<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/charlie-rasch/rss" /><link>https://www.ivanti.com/blog/authors/charlie-rasch</link><item><guid isPermaLink="false">4169d8e8-b026-4cc7-ac1c-6ab1cb8ee359</guid><link>https://www.ivanti.com/blog/mdm-vs-mdm-what-s-the-difference-between-mobile-device-management-and-modern-device-management</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>MDM vs. MDM: What’s the Difference Between Mobile Device Management and Modern Device Management?</title><description>&lt;p&gt;When it comes to mobile device management versus modern device management, they may sound similar, but there’s a significant degree of difference between them. The &lt;a href="https://straitsresearch.com/report/enterprise-mobile-device-market" rel="noopener" target="_blank"&gt;explosive growth&lt;/a&gt; in these devices within enterprises makes it crucial for organizations to choose the right platform for overseeing them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In this blog post, let’s examine:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;What “mobile device management” and “modern device management” each mean.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;The differences and similarities between the two platforms.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Why so many people confuse the two – it’s more than just the shared “MDM” acronym!&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="one"&gt;What's mobile device management?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Mobile device management&lt;/a&gt; — we’ll call it “mobile MDM” in this post — can be defined this way:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Mobile device management is a technology that helps an organization’s IT and security teams to manage and secure their enterprise’s mobile devices, such as smartphones, laptops and tablets, across different locations, formats and operating systems (OS).&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Mobile MDM solutions help sysadmins efficiently configure, monitor and update the hardware and software settings on multiple mobile devices from one dashboard.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In this way, mobile MDMs ensure that an end user’s device usage — whether directly managed or permitted to access organizational apps through bring-your-own-device (BYOD) policies — complies with company policies and protects any confidential data stored or accessed through the endpoint.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Mobile MDM solutions typically include features such as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Policy enforcement.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software installation/update management.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Remote wipe capabilities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Device tracking/monitoring.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;User authentication/authorization controls.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Asset inventory management.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By allowing administrators to remotely manage these settings on all their organization’s mobile devices from a single console or dashboard — regardless of the device type or operating system — mobile MDM solutions make it much easier for organizations to maintain consistent security policies across all of their connected assets. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Plus, most mobile MDM solutions provide robust support for enterprise mobility management (EMM). EMM provides additional layers of security for mobile endpoints by allowing administrators to enforce granular access controls over which applications can be installed or accessed by specific end users.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This granularity ensures that specific employee user profiles only have access to approved applications through an organization-approved app store, while also providing detailed visibility into each user’s application usage and data sharing activities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to these security features, many mobile device management solutions also provide advanced analytics capabilities that allow organizations to gain valuable insights into endpoint device and data usage trends across their connected device base.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These endpoint analytics help organizations:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Identify potential problem areas so they can proactively address issues before they become serious threats.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Optimize IT and technology resources while improving user experience.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Overall, mobile MDM solutions represent a powerful tool for organizations looking to streamline the process of managing multiple mobile devices while maintaining a high level of security for their confidential data assets.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What's modern device management?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/glossary/modern-device-management"&gt;Modern device management&lt;/a&gt; — which for this post, we’ll call “modern MDM” —&amp;nbsp;solutions represent an innovative evolution in managing the devices of an organization, and can be defined this way:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Modern device management is a form of endpoint management technology that focuses on standardizing, tracking and controlling all the devices used by employees within an organization’s network environment.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;More specifically, a modern MDM solution helps organizations protect their data, applications and networks from malicious attacks and unauthorized access. It also enables them to centrally manage all their devices within one unified system.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern MDM solutions are designed to help companies establish control over the various types of devices they use in their businesses — ranging from smartphones and tablets to laptops, desktop computers and servers.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern MDM solutions help sysadmins:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Configure settings on each device remotely.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Monitor usage activity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Apply restrictions on certain features or applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Enforce security policies.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Deploy application updates and patches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Protect organizational data stored on or accessed through an employee’s phone and other devices.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Modern MDMs also offer advanced features such as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Remote wiping of sensitive data if a device is lost or stolen.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Geofencing capabilities for locating misplaced hardware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Location tracking for better asset management.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software distribution for installing new applications quickly and easily across multiple endpoints.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;(Of course, all these features must be used responsibly to legally support every employee’s privacy rights.) &amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;Comparing MDM to MDM: what’s the difference between mobile and modern device management?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;There are two primary areas of difference between modern device management and mobile device management:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;The kinds of devices covered by each MDM.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Each MDM’s primary focus.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;MDM difference #1: Modern device management solutions cover more types of endpoints than mobile device management&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;When comparing mobile device management versus modern device management (MDM), the first and most obvious difference between the two lies in their scope of coverage.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Mobile&lt;/em&gt; device management covers traditional mobile devices such as smartphones, tablets and laptops.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Modern&lt;/em&gt; device management reaches a wider range of connected network devices, including but not limited to:&amp;nbsp;
	&lt;ul&gt;
		&lt;li&gt;IoT sensors.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;Wearables (e.g., smart watches).&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;Medical equipment.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;Industrial machinery.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;Desktops.&amp;nbsp;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;MDM difference #2: Mobile device management focuses on controlling configurations; modern device management primarily collects and gathers usage data&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Additionally, while both mobile device management and modern device management platforms are designed to manage corporate-owned mobile or connected devices within an organization’s environment, the scope of control that each type of management provides varies greatly.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Mobile&lt;/em&gt; device management provides IT administrators with comprehensive control over the configuration settings of each mobile device they manage, including access restrictions on applications or certain features.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;In contrast, &lt;em&gt;modern&lt;/em&gt; device management is focused on monitoring user activity and providing insights into usage trends across all managed devices. It also allows for remote wiping of any sensitive data stored on the device if required.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Comparing MDMs: what do both mobile and modern device management have in common?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Despite these fundamental differences in scope and focus, these two types of device management solutions share some commonalities. Both:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Offer enterprise-level security capabilities through encryption and authentication techniques.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Allow for quick application patching.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Provide device location tracking.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Support geofencing capabilities.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Enable software distribution.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Have inventory management capabilities.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Provide detailed reporting insights about each managed device.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Enable automated backups.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Ensure compliance with industry privacy standards, such as HIPAA or GDPR regulations.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Reduce costs associated with managing a large fleet of devices by automating manual tasks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Increase productivity by streamlining processes related to device management operations, among other features.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;Clearing up confusion over mobile device management versus modern device management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The similarities between the two MDM platforms offer quite a bit of room for confusion — even if &lt;em&gt;modern&lt;/em&gt; device management solutions clearly cover a wider range of possible endpoint devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For example, both systems offer encryption technology for data security. However:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Mobile&lt;/em&gt; MDM focuses more on authentication techniques.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Modern &lt;/em&gt;MDM offers more detailed monitoring of user activity.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Similarly, both systems provide location tracking capabilities, but:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Mobile&lt;/em&gt; MDM is better suited for managing fleets of devices or assets in remote locations.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Modern&lt;/em&gt; MDM is better suited for tracking individual user device behavior.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Another area where confusion arises is software distribution. Both systems can deploy application updates and patches to devices remotely. However:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Mobile&lt;/em&gt; MDM focuses only on over-the-air deployments.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Modern&lt;/em&gt; MDM provides more comprehensive control over configuration settings.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;table border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Encryption and security&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Location tracking&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Software distribution&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Mobile device management&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Focuses more on authentication techniques.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Better suited for managing fleets of devices&amp;nbsp;or assets in remote locations.&amp;nbsp;&lt;/p&gt;

