<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/david-murray/rss" /><link>https://www.ivanti.com/blog/authors/david-murray</link><item><guid isPermaLink="false">eb7996b8-8197-4544-ac37-c5e914bba77c</guid><link>https://www.ivanti.com/blog/ivanti-endpoint-security-now-integrates-with-ivanti-neurons-for-patch-intelligence</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><title>Ivanti Endpoint Security Now Integrates with Ivanti Neurons for Patch Intelligence!</title><description>&lt;p&gt;Ivanti Neurons for Patch Intelligence (&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;https://www.ivanti.com/products/ivanti-neurons-patch-intelligence&lt;/a&gt;) helps organizations reduce the time-to-patch and to meet or exceed their service-level agreements (SLAs) for patch management.&amp;nbsp; It does this by delivering automated insight into your risk exposure and helps you to prioritize, based on adversarial risk.&amp;nbsp; In particular, it provides real-time intelligence on vulnerability exploits that are actively trending in the wild, and those that have ties to ransomware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Patch Intelligence combines this risk-based prioritization with patch reliability data to help you focus your testing efforts and reduce the overall time to patch.&amp;nbsp; This combination enables you to get a clear picture of how compliant the devices are within your environment and to identify which devices and patches need prioritizing based on your specific SLA timescales and dates.&lt;/p&gt;

&lt;p&gt;&lt;img alt="screenshot: patch intelligence dashboard" src="https://static.ivanti.com/sites/marketing/media/images/blog/ivanti-endpoint-security-now-integrates-with-ivanti-neurons-for-patch-intelligence.png"&gt;&lt;/p&gt;

&lt;p&gt;We have now integrated Ivanti Endpoint Security with Ivanti Neurons for Patch Intelligence.&amp;nbsp; With this integration you can populate the endpoint and patch content information from Ivanti Endpoint Security into Ivanti Neurons and then you can leverage the risk context and threat insights that we have in Patch Intelligence to ensure that you are taking that risk-based, prioritized action for patch management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This integration enables you to see the vulnerability risk associated with your specific environment and help you understand where you need to focus your attention to reduce that risk.&lt;/p&gt;

&lt;p&gt;This integration has been developed as part of the Ivanti Endpoint Security 8.6 Update 2 release, but the integration actually works on any currently supported version of Ivanti Endpoint Security!&lt;/p&gt;

&lt;p&gt;We’ve also implemented some other enhancements in the 8.6 U2 release. These include:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SIEM integration for Device Control&lt;/strong&gt;&lt;br&gt;
Many organizations use Security Information and Event Management (SIEM) platforms to aggregate and analyze activity from different solutions in their environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To help you integrate with your SIEM of choice, we have developed a plug-in solution for Device Control events.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This solution is an agent-side implementation which enables you to forward events from Ivanti Endpoint Security Device Control agents directly to the SIEM solution.&amp;nbsp; The following KB article (&lt;a href="https://forums.ivanti.com/s/article/Ivanti-Endpoint-Security-Device-Control-SIEM-Integration?language=en_US" target="_blank"&gt;https://forums.ivanti.com/s/article/Ivanti-Endpoint-Security-Device-Control-SIEM-Integration?language=en_US&lt;/a&gt;) provides sample code and further documentation to enable you to integrate with your SIEM solution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Silverlight Removal / Additional Browser Support&lt;/strong&gt;&lt;br&gt;
Customers will be pleased to know that we have removed Microsoft Silverlight which reached end of support recently.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We’ve replaced Silverlight by a SignalR-based solution and the necessary component changes will happen in the background as part of the upgrade process to 8.6 U2.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to updating the underlying technology to a supported platform, this change also means that you will no longer need to use Internet Explorer 11 to run Install Manager.&amp;nbsp; You can now use your browser-of-choice to install new components.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OS Support Updates&lt;/strong&gt;&lt;br&gt;
We’ve also added support for the, just recently released, Windows Server 2022 and Windows 11 platforms.&amp;nbsp; Note that in the case of Windows 11, this support applies to the Patch &amp;amp; Remediation, Application Control and AntiVirus modules only.&amp;nbsp; Device Control is not yet supported on Windows 11, but we will add that shortly.&lt;/p&gt;

&lt;p&gt;For more information about these and other important updates, check out the &lt;a href="https://help.ivanti.com/ht/help/en_US/IES/86/Ivanti%20Endpoint%20Security%208.6%20U2%20Release%20Notes.pdf" target="_blank"&gt;8.6 U2 release notes&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 27 Oct 2021 11:30:00 Z</pubDate></item><item><guid isPermaLink="false">520d1fe6-e03f-422d-be38-d4ae899a3f7b</guid><link>https://www.ivanti.com/blog/ivanti-service-desk-introduces-chat-functionality</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><title>Ivanti Service Desk Introduces Chat Functionality!</title><description>&lt;p&gt;We’ve been ‘chatting’ about it for a while now – and we’re delighted to announce that the latest release of Ivanti Service Desk&amp;nbsp;introduces our&amp;nbsp;brand-new&amp;nbsp;Chat feature!&lt;/p&gt;

&lt;p&gt;At the end of last year, we introduced a preview of&amp;nbsp;Chat&amp;nbsp;for both Workspace and Web Access to help users communicate more easily with Support. We received a lot of feedback&amp;nbsp;via this preview&amp;nbsp;which&amp;nbsp;has&amp;nbsp;helped us&amp;nbsp;to&amp;nbsp;refine the functionality.&lt;/p&gt;

&lt;p&gt;&lt;img alt="service desk: workspaces and web access" src="https://static.ivanti.com/sites/marketing/media/images/blog/service-desk-chat-1.png"&gt;&lt;/p&gt;

&lt;p&gt;Users can now request a&amp;nbsp;Chat session&amp;nbsp;with an analyst&amp;nbsp;through the&amp;nbsp;Self-Service portal in either Workspaces or Web Access.&amp;nbsp;The request&amp;nbsp;is then added to a queue&amp;nbsp;where it can be accepted by an Analyst for a 2-way Chat.&lt;/p&gt;

&lt;p&gt;The introduction of Chat in Ivanti Service Desk further underlines our ambition to bring&amp;nbsp;innovative new features to the product – and we will continue to build on these features in future releases.&lt;/p&gt;

