<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/gary-mcallister/rss" /><link>https://www.ivanti.com/blog/authors/gary-mcallister</link><item><guid isPermaLink="false">7f43486a-5a9e-4b9a-bdd4-bd5702290f49</guid><link>https://www.ivanti.com/blog/cloud-endpoint-security-protection</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><title>Reduce application exploitation opportunities with cloud endpoint security protection</title><description>&lt;p&gt;It’s no surprise to say that today’s digital business environment is incredibly dynamic.&amp;nbsp; And the proliferation of distributed devices and applications has been a key part of that. The problem this has created? An increased exploitation of endpoint applications, jeopardizing data security and disrupting operations. Yet companies have limited security resources for coping with these risks.&lt;/p&gt;

&lt;p&gt;But businesses can mitigate them by moving to the cloud. By adopting cloud-based endpoint protection, they can realize benefits including enhanced scalability, agility and access to dedicated security expertise.&lt;/p&gt;

&lt;p&gt;Let’s explore endpoint application exploitation hazards and how cloud migration can help protect your data and systems.&lt;/p&gt;

&lt;h2&gt;Overview of endpoint application exploitation opportunities&lt;/h2&gt;

&lt;p&gt;Endpoint devices like laptops, desktops, smartphones and IoT devices are vital to modern business operations. But as the number of these devices increases, there are more openings for attackers to exploit endpoint applications due to factors like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.ivanti.com/products/endpoint-security-for-endpoint-manager"&gt;Endpoint security&lt;/a&gt; risks are hidden by lack of visibility:&lt;/strong&gt; The widespread use of endpoint devices in organizations makes it hard to fully see and manage their security. Any blind spots allow cybercriminals to find and exploit weaknesses.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Expanded attack surface: &lt;/strong&gt;Businesses face a greater risk of attack due to the wide range of devices and applications in use. Every device and application offers a chance for malicious actors to gain access.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Insufficient security controls and resources: &lt;/strong&gt;Many organizations struggle to dedicate enough security resources to protect their endpoint devices. This can result in inadequate security controls, leaving endpoints vulnerable.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Unpatched vulnerabilities and outdated software: &lt;/strong&gt;Endpoints that aren't regularly updated or patched are easy targets for cyber criminals. &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Unpatched vulnerabilities&lt;/a&gt; open a direct path for attackers to gain unauthorized access to systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Insider threats and compromised privileged accounts:&lt;/strong&gt; Insiders with malicious intentions or compromised privileged accounts can be serious threats to endpoint security. They might give attackers access to sensitive data or systems, either on purpose or by accident.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It's clear that businesses must act now to implement strong cybersecurity measures. By centralizing applications and taking advantage of the advanced security capabilities of the cloud, organizations can better protect themselves from these risks and keep their data and systems safe.&lt;/p&gt;

&lt;h2&gt;How migrating to a cloud endpoint security solution can mitigate these risks&lt;/h2&gt;

&lt;p&gt;Migrating applications to a cloud solution mitigates risks associated with endpoint application exploitation. Centralizing applications in the cloud reduces the &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;attack surface&lt;/a&gt;, simplifying endpoint security management and minimizing exposures.&lt;/p&gt;

&lt;p&gt;Moreover, cloud providers offer robust security features and services such as firewalls, intrusion detection systems and encryption, ensuring comprehensive protection for applications. Moreover, cloud solutions improve scalability and agility, allowing organizations to quickly implement security updates and patches to stay ahead of potential threats.&lt;/p&gt;

&lt;h2&gt;Better security at less cost&lt;/h2&gt;

&lt;p&gt;There are other ways cloud migration can bolster your overall security posture. Cloud providers offer multi-factor authentication, access controls and data encryption, ensuring your sensitive information is always safeguarded.&lt;/p&gt;

&lt;p&gt;Cloud providers also employ dedicated security teams that carry out continuous security monitoring, allowing quick incident detection and response. This proactive approach to security management reduces the risk of successful endpoint application exploitation.&lt;/p&gt;

&lt;p&gt;Moreover, migrating to the cloud allows you to take advantage of its economies of scale. The cloud provider, not you, invests in the security of its platform, so you don’t have to buy or maintain security infrastructure. This lets you access a wide range of up-to-date security services and technologies that secure your applications more effectively – and at lower cost – than you could in an on-premises environment. Another benefit? Cloud providers offer predictable pricing models, providing you with greater financial transparency and control.&lt;/p&gt;

&lt;h2&gt;Benefits beyond security&lt;/h2&gt;

&lt;p&gt;Moving to cloud-based applications can be a game changer for reducing endpoint application exploitation risk and improving your security posture. But the benefits of moving to the cloud don’t stop with security.&lt;/p&gt;

