organizations&amp;nbsp;aren't&amp;nbsp;ignoring available patches;&amp;nbsp;they're&amp;nbsp;missing the endpoints that still need them.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Prolonged&amp;nbsp;exposure&amp;nbsp;windows and&amp;nbsp;breach&amp;nbsp;risk&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Fragmentation stretches&amp;nbsp;exposure&amp;nbsp;windows in subtle ways. Devices that were never enrolled in management platforms, such as shadow BYOD, unsecured contractor&amp;nbsp;devices&amp;nbsp;or&amp;nbsp;remote endpoints outside the traditional perimeter, often go unnoticed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Research from Ivanti&lt;/a&gt;&amp;nbsp;shows&amp;nbsp;that only one in three employers&amp;nbsp;have&amp;nbsp;implemented zero trust network access for remote workers, leaving significant gaps in visibility across distributed environments.&amp;nbsp;Newly discovered endpoints appear after patch reports are generated. Systems drift out of compliance between scan cycles. Each delay compounds the risk, extending the time attackers&amp;nbsp;have to&amp;nbsp;weaponize known weaknesses.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/24843673"&gt;&lt;/div&gt;

&lt;h2&gt;Common&amp;nbsp;post-patch&amp;nbsp;issues and IT&amp;nbsp;ticket&amp;nbsp;overload&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Even when patches are deployed on schedule, manual patching often creates downstream issues. Failed updates, broken agents, performance&amp;nbsp;problems&amp;nbsp;and&amp;nbsp;unexpected reboots trigger support tickets and emergency fixes. What starts as a security task quickly becomes an operational drain.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT teams spend time resolving predictable failures instead of&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;improving endpoint posture&lt;/a&gt;. Security teams see delays as unresolved risk. Users associate patching with disruption. That friction persists across teams, even when their goals are aligned.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Transforming&amp;nbsp;patch management&amp;nbsp;with autonomous endpoint management&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation address the core disconnects in&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;&amp;nbsp;by unifying visibility and reducing manual coordination. When endpoint discovery, vulnerability data, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status are correlated into a unified view, IT and security teams can work from the same facts instead of reconciling partial data across tools.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&amp;nbsp;(AEM)&lt;/a&gt; brings clarity to the confusion by using AI intelligence and automation to give IT and security a single, continuously updated view of endpoints, their&amp;nbsp;health&amp;nbsp;and their exposure.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How&amp;nbsp;AI&amp;nbsp;improves patching decisions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI improves patching decisions by prioritizing vulnerabilities based on real-world risk rather than severity scores alone. By factoring in exploit activity, asset criticality&amp;nbsp;and&amp;nbsp;exposure context, teams can align on what to patch first and focus effort where it will reduce risk fastest.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With autonomous endpoint management, that same Monday morning scenario plays out differently:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability is detected, and AI&amp;nbsp;immediately&amp;nbsp;cross-references it against a unified endpoint inventory. It&amp;nbsp;identifies&amp;nbsp;1,560 devices running the vulnerable version, including 217 devices that were previously unmanaged.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/automated-patch-management"&gt;Automated&amp;nbsp;patch&amp;nbsp;workflows&lt;/a&gt;&amp;nbsp;simultaneously: enroll the unmanaged devices, prioritize patching based on exposure risk and asset criticality. They then&amp;nbsp;schedule deployment during low-usage&amp;nbsp;windows, and&amp;nbsp;begin ring-based rollout.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the time the security team sends the alert, IT already has a real-time dashboard showing remediation in progress&amp;nbsp;—&amp;nbsp;with the same device count, the same exposure&amp;nbsp;data&amp;nbsp;and&amp;nbsp;the same prioritization logic. No reconciliation&amp;nbsp;necessary.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How automation accelerates remediation&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Automation then turns those decisions into action. Patch workflows can be orchestrated end to end:&amp;nbsp;identifying&amp;nbsp;affected devices, deploying&amp;nbsp;updates&amp;nbsp;and&amp;nbsp;validating&amp;nbsp;remediation without constant manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI-powered intelligent patch scheduling minimizes user impact by aligning deployments with device usage patterns, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;operational constraints. Ring-based rollouts allow patches to be&amp;nbsp;validated&amp;nbsp;on smaller groups before wider deployment, reducing disruption while accelerating remediation. The result is faster&amp;nbsp;patching, less&amp;nbsp;downtime&amp;nbsp;and&amp;nbsp;a more predictable process for both teams.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Self-healing workflows detect and resolve common issues automatically, such as restarting services, reinstalling&amp;nbsp;agents&amp;nbsp;or&amp;nbsp;correcting misconfigurations. These workflows prevent avoidable incidents before they turn into support tickets.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;From data debates to unified intelligence and shared visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;AI-driven platforms&lt;/a&gt;&amp;nbsp;unify endpoint visibility by correlating discovery data, vulnerability context, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status into a single endpoint record, with enrollment and access controls ensuring that devices are continuously discovered and managed throughout their lifecycle. IT and security teams see the same devices, the same&amp;nbsp;exposure&amp;nbsp;and&amp;nbsp;the same remediation status in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This unified intelligence&amp;nbsp;eliminates&amp;nbsp;debates over whose data is correct and replaces them with agreement on which risks&amp;nbsp;to address&amp;nbsp;first.&amp;nbsp;By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale. By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Shared patch ownership:&amp;nbsp;powering IT and security collaboration&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation only improve patch management when&amp;nbsp;they’re&amp;nbsp;paired with shared ownership. When IT and security teams&amp;nbsp;operate&amp;nbsp;from the same endpoint data and remediation workflows, accountability shifts from defending individual reports to jointly reducing exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A data-driven patch process starts with mutual goals. Instead of tracking success in isolated tools, organizations align IT and security around common metrics that reflect real-world risk and operational impact. This shared measurement creates clarity on priorities and removes ambiguity around ownership.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Effective collaboration depends on metrics both teams trust and act on together. Common KPIs include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Mean Time to Remediate (MTTR):&amp;nbsp;How quickly critical vulnerabilities are resolved&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch compliance rates:&amp;nbsp;Across both managed and previously unmanaged endpoints&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure duration:&amp;nbsp;How long high-risk vulnerabilities&amp;nbsp;remain&amp;nbsp;open&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Endpoint visibility:&amp;nbsp;Percentage of devices fully discovered and managed&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics shift conversations from patch volume to measured risk outcomes and help teams focus on outcomes instead of activity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Joint ownership requires workflows that span the entire&amp;nbsp;patch&amp;nbsp;lifecycle. AI-driven platforms support this by automating routine tasks while surfacing exceptions that require human judgment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT and security leaders define guardrails for automation, including&amp;nbsp;approval&amp;nbsp;thresholds, testing&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;rollout constraints. Within those boundaries, automation executes remediation consistently and at scale, without constant manual coordination. Over time, trust in the process grows, coordination overhead decreases, and patching becomes a cooperative operational responsibility rather than a point of friction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Visit our solutions page to discover how&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Ivanti's autonomous endpoint management solutions&lt;/a&gt;&amp;nbsp;give IT and security teams the unified visibility they need to&amp;nbsp;eliminate&amp;nbsp;patching silos and close vulnerabilities faster.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 02 Apr 2026 15:37:11 Z</pubDate></item><item><guid isPermaLink="false">c6a5b580-8345-47fd-b9fe-58b19a5bc3cc</guid><link>https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>Who Owns Endpoint Management? Defining Security and IT Governance</title><description>&lt;p&gt;Endpoint management is one of the most critical — and most contested — areas of enterprise governance. Every organization depends on endpoints, yet many still struggle to answer a fundamental question: who actually &lt;i&gt;owns &lt;/i&gt;these devices?&lt;/p&gt;