			&lt;p&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Focuses only on over-the-air deployments.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Modern device management&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Offers more detailed monitoring of user activity.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Better suited for tracking individual user device behavior.&amp;nbsp;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Provides more comprehensive control over configuration settings.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;Finally, there are also differences in terms of reporting insights and automated backups. While both systems provide these features to varying degrees, depending on device type and usage requirements, it’s important for customers to understand which system best meets their needs before making any decisions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;table border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Mobile device management&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Modern device management&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Primary devices focus&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Phones, tablets, PDAs, COSU, etc.&lt;/td&gt;
			&lt;td&gt;Same as mobile, but with additional device types including servers, desktops, laptops, IoT, etc.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Management scope&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Mobile device focus&lt;/td&gt;
			&lt;td&gt;User focus&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Application deployment&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Yes – via MAM&lt;/td&gt;
			&lt;td&gt;Yes – via in-house apps store&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Endpoint configuration and policies&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Mobile only&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Yes&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Device tracking&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Mobile only&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Yes&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Reporting and trends&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Limited&lt;/td&gt;
			&lt;td&gt;Yes&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;OS and application updates&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Over-the-air&lt;/td&gt;
			&lt;td&gt;Comprehensive patching and management&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;Which MDM is right for you?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;There are clear differences when contrasting mobile device management versus modern device management. And both offer extensive benefits to organizations looking for ways to optimize their IT infrastructure while ensuring their assets remain secure at all times.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The best practice in picking between the two? An organization should select an MDM system based on its individual requirements. For example, while both mobile and modern device management systems offer similar features like encryption technology or authentication techniques, they vary significantly in terms of scope and focus.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Make sure you select the solution that matches best with your current security protocols and desired feature set — because while they may share an acronym, their differences may make all the difference for your enterprise.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 06 Nov 2023 19:40:47 Z</pubDate></item><item><guid isPermaLink="false">7ac23234-735c-4717-8f8a-9ce13319bb52</guid><link>https://www.ivanti.com/blog/what-s-new-in-ivanti-neurons-for-mobile-device-management</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><title>What's New in Ivanti Neurons for Mobile Device Management?</title><description>&lt;p&gt;The latest release of &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for MDM&lt;/a&gt;&amp;nbsp;includes enhancements for managing COSU devices and transitioning to cloud-based device management.&lt;/p&gt;

&lt;h2&gt;Provide&amp;nbsp;extra security and support for your Android COSU devices&lt;/h2&gt;

&lt;p&gt;Corporate-owned single-use (COSU) devices are dedicated for a single use, and Android Enterprise's capabilities can help configure those devices to best serve that purpose. Use cases for COSU devices include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Point-of-sale (POS) systems in retail.&lt;/li&gt;
	&lt;li&gt;Handheld barcode scanners in supply chain.&lt;/li&gt;
	&lt;li&gt;Smart panels (such as information kiosks, timecard entry panels, physical access entry panels, etc.) across a number of industries, including healthcare, retail and manufacturing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These locked-down devices can be dedicated to a single user, multiple users&amp;nbsp;or external users. The Android Enterprise COSU configuration provides more control over how your staff and customers use the device&amp;nbsp;by compartmentalizing the operating system to deploy in a locked-down environment, running a single application or a specific set of apps. Usually, one application is intended to run on the device and that’s all. COSU improves security, efficiency, processes, compliance and user experience by locking devices down to execute a small range of specific tasks.&lt;/p&gt;