&lt;p&gt;Check out the &lt;a href="https://forums.ivanti.com/s/article/Ivanti-Service-Desk-2018-3-Download" target="_blank"&gt;Update 2 release notes&lt;/a&gt; for more information on Chat for Ivanti Service Desk&lt;/p&gt;
</description><pubDate>Tue, 26 Oct 2021 16:00:00 Z</pubDate></item><item><guid isPermaLink="false">b9b4a41b-7a48-4131-90cf-56e6e70fbcc9</guid><link>https://www.ivanti.com/blog/ivanti-workspace-control-2021-1-service-update-1-is-now-available</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><title>Ivanti Workspace Control 2021.1 – Service Update 1 is Now Available!</title><description>&lt;p&gt;Our latest release of Workspace Control is a service update for IWC 2021.1 containing a number of bug fixes and compatibility updates. But it has so much more than that!&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We’ve also included a number of User Voice requests which were submitted via the &lt;a href="https://success.ivanti.com/customers/Community_RegStep1_Page?startURL=%2Fcustomers%2Fidp%2Flogin%3Fapp%3D0sp130000008P1f%26SAMLRequest%3DfZJdT8MgGIX%252FSu%252B46gft1m1krWm2mCyZZtnUC28MpdSRtIC8MPXfSzuNM1G5hPOcc3hhCbTvNKmcPco9f3EcbFABcGOFkislwfXcHLg5Ccbv99sCHa3VQOJYnKi0InJeelL%252BMGKqjwezmJ0pFKy9mZB0cPrmwDHGAaJPfqCYA6t8DMSi0XGnnoW8oloXCWicJeOa73CLgs26QE90XrPFvMnC2XTWhpNFnYT1pMlD3NZ5kzGc5%252BnUSwEc30iwPqVAaZLiMFmEeHKXZiSZE4wfUfDgI8duaZSg4K3vJJDhBgVyRhJFQQCRtOdALCOH6mZLvJDQr%252BlcIvp%252FRhtlFVMdKpeDmoztTPnbDJfxpWJ5fp5b77hZ71Qn2HtQdZ16XRlOLS%252BQNc5P%252BlqZntq%252FO%252BAIjzuiCdtRSpwEzZloBW9QXJ5Df36D8gM%253D" target="_blank" rel="noopener"&gt;Product Ideas page on the Ivanti Community&lt;/a&gt;. In addition, we are currently developing a significant new feature called Workspace Control Cloud Relay which we will be releasing later this year.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, this service update contains an Early Access version of this feature, so let’s start there!&lt;/p&gt;

&lt;h2&gt;Workspace Control Cloud Relay&lt;/h2&gt;

&lt;p&gt;Over the past year, most organizations experienced the rapid shift whereby users moved out of the corporate office and started to work from home. In many cases the endpoints they were using were no longer connected to the corporate network and, as a result, it made it very difficult to connect to these devices and to provide configuration and other updates needed for the users to remain productive and secure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We already have solutions to help with this scenario, but they place the burden on our customers to add additional on-premises infrastructure and, for many customers, this is a very challenging proposition. Customers want and expect us to take this burden away from them and to provide a solution without the need for them to add infrastructure locally.&lt;/p&gt;

&lt;p&gt;To solve this problem, we have developed Workspace Control Cloud Relay, which enables endpoints that are located outside of the corporate network to connect and receive updates without the need to use a VPN connection.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This feature is now available for customers to trial. If you want to try this feature out, contact our Support team through the &lt;a href="https://forums.ivanti.com/s/contactsupport?language=en_US" target="_blank" rel="noopener"&gt;Ivanti Community portal&lt;/a&gt;. We would love to get your feedback on it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more information on Cloud Relay, refer to the &lt;a href="https://help.ivanti.com/res/help/en_US/IWC/2021/ReleaseNotesRevision/LandingPage.htm" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="ivanti cloud, corporate firewall, and corporate network graphic " src="https://static.ivanti.com/sites/marketing/media/images/blog/1_cloud_relay.png"&gt;&lt;/p&gt;

&lt;h2&gt;User Voice and Other Enhancements&lt;/h2&gt;

&lt;p&gt;We are continuing to review and respond to your feature enhancement requests. Thank you for continuing to submit these requests and for voting on the requests that others have submitted previously!&lt;/p&gt;

&lt;p&gt;These ideas and votes act as an input to our roadmap. In addition to including requests which have received a lot of votes, we also try to include some ‘quick wins’ (those requests that really don’t take that much effort to implement but provide benefit to our customers).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Please refer to the &lt;a href="https://help.ivanti.com/res/help/en_US/IWC/2021/ReleaseNotesRevision/LandingPage.htm" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt; for details on all of the User Voice feature requests and other feature enhancements that are included in this service update. The following are a couple of the more noteworthy additions:&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Display Scaling (DPI) settings are saved per user&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;This was our top voted User Voice entry with over 70 votes, so we are very pleased to be able to fulfil this request!&lt;/p&gt;

&lt;p&gt;In previous versions, Workspace Control was starting too late during the logon process. By which time the DPI settings had already been set on the endpoint. This made it very challenging for users with a visual impairment - and for those who preferred to have larger text on their displays.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The good news is that this top request has now been implemented. Workspace Control can save DPI settings on a per-user basis and apply these settings every time the user starts a Workspace Control managed session. This enhancement works for both single monitor and multiple monitor configurations.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Managed application GUID displayed in Application List&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;One of those ‘quick wins’ mentioned earlier, this request - which accumulated 16 votes - was to make it possible to show the GUID column in the Application List.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Having this information can be helpful when troubleshooting for example. The administrator may know the application GUID but identifying the associated application from the GUID can be challenging.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Simply adding the GUID as a column in the Application List makes it easy to search for and find the associated application, so that’s what we’ve done.&lt;/p&gt;

&lt;p&gt;&lt;img alt="screenshot: workspace control console - application list" src="https://static.ivanti.com/sites/marketing/media/images/blog/2_application_guid.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Workspace Control Agent status displays connected Relay Server name&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;This request didn’t come through User Voice, but it did come up in a conversation with one of our Cloud Relay early access customers and we recognized that it was a great idea and have implemented it!&lt;/p&gt;

&lt;p&gt;If a Workspace Control agent is connected to a Relay Server, the name of the connected Relay Server is now specified in the “Connects to” column in the Agents view.&lt;/p&gt;

&lt;p&gt;&lt;img alt="3 agent relay server status" src="https://static.ivanti.com/sites/marketing/media/images/blog/3_agent_relay_server_status.png"&gt;&lt;/p&gt;