&lt;p&gt;In many environments, IT and security teams are both confident they’re doing the right thing, yet still talk past each other. Security looks at a scanner and sees 10,000 critical vulnerabilities; IT looks at a patch report and sees everything deployed. They're both right, but they're speaking different languages.&lt;/p&gt;

&lt;p&gt;The result is stalled risk remediation efforts, policy friction and growing frustration. Teams debate whose data is accurate instead of closing gaps. When &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management"&gt;endpoint management&lt;/a&gt; is governed jointly, with shared visibility and accountability, teams can shift their focus from reconciling data to improving execution.&lt;/p&gt;

&lt;p&gt;As endpoint environments scale, governance also depends on automation. AI-powered capabilities can help normalize data across siloed tools, surface unmanaged devices, and highlight &lt;a href="https://www.ivanti.com/it-asset-visibility"&gt;asset visibility&lt;/a&gt; gaps, making shared ownership possible without relying on manual reconciliation.&lt;/p&gt;

&lt;h2&gt;Why endpoint management ownership matters&lt;/h2&gt;

&lt;p&gt;Endpoints are where users work, where data is accessed and where many security incidents begin. When ownership of endpoint management is unclear, fissures start to appear.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;Autonomous Endpoint Management Advantage&lt;/a&gt; report shows that these visibility gaps are widespread and consequential. Just over half of organizations report using endpoint management solutions that provide centralized visibility, meaning many teams still struggle to see their full device landscape. These blind spots extend beyond unmanaged IT devices.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of security and IT professionals cite &lt;a href="https://www.ivanti.com/products/discovery"&gt;shadow IT&lt;/a&gt; as a key data gap.&lt;/li&gt;
	&lt;li&gt;41% report difficulty &lt;a href="https://www.ivanti.com/use-cases/manage-it-vulnerability-risk"&gt;identifying vulnerabilities&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;38% can’t reliably tell which devices are even accessing their network.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;Most organizations believe they know what’s on their network, until they turn on proper discovery. The reality is that device lists are usually siloed: one from your MDM, another from on-prem tools and something else from the identity provider.&lt;/p&gt;

&lt;p&gt;As a result, basic questions become hard to answer: which devices are fully managed, which are compliant and which can access sensitive resources without controls.&lt;/p&gt;

&lt;p&gt;AI-powered automation can help continuously correlate endpoint data across management, identity and &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security"&gt;endpoint security solutions&lt;/a&gt;, reducing blind spots that manual processes routinely miss.&lt;/p&gt;

&lt;p&gt;But visibility is only valuable when it’s shared and governed. You can’t secure, patch or support what you can’t see. Without a shared, trusted view and clear governance of endpoints, well-intentioned efforts still lead to friction, delays and increased risk. That’s why endpoint management is ultimately a governance problem, not just a technical one.&lt;/p&gt;

&lt;p&gt;Security isn’t the only issue with these blind spots. Patching is slowed, support gets complicated and policy enforcement is undermined. When IT and security teams rely on different datasets, disagreements over risk and remediation are inevitable.&lt;/p&gt;

&lt;p&gt;Clear ownership changes that dynamic. When endpoint management is governed jointly, with shared visibility and accountability, organizations are better positioned to move from debating data to closing gaps. Endpoint management becomes a foundation for consistent policy enforcement, faster remediation and better collaboration across teams.&lt;/p&gt;

&lt;h2&gt;Common points of friction between IT and security teams&lt;/h2&gt;

&lt;p&gt;Most friction between IT and security doesn’t come from bad intent. It comes from misalignment.&lt;/p&gt;

&lt;p&gt;Our &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; also suggests this misalignment isn’t abstract; it’s measurable and costly. We found that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;56% of IT professionals say wasteful IT spend is a problem.&lt;/li&gt;
	&lt;li&gt;And 39% point to inefficient tech support as an area of waste.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365747"&gt;&lt;/div&gt;