&lt;p&gt;With the latest release of Ivanti Neurons for MDM, several new features have been added to better secure and support your COSU devices.&lt;/p&gt;

&lt;h3&gt;5G slicing support&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With more COSU devices deployed in remote locations, 5G support becomes more essential for securing those devices. Not only does Neurons for MDM provides 5G information to let you know if your device is part of your private 5G network slice, 5G network slicing allows your provider to take a shared physical network and portion it out into logical segments. Each segment is provisioned for a different set of users, devices&amp;nbsp;and applications,&amp;nbsp;and the logical separations mean the traffic from one slice does not interfere with another.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In a retail environment, different slices can be configured to provide for your mobile POS&amp;nbsp;devices and for your customer kiosks. Your remote retail environments might employ these slicing schemes to provide better employee and customer experience, while behind the scenes keeping track of inventory. These slices would separate each other’s traffic and resources, improving security. 5G slicing can be enabled in the lockdown Android Enterprise configuration within Ivanti Neurons for MDM.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Configuring higher app priority distribution and updates on your COSU devices&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With Ivanti Neurons for MDM, IT can set higher-priority apps for enrollment and update on COSU devices. This will allow admins to set which applications are critical for deployment and updating.&amp;nbsp; This is important especially if the update would resolve or prevent a production-related issue. Getting these updates out as fast as possible can reduce downtime or even prevent a production-affecting event from surfacing.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Providing additional USB security to your COSU devices&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With Ivanti Neurons for MDM, you can configure the USB port to be used for charging only to prevent the USB port from being used as a physical vector for malicious attacks, keeping unauthorized users from accessing confidential data. This&amp;nbsp;is important particularly important for&amp;nbsp;COSU devices in an open area, such as kiosks and POS devices in retail stores.&lt;/p&gt;

&lt;h3&gt;Unattended remote session support&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Remote session support becomes even more of a necessity for remote COSU devices,&amp;nbsp;particularly in a retail environment where there maybe no one is available&amp;nbsp;after the store closes&amp;nbsp;to troubleshoot and resolve technical issues.&lt;/p&gt;

&lt;p&gt;With Neurons for MDM, you can initiate a remote session from within the console without requiring input from any user at that location, making it easy&amp;nbsp;to manage COSU devices when there is no physical access to those devices.&lt;/p&gt;

&lt;h2&gt;Easily transition Windows devices to cloud-based modern management&lt;/h2&gt;

&lt;p&gt;We are excited to announce an Ivanti Neurons for MDM deployment package with the Q2 release to support customers with an easy transition for their Windows devices from traditional management to modern management.&lt;/p&gt;

&lt;h3&gt;Ivanti Neurons for MDM deployment package&lt;/h3&gt;

&lt;p&gt;IT can enroll devices managed by Microsoft Configuration Manager (formerly SCCM) or Ivanti Endpoint Manager into Ivanti Neurons for MDM. The Deployment Package tool allows organizations to streamline the transition of Windows devices to cloud-based modern management, without downtime or end-user interruption. Seamless transition is achieved by downloading a unique deployment package from the Neurons for MDM console, then deploying it through the existing management tool or domain. Once the package is deployed, it will silently enroll endpoints into Neurons for MDM for ongoing management. This approach allows administrators to first migrate devices easily, then have flexibility to configure devices later over the air. When device enrollment is completed silently into Neurons for MDM, it is joined with MDM and gets co-managed by two management authorities. Once an administrator configures the desired Windows experience within Neurons for MDM, a legacy management platform can be decommissioned, leaving Neurons for MDM as the&amp;nbsp;single management authority of the device.&lt;/p&gt;

&lt;p&gt;This package can be deployed in environments that do not leverage Azure Active Directory (AAD). The main elements of Neurons for MDM modern Windows management suite do not require AAD. Co-management or co-existence may require certain workloads or configurations to be deployed upon silent enrollment, to avoid any impact during transition.&lt;/p&gt;

&lt;h3&gt;Why move to cloud-based modern management?&lt;/h3&gt;

&lt;p&gt;As UEM solutions have evolved and added more capabilities over the years, it has become&amp;nbsp;critical to provide a consistent user experience and management capabilities between mobile (iOS and Android) and Windows devices. Cloud-based modern device management on Windows devices is fundamentally different from&amp;nbsp;traditional device management, but similar to mobile device management on iOS and Android.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One of key differences is profile-based management. Breaking from image-based management relieves significant IT workload from manual device imaging and maintenance. A profile is a collection of configuration settings that are applied to a device based on group membership, which allows profiles to be created as a module with multiple profiles assigned to a single user depending on their job function and required apps.&amp;nbsp;With profile-based management, IT can remotely make changes on any configuration and push patch updates over the air.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Those differences mean that cloud-based modern management significantly reduces IT overhead and the complexity of managing Windows devices.&lt;/p&gt;