&lt;p&gt;We’ve implemented some other requests that focus on improving performance, such as the ability to reset the last visited node in Workspace Analysis and the ability to reset the ‘Show all User Settings’ option when switching tabs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In both cases, the current behaviour could cause a lot of information to be reloaded when the user visits these pages, resulting in extended waiting time for the page to load, particularly in larger environments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We are already working on the next set of User Voice requests for the October release. If you have enhancements that you would like to see in the product, go ahead and submit them.&lt;/p&gt;

&lt;p&gt;We won’t get to them all, but we do review them every week.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Compatibility Updates&lt;/h2&gt;

&lt;p&gt;Finally, one of the more significant compatibility updates is that Managed Applications can now be published to specific Citrix folders when using Citrix XenApp. Please refer to the &lt;a href="https://help.ivanti.com/res/help/en_US/IWC/2021/ReleaseNotesRevision/LandingPage.htm" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt; for more information on how to configure this.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="enable citrix xenapp application publishing" src="https://static.ivanti.com/sites/marketing/media/images/blog/4_citrix_folder.png"&gt;&lt;/p&gt;
</description><pubDate>Tue, 20 Jul 2021 19:22:05 Z</pubDate></item><item><guid isPermaLink="false">ac0aa778-718c-4168-9caf-faa60bef43f4</guid><link>https://www.ivanti.com/blog/what-s-new-with-ivanti-workspace-control-2021-1</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><title>What's New with Ivanti Workspace Control 2021.1?</title><description>&lt;p&gt;The past 12 months have seen significant changes and upheaval in the way we live our lives and also in terms of our work environment. Many organizations moved to remote working almost overnight, leaving IT with significant challenges in terms of ensuring users continue to remain productive and secure. Organizations have been increasingly looking to cloud technologies to provide solutions to these challenges.&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2020-11-17-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-grow-18-percent-in-2021" target="_blank" rel="noopener"&gt;Gartner&lt;/a&gt; the proportion of IT spending that is shifting to cloud will accelerate in the aftermath of the COVID-19 crisis. Additionally, a recent &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%253A%252F%252Fwww.gartner.com%252Fdocument%252F3991263%253Fref%253DAnalystProfile" target="_blank" rel="noopener"&gt;Gartner survey&lt;/a&gt; found that almost 70% of organizations using cloud services today plan to increase their cloud spending in the wake of the disruption caused by COVID-19.&lt;/p&gt;

&lt;p&gt;The Workspace Control 2021.1 release has been designed to help customers with the transition to cloud and also with managing users working from home. The two standout features from this release in support of these initiatives are as follows:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Azure Active Directory Integration&lt;/strong&gt;&lt;br&gt;
	Azure AD is Microsoft's enterprise cloud-based identity and access management (IAM) solution and is the built-in solution for managing identities in Microsoft 365. To support the increased usage of Microsoft 365, Workspace Control 2021.1 now integrates directly with Azure AD and customers can use Azure AD for context-based decisions in areas such as workspace containers, in zones and access control.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Azure User Settings&lt;/strong&gt;&lt;br&gt;
	In this release, we added the ability to synchronize user settings with Microsoft Azure storage. Previously user settings could only be synchronized with a network share which meant that you had to be connected to the corporate network. With so many users now working from home and the expectation of greater flexibility in the future in terms of where users do their work, users are not always going to be connected to the corporate network.&amp;nbsp; By providing the ability to synchronize user settings with Azure storage, users’ settings can be synchronized from wherever they are located. All the users need is to have internet access.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ve also continued to focus on your product enhancement requests submitted via our &lt;a href="https://forums.ivanti.com/s/product-enhancement-requests?language=en_US" target="_blank" rel="noopener"&gt;User Voice Portal&lt;/a&gt;. Your ideas and votes are an important input to our product roadmap so thank you for continuing to submit these. The following are some of those we’ve implemented in this release:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Delayed Automatic Launch of Applications&lt;/strong&gt;&lt;br&gt;
	This was the top voted request in User Voice last year, so to reinforce that your votes count we added this feature to the release. The requirement in this case was that customers want certain applications to always run for all users so what they do is to configure a mandatory auto launch for those applications. Unfortunately, starting these applications puts a strain on the system resources during logon and provides a poor logon experience for users. So, we’ve provided an additional option to delay auto launch until the session startup has completed.&amp;nbsp; With this setting, the logon finishes earlier, the users can start working and the applications will then start in the background.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Learning Mode for Authorized Certificates&lt;/strong&gt;&lt;br&gt;
	We added authorized certificates as an additional security feature a couple of years ago.&amp;nbsp; We have a learning mode for other security features such as Managed Applications and that has been really helpful to progressively introduce security measures. You can see what effect changes will have before you apply them. Learning mode is now available for authorized certificates such that you can continue to use application security in enabled mode, but then add Certificate Security in learning mode. This can help you to simplify your security configuration and progressively add certificates in place of more complex file rules.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;SQL Always-On Multi-Subnet Support&lt;/strong&gt;&lt;br&gt;
	This is another feature request that received a lot of votes, so we’ve added SQL always-on multi-subnet support to provide high availability database options for Workspace Control.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are just some of the requests we’ve implemented. To learn about the others, read the 2021.1 releases notes which are available at &lt;a href="https://www.ivanti.com/support/product-documentation"&gt;https://help.ivanti.com&lt;/a&gt;. We are currently reviewing the User Voice backlog to identify candidates for the 2021.2 release, so continue to submit your ideas and vote on those ideas already in the system.&lt;/p&gt;

&lt;p&gt;For more information on the Workspace Control 2021.1 release, please watch the recently added &lt;a href="https://www.ivanti.com/webinars/2021/what-s-new-in-ivanti-workspace-control-2021-1"&gt;on-demand webinar&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;</description><pubDate>Mon, 22 Mar 2021 20:47:26 Z</pubDate></item><item><guid isPermaLink="false">a4aaff16-36a5-4e71-927c-24bcbebf60dc</guid><link>https://www.ivanti.com/blog/the-reviews-are-in-what-the-workspace-control-edge-intelligence-users-find-most-helpful</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><title>The Reviews are In: What the Workspace Control Edge Intelligence Users Find Most Helpful</title><description>&lt;p&gt;The Ivanti Workspace Control 2020 release that occurred in August included Ivanti Neurons for Edge Intelligence, an innovative new feature which enables administrators to query endpoints and get real-time intelligence from across the enterprise in seconds. A function that works regardless of whether endpoints are on or off the corporate network. An essential feature considering the number of employees working from home.&lt;/p&gt;