&lt;p&gt;Centralizing applications in the cloud streamlines IT operations, reducing complexity and administrative overhead. This allows you to allocate resources more efficiently and focus on strategic initiatives that drive growth and innovation. And because the cloud is inherently scalable and agile, your business can adapt quickly to changing market dynamics and customer demands, fostering a culture of continuous improvement.&lt;/p&gt;

&lt;p&gt;The compelling advantages of cloud migration &lt;em&gt;far&lt;/em&gt; outweigh any imagined challenges. By proactively addressing endpoint application exploitation risks and leveraging the cloud's robust security features, businesses can unlock new levels of innovation, agility and cost efficiency.&lt;/p&gt;

&lt;p&gt;Embracing the cloud is much, much more than just a technological shift. It’s a visionary, strategic move that will pay off far into the future for any enterprise that wants to rise to the challenges–and seize the opportunities – that lie ahead.&lt;/p&gt;

&lt;hr&gt;
&lt;p&gt;Read more about &lt;a href="https://www.ivanti.com/blog/cloud-migration-benefits"&gt;cloud migration&lt;/a&gt;&amp;nbsp;and learn and how the benefits&amp;nbsp;can help you save money, scale your business and improve your operations.&lt;/p&gt;
</description><pubDate>Thu, 14 Nov 2024 07:00:01 Z</pubDate></item><item><guid isPermaLink="false">c58ed562-e8ed-43a4-b2a3-5c5767734ab2</guid><link>https://www.ivanti.com/blog/cloud-migration-benefits</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><category>Service Management</category><title>Eliminate infrastructure and reduce maintenance costs by moving to the cloud</title><description>&lt;p&gt;Today, companies are constantly searching for ways to streamline operations and gain an edge. Many, though, are weighed down by the burdens and costs of on-premises IT infrastructure. That’s why some are considering the benefits of cloud migration.&lt;/p&gt;

&lt;p&gt;In this article, we’ll take a look at cloud migration benefits and how they help you save money, scale your business and improve your operations. We’ll talk about how getting rid of on-site infrastructure, lowering maintenance costs and using the latest security technologies can help businesses of all sizes.&lt;/p&gt;

&lt;h2&gt;Lower costs and increase scalability&lt;/h2&gt;

&lt;p&gt;By moving to the cloud and leveraging its pay-as-you-go model, businesses can avoid investing heavily in on-site infrastructure, such as servers, software and data centers. This eliminates the capital expenditures associated with purchasing and maintaining hardware and software, freeing up valuable financial resources that can be reallocated to other areas of the business.&lt;/p&gt;

&lt;p&gt;Scalability is another major benefit of moving to the cloud. Businesses can easily scale their IT resources up or down based on their needs, ensuring that they only pay for the resources they use. This is particularly helpful for businesses with fluctuating workloads or seasonal demands. By not overprovisioning infrastructure, they can optimize their IT spending and avoid unnecessary costs.&lt;/p&gt;

&lt;p&gt;Furthermore, the cloud opens the door to using the latest hardware and software, empowering businesses to improve their performance and agility. With cloud providers handling infrastructure updates and maintenance, companies can focus on their core business, free from the burden of managing and updating systems. This allows them to remain competitive and responsive, driving innovation and growth.&lt;/p&gt;

&lt;h2&gt;Reduce costs by eliminating on-site infrastructure&lt;/h2&gt;

&lt;p&gt;Moving to the cloud means more than just not having to buy and maintain hardware. It also means significant reductions in the ongoing costs of on-site infrastructure. By migrating to the cloud, companies can avoid the cost of maintaining physical servers, storage systems and networking equipment. This means no more capital expenditure for hardware, no more power and cooling costs and no more maintenance contracts. Instead, companies can direct that money into initiatives that drive growth and innovation and move their business forward.&lt;/p&gt;

&lt;p&gt;In addition, by reducing the need for an on-site infrastructure, you reduce the need to hire IT personnel to maintain and troubleshoot it. That means your existing IT team can spend less time on routine maintenance and more time on other projects that drive business value. And when you work with a cloud provider, they provide a team of experts who are always monitoring and optimizing their cloud infrastructure to make sure it’s both highly reliable and performing at its best.&lt;/p&gt;

&lt;p&gt;And, because cloud providers benefit from economies of scale, they can provide infrastructure services at a lower cost than on-premises solutions. They do this by making significant investments in state-of-the-art data centers, using energy-efficient technologies and optimizing resource utilization. As a result, your business can save money without sacrificing quality or performance, which is especially important in today’s competitive environment.&lt;/p&gt;