&lt;p&gt;There are a number of drivers for considering a&amp;nbsp;transition from client-based to cloud-based modern device management:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Higher scalability and lower cost impact.&lt;/strong&gt;&amp;nbsp;We can view scalability into two different ways – faster deployment and ease&amp;nbsp;of scaling.&amp;nbsp;First, a cloud-based solution&amp;nbsp;is&amp;nbsp;faster to deploy compared to an on-prem solution.&amp;nbsp;Second, if you want to deploy more devices with a cloud-based solution, you don’t need to build a new server, which would be required for&amp;nbsp;an on-prem solution to scale.&amp;nbsp;Also, cloud-based solutions are&amp;nbsp;managed by the vendor, so customers can save the cost of&amp;nbsp;managing&amp;nbsp;infrastructure and servers on their own.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Better security posture.&lt;/strong&gt;&amp;nbsp;Some might argue that on-prem has a better reputation when it comes to security posture. And it is true that some customers in heavily regulated industries still prefer to continue using on-prem solutions. The caveat is that security posture really depends on a customer’s infrastructure, and it often&amp;nbsp;requires a heavy investment for customers to build their own security infrastructure and hire experts to manage it.&amp;nbsp;Cloud service providers, including Ivanti, meet a high security standard with various certifications&amp;nbsp;— for example, Ivanti Neurons for MDM is FedRAMP&amp;nbsp;and SOC2 certified.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved productivity and user experience.&lt;/strong&gt;&amp;nbsp;Remember&amp;nbsp;the significant efforts that went into the Windows 10 migration of a few years ago — and the loss of productivity due to downtime during the update?&amp;nbsp;Modern device management minimizes impacts on productivity between Windows OS updates, as devices are being managed like smartphones.&amp;nbsp;Modern device management also allows you to leverage a zero-touch provisioning solution that integrates systems like Windows Autopilot, Apple Business Manager, Android Enterprise&amp;nbsp;and Samsung Knox Mobile Enrollment.&amp;nbsp;IT can ship a Windows device directly to a user, and it automatically gets enrolled into the cloud-based UEM solution.&amp;nbsp;You can cut onboarding time from weeks to two days, which results not only in a faster onboarding but also&amp;nbsp;higher user satisfaction.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Learn more&lt;/h2&gt;

&lt;p&gt;For more information about Ivanti Neurons for MDM, visit the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;product page&lt;/a&gt;&amp;nbsp;or view the &lt;a href="https://help.ivanti.com/mi/help/en_us/cld/8x/rn/default.htm" target="_blank"&gt;release notes&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 02 May 2022 18:25:13 Z</pubDate></item><item><guid isPermaLink="false">987dd57a-703c-467b-bb05-9a72b08de367</guid><link>https://www.ivanti.com/blog/what-s-new-in-epm-2022</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><title>What's New in EPM 2022?</title><description>&lt;p&gt;The latest release of Ivanti Endpoint Manager includes several new features.&lt;/p&gt;

&lt;h2&gt;Enhanced Windows Autopilot support&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti Endpoint Manager 2022 will allow customers to easily deploy provisioned devices to end users, regardless of where they are located, without infrastructure changes. Additionally, Ivanti Endpoint Manager will continue to be the trusted solution to manage modern devices anywhere within the device lifecycle. These enhancements include adding new Autopilot functionality:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Updated search UI.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Updated APIs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;PowerShell requirements and detection rules.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Web console 2.0 – software distribution enhancements&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;This enhancement now allows the helpdesk analyst role to deliver software to end users via the new web console. This includes the following features set for this role:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Quickly find a user and/or device.&lt;/li&gt;
	&lt;li&gt;Install and uninstall software packages.&lt;/li&gt;
	&lt;li&gt;Find and filter between different types of software packages.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Get deployment status via task notifications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Console - improved query import capabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Admins often require reporting on a large list of devices. Originally, EPM limited queries to 50 devices when importing. This limitation has been removed within the EPM console.&lt;/p&gt;

&lt;h2&gt;Improved inventory scanner for macOS&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti rewrote and optimized the agent inventory scanner to improve interoperability with macOS endpoints, making it more efficient and reducing scan time from 7-12 minutes down to 1-2 minutes.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;More resources&lt;/h2&gt;

&lt;p&gt;Visit the &lt;a href="https://forums.ivanti.com/s/endpoint-manager-and-endpoint-security?language=en_US" target="_blank"&gt;Ivanti Community&amp;nbsp;Endpoint Manager page&lt;/a&gt; for additional resources, including &lt;a href="https://forums.ivanti.com/s/article/Ivanti-Endpoint-Manager-2022-Release-Information-and-Useful-Links?language=en_US" target="_blank"&gt;release notes&lt;/a&gt;, and to &lt;a href="https://forums.ivanti.com/s/article/Download-the-Latest-Service-Pack-for-Ivanti-LANDESK-Software-Products" target="_blank"&gt;download the latest service pack for Ivanti EPM products&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 26 Apr 2022 18:29:11 Z</pubDate></item><item><guid isPermaLink="false">a827ed42-4386-4f75-939a-7ac3fca7a5d9</guid><link>https://www.ivanti.com/blog/how-to-mitigate-cve-2022-0847-the-dirty-pipe-vulnerability</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><category>Security</category><title>How to Mitigate CVE-2022-0847 (The Dirty Pipe Vulnerability)</title><description>&lt;h2&gt;What is the “Dirty Pipe Vulnerability”?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Dirty Pipe vulnerability is a Linux kernel vulnerability that allows the ability of non-privileged users to overwrite read-only files. The vulnerability is due to an uninitialized “pipe_buffer.flags” variable, which overwrites any file contents in the page cache even if the file is not permitted to be written, immutable, or on a read-only mount, including CD-ROM mounts. The page cache is always writable by the kernel and writing to a pipe never checks any permissions.&amp;nbsp;An extensive write-up on the Dirty Pipe vulnerability can be found in the reference links at the end of this blog.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why is this important?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;This enables attackers to perform privilege escalation by overwriting data in arbitrary read-only files and injecting code from unprivileged processes to privileged processes. This can make Linux and Android systems vulnerable to a multitude of malware and other exploits, including ransomware.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Who is affected?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;This vulnerability affects endpoints running Linux with a kernel version 5.8 or higher. This includes a multitude of devices running Android 12 and Linux.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How to find out if I am affected?&amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;Linux:&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;From the Linux command line, run the following command:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;uname -srm&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Your output should show something similar:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Linux 5.13.19-3-generic x86_64&lt;/code&gt;&lt;/p&gt;