&lt;p&gt;Nearly nine in ten respondents also report that siloed data negatively impacts IT operations, driving inefficient use of resources, reduced collaboration and elevated risk of non-compliance.&lt;/p&gt;

&lt;p&gt;In practice, this misalignment tends to surface in a few consistent and recurring friction points:&lt;/p&gt;

&lt;h4&gt;Fragmented tooling&lt;/h4&gt;

&lt;p&gt;Fragmented tooling is a major barrier. Many organizations juggle an older on-prem client tool, a separate MDM for mobile and a different solution for patches. The result is tech sprawl that makes the problem worse.&lt;/p&gt;

&lt;p&gt;As this disconnect plays out in practice, security and IT teams often rely on different tools and datasets to assess the same endpoints, leading to very different conclusions about risk and remediation status.&lt;/p&gt;

&lt;p&gt;AI-driven analysis can add context across these datasets, helping IT and security teams interpret exposure through a shared lens rather than competing reports.&lt;/p&gt;

&lt;h4&gt;User impact&lt;/h4&gt;

&lt;p&gt;User impact is another source of tension. Endpoint controls are often seen as restrictive, raising concerns about performance, downtime or privacy, especially on bring-your own (BYOD) devices. IT teams are left balancing enforcement with user experience, while security pushes for stricter controls.&lt;/p&gt;

&lt;h4&gt;Resource constraints&lt;/h4&gt;

&lt;p&gt;Resource constraints make this harder. Teams are wary of introducing new platforms or policies that appear complex or disruptive, especially when they’re already stretched thin.&lt;/p&gt;

&lt;p&gt;Without clear governance, these issues lead to inconsistent enforcement, stalled remediation and shadow policy decisions. Endpoint management stays reactive. But the good news is that this is solvable.&lt;/p&gt;

&lt;h2&gt;Balancing security requirements and business flexibility&lt;/h2&gt;

&lt;p&gt;One of the hardest challenges in endpoint management is balancing security with business flexibility. Security teams want consistent controls to reduce risk. Business leaders want minimal disruption and the freedom to work without friction. IT teams are often caught in the middle.&lt;/p&gt;

&lt;p&gt;When this balance isn’t clearly defined, endpoint policies become a source of conflict. Strict controls applied universally can slow productivity, frustrate users and encourage workarounds. Too much flexibility, on the other hand, increases exposure and makes enforcement inconsistent.&lt;/p&gt;

&lt;p&gt;The real issue is that organizations fail to agree upfront on what’s mandatory and where flexibility is acceptable. Without that clarity, organizations negotiate policy decisions ad hoc and react to incidents instead of managing risk proactively.&lt;/p&gt;

&lt;p&gt;Effective endpoint governance reframes the conversation. By defining baseline requirements upfront and aligning them to risk, organizations can protect critical assets while still supporting different user needs and operating models. This shift allows security and IT to move from constant trade-offs to structured decision-making. That's when the relationship fundamentally changes from friction to alignment.&lt;/p&gt;

&lt;h2&gt;Who should own endpoint governance?&lt;/h2&gt;

&lt;p&gt;Endpoint governance can't sit with a single team. It requires shared ownership across IT, security and the business.&lt;/p&gt;

&lt;p&gt;In successful organizations, endpoint governance is shaped by a group that includes IT operations, security and key business stakeholders. This group defines decision rights, agrees on priorities and establishes a common policy framework that everyone operates within.&lt;/p&gt;

&lt;p&gt;Security brings risk context and threat awareness. IT brings operational insight and user impact considerations. Business leaders provide perspective on workflows, productivity and acceptable levels of disruption. When these perspectives are aligned early, endpoint policies are easier to enforce and less likely to be bypassed.&lt;/p&gt;

&lt;p&gt;Governance clarifies accountability. It answers questions like who decides what's mandatory, how exceptions are handled and how conflicts are resolved. With that structure in place, endpoint management becomes a coordinated program rather than a series of isolated decisions.&lt;/p&gt;

&lt;h2&gt;Defining risk remediation priorities and timelines&lt;/h2&gt;

&lt;p&gt;Effective endpoint governance depends on clear agreement around &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;risk remediation priorities&lt;/a&gt; and timelines. Without that agreement, IT and security teams often talk past each other, prioritizing volume instead of focusing on what matters most.&lt;/p&gt;

&lt;p&gt;The problem with patching is prioritization, and Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; confirms this isn't just a theoretical problem but a measurable operational challenge:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;39% of IT teams struggle to prioritize risk remediation and patch deployment.&lt;/li&gt;
	&lt;li&gt;38% have difficulty tracking patch status and rollouts.&lt;/li&gt;
	&lt;li&gt;And 35% struggle to stay compliant with patching.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are all outcomes that stem largely from visibility gaps and inconsistent tooling, making it harder to focus remediation efforts.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Traditional approaches rely on CVSS scores and long spreadsheets that don't reflect real-world risk at all. Context matters: whether a device is Internet-facing, who uses it, what data it touches and how likely exploitation is, with AI-powered analysis helping teams assess that context continuously at scale.&lt;/p&gt;

&lt;p&gt;Governance helps shift remediation from a volume-driven exercise to a risk-based one. By defining patching timelines, escalation paths and ownership upfront, organizations can align IT and security around shared priorities. Instead of debating which issues to address first, teams can focus on execution.&lt;/p&gt;

&lt;p&gt;Clear timelines reduce friction by making remediation predictable instead of reactive. This consistency improves accountability, shortens exposure windows and builds trust between teams.&lt;/p&gt;

&lt;h2&gt;Non-negotiables vs. flexibility zones&lt;/h2&gt;

&lt;p&gt;One of the most important outcomes of endpoint governance is clarity around what's required and where flexibility is allowed.&lt;/p&gt;

&lt;p&gt;Non-negotiables are the baseline. This includes disk encryption, specific &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; timelines and mandatory enrollment before a device can touch sensitive data. Defining these controls upfront removes ambiguity and ensures a consistent security posture.&lt;/p&gt;