&lt;p&gt;Now that customers have been using the feature for a few months, we’ve asked them what they find most useful.&amp;nbsp; Here’s what they have told us.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Logon Performance&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The number one feature Workspace Control customers find most useful is the Logon Performance query. Achieving a fast logon performance experience is always a key goal for organizations. When users complain of slow logon performance, administrators need a quick and easy way to troubleshoot to understand what’s causing the issue so that they can remediate.&amp;nbsp; The Edge Intelligence logon performance query includes a graphical breakdown of the logon duration including both the Windows component of the logon along with a detailed breakdown of the Workspace Control component.&amp;nbsp; With this information, it is very easy to see where the problem is, to validate what the user is saying about the logon duration and also to immediately see whether other users are experiencing similar issues.&lt;/p&gt;

&lt;p&gt;&lt;img alt="logon session details" src="https://static.ivanti.com/sites/marketing/media/images/blog/picture1.png"&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Device Uptime&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When a user complains that something is not working as expected, the ability to quickly see how long since the device was last rebooted is helpful.&amp;nbsp; As one administrator described it, “when a user is having an issue, one of the first things I check is the device uptime.&amp;nbsp; If they haven’t rebooted in several days, it is often one of the first things I get them to try to see if it resolves the issue.&amp;nbsp; Having that immediate visibility is invaluable rather than having to rely on the user remembering when they last rebooted”.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Dashboard&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many customers commented on security use cases and how Edge Intelligence really helps solve these challenges.&amp;nbsp; Different customers provided different examples but, in all cases, customers liked being able to quickly find the information they needed.&amp;nbsp; One of the most common examples was being able to see Missing Patches, as an additional validation step on top of other patching tools being used.&amp;nbsp; One user also commented they use the Device Uptime query to identify pending reboots, whereby a system might still be vulnerable until the reboot has completed.&amp;nbsp; Other users liked using the Local Admin Users query to identify systems with local administrators, which would be considered a security risk.&amp;nbsp; And yet another user commented that he liked the User Logon Failures query so that he could proactively reach out to users that were having difficulty logging on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simplicity &amp;amp; Shift-left&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Edge Intelligence is simple to use.&amp;nbsp; Customers have expressed their appreciation for a clear and simple view for normal Help Desk users.&amp;nbsp; In order to get the information they need to investigate an issue, these users often need to contact a 2&lt;sup&gt;nd&lt;/sup&gt; or 3&lt;sup&gt;rd&lt;/sup&gt; line technician.&amp;nbsp; However with Edge Intelligence it is already there for them, laid out in a way that makes it easy for them to use.&amp;nbsp; One administrator told us that he had been looking at using APIs to provide the required information to the Help Desk users and now he no longer needs to do this.&amp;nbsp; These users can now get this information for themselves (shift-left) which frees him up to focus on other, more important tasks.&amp;nbsp; Another customer told me that Edge Intelligence allows him to gain insights that would require multiple other tools, so having this all in one place makes things more efficient.&amp;nbsp; He went on to say that their management team preferred the user-friendly graphs created by the program vs. the detailed reports they were previously creating.&lt;/p&gt;

&lt;p&gt;Have you tried out Edge Intelligence yet?&amp;nbsp; If not, go ahead and upgrade to Workspace Control 2020 and enable it. Please provide any thoughts or feedback on the product directly to &lt;a href="mailto:david.murray@ivanti.com" target="_blank" rel="noopener"&gt;david.murray@ivanti.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;DAVID MURRAY&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Director, Product Management&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Fri, 11 Dec 2020 16:18:02 Z</pubDate></item><item><guid isPermaLink="false">1ba39f1f-54cc-4711-a6a3-df2c28fe0b46</guid><link>https://www.ivanti.com/blog/workspace-control-ivanti-neurons</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><category>Endpoint Management</category><title>Workspace Control Now With Ivanti Neurons for Edge Intelligence</title><description>&lt;p&gt;Following the formation of the Extended Products Group earlier this year, we’ve been &lt;a href="https://www.ivanti.com/blog/increased-focus-ivanti-solutions" target="_blank"&gt;refocusing our attention on Ivanti Workspace Control.&lt;/a&gt; With the previous release being mainly focussed on maintenance, security, and performance improvements, this Workspace Control 2020 release will be our first major release since then.&lt;/p&gt;

&lt;p&gt;Workspace Control 2020 introduces several significant new features while also incorporating many of your User Voice requests (please continue to share with us).&amp;nbsp; You will also see a new splash screen when opening the Workspace Control console to reflect the rejuvenation of the product.&amp;nbsp; So, here’s what we have delivered in Workspace Control 2020.&lt;/p&gt;

&lt;h3&gt;Ivanti Neurons for Edge Intelligence... for Workspace Control&lt;/h3&gt;

&lt;p&gt;Ivanti Workspace Control is now connecting to the cloud and adding Edge Intelligence, &amp;nbsp;an &lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Ivanti Neurons, &lt;/a&gt;feature which gives IT the ability to query devices using natural language processing (NLP) and obtain real-time intelligence from across the enterprise in seconds.&amp;nbsp; With so many users now working from home, this feature enables IT administrators to retrieve data quickly and easily from endpoints, whether they are on or off network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="workspace control - edge intelligence" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/08/edge.png"&gt;&lt;/p&gt;

&lt;p&gt;In Workspace Control 2020, Ivanti Neurons for Edge Intelligence is &amp;nbsp;made available on a controlled release to a subset of customers to assess both the benefits and investments &amp;nbsp;associated with this feature at scale. It is also available to customers who purchase &lt;a href="https://www.ivanti.com/products/ivanti-neurons-edge-intelligence"&gt;Ivanti Neurons for Edge Intelligence&lt;/a&gt; as part of the Ivanti Neurons platform. Watch for further developments on this feature as we progress through the year.&lt;/p&gt;

&lt;h3&gt;Microsoft Profile Containers Integration&lt;/h3&gt;

&lt;p&gt;We’ve added support for &lt;a href="https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fforums.ivanti.com%2Fs%2Farticle%2FMicrosoft-Profile-Containers-Integration-Overview-for-Ivanti-Workspace-Control&amp;amp;data=02|01|Charlie.Roberts%40ivanti.com|77e0033c8eb24f5e5c0c08d83783a316|e5208e76dd1247f09541c9b45afaffe6|0|0|637320385807101570&amp;amp;sdata=Ivr73aWY2doDee8Fd%2F71HxS6eHH%2F9FqcF6kTMbOCeA4%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Microsoft Profile Containers&lt;/a&gt;, formerly known as FSLogix.&amp;nbsp; This integration has been added to provide support for non-persistent Virtual Desktop Infrastructure (VDI) environments where Microsoft Office 365 is in use, enabling Virtual Hard Disk (VHD) cache roaming for Office 365 applications.&lt;/p&gt;