&lt;h3&gt;Android:&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;To find the kernel version on Android:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With most generic Android devices, go to setting and search or select “About Phone” -&amp;gt; “Android Version” and you should see the “Kernel version.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="Android device showing &amp;quot;About phone&amp;quot; screen" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/03/android-about-phone.png"&gt;&lt;img alt="Android device showing &amp;quot;Android version&amp;quot; screen" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/03/android-android-version.png"&gt;&lt;img alt="Android device showing the kernel version on the &amp;quot;Android version&amp;quot; screen" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/03/android-kernel-version.png"&gt;&lt;/p&gt;

&lt;p&gt;With Samsung, go to settings and search or select “About Phone” -&amp;gt; “Software Information” and your “Kernel version” should be displayed.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Samsung device showing &amp;quot;About Phone&amp;quot; screen" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/03/samsung-about-phone.png"&gt;&lt;img alt="Samsung device showing &amp;quot;Software Information&amp;quot; screen" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/03/samsung-software-information.png"&gt;&lt;/p&gt;

&lt;p&gt;Currently, the most common Android devices affected by this vulnerability are Samsung S22 and Google Pixel 6 series.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How to mitigate Dirty Pipe&amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;Linux&lt;/h3&gt;

&lt;p&gt;If your endpoint is running a Linux kernel version 5.8 or higher, you should patch your kernel to 5.16.11, 5.15.25 and 5.10.102 or greater. Most distributions have already released a kernel patch. You can run an update with your distro’s package manager to update to the latest kernel.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Patch for Endpoint Manager can find which Linux endpoints are affected and automatically apply the vulnerability fix.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Android&lt;/h3&gt;