&lt;p&gt;Flexibility zones acknowledge that not all endpoints are the same. Different teams, roles and operating models may require tailored policies, especially in environments with BYOD, contractors or frontline workers. Governance defines where exceptions are permitted, how they are approved and how risk is managed when flexibility is granted.&lt;/p&gt;

&lt;p&gt;Without this distinction, organizations either over-restrict users or allow uncontrolled exceptions. With it, endpoint management becomes both enforceable and adaptable.&lt;/p&gt;

&lt;p&gt;Security teams know which controls cannot be compromised, while IT and the business retain the flexibility needed to support productivity. This balance makes endpoint governance enforceable and practical.&lt;/p&gt;

&lt;h2&gt;Building trust through shared dashboards and transparency&lt;/h2&gt;

&lt;p&gt;Even the best endpoint governance framework breaks down without shared visibility. When IT and security teams operate from different dashboards and reports, trust erodes and shadow decisions take root.&lt;/p&gt;

&lt;p&gt;These disconnects are often rooted in fragmented data pipelines, where endpoint information is incomplete, outdated or inconsistently updated across tools and systems. Shared dashboards only change that dynamic when they are built on continuously updated, reconciled data. &lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&lt;/a&gt;, powered by AI, helps make this possible by automatically correlating endpoint signals across discovery, compliance, &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process"&gt;vulnerability and remediation&lt;/a&gt; data sources.&lt;/p&gt;

&lt;p&gt;When both teams rely on the same data — covering device inventory, compliance status, vulnerability exposure and remediation progress — conversations become grounded in facts rather than assumptions. Disagreements shift from “Whose data is right?” to “What issue should we tackle next?”&lt;/p&gt;

&lt;p&gt;Data transparency changes the culture from finger-pointing to IT and security collaboration. Instead of security saying they’ve found more unmanaged laptops, the conversation becomes: “We have a visibility gap – how do we close it?”&lt;/p&gt;

&lt;p&gt;Joint IT and security metrics such as time to discovery, percentage of fully managed endpoints and exposure duration create a common language for decision-making. AI-driven automation helps keep those metrics accurate and current. Shared dashboards reinforce accountability.&lt;/p&gt;

&lt;p&gt;When progress and gaps are visible to all stakeholders, endpoint governance stops being an abstract policy discussion and becomes a measurable, collaborative effort. This visibility is what turns governance from intent into execution.&lt;/p&gt;

&lt;h2&gt;Measuring the effectiveness of endpoint governance&lt;/h2&gt;

&lt;p&gt;Endpoint governance only works if organizations can measure whether it’s actually reducing risk and improving operations. Without clear KPIs and accessible data, governance quickly becomes a policy exercise rather than a practical discipline.&lt;/p&gt;

&lt;p&gt;In practice, effective measurement spans visibility, risk and operational performance.&lt;/p&gt;

&lt;h4&gt;Visibility and coverage metrics&lt;/h4&gt;

&lt;p&gt;Effective measurement starts with visibility. These metrics show whether endpoints are governed in practice, not just on paper.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Percentage of endpoints that are fully managed&lt;/li&gt;
	&lt;li&gt;Time to discover new or previously unknown devices&lt;/li&gt;
	&lt;li&gt;Number and persistence of unmanaged or unknown endpoints&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AI-powered automation supports continuous measurement here by tracking trends in coverage and policy drift over time rather than relying on point-in-time reports.&lt;/p&gt;

&lt;h4&gt;Risk and exposure metrics&lt;/h4&gt;

&lt;p&gt;Risk-based metrics help teams move beyond volume and focus remediation on what matters most.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure time for critical vulnerabilities&lt;/li&gt;
	&lt;li&gt;Devices with the highest risk based on context and access&lt;/li&gt;
	&lt;li&gt;Alignment of remediation activity to real-world exploitability&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics help IT and security teams prioritize actions that have clear business impact, rather than chasing patch counts or compliance percentages alone.&lt;/p&gt;

&lt;h4&gt;Operational performance metrics&lt;/h4&gt;

&lt;p&gt;Operational metrics indicate whether endpoint governance is improving day-to-day execution and user experience.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reductions in endpoint-related security incidents&lt;/li&gt;
	&lt;li&gt;Faster onboarding and offboarding of users and devices&lt;/li&gt;
	&lt;li&gt;Fewer support tickets tied to endpoint configuration or patching issues&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over time, improvements in these indicators show whether automation, self-healing and policy enforcement are delivering measurable value.&lt;/p&gt;

&lt;p&gt;Endpoint governance KPIs must be reviewed jointly, with IT and security looking at the same data and course-correcting as needed. This reinforces accountability and enables continuous improvement. As environments evolve, policies, priorities and controls should evolve with them. Endpoint governance isn’t static — it’s an ongoing process that adapts as risk, technology and business needs change.&lt;/p&gt;

&lt;h2&gt;Defining ownership to scale endpoint management&lt;/h2&gt;

&lt;p&gt;Endpoint management doesn’t fail for lack of technology. It fails when ownership is unclear and governance is fragmented.&lt;/p&gt;

&lt;p&gt;As endpoints continue to diversify and work becomes more distributed, the question of who owns endpoint management can no longer be left ambiguous. Security, IT and the business all have a stake, and effective governance brings those perspectives together under a shared framework.&lt;/p&gt;

&lt;p&gt;When organizations establish clear ownership, define non-negotiables and operate from a shared view of endpoints, AI-powered automation helps endpoint management shift from reactive firefighting to proactive risk reduction. Shared dashboards, agreed-upon remediation timelines and continuous measurement replace ad hoc decisions and shadow policies.&lt;/p&gt;