&lt;p&gt;One of the main challenges with using Office 365 in non-persistent VDI environments is that the user profile needs to be rebuilt at logon and this typically involves copying lots of files, including large files such as .ost files.&amp;nbsp; Other items, such as the search indexer, need to be rebuilt every time you log in.&amp;nbsp; Because of this, sign in and sign out times often become unacceptable in these non-persistent environments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft Profile Containers solves this problem by redirecting user profiles to a network location.&amp;nbsp; Profiles are placed in VHD(X) files and mounted at run time.&amp;nbsp; Mounting and using the profile on the network eliminates delays and results in a better overall user experience.&lt;/p&gt;

&lt;p&gt;With this integration it is now possible to configure Microsoft Profile Containers from the Ivanti Workspace Control Console with the result that you can continue to manage all your user profile settings from a single console.&amp;nbsp; For more details on the integration and how it works, take a look at the associated &lt;a href="https://forums.ivanti.com/s/article/Microsoft-Profile-Containers-Integration-Overview-for-Ivanti-Workspace-Control" target="_blank" rel="noopener"&gt;Community Article&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Tags on Administrative Roles&lt;/h3&gt;

&lt;p&gt;We’ve added Tags as a new scope option for Administrative Roles. Tags can be used to configure which administrative roles can administer an application or printer and they can be used to provide more granular role-based access control (RBAC) for organizations with multiple administrators.&amp;nbsp; Check out the &lt;a href="https://forums.ivanti.com/s/article/INFO-Tags-on-Administrative-Roles?language=en_US" target="_blank" rel="noopener"&gt;Community Article &lt;/a&gt;for some typical use case examples for this feature and how to configure Tags.&lt;/p&gt;

&lt;h3&gt;User Voice – Responding to Your Requests&lt;/h3&gt;

&lt;p&gt;Thanks for continuing to submit your Product Enhancement Requests via the &lt;a href="https://forums.ivanti.com/s/product-enhancement-requests?language=en_US" target="_blank" rel="noopener"&gt;Product Ideas page on the Ivanti Community&lt;/a&gt;. We review these each week and they form a valuable input to our product roadmap, so please continue to submit your ideas and vote on those that are already there!&lt;/p&gt;

&lt;p&gt;At the start of 2020, there were only 40 requests and a handful of votes in the system.&amp;nbsp;I’ve been asking you to get your ideas into the system and to start voting.&amp;nbsp;You have responded.&amp;nbsp;This list has now grown to over 100 requests and over 1,000 votes across these requests.&amp;nbsp;We’ve included several of these in Workspace Control 2020.&amp;nbsp;To find out which ones made it in, check out the &lt;a href="https://help.ivanti.com/res/help/en_US/iwc/10.5/Ivanti%20Workspace%20Control%20Release%20Notes%2010.5.0.0.pdf" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Compatibility Updates&lt;/h3&gt;

&lt;p&gt;We’ve also updated Workspace Control so that it is compatible with even more 3&lt;sup&gt;rd&lt;/sup&gt; party applications and products.&amp;nbsp; Some of the main enhancements include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Support for SQL 2019&lt;/li&gt;
	&lt;li&gt;Support for Windows 10 Virtual Desktop&lt;/li&gt;
	&lt;li&gt;Interception support for VMware Horizon published apps&lt;/li&gt;
	&lt;li&gt;Improved support for Citrix Cloud, which was originally introduced in Workspace Control 10.3.90.0.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a full list of these, along with additional security and performance improvements, read the &lt;a href="https://help.ivanti.com/res/help/en_US/iwc/10.5/Ivanti%20Workspace%20Control%20Release%20Notes%2010.5.0.0.pdf" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;We’re Just Getting Started&lt;/h3&gt;

&lt;p&gt;We’re planning on another Workspace Control release towards the end of 2020 and our roadmap for this release and beyond is taking shape.&amp;nbsp; If you would like to have a conversation around where we need to focus our efforts, send an email to &lt;a href="mailto:david.murray@ivanti.com" target="_blank" rel="noopener"&gt;david.murray@ivanti.com&lt;/a&gt; or just continue to submit your ideas via User Voice.&amp;nbsp; I look forward to hearing from you.&lt;/p&gt;
</description><pubDate>Mon, 10 Aug 2020 16:10:29 Z</pubDate></item><item><guid isPermaLink="false">e60a136d-a5f2-4879-af78-74b747fb9ed7</guid><link>https://www.ivanti.com/blog/next-chapter-ivanti-endpoint-security</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><category>Endpoint Management</category><title>The Next Chapter for Ivanti Endpoint Security (IES)</title><description>&lt;p&gt;As part of the re-affirmed commitment to customers &lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-re-affirms-commitment-to-customer-success" target="_blank"&gt;as announced on January 30&lt;/a&gt;&lt;u&gt;,&lt;/u&gt; Ivanti launched an Extended Products Group (EPG) consisting of proven solutions with a large customer following (dare I say,&amp;nbsp;fans?) that deserve some TLC. One of these solutions is &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Ivanti Endpoint Security (IES)&lt;/a&gt;, previously referred to as Endpoint Management &amp;amp; Security Suite (EMSS) and also as Patch for Linux, Unix and Mac.&lt;/p&gt;

&lt;p&gt;So, what’s new with Ivanti Endpoint Security?&lt;/p&gt;

&lt;h2&gt;Windows 10 Branch Upgrade Support&lt;/h2&gt;

&lt;p&gt;We’ve added a much-requested customer feature: the ability to upgrade from one Windows 10 version to the next, starting with Windows 10 version 1903.&amp;nbsp;Ivanti Endpoint Security customers no longer need to rely on other Endpoint Management solutions to keep their Windows 10 systems up to date.&amp;nbsp;Additional patch content starting with “Feature Update to Win 10 Version 1909” is now available as Recommended Content and can be applied to Windows 10 1903 systems just like any other patch.&lt;/p&gt;

&lt;p&gt;&lt;img alt="feature update to win 10" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/06/screen-shot-2020-06-03-at-12.53.07-pm.png"&gt;&lt;/p&gt;

&lt;p&gt;Once the upgrade has completed, the patch status will be updated to reflect that the endpoints have been successfully patched.&lt;/p&gt;