&lt;p&gt;On Android, manufacturers are working on applying a critical system update. It is highly recommended to contact your device manufacturer to confirm they are addressing this vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You can create reports in Neurons for Discovery to find which Android endpoints are affected.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With Ivanti Neurons for MDM, applying a “System Update” configuration and setting the “Android System Update” to “Automatic” will push the latest manufacture approved system updates to your devices.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Reference Links&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://dirtypipe.cm4all.com/" rel="noopener" target="_blank"&gt;Max Kellermann: The Dirty Pipe Vulnerability&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2022-0847" rel="noopener" target="_blank"&gt;Red Hat Bugzilla – Bug 2060795&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://android-review.googlesource.com/c/kernel/common/+/1998671" rel="noopener" target="_blank"&gt;Google’s Android Kernel Upstream Bug Fix addressing CVE-2022-0847&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://vimeo.com/685677595" rel="noopener" target="_blank"&gt;Ivanti Endpoint Manager - Patch Management and Automation - Video&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=-6V69aDYWhs" rel="noopener" target="_blank"&gt;Ivanti Neurons Patch Intelligence&amp;nbsp;&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Wed, 16 Mar 2022 13:09:48 Z</pubDate></item><item><guid isPermaLink="false">99fdc24a-f686-4814-b465-347895a3b2d6</guid><link>https://www.ivanti.com/blog/best-practices-to-secure-your-corporate-owned-personally-enabled-cope-android-devices</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><category>Security</category><title>Best Practices to Secure Your Corporate-Owned Personally Enabled (COPE) Android Devices</title><description>&lt;h2&gt;What is COPE?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;COPE stands for Corporate Owned Personally Enabled Device. &amp;nbsp;These are devices that are owned and provided by the company for work but are also expected to be used for personal reasons. &amp;nbsp;It’s a term that’s especially relevant today, with the adoption of Everywhere Workplace, as companies are giving employees more freedom with corporate-owned and controlled devices.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why COPE is important to your IT&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Over the years, IT professionals have voiced their frustration over carrying multiple devices—one for work and another for personal use. &amp;nbsp;As a result, many organizations have provided Android mobile devices to their employees, expecting that a single device will serve a dual personal/professional purpose. However, this has created multiple challenges for IT, as they need to keep corporate data protected from personal use. Unlike BYO devices, COPE devices are owned by the company, which means you’ll need to track and monitor these assets while minimizing the chance of them being used to exploit the security of your infrastructure.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Best practices to secure COPE devices &amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;Work Profile to protect company apps and data &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Use a work profile to protect your company apps and data. &amp;nbsp;With a work profile, you can securely and privately use the same device for work and personal purposes. The work profile keeps your company’s apps and data and the employee’s apps and data in a separate encrypted security domain.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Using White or Blacklist apps outside the work profile &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Decide what apps that can be used on the separate personal enable, not in the work profile domain. Protect your users from themselves from downloading apps that can compromise the device by limiting what apps they can install.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Lockdown Configuration &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Use a lockdown configuration to protect the device from unauthorized access. There are many options you can use to protect your users from malicious activities and your devices from unauthorized access.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disable USB file transfer &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Protect your users and company data by preventing files from transferring over USB. This locks the USB port to only be used for charging.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disallow debugging features &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Debugging data provides verbose data of not only the applications and Android but can also include data that are used by those apps and OS. Only enable debugging when troubleshooting using debug is required by your software or hardware vendors.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Ensure verify apps &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Protect your users from possible malicious us apps that are sideloaded. Insure only verified apps that have been scanned and verified by Google Play Protect can be installed via the Google Play store.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disable data roaming &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Keep data on your trusted cellular networks, this can be vital if you are implementing 5G slicing for your Android devices.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disallow Bluetooth sharing &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Prevent user’s personal data from transferring off the device using Bluetooth protocols.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disallow Bluetooth settings &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Preconfigure and pair only authorized Bluetooth devices. Once you are done pairing those authorized devices, disable access to the Bluetooth settings&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disable Wi-Fi settings &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;If you want the COPE device to only connect to authorized company Wi-Fi networks, preconfigure those Wi-Fi networks with a Wi-Fi policy and disable Wi-Fi setting to prevent users adding and accessing unauthorized Wi-Fi networks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Disallow tethering &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Tethering may allow access to your mobile endpoint and your corporate network using personal devices. Disabling tethering prevents unauthorized access to the Android device and using your android device to exploit access to your company network.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
Disallow adding or modifying accounts &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Personal accounts on Work Profile allows user to download public apps on corporate container, which is a risk. Basic AE security always starts from preventing users from adding or modifying accounts within Work Profile&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Secure your device with Mobile Threat Protection &amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Add that next level of protection with Mobile Threat Defense. MTD adds not only provides protection from exploits but also protect your users from phishing attacks by using a hybrid on-device and cloud detection capabilities. MTD is also fully integrated into the MobileIron Go app, which means that when you deploy your devices, MTD is also already deployed to your devices.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why Ivanti Neurons for MDM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;With Ivanti Neurons for MDM&lt;/a&gt;, you can secure your employee- and executive-assigned devices while giving employees the freedom to use those Android devices for personal reasons. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for MDM will integrate your Android COPE devices using a cloud-base device management and security, which integrates mobile application management (MAM), app distribution and configuration, easily onboard Android devices with zero-touch, and the ability to scale when you grow, and secure your employees productivity and connectivity. In addition, Neurons of MDM also integrates with not just Android,. but other Operating Systems and Devices: iOS, MAC, Windows, and Linux.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Learn more about Ivanti Neurons for MDM.&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Fri, 11 Feb 2022 18:20:44 Z</pubDate></item><item><guid isPermaLink="false">be951c27-36f8-4571-b743-4d4ee1a0335e</guid><link>https://www.ivanti.com/blog/how-to-secure-byo-android-devices</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>How to Secure BYO Android Devices</title><description>&lt;p&gt;Two-thirds of US white-collar employees are working from home some or all of the time, according to a &lt;a href="https://news.gallup.com/poll/355907/remote-work-persisting-trending-permanent.aspx" rel="noopener" target="_blank"&gt;September 2021 Gallup survey&lt;/a&gt; – and of those, 91 percent hope to continue to do so even after the pandemic.&lt;/p&gt;

&lt;p&gt;In this Everywhere Workplace environment, a “bring your own device” (BYOD) policy is an appealing proposition for employees and IT departments alike, &lt;a href="https://www.sciencedirect.com/science/article/pii/S0268401220306940" rel="noopener" target="_blank"&gt;leading to&lt;/a&gt; an average annual savings of $350 per employee and a 34 percent increase in productivity.&lt;/p&gt;

&lt;p&gt;But with BYOD policies come new requirements for securing those employee-owned devices, keeping corporate information safe while respecting employees’ privacy. Enter: &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for Mobile Device Management (MDM)&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Zero Trust for Android BYOD&lt;/h2&gt;

&lt;p&gt;Android holds &lt;a href="https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/" rel="noopener" target="_blank"&gt;over 72 percent&lt;/a&gt; of the mobile operating system market, so Ivanti Neurons for MDM, which integrates with Android Enterprise, is an ideal zero-trust foundation for implementing a BYOD directive with relative ease.&lt;/p&gt;

&lt;p&gt;Android Enterprise is the set of features and services built into Android that allows companies to secure and manage corporate data and apps on Android devices. With Android Enterprise’s work profiles, employees’ personal data and information on the device are unavailable to their IT department, while the company knows their corporate apps and data are secure. Android enforces separation between personal and work data at the kernel level across process, memory and storage. All applications from Google Play work out of the box with separate data storage.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons for MDM&lt;/h2&gt;

&lt;p&gt;With Ivanti Neurons for MDM, you can manage work apps and data within the work profile while personal apps, data and usage remain private – all with minimal interaction from the employee.&lt;/p&gt;