&lt;p&gt;Success comes from treating endpoint management as a unifying, automation-first program. In practice, the pattern is clear: when visibility, shared ownership and governance come together, endpoints shift from a friction point to a foundation for resilience and collaboration.&lt;/p&gt;
</description><pubDate>Thu, 05 Mar 2026 13:30:01 Z</pubDate></item><item><guid isPermaLink="false">0dd67aaf-cdcf-4be8-b109-d8ca9dd68e60</guid><link>https://www.ivanti.com/blog/combining-mdm-and-mtd-for-strategic-security</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Combining MDM and MTD for Strategic Security</title><description>&lt;p&gt;The mobile threat landscape is constantly evolving, with advanced threats like CryptoChameleon emerging all the time. To effectively combat these challenges, organizations need a comprehensive solution – and that’s where combining &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Mobile Threat Defense (MTD)&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Mobile Device Management (MDM)&lt;/a&gt; comes in.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While MTD can identify potential threats on mobile devices, it often lacks the capability to take proactive measures to address them once they’ve been identified. Organizations still need a way to manage and secure their devices throughout their lifecycle, from initial enrollment to decommissioning.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Integrating MDM with MTD is key to achieving strategic cybersecurity benefits. This approach goes beyond merely boosting mobile security; it represents a deliberate move toward creating a mobile ecosystem that is not only more secure but also more efficient and compliant.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By combining MTD and MDM, you gain a unified view of both security threats and device management statuses across your entire mobile fleet. This integration maximizes production efficiency and enhances overall visibility and control.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Imagine a single dashboard that eliminates the need for switching between separate MTD and MDM consoles. This consolidated management streamlines IT operations by offloading the burden of managing multiple products and consoles. In essence, you get a single pane of glass for both mobile security and device management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This ensures that your organization can face the challenges of today's mobile threat landscape, all while maintaining a focus on user experience and operational efficiency.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The more mobile we are, the greater the risks&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mobile devices are essential business tools in today’s Everywhere Workplace. By 2025, it’s expected there will be &lt;a href="https://www.statista.com/statistics/245501/multiple-mobile-device-ownership-worldwide/" rel="noopener" target="_blank"&gt;over 18 billion mobile devices worldwide&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CryptoChameleon has spurred worldwide concern because of its innovative approach to compromising users. This “phishing kit” lets attackers build copies of SSO pages through which they can trick users into sharing usernames, passwords and more.&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Every organization must realize the importance of shielding its endpoints and data from the threats that target mobile devices. According to Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;2024 State of Cybersecurity Report&lt;/a&gt;:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;81% of office workers admitted they are using some type of personal device for work; half of those are logging in to networks and work software on their personal devices.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;40% said their employers don’t know about their activities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;23% of IT and security professionals said it is high-risk behavior for employees to use personal devices while working.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;63% said their IT asset management solution tracks the practice of bringing your own device.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Better together: The benefits of MTD with MDM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;In this landscape, traditional security methods aren't up to the task of countering dynamic new threats. What’s needed is a more integrated and comprehensive defense strategy.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's where the synergy between MDM security and MTD security is vital. By integrating MDM and MTD, organizations can create a resilient and proactive security posture that does more than manage and secure mobile devices; it also detects and responds to emerging threats in real time.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;Enhanced visibility and control&amp;nbsp;&lt;/h4&gt;

&lt;p&gt;By unifying MTD and MDM, security teams gain a single pane of glass for managing their entire mobile fleet. They can view both device security threats and management statuses within the same dashboard.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Imagine having real-time access to information about potential malware infections alongside details like device compliance with security protocols. This comprehensive view allows for a quicker and more informed risk response.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Furthermore, this integration streamlines IT operations. Security teams no longer need to juggle separate platforms for monitoring devices and managing threats. This empowers them to quickly analyze and act on the information they see. They can identify and address security issues, enforce policies, and manage devices with greater efficiency, which also allows them to dedicate more time to strategic security initiatives.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;Proactive threat detection and response&amp;nbsp;&lt;/h4&gt;

&lt;p&gt;The power of integrating MDM and MTD goes beyond providing a unified view of your mobile environment. They elevate your mobile security posture from passive defense to proactive threat hunting.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;MTD acts as a lookout with omniscient vision, always scanning your mobile fleet for even the slightest sign of trouble. It can detect suspicious app behavior, network anomalies and potential malware infections in real time. When they spot a potential threat, they immediately alert the system.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where MDM steps in as the swift and decisive response force. MDM's automated response capabilities can be preconfigured to take immediate action based on the threat identified by MTD. For example, MDM can automatically quarantine infected devices, block malicious websites or remotely wipe compromised data – effectively neutralizing the threat before it can cause damage. This eliminates the need for manual intervention while reducing the window of opportunity for cyber criminals.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;Comprehensive security policies&amp;nbsp;&lt;/h4&gt;

&lt;p&gt;Enforcing comprehensive corporate security policies across a mobile fleet can be a complex challenge. MDM's robust policy enforcement tools, combined with MTD's threat detection, can make this far easier.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This includes ensuring conditional access based on device compliance, ensuring that only squeaky-clean and secure policy-adhering devices can access corporate resources, enhancing overall security posture.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Other policies they can automatically enforce include: requiring strong passwords; device encryption; restriction of unauthorized applications from unknown sources; allowing approved applications for work purposes; and remote application and data wiping for lost or compromised devices.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;Streamlined compliance and reporting&amp;nbsp;&lt;/h4&gt;

&lt;p&gt;Cyber threats are complex enough, but organizations must also deal with a labyrinth of regulation. MDM and MTD can work hand in hand to streamline compliance, as their robust reporting functionalities generate detailed insights into both device management and security.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These reports can detail device configurations, access controls and security threats so organizations can easily demonstrate adherence to industry regulations and data privacy laws. These reports are a lifesaver during audits and compliance checks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Beyond this, insights from MTD can reveal patterns of risky behavior on mobile devices, informing data-driven security decisions. By knowing where weaknesses lie, you can prioritize resources and implement targeted security measures to plug gaps before they turn into compliance issues.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;User-centric security&amp;nbsp;&lt;/h4&gt;