&lt;p&gt;&lt;img alt="feature update to win 10 - completed" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/06/screen-shot-2020-06-03-at-12.53.13-pm.png"&gt;&lt;/p&gt;

&lt;h2&gt;New Add-on Patch Functionality&lt;/h2&gt;

&lt;h3&gt;&lt;em&gt;Released to support Windows 7 and Server 2008/2008 R2 extended security updates (ESU’s)&lt;/em&gt;&lt;/h3&gt;

&lt;p&gt;Windows 7 and Server 2008/2008 R2 officially reached end of support on January 14, 2020. This was the last &lt;a href="https://www.ivanti.com/blog/topics/patch-tuesday" target="_blank"&gt;Patch Tuesday&lt;/a&gt; with security updates available to everyone for these operating systems.&amp;nbsp; They will of course continue to function but will be at increased security risk as time passes and additional vulnerabilities are identified without updates.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti now offers custom content support, which allows the Microsoft ESUs to continue working seamlessly with Ivanti Endpoint Security.&amp;nbsp;Please note that this is not part of the general maintenance or annual content subscription.&amp;nbsp; The custom content for the Microsoft ESUs is available for a fixed annual subscription fee which includes Technical Support and does not have an associated endpoint count.&amp;nbsp;Please review the &lt;a href="https://forums.ivanti.com/s/article/Custom-Patch-Support-for-Microsoft-s-Windows-7-and-Server-2008-2008-R2-Extended-Support?language=en_US" target="_blank" rel="noopener"&gt;Custom Patch Support&lt;/a&gt; article in the Ivanti Community for more details or &lt;a href="https://www.ivanti.com/lp/security/demos/endpoint-security-solutions" target="_blank"&gt;reach out to us&amp;nbsp;directly&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Additional OS Patch Support&lt;/h2&gt;

&lt;p&gt;On March 27&lt;sup&gt;th&lt;/sup&gt;, we released an updated version of the Patch Agent for Linux, Unix &amp;amp; Mac, also known as the LUM agent.&amp;nbsp;This version adds support for Red Hat Enterprise Linux (RHEL) version 8 and also addresses a number of customer bugs.&amp;nbsp;Please review the &lt;a href="https://help.ivanti.com/ht/help/en_US/IES/EOL/default.htm" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt; for more information.&lt;/p&gt;

&lt;p&gt;On June 3&lt;sup&gt;rd&lt;/sup&gt;, we released a further update to the LUM agent which provides support for patching CentOS 8 and SUSE Linux version 15 SP1.&amp;nbsp;Refer to the &lt;a href="https://help.ivanti.com/ht/help/en_US/IES/EOL/default.htm" target="_blank" rel="noopener"&gt;Release Notes&lt;/a&gt; for more information.&lt;/p&gt;

&lt;h2&gt;5 Key Highlights of What’s Coming Next!&lt;/h2&gt;

&lt;p&gt;We’re just a few short weeks away from the release of Ivanti Endpoint Security 8.5 Update 4 which focuses primarily on enhancements to the Device Control module.&amp;nbsp;The following are some of the key highlights of that release, which we expect to deliver to market later in June.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. BitLocker Encryption Support is now available!&lt;/strong&gt;&lt;br&gt;
Do you currently use BitLocker encrypted devices?&amp;nbsp; And require more control around whitelisting these, alongside a full device control solution?&amp;nbsp; Ivanti Endpoint Security now allows continued use of BitLocker encrypted devices while also providing additional granular controls around whitelisting, policy, permissions and reporting.&amp;nbsp; You can now define policies for Removable Storage Devices, such as USB sticks, based on whether or not they have been encrypted using BitLocker.&amp;nbsp; For example, you could allow users to read files from BitLocker encrypted devices but not write to them, thereby protecting your corporate data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. File-type filtering enhancements&lt;/strong&gt;&lt;br&gt;
The Device Control file-type filtering feature has been enhanced to add support for the portable device class and for MP4 files.&amp;nbsp; This means that you can now apply granular Device Control policies for mobile phones in the same way as you currently do for removable storage devices, such as USB sticks.&amp;nbsp; For example, you can allow users to transfer pictures to and from their phones while still blocking other file types.&amp;nbsp; You can do the same for MP4 video files across all device classes and decide whether your users can copy these video files to or from their workstations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Device Detached events&lt;/strong&gt;&lt;br&gt;
Ivanti Endpoint Security has always generated log events when a user connects a device, such as a USB stick, to a computer. We now also provide log events when devices have been disconnected or removed.&amp;nbsp; These device-detached events could be used, for example, to determine when a device was physically removed in the event that a device was lost or stolen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Encrypted media unlocked event&lt;/strong&gt;&lt;br&gt;
Some customers have software that they want to execute after a user finishes unlocking a USB device. By providing a log event that can be used as a trigger to initiate this software, Ivanti Endpoint Security 8.5 Update 4 offers a capability to automate this otherwise manual task.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Keeping up to date&lt;/strong&gt;&lt;br&gt;
As with any new release, we are adding support for the latest Microsoft platform updates.&amp;nbsp; We’ve also added Device Control support for Thunderbolt 3 devices so that they are &amp;nbsp;correctly recognized as USB devices. We’ve also updated the Device Control engine to avail of the latest bugfixes and stability improvements.&lt;/p&gt;

&lt;p&gt;More details will be available in the release notes in June, so watch out for them.&amp;nbsp;The next release of Ivanti Endpoint Security is also in the works. This release will be focused on the Patch module.&amp;nbsp;I’d like to get your input for that release.&amp;nbsp; What new capabilities do you need us to add to Ivanti Endpoint Security?&amp;nbsp;Submit your product ideas via the &lt;a href="https://forums.ivanti.com/s/product-enhancement-requests?language=en_US" target="_blank" rel="noopener"&gt;Ivanti Community&lt;/a&gt;.&amp;nbsp;Select “Security Ideas” followed by “Endpoint Security” and add your idea for us to review.&lt;/p&gt;
</description><pubDate>Wed, 03 Jun 2020 20:55:53 Z</pubDate></item><item><guid isPermaLink="false">aa717eb6-65ff-40e9-b591-6eff71feee64</guid><link>https://www.ivanti.com/blog/cutting-fog-implement-security-foundation</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><category>Security</category><title>Cutting Through the 'Fog of More' to Implement a Solid Security Foundation</title><description>&lt;p&gt;I recall seeing a TV ad a number of years back in which a lost tourist in a rental car is driving in a very rural area. He sees a farmer walking along the road and stops to ask for directions to the nearest town. The farmer stops walking and pauses to think for a minute, looks around at the surrounding wilderness and turns back to the tourist and says, “Well, if I were you, I wouldn’t start from here.”&lt;/p&gt;