&lt;h2&gt;No need to worry about applying upgrades and patches&lt;/h2&gt;

&lt;p&gt;A major benefit of cloud computing is eliminating the need to apply on-premises upgrades and patches. This shift reduces the risk of human error and delayed upgrades while freeing up IT resources to focus on strategic business initiatives. By removing the complexity of managing vendor relationships for system updates and patches, organizations can significantly streamline IT operations.&lt;/p&gt;

&lt;p&gt;Furthermore, cloud computing providers offer reliable and secure data backup and disaster recovery solutions. This means that in the event of a natural disaster or system failure, businesses can quickly and easily retrieve their data and continue operations without major disruptions. This level of data protection and resilience is often difficult and costly to achieve with on-premises systems. With cloud computing, businesses can enjoy peace of mind knowing that their valuable data is always backed up and readily accessible.&lt;/p&gt;

&lt;h2&gt;Eliminate downtime caused by on-premises upgrades&lt;/h2&gt;

&lt;p&gt;One of the most attractive advantages of moving to the cloud is the elimination of downtime caused by on–premises infrastructure upgrades. These upgrades can be required at regular intervals, often involving lengthy downtime and disruptions to business operations. This can result in lost productivity and revenue as well as customer dissatisfaction.&lt;/p&gt;

&lt;p&gt;In contrast, cloud computing offers a seamless and continuous upgrade process. Cloud providers handle all infrastructure maintenance and upgrades, ensuring minimal or no downtime for businesses. This allows organizations to focus on their core competencies without worrying about the complexities of IT management. By eliminating downtime, they can maintain uninterrupted operations, improve customer satisfaction and gain a competitive edge.&lt;/p&gt;

&lt;p&gt;Furthermore, cloud computing offers access to &lt;a href="https://www.ivanti.com/blog/5-ways-to-secure-your-cloud-journey"&gt;cutting-edge security measures&lt;/a&gt; and compliance certifications. Cloud providers invest heavily in robust security infrastructure and employ dedicated security teams to protect data and systems. So, businesses can enjoy heightened security without the need for substantial investments in their own security infrastructure. This not only reduces costs but also guarantees adherence to industry regulations and standards.&lt;/p&gt;

&lt;h2&gt;Showing a green commitment&lt;/h2&gt;

&lt;p&gt;Beyond security, cloud computing also plays a role in environmental sustainability. Moving to the cloud means businesses can reduce their carbon footprint by decreasing energy consumption and minimizing hardware waste. This is particularly relevant as sustainability and responsible resource management are increasingly important. Embracing cloud computing isn't only a smart business decision but also a way for companies to demonstrate their commitment to a greener future.&lt;/p&gt;

&lt;p&gt;In summary, cloud migration eradicates downtime, eliminates the cost of on-premises infrastructure and fortifies security. Making a move to the cloud delivers a strategic advantage for businesses in pursuit of efficiency, scalability and a competitive edge.&lt;/p&gt;
</description><pubDate>Mon, 04 Nov 2024 15:50:11 Z</pubDate></item><item><guid isPermaLink="false">139fedc2-9d61-4985-8d32-9b0e2cfbd44a</guid><link>https://www.ivanti.com/blog/the-importance-of-application-control</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Endpoint Management</category><title>The Importance of Application Control</title><description>&lt;p&gt;In today's digital age, organizations face a constant barrage of cyber threats, with unauthorized applications posing a significant risk to their security and operations. Traditional security measures are no longer sufficient to protect against the sophisticated attacks that target vulnerabilities within applications and endpoints.&lt;/p&gt;

&lt;h2&gt;What is application control?&lt;/h2&gt;

&lt;p&gt;Application control consists of the policies, procedures and tools for ensuring applications work as intended, data reliability and accuracy are maintained, access to applications and data are restricted to authorized users and application updates and changes are properly managed. Basically, application control is about &lt;em&gt;mitigating&lt;/em&gt; risk associated with data misuse, alteration or loss within applications, preserving the integrity of business operations.&lt;/p&gt;

&lt;h2&gt;The growing threat of unauthorized applications&lt;/h2&gt;

&lt;p&gt;The proliferation of cloud-based applications has made it easier for employees to access and use software without IT approval. This phenomenon, known as &lt;em&gt;shadow IT&lt;/em&gt;, can introduce significant security risks into an organization. Unauthorized applications might be infected with malware, expose sensitive data or violate compliance regulations.&lt;/p&gt;