&lt;p&gt;Finding the right balance between robust protection and a seamless user experience is crucial. Overly stringent security measures can frustrate users and hinder productivity, while lax controls leave devices vulnerable.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;MDM and MTD integration let an organization prioritize user experience without undermining protection. MDM allows for the creation of security policies that are transparent and less disruptive, while MTD's focus on real-time threat detection powers targeted interventions, minimizing disruption.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This goes beyond mitigation into empowering user education. MDM can be configured to send alerts to users highlighting potential security risks associated with specific apps or websites, and MTD can trigger notifications explaining the dangers of any suspicious activities detected on the device. These instructional nudges encourage a culture of security awareness among users – a win-win situation where you’re enhancing both security posture and user satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h4&gt;Other benefits&amp;nbsp;&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Ironclad adoption:&lt;/strong&gt; A best-in-class MDM will automatically push the MTD app to every device, running seamlessly in the background without requiring any user involvement.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Data-loss prevention:&lt;/strong&gt; Sensitive data is secured against loss or unauthorized access even if a device is compromised.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Scalability:&lt;/strong&gt; Mobile security can accommodate growth or changing threat landscapes.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cost efficiency:&lt;/strong&gt; Significant cost savings come from operational efficiencies, fewer standalone tools and incident prevention.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Integration considerations&lt;/h4&gt;

&lt;p&gt;CISOs and other security professionals want to ensure 100% of mobile devices on their network are managed and 100% secured. Integrating MDM and MTD is an important step toward achieving that.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This integration gives cybersecurity teams a centralized command center from which they can manage devices, enforce security policies and identify threats all in one place.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To make this integration a success, take these basic considerations into account as you make that move:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Seamless integration:&lt;/strong&gt; When integrating MDM and MTD, ensure that the solutions communicate seamlessly, sharing data and triggers without manual intervention so they can deliver real-time threat response and policy enforcement.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Vendor collaboration:&lt;/strong&gt; Choose MDM and MTD solutions that offer native integration capabilities or are known to work well together. You may want to opt for solutions from vendors who provide both MDM and MTD to ensure compatibility.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Thu, 25 Jul 2024 07:00:00 Z</pubDate></item><item><guid isPermaLink="false">deb33608-57fe-4197-9b03-cbcadb697f83</guid><link>https://www.ivanti.com/blog/ios-16-and-ivanti-uem-what-to-know-about-the-latest-apple-release</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>iOS 16 and Ivanti UEM: What to Know About the Latest Apple Release</title><description>&lt;p&gt;Apple’s iOS 16 brings a number of device management enhancements. Highlights include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Identity and security: Managed Apple ID, User Enrollment&lt;/li&gt;
	&lt;li&gt;Device management: Cellular updates, Shared iPad management updates&lt;/li&gt;
	&lt;li&gt;Apple apps: Apple Configurator for iPhone, Classroom, Schoolwork&lt;/li&gt;
	&lt;li&gt;MDM Framework Update: Declarative Management&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ivanti’s UEM solutions are day-zero compatible for iOS 16, so customers won’t have to wait to take advantage of new enhancements. Let’s look at the key iOS 16 features that Ivanti will support from day zero.&lt;/p&gt;

&lt;h2&gt;Remote authentication on Shared iPad&lt;/h2&gt;

&lt;p&gt;Earlier versions of iPadOS require a Shared iPad to occasionally connect to the internet when a user tries to sign in. In iPadOS 16, Shared iPad defaults to using the local passcode for existing users on the device, requiring no network connection.&lt;/p&gt;

&lt;p&gt;MDM administrators can also choose to always enforce remote authentication or to define a grace period before remote authentication is required, providing the flexibility to determine when remote passcode changes take effect on existing cached sign-ins.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Ivanti users can access this feature:&lt;/strong&gt; To change the remote authentication settings from the default local passcode, go to the DEP profile under Shared iPad settings.&lt;/p&gt;

&lt;h2&gt;Default domains setting on Shared iPad&lt;/h2&gt;

&lt;p&gt;The latest iOS also allows admins to include default domains, making signing into a Shared iPad even easier – particularly for those with a lengthy Managed Apple ID. After entering the username portion of a Managed Apple ID, users can select their account’s domain from a list in the QuickType keyboard.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Ivanti users can access this feature:&lt;/strong&gt; Under the Shared iPad setting, admins will find a new section where they can input a list of domains for the user to select from when logging in.&lt;/p&gt;

&lt;h2&gt;Other features with day-zero support&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;A new field to populate &lt;code&gt;enablexlat464&lt;/code&gt; in Cellular Payload.&lt;/li&gt;
	&lt;li&gt;The ability to add the new Apple Business Manager skip key to Terms of Address.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;What else is coming?&lt;/h2&gt;