&lt;p&gt;I can’t recall what the ad was for, but I do remember the bemused expression on the tourist’s face. Implementing cybersecurity can be a bit like that. It is very rare that you get the chance to start over with a clean slate and design your ideal cybersecurity defense.&lt;/p&gt;

&lt;h2&gt;Defense-in-Depth or Expense-in-Breadth?&lt;/h2&gt;

&lt;p&gt;Invariably you will have a collection of different security technologies that will have been implemented over the years to address specific security needs or in response to specific security compliance issues or security breaches. Every time a new issue arises, you look to your existing security solutions to determine whether they can provide a solution or try to find something else to cover that gap. As you add each of these components, you start to ask yourself whether you’re really achieving defense-in-depth or just expense-in-breadth.&lt;/p&gt;

&lt;p&gt;This is why I like the &lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt; from the Center for Internet Security.&lt;/p&gt;

&lt;p&gt;As outlined in the introduction to the latest 7.1 version, “The CIS Controls™ are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks.” Developed by a community of security experts, the CIS framework acknowledges the wealth of security tools and technology that are available to security practitioners and identifies the resulting “fog of more” that can be overwhelming and can distract organisations from taking the necessary decisions to achieve basic security fundamentals.&lt;/p&gt;

&lt;p&gt;In total, there are 20 controls which are set out in a prioritized manner with the first six controls, known as the basic controls, providing &lt;a href="https://www.ivanti.com/blog/cyber-hygiene-definition-and-best-practices"&gt;cyber hygiene&lt;/a&gt;. The message from the CIS is that if you start at the top and work your way down, with each step along the way you are maximising your impact on improving your security posture. There is a very logical flow to the list and the top six in particular.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;The first control is the inventory and control of hardware assets. If you don’t know it exists, you can’t secure it. So, step 1, discover what’s in your environment.&amp;nbsp;&lt;/li&gt;
	&lt;li value="2"&gt;The second control is the inventory and control of software assets. Once you know what hardware you’ve got, understand what software is running on this hardware. Is this software that you want to have running in your network? Technologies like application control or application whitelisting have a big part to play here.&lt;/li&gt;
	&lt;li value="3"&gt;The third control is continuous vulnerability management. Once you have identified the software applications that exist, you know that these applications will have ongoing vulnerabilities, so you need to continuously scan and remediate these vulnerabilities.&lt;/li&gt;
	&lt;li value="4"&gt;The fourth control is the controlled use of administrative privileges. Admin privileges provide attackers with a way to spread inside an enterprise. When an attacker gains access to a system, typically by exploiting an unpatched vulnerability, they can do a lot more damage and navigate more easily throughout the network if they have admin privileges.&amp;nbsp;&lt;/li&gt;
	&lt;li value="5"&gt;The fifth control is to implement a Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Default configurations for applications and operating systems are designed for ease-of-deployment and ease-of-use rather than for security. However, these configurations often make systems easier to exploit so the settings need to be adjusted to make them secure and systems need to be scanned regularly to ensure that they haven’t deviated from these secure configurations as new software is added and patches applied.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Originally, only the top five controls were required for cyber hygiene, but the sixth control, Maintenance, Monitoring, and Analysis of Audit Logs, is now also included in the set of basic controls in recognition of the need to capture information to help detect, understand, or recover from an attack.&lt;/p&gt;

&lt;p&gt;Like the tourist in the TV ad, while it mightn’t be ideal to “start from here”, the CIS framework enables enterprises to evaluate their existing security infrastructure against this carefully thought out, prioritized set of controls to identify where they have coverage or where there are gaps that need to be filled. Armed with this knowledge, enterprises stand a much better chance of navigating the “fog of more” and getting to the destination of a solid security foundation.&lt;/p&gt;

&lt;p&gt;David Murray is Principal Product Manager at Ivanti for Ivanti® Security Controls, a solution designed to deliver the basic controls outlined by the Center for Internet Security. Visit the &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank"&gt;Security Controls web page&lt;/a&gt; to learn more, request a demo, or to start your free trial.&lt;/p&gt;
</description><pubDate>Mon, 14 Oct 2019 21:03:50 Z</pubDate></item><item><guid isPermaLink="false">0f28ec14-0948-4a9b-9b8a-d57cfed66a4b</guid><link>https://www.ivanti.com/blog/how-can-i-protect-you-in-this-crazy-world</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><category>Security</category><title>How Can I Protect You in This Crazy World?</title><description>&lt;p&gt;The Irish band Aslan is one of my favourites. Their lead singer, Christy Dignam, has an incredible voice and is often my go-to artist when I need to unwind and relax. He sings with such passion; you sense that he believes every word and note. Listening to him is almost a religious experience.&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/hell.breaks.loose.400267.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Christy really lived the rock ‘n roll lifestyle and had more than his fair share of problems along the way—even getting dropped by the band for a period of time as a result. Thankfully, he eventually emerged out the other side of his problems and continues to entertain us today.&lt;/p&gt;

&lt;p&gt;As he emerged from his troubles with drugs and alcohol, he and the band recorded the song “Crazy World”—one of their biggest hits. The song, the opening line of which is “How can I protect you in this crazy world?”, reflected on Christy’s sense that he couldn’t protect those he loved when he kept failing himself.&lt;/p&gt;

&lt;h2&gt;Cyber Security and the Task of Protecting Customers&lt;/h2&gt;

&lt;p&gt;Sometimes when I listen to this song, I think of the cyber-security industry and the mammoth task of protecting customers. I remember my first time visiting the RSA security conference. I was really excited to be going there, partially because San Francisco is my favourite US city and I had only been there a couple of times previously.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, on entering the Moscone Center where RSA is held, I felt quite intimidated by the sheer size of the place and the huge number of exhibitors. How was my company going to stand out from this crowd and make an impact?&lt;/p&gt;

&lt;p&gt;But as the crowds streamed through over the following days, I felt they had an even tougher job in terms of selecting products to protect their organisations from malware, apart from those attendees who were there simply to collect lots of free stuff! It is exhausting just to walk around the Moscone Center and visit the various stands and understand their messaging. It is even tougher to take all that information back and develop a coherent strategy to protect an organisation.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Where Do You Start?&lt;/h2&gt;