&lt;p&gt;Simply email employees a Google Play Store link to &lt;a href="https://vimeo.com/ivanti/download/647120704/6eac83404d" rel="noopener" target="_blank"&gt;download and run Ivanti’s app&lt;/a&gt;. All that is required to complete the setup process is their employee email and credentials.&lt;/p&gt;

&lt;p&gt;Your IT department can configure Neurons for MDM to automatically configure the work profile to download and install the apps and their settings so the employee can hit the ground running.&lt;/p&gt;

&lt;h2&gt;Key Features of Ivanti Neurons for MDM&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://vimeo.com/ivanti/download/647120649/135ac27c5c" target="_blank" rel="noopener"&gt;&lt;strong&gt;App catalog&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt; Add, configure, distribute, promote and whitelist managed Google Play Store apps, company private apps, and private or third-party web applications within the work profile.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Always-on encryption policy.&lt;/strong&gt; Create a protection/encryption disable policy to monitor and automatically audit actions if encryption on the device is disable or compromised.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Passcode configuration.&lt;/strong&gt; Define the passcode requirements for the device and work profile, which protects corporate applications and data from unauthorized access. You can also option to allow the use of biometrics to unlock the device and work profile.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ivanti tunnel.&lt;/strong&gt; Secure per-app VPN for business apps and data from anywhere. Mobile apps can access protected corporate data and content behind a firewall.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Client out of contact policy.&lt;/strong&gt; Set up a set of actions to take if the Ivanti MobileIron Go client has not checked in for a specified number of hours or days. This can be set to deny, quarantine or even delete the work profile in order to protect corporate apps and data when out of compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Default app permissions configuration.&lt;/strong&gt; Set default runtime permissions for work profile apps.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://vimeo.com/ivanti/download/647120648/f090c1b791" target="_blank" rel="noopener"&gt;&lt;strong&gt;Lockdown configuration&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt; Decide what Android Enterprise features are used to restrict the work profile.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Certificate distribution.&lt;/strong&gt; Configure to automatically create app and identity certificates for your devices to establish trust with your corporate assets using your choice of cert authorities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Auto update.&lt;/strong&gt; Set update options and requirements for when to update private and Google Play Store apps within the work profile.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Notifications and reporting.&lt;/strong&gt; Set up automated reports for you and your upper management while adding notifications when a device fails compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Zero sign-on (ZSO).&lt;/strong&gt; With ZSO, eliminate the need for passwords by making mobile devices the primary factor for user authentication.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Mobile threat defense (MTD).&lt;/strong&gt; Easily deploy threat protection with machine-learning algorithms that provide on-device phishing and threat protection. MTD also supplies reputation scores for apps in the apps catalog.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti Neurons for MDM is Android Enterprise Recommended (AER)&lt;/h2&gt;

&lt;p&gt;Ivanti is certified by Google’s Android Enterprise Recommended (AER) program, the continual seal of approval that Ivanti&amp;nbsp;Neurons for MDM meets Google’s strict Android Enterprise requirements. Ivanti Neurons for MDM is Android Enterprise Recommended for the work profile, which is the primary management set used for BYO devices, proving you can trust Ivanti Neurons for MDM to manage current and future versions of Android.&lt;/p&gt;

&lt;h2&gt;A Secure Foundation for BYOD Policies&lt;/h2&gt;

&lt;p&gt;Over 59 percent of organizations already have an BYOD policy, and 13 percent are in the process of implementing BYOD. With Ivanti Neurons for MDM, you can be confident not only that your enterprise apps and data are secure on your employees’ personal devices thanks to Ivanti’s zero-trust foundation, but also that your employees’ personal data is kept private.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Learn more.&lt;/strong&gt; Hear how Android 12’s new features improve productivity and security and how you can use Ivanti UEM to implement these new capabilities and mature your zero-trust journey. &lt;a href="https://www.ivanti.com/webinars/2021/everything-you-need-to-know-about-android-enterprise"&gt;Watch the on-demand webinar&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 06 Dec 2021 17:55:51 Z</pubDate></item><item><guid isPermaLink="false">f1bb7b3c-93ba-48ba-9f47-0640e27de035</guid><link>https://www.ivanti.com/blog/ivanti-delivers-day-zero-compatibility-and-key-feature-support-for-android-12</link><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Ivanti Delivers Day-Zero Compatibility and Key Feature Support for Android 12</title><description>&lt;p&gt;Here at Ivanti, we are excited about Android 12. I’m pleased to share that we offer day-zero compatibility and key feature support across the Ivanti product portfolio for the new features built into Google’s updated OSs.&lt;/p&gt;

&lt;p&gt;Android 12 brings plenty of new things to see and experience with a combination of security and privacy. Some of the coolest new features and improvements include performance class classifications, enrollment-specific ID, streamlining of the work profile security challenge, changes in the user privacy permissions, disabling the USB port, and limiting input methods.&lt;/p&gt;

&lt;h2&gt;Performance Class Classifications&lt;/h2&gt;