&lt;p&gt;Beyond the features above, we are diligently working to make sure our customers can enjoy the full set of iOS 16 features. New features coming soon include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Managed device attestation.&lt;/li&gt;
	&lt;li&gt;Declarative management.&lt;/li&gt;
	&lt;li&gt;OAuth 2.0 support for account-based enrollments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Device compatibility: &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;iPhone SE (2022), SE (2020), iPhone 13 Pro Max, 13 Pro, 13, 13 mini, iPhone 12 Pro Max, 12 Pro, 12, 12 mini, iPhone 11 Pro Max, 11 Pro, 11, iPhone XS Max, XS, XR, X, iPhone 8 Plus, 8&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Support discontinued: &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;iPhone SE, iPhone 6s and iPhone 6s Plus, iPhone 7 and iPhone 7 Plus, iPod touch&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Resources:&amp;nbsp;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/guide/deployment/whats-new-dep950aed53e/web" target="_blank" rel="noopener"&gt;&lt;em&gt;What’s new in Apple Platform Deployment&lt;/em&gt;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://developer.apple.com/videos/play/wwdc2022/10045/" target="_blank" rel="noopener"&gt;&lt;em&gt;What’s new in Managing Apple Devices&lt;/em&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Statements in the blog concerning future product availability and plans are forward looking statements, and they are subject to change. They do not represent a commitment, promise or legal obligation to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Mon, 12 Sep 2022 20:03:12 Z</pubDate></item><item><guid isPermaLink="false">a29e4fbe-c135-4689-8068-a5c0b89672b1</guid><link>https://www.ivanti.com/blog/ivanti-delivers-zero-day-compatibility-and-key-feature-support-for-ios-and-ipados-15</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>Ivanti Delivers Day-Zero Compatibility and Key Feature Support for iOS and iPadOS 15</title><description>&lt;p&gt;Here at Ivanti, we are excited about iOS 15 and iPadOS 15. I&lt;span dir="RTL"&gt;’&lt;/span&gt;m pleased to share that we offer day-zero compatibility and key feature support across the Ivanti product portfolio for the new features built into Apple&lt;span dir="RTL"&gt;’&lt;/span&gt;s updated OSs.&lt;/p&gt;

&lt;p&gt;iOS 15 and iPadOS 15 bring plenty of new things to see and experience with a combination of security, user experience, and performance. Some of the coolest new features and improvements include Managed Pasteboard, New Code signature format for security, Account-Driven User Enrollment, Required Apps and Books improvements, Declarative Management, and Software Update options and Shared iPad Enhancements.&lt;/p&gt;

&lt;p&gt;Ivanti customers can take advantage of the new features in iOS 15 and iPadOS 15 including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Managed Pasteboard: &lt;/strong&gt;This is a new restriction which controls if the paste function is affected with managed open in rules. If this restriction is imposed, then the user will see a notification explaining that the paste feature is not allowed while trying to paste content. Your organization’s name can also be displayed on the notification, which can be customized in organization info settings with &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Ivanti Unified Endpoint Management (UEM)&lt;/a&gt; formerly MobileIron Cloud.&lt;/li&gt;
	&lt;li&gt;This is another new restriction that will allow admins to restrict the device from connecting to Siri servers for the purposes of translation. This feature is also available with Ivanti UEM.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;New Code Signature Format: &lt;/strong&gt;With iOS 15 Apple has again strengthened the security of the platform. Among the improvements, iOS 15 requires an updated code signature format. The good news is that these improvements do not require any changes from developers distributing their apps through the App Store or TestFlight because App Store Connect will re-sign the app. Ivanti customers distributing their apps though the &lt;a href="https://developer.apple.com/programs/enterprise/" target="_blank" rel="noopener"&gt;Apple Developer Enterprise Program&lt;/a&gt; or using &lt;a href="https://www.ivanti.com/blog/your-enterprise-apps-might-need-re-signing-for-ios-15-compatibility"&gt;incapptic Connect&lt;/a&gt; don’t need to worry either. Starting with version 1.38.0 their apps can be re-signed automatically meeting iOS 15 requirements. Developers using ad hoc, or enterprise distribution might need to re-sign their apps manually and should check if their apps need to be re-signed using the codesign utility as outlined &lt;a href="https://developer.apple.com/forums/thread/682775#681438022" target="_blank" rel="noopener"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Apart from the above features Ivanti is also diligently working on other cool features such as Account-Driven User Enrollment, Declarative Management, Apps and Book Improvements so our customers can enjoy the full set of iOS 15 and iPadOS 15 features. At Ivanti, we are committed to providing excellent customer service and support. We look forward to helping our customers leverage the full potential of the updates in iOS 15 and iPadOS 15.&lt;/p&gt;

&lt;p&gt;To learn more and to check device compatibility:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.apple.com/ios/ios-16/" target="_blank" rel="noopener"&gt;https://www.apple.com/ios/ios-16/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.apple.com/ipados/ipados-16/" target="_blank" rel="noopener"&gt;https://www.apple.com/ipados/ipados-16/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Statements in the blog concerning future product availability and plans are forward looking statements, and they are subject to change. They do not represent a commitment, promise or legal obligation to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 20 Sep 2021 19:16:01 Z</pubDate></item><item><guid isPermaLink="false">93e1a67c-6a30-4bb5-8c56-6715bcbc3ea2</guid><link>https://www.ivanti.com/blog/apple-wwdc-2021</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Apple WWDC 2021</title><description>&lt;p&gt;Apple’s Worldwide Developers Conference is a week of amazing sessions that define the coming year, announce new features, and preview technologies that will be at the core of managing Apple’s platforms inside your organization. Apple announced its latest versions of operating systems - iOS 15, iPadOS 15, watchOS 8, tvOS 15 and macOS Monterey, all of which have exciting new features shared across platforms that will make the Apple ecosystem even better. Apple hosted this conference virtually for the second year in a row due to the global pandemic.&lt;/p&gt;

&lt;p&gt;Key announcements for iOS 15 consist of consumer and enterprise features such as major updates to FaceTime, new Focus features to reduce distraction, enhanced on-device intelligence to discover information, and more ways to explore the world using Maps, Weather, and Wallet.&lt;/p&gt;

&lt;p&gt;One of the key enterprise features is declarative device management which is a new paradigm where the management will allow MDM servers to describe the right configuration to the device and let the device handle the implementation/execution. As previously mentioned in &lt;a href="https://www.ivanti.com/blog/exciting-announcements-at-wwdc21" target="_blank"&gt;a post about Apple WWDC&lt;/a&gt;, we firmly believe that declarative device management will have a major impact on the future of device management. Keep reading to learn more about the new capabilities included in declarative device management.&lt;/p&gt;

&lt;h2&gt;User Driven User Enrollment&lt;/h2&gt;