&lt;p&gt;Furthermore, the increasing sophistication of &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cyber attacks&lt;/a&gt; has made it harder to detect and prevent malicious software from infiltrating networks. Advanced threats like ransomware, phishing and supply chain attacks can target vulnerabilities within applications to gain unauthorized access and disrupt operations.&lt;/p&gt;

&lt;h2&gt;The importance of application control&lt;/h2&gt;

&lt;p&gt;To mitigate these risks, organizations must implement robust application control measures. Application control solutions help to identify and prevent unauthorized applications from running on endpoints, &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;reducing the attack surface&lt;/a&gt; and protecting sensitive data.&lt;/p&gt;

&lt;h3&gt;Key application control benefits&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced security:&lt;/strong&gt; Prevent unauthorized applications from accessing sensitive data and compromising your network.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved compliance:&lt;/strong&gt; Ensure adherence to industry regulations and data privacy standards.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Reduced risk of malware:&lt;/strong&gt; Protect against malware infections that can disrupt operations and damage your reputation.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced productivity:&lt;/strong&gt; Streamline IT operations and reduce the burden on IT staff by automating application management tasks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved visibility:&lt;/strong&gt; Gain visibility into application usage and identify potential security risks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti Neurons for App Control: A comprehensive solution&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; is a powerful solution that empowers organizations to manage and control application usage. Its key features include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Granular application control:&lt;/strong&gt; Precisely define which applications are allowed to run on your endpoints, preventing unauthorized software from executing.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege management:&lt;/strong&gt; Enforce least-privilege principles to minimize attack surface and reduce the risk of unauthorized access.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cloud-based deployment:&lt;/strong&gt; Easily deploy and manage Ivanti Neurons for App Control from a centralized cloud platform.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced security:&lt;/strong&gt; Protect your sensitive data and prevent malware infections by blocking unknown applications.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved compliance:&lt;/strong&gt; Ensure adherence to industry regulations and data privacy standards.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How Ivanti Neurons for App Control works&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons for App Control uses advanced technology to analyze the NTFS ownership of files and cross-reference them against a trusted owners list. If the file owner isn't trusted, the application is blocked from running. This intelligent approach provides a robust defense against unauthorized applications while allowing for exceptions to be configured for approved software.&lt;/p&gt;

&lt;h2&gt;Why invest in application control?&lt;/h2&gt;

&lt;p&gt;In today's threat-filled landscape, application control is no longer an option but a necessity. Ivanti Neurons for App Control offers a comprehensive solution for organizations to safeguard endpoints, reduce risk and improve security posture.&lt;/p&gt;

&lt;p&gt;By investing in application control, you can protect sensitive data, streamline IT operations and ensure compliance with industry regulations.&lt;/p&gt;

&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Learn more: Explore the benefits, features and functionality of &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
</description><pubDate>Tue, 15 Oct 2024 10:44:18 Z</pubDate></item><item><guid isPermaLink="false">64176665-7f00-440f-9955-0fe663726079</guid><link>https://www.ivanti.com/blog/ivanti-user-workspace-manager-2023-3-release</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><title>Ivanti User Workspace Manager 2023.3 Release</title><description>&lt;p&gt;Ivanti User Workspace Manager 2023.3 is now available — and for the first time you can manage your deployments from the cloud!&lt;/p&gt;

&lt;p&gt;Ivanti User Workspace Manager (UWM) is now part of&amp;nbsp;Ivanti Neurons, allowing you to manage and deploy your UWM configurations and agents via the Neurons platform.&amp;nbsp;This takes the place of the Management Center (although the on-premises Management Center is still available).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We have called this a 'hybrid' release, as you'll still need to use the UWM consoles on Windows devices to create and manage your configurations. This is a first step in bringing UWM capabilities to the cloud, and more features are planned for the future.&lt;/p&gt;

&lt;p&gt;A major initial benefit is the ability to deploy agents and configurations to devices outside the corporate network. Over the past three years, there's been a big increase in the amount of remote working, and with that comes devices that aren't always connected to the internal network to receive updates. This supports Ivanti's 'Everywhere Work' approach in enabling greater flexibility and freedom for both you and your employees.&lt;/p&gt;

&lt;p&gt;In addition to the UWM deployment features now available in Ivanti Neurons, you'll also be able to utilize the capabilities of Ivanti Neurons For Edge Intelligence. As an integral piece of the Ivanti Neurons platform, Ivanti Neurons For Edge Intelligence gives IT the ability to gather real-time insights from all devices using Natural Language Processing. It provides operational awareness in seconds of inventory, health and security configurations across the edge leveraging a sensor-based architecture.&lt;/p&gt;