&lt;p&gt;Google also is working with ecosystem partners and introduced a new standard called &lt;a href="https://developer.android.com/topic/performance/performance-class" rel="noopener" target="_blank"&gt;“Performance Class”&lt;/a&gt;. Performance class sets classification levels for sets of Android devices that includes the minimum technical requirements for Google’s &lt;a href="https://source.android.com/docs/compatibility/cdd" rel="noopener" target="_blank"&gt;Compatibility Definition Document (CDD)&lt;/a&gt; and the verification of the classification using the &lt;a href="https://source.android.com/docs/compatibility/cts" rel="noopener" target="_blank"&gt;Android Compatibility Test Suite (CTS)&lt;/a&gt;. This allows developers to check to see if the device not only meets Android’s requirements, but also the developers’ performance requirements or automatically change features within their application to best run on that performance class. Ivanti is certified by Google to meet the three types of management solutions for your Android devices.&lt;/p&gt;

&lt;h2&gt;Security and Privacy Changes&lt;/h2&gt;

&lt;p&gt;As for this new version of Android, the enterprise component has made several changes to improve security and privacy features that will be implemented within Ivanti UEM, formerly MobileIron.&lt;/p&gt;

&lt;h2&gt;Enrollment-specific ID&lt;/h2&gt;

&lt;p&gt;Work Profiles for BYOD devices, Ivanti UEM will no longer have access to several hardware identifiers in Android 12. This means that BYOD devices can no longer be identified via IMEI, MEID and the serial number of the devices. Google has implemented enrollment-specific IDs for enrolling BYOD devices. When enrolling into UEM, the work profile on the device will be provided a unique ID and will remain with the device, even after a device has been factory reset.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Due to this, we highly recommend at your earliest convenience, that you remove any dependencies for hardware identifiers for Android devices in Ivanti UEM.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Simplified password complexity settings&lt;/h2&gt;

&lt;p&gt;Google has simplified the default requirements for password requirements. With Ivanti UEM, you can choose between predefined complexity sets (High, Medium, Low and None) for accessing the work profile on a device.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The streamlining of the work profile security challenge&lt;/h2&gt;

&lt;p&gt;UEM enrollment setup now takes into account if the device passcode meets company security requirements and makes it easy for the administrator to choose whether to increase the strength of the device passcode or to use the work profile security challenge.&lt;/p&gt;

&lt;h2&gt;User privacy permissions&lt;/h2&gt;

&lt;p&gt;Users now have more privacy controls within the work profile apps. The following permissions can be granted by the user in the work profile unless limited by UEM profile configuration settings.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Location&lt;/li&gt;
	&lt;li&gt;Camera&lt;/li&gt;
	&lt;li&gt;Microphone&lt;/li&gt;
	&lt;li&gt;Body Sensor&lt;/li&gt;
	&lt;li&gt;Physical activity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In addition, IT administrators can manage permission or choose to opt out of managing sensor-related permission grants during provisioning for fully managed company own devices. If the administrator chooses to manage permissions, users see an explicit message during the setup wizard. If the administrator chooses to opt out, users are prompted to accept or deny permissions in-app when the app is first used.&lt;/p&gt;

&lt;h2&gt;Disabling the USB port&lt;/h2&gt;

&lt;p&gt;On a fully managed company own device, you can now configure the device to use the USB port only for charging. IT admins can mitigate users unknowingly downloading malware through the USB port at public charging locations such as airport lounges or the USB port being maliciously used to accessing the data on the device itself.&lt;/p&gt;

&lt;h2&gt;Limiting input methods used in the personal profile&lt;/h2&gt;

&lt;p&gt;IT admins can now approve what input methods can be used within the work profile on a fully managed device. IT admins can set a configuration profile within UEM to prevent the use of the 3rd party keyboards/swiping input apps that replace the default Android or the device manufacturers on screen keyboard.&lt;/p&gt;

&lt;h2&gt;Keeping up to date on compatibility&lt;/h2&gt;

&lt;p&gt;To check on your device compatibility with Android 12, we recommend contacting your device manufacturer.&lt;/p&gt;

&lt;p&gt;Ivanti is keeping an updated live KB (Knowledge Base) on current issues of using Android 12 with UEM: &lt;a href="https://forums.ivanti.com/s/article/MobileIron-Guidance-on-Android-12-Compatibility?language=en_US" target="_blank"&gt;https://forums.ivanti.com/s/article/MobileIron-Guidance-on-Android-12-Compatibility?language=en_US&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please note that Ivanti cloud services are already configured to support Android 12 and its new features. Once Android 12 is released, Ivanti software releases will be already available and updated applications would be supported on Android 12. Our on-prem customers can choose to update their UEM software when Android 12 is released for some features, but backward compatibility on MobileIron Core ensures devices are also supported with some versions of UEM software.&lt;/p&gt;

&lt;p&gt;At Ivanti, we are committed to providing excellent customer service and support. This is why Ivanti UEM is Android Recommended. With this stamp of approval, have confidence that Ivanti is supporting Android 12 and future versions of Android Enterprise and their features.&lt;/p&gt;

&lt;p&gt;To learn more about Android 12 requirements, changes and features, please visit Google’s “&lt;a href="https://developer.android.com/about/versions/12" rel="noopener" target="_blank"&gt;About Android 12&lt;/a&gt;” page.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Statements in the blog concerning future product availability and plans are forward looking statements, and they are subject to change. They do not represent a commitment, promise or legal obligation to deliver any material, code or functionality, and should not be relied upon in making purchasing decisions.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 04 Oct 2021 17:55:24 Z</pubDate></item></channel></rss>