&lt;p&gt;First, a new version of User Enrollment was announced. Before the user can request their enrollment profile, they require authentication against the organization’s MDM service, or against organization IdP, and only then will they be allowed to download their MDM Enrollment profile. This is called user driven user enrollment.&lt;/p&gt;

&lt;h2&gt;Required App&lt;/h2&gt;

&lt;p&gt;Another simple yet important feature is the Required App on unsupervised devices. Admins can push one managed app onto an unsupervised device and can be sure that the app cannot be removed. This is installed as part of the initial MDM profile and the consent to install apps is included during the profile installation. This feature is useful for installing an app that is critical for the business functions such as &lt;a href="https://www.ivanti.com/products/mobile-threat-defense" target="_blank"&gt;Mobile Threat Defense&lt;/a&gt;, a VPN app, or any other enterprise application. This will enhance BYOD security even further and make it easier for admins to manage BYOD devices.&lt;/p&gt;

&lt;h2&gt;Managed Pasteboard&lt;/h2&gt;

&lt;p&gt;Managed Pasteboard is a new feature that controls if paste is affected with managed open-in rules. If restrictions are imposed, then the user will see a notification letting them know that pasting is not allowed. This feature helps corporate data and contents better secured by preventing from unauthorized copy and paste.&lt;/p&gt;

&lt;h2&gt;MacOS Monterey&lt;/h2&gt;

&lt;p&gt;Apple also announced new features for macOS Monterey and a few of them are exclusive to Apple Silicon and T2 chip devices.&lt;/p&gt;

&lt;h2&gt;InstallLater for Software Update&lt;/h2&gt;

&lt;p&gt;In previous releases, admins were given just a few options to help keep devices up to date where admins can issue a blanket delay on updates for a period to allow for testing. In case a user does not install updates then admins can use the MDM command to InstallASAP. In macOS Monterey, there are some changes where the admin is allowed to set a number of deferrals that a user can use to push back their own update, and then also enforce an update after a given number of deferrals. InstallLater makes the machine update at night, silently and automatically, while users are away from work devices providing convenience with no interruption, leading to an even better user experience. IT admins are also given the flexibility to push updates onto managed Mac devices with this enhancement.&lt;/p&gt;

&lt;h2&gt;Device Lock Command&lt;/h2&gt;

&lt;p&gt;Device lock command on Macs has been enhanced with Apple silicon. Admins can now send six-digit pin codes, lock screen messages (optional) and phone numbers (optional) to the device. This will cause the device to reboot and present a user with information provided bringing feature parity across all Mac models. With remote lock in place, the user is unable to use their device until the pin is provided. Once the pin is entered, the device will reboot with all data intact and will be ready for login.&lt;/p&gt;

&lt;h2&gt;Erase Device Command&lt;/h2&gt;

&lt;p&gt;In MacOS Monterey, the erase all contents from settings for the Apple silicon and T2 chip devices will be available for quick return to service. This feature will be available via MDM as well. Sending the Erase Device Command will erase all user data and reboot back to the setup assistant making the device ready for the next user in minutes. That allows IT admins to save time refreshing a used device for a new user by eliminating a very time-consuming set up task. On devices with Apple silicon, this will also reset any security settings that have been modified in recovery. For Enterprises, the allowEraseContentAndSettings restriction will be available.&lt;/p&gt;

&lt;h2&gt;Removable System Extension&lt;/h2&gt;

&lt;p&gt;Apple added a few kernel extension enhancements along with a new feature called Removable System Extension where the feature will allow the app to deactivate its own system extension. This feature does not require an admin password to remove the system extension. This mainly is used in deployments where the Mac has no AdminUser.&lt;/p&gt;

&lt;p&gt;Overall, Apple has brought a lot of important management and security features across iOS, iPadOS, watchOS and macOS while bringing a balance between privacy, user agency and administrative control which makes a great device management solution. We will continue to find new ways to integrate these new features into our &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank"&gt;UEM platform&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 09 Jul 2021 18:15:58 Z</pubDate></item><item><guid isPermaLink="false">97f02f6f-e4bb-49a8-9ab5-5330adcc21b1</guid><link>https://www.ivanti.com/blog/ivanti-delivers-day-zero-compatibility-for-ios-and-ipados-14-5</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>Ivanti Delivers Day Zero Compatibility for iOS and iPadOS 14.5</title><description>&lt;p&gt;Here at Ivanti, we are excited about iOS and iPadOS 14.5. I&lt;span dir="RTL"&gt;’&lt;/span&gt;m pleased to share that we offer zero-day compatibility and key feature support across the Ivanti product portfolio for the new features built into Apple&lt;span dir="RTL"&gt;’&lt;/span&gt;s updated OS.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Apple is bringing a major change to the integration between the iPhone and the Apple Watch. iOS 14.5 introduces the ability to unlock your Face ID enabled phone with an associated Apple Watch. While this is a great feature for the end user, enterprise admins may want to control this to ensure the security of the managed device and data. Apple originally debuted Auto Unlock for Mac, and with its arrival in iOS 14.5 admins have the ability to disable Auto Unlock for iPhone on a managed device.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In addition to supporting the allow Auto Unlock for iPhone restriction, Ivanti also supports additional security restrictions such as:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Unpaired External Boot To Recovery&lt;/strong&gt; restriction where devices can be booted into recovery by an unpaired device.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Force On Device Only Dictation &lt;/strong&gt;restriction that allows the admin to prevent dictated content from being sent to Siri servers for processing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Apart from support for the above features, Ivanti is also working actively to make other new iOS and iPadOS14.5 features available in our upcoming releases so customers can take advantage of the new capabilities.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;At Ivanti, we are committed to providing excellent customer service and support. We look forward to helping our customers leverage the full potential of the updates in iOS and iPadOS14.5.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Statements in the blog concerning future product availability and plans are forward looking statements, and they are subject to change. They do not represent a commitment, promise or legal obligation to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 26 Apr 2021 17:36:50 Z</pubDate></item></channel></rss>