&lt;p&gt;That is why I really like the Center for Internet Security (CIS) and their security framework, the CIS Critical Security Controls. On their &lt;a href="https://www.cisecurity.org/controls" target="_blank" rel="noopener"&gt;website&lt;/a&gt; they describe the CIS Controls as “a prioritized set of actions to defend against pervasive cyber threats.” They have a total of 20 controls and their message is to start at the top and work your way down. Each step along the way, you are maximizing your impact on improving your defences. This is particularly true of the first five controls, which are the things that you must do to create a strong security foundation. In other words, get these in place first and build from there. It removes a lot of the mystery in how to get started and how to develop your security strategy.&lt;/p&gt;

&lt;p&gt;At Ivanti, we’ve aligned our &lt;a href="https://www.ivanti.com/network-security"&gt;security solutions&lt;/a&gt; and our product strategy to these CIS Controls. With our strong heritage in &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;asset discovery&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/endpoint-security-for-endpoint-manager" target="_blank"&gt;vulnerability management&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;application control&lt;/a&gt;, &lt;a href="https://www.ivanti.com/products/device-control" target="_blank"&gt;device control&lt;/a&gt;, and &lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;privilege management&lt;/a&gt; we can help you get your cyber-security foundation in place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Come and talk to us. Maybe we can protect you in this crazy world.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;David Murray, based in Ireland, is an IT industry veteran and Ivanti product manager focusing on bringing to market &lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;application control&lt;/a&gt; technology as well as &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security" target="_blank"&gt;integrated endpoint security&lt;/a&gt; solutions. &lt;/em&gt;&lt;/p&gt;

</description><pubDate>Tue, 16 Oct 2018 22:13:11 Z</pubDate></item><item><guid isPermaLink="false">db504f78-c054-4ff1-974e-4ec8784713c0</guid><link>https://www.ivanti.com/blog/application-control-are-we-there-yet</link><atom:author><atom:name>David Murray</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-murray</atom:uri></atom:author><category>Security</category><title>Application Control – Are We There Yet?</title><description>&lt;p&gt;Every now and again, a technology comes along that just makes sense and you wonder how you ever got by without it.&lt;/p&gt;

&lt;h2&gt;Calculators, Fortnite, and GPS&lt;/h2&gt;

&lt;p&gt;I recall, as a child, my first time using a calculator and realising that this device was going to change my life and eliminate the drudgery of the multiplication and division tables that I had been learning off until then.&lt;/p&gt;

&lt;p&gt;I spent countless hours trying to catch this device out with complex calculations, being amazed at the speed at which it could return accurate results that would have taken me forever to work out by hand. Hey, life in the west of Ireland in the ‘70s could be a little dull! Back then, Fortnite was not a computer game but a two-week period of time during which the rain might not let up.&lt;/p&gt;

&lt;p&gt;Similarly, I recall my first time encountering GPS. I grew up with maps and compasses. I was an excellent navigator. I was the guy you wanted in the passenger seat heading on a long journey into unknown terrain. Mountains and rivers could be used to substitute for lack of road signs to confirm whether we were still on track or not.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I am blessed to have a wonderful wife, but even she will admit that she has a couple of flaws: 1) she doesn’t like to drive, and 2) she feels sick if she tries to read in a car.&lt;/p&gt;

&lt;p&gt;Let’s just say that in the early years of our marriage this resulted in more than a few heated arguments when we found ourselves 20 miles off track in a car on holidays somewhere in the French countryside with three hungry kids in the back of the car continually asking, “Are we there yet?” All because she refused to look at a map. I’m pretty sure that our sat nav has saved our marriage and anyone who has travelled in a car with me is probably familiar with the sound of “Happy Holly” cheerfully keeping me on track. My wife and Holly coexist in a long-term relationship with me, without any signs of jealousy or rancour between them.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The World of Endpoint Security, Application Control, and Malware Protection&lt;/h2&gt;

&lt;p&gt;I had a similar reaction when I first entered the world of endpoint security many years ago and encountered Application Control.&lt;/p&gt;

&lt;p&gt;Back then, malware was still somewhat in its infancy. A new strain of malware was propagating rapidly due to sad guys like me who just had to open a picture of the lovely Russian tennis star Anna Kournikova that they had received via email. I was working in the telecom industry at the time, but I could see that, for better or worse, security was a market that was going to grow and grow, and I felt that I had to be part of it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When I first heard about &lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;Application Control&lt;/a&gt;, it was a technology that simply made sense in the battle against the malware writers and was the trigger for me to enter the industry. I soon began to realise, however, that while the concept was simple the practical implementation was anything but.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The concept? Well, it is that you have a set of applications that you know and trust and these are allowed to run. Everything else is blocked. Fairly simple, right? It just makes sense.&lt;/p&gt;

&lt;p&gt;However, that is all well and good in a static world with a relatively small number of applications. Back when Anna Kournikova was gracing the tennis court that was probably valid. There really weren’t that many applications available for you to use to do your job, so it seemed reasonable to put these in a list and lock computers down so that only applications on that list could run.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, as malware writers continued to discover security flaws in the computer operating system and in common applications, these had to be continually updated. As the Internet took off, there was an explosion in the sheer number of applications and utilities that became available to help users do their jobs more effectively. So, while creating a “whitelist” of allowed applications was relatively easy, maintaining that list was a huge challenge.&lt;/p&gt;

&lt;p&gt;To address the challenge, vendors have changed from creating lists to creating rules that define what’s allowed and what’s not allowed to run. I’ve witnessed lots of innovation in this area to remove the complexity and make application control operationally simple. I talk to customers all the time, and while I meet some that have been burned in the past by the burden of a first-generation whitelisting solution, I see more and more customers adopting application control as part of a defense-in-depth strategy.&lt;/p&gt;

&lt;p&gt;Are we there yet? I’m not sure we are quite there, but I think we are getting close. Let me know what you think.&lt;/p&gt;

&lt;p&gt;Also, you may want to look into Ivanti’s &lt;a href="https://www.ivanti.com/lp/security/demos/app-control" target="_blank"&gt;Application Control&lt;/a&gt; and other &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Endpoint Security&lt;/a&gt; solutions. You can also request a demo.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;David Murray, based in Ireland, is an IT industry veteran and Ivanti product manager focusing on &lt;a href="https://www.ivanti.com/products/application-control" target="_blank"&gt;Application Control&lt;/a&gt; and &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security" target="_blank"&gt;Endpoint Security&lt;/a&gt; solutions and bringing them to market. &lt;/em&gt;&lt;/p&gt;


</description><pubDate>Mon, 08 Oct 2018 20:39:27 Z</pubDate></item></channel></rss>