&lt;p&gt;For users of UWM, the information gathered by Edge Intelligence will be of great benefit when it comes to planning or managing your UWM configurations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You can read more about the features and benefits of Ivanti Neurons For Edge Intelligence&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-edge-intelligence"&gt;here&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 25 Oct 2023 09:12:48 Z</pubDate></item><item><guid isPermaLink="false">f47d694b-e9fe-42ee-bd86-bbf146774777</guid><link>https://www.ivanti.com/blog/ethics-of-telemetry-collection-for-employee-experience-improvement</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>DEX</category><title>Ethics of Telemetry Collection for Employee Experience Improvement</title><description>&lt;p&gt;Data collection has become an increasingly essential tool for businesses, allowing them to gather insights about their customers and employees. But it also raises the question of ethics: what data should be collected, how should it be used&amp;nbsp;and who should have access to it?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In this article, we'll explore the ethical implications of collecting employee experience data through telemetry. We'll also examine the &lt;a href="#one"&gt;legal framework surrounding data collection and telemetry&lt;/a&gt;, as well as&amp;nbsp;&lt;a href="#two"&gt;the benefits and dangers associated with it&lt;/a&gt;.&amp;nbsp;Lastly, we'll discuss how to &lt;a href="#two"&gt;develop and implement an ethical workplace telemetry collection protocol&lt;/a&gt; that ensures employee rights are protected and privacy is respected.&lt;/p&gt;

&lt;p&gt;Some examples of data that can be collected in this manner include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Installed applications.&lt;/li&gt;
	&lt;li&gt;Running or stopped processes and services.&lt;/li&gt;
	&lt;li&gt;Firewall and antivirus compliance.&lt;/li&gt;
	&lt;li&gt;Default browser detection.&lt;/li&gt;
	&lt;li&gt;Disk space and profile size.&lt;/li&gt;
	&lt;li&gt;Application faults/crashes.&lt;/li&gt;
	&lt;li&gt;Local event information.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="one"&gt;Understanding the legal framework of data and telemetry collection&lt;/h2&gt;

&lt;p&gt;The European Union's&amp;nbsp;&lt;a href="https://gdpr-info.eu" rel="noopener" target="_blank"&gt;General Data Protection Regulation (GDPR)&lt;/a&gt;&amp;nbsp;sets out the legal framework for collecting personal data from individuals within the EU. It states that employers must obtain consent before collecting or using any personal data from their employees, including telemetry data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://oag.ca.gov/privacy/ccpa" rel="noopener" target="_blank"&gt;California Consumer Privacy Act (CCPA)&lt;/a&gt;&amp;nbsp;also imposes restrictions on collecting employee information in California.&amp;nbsp;These regulations provide a basis for businesses to ensure that they are collecting data in a responsible manner that respects the privacy and rights of their employees. Businesses must take steps to ensure they are compliant with these regulations, such as implementing data security measures and providing employees with clear information about how their data is being used.&lt;/p&gt;

&lt;p&gt;In addition to GDPR and CCPA, there are other laws regarding employee privacy that employers must consider when collecting telemetry data. For example, some U.S. states have laws that require employers to provide notice of any monitoring activities they conduct. It's important for employers to understand these laws and ensure they're compliant with them when developing their telemetry collection protocols.&lt;/p&gt;

&lt;p&gt;When considering the ethics of collecting employee experience data through telemetry, there's a distinction between data privacy and employee privacy:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Data privacy&lt;/strong&gt;&amp;nbsp;is focused on protecting an individual's personal information from being misused or shared without their consent.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Employee privacy&lt;/strong&gt;&amp;nbsp;protects employees' rights in the workplace, such as freedom from surveillance or discrimination.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Employers must consider both perspectives when implementing a telemetry collection protocol to ensure they remain compliant with all relevant laws and protect employee rights in the workplace.&lt;/p&gt;

&lt;h2&gt;The employee experience impacts of collecting their data&lt;/h2&gt;

&lt;p&gt;Collecting employee experience data through telemetry can have a number of positive employee experience impacts for businesses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It allows employers to gain valuable insights into how their employees are performing, what areas need more support and attention, and how the working environment is affecting employee engagement and morale.&lt;/p&gt;

&lt;p&gt;Measuring employee engagement and satisfaction is one of the main advantages of collecting telemetry data. For example, employers can track changes in productivity, efficiency, and performance over time to determine whether any improvements need to be made. This helps to ensure that their employees are motivated and engaged in their work, as well as identify any areas where they may need additional training or support.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, collecting this type of data helps employers understand which processes or practices are having a positive effect on job satisfaction and which ones might be creating issues for employees.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By understanding these dynamics, employers can make adjustments to ensure that their workplace remains an enjoyable environment for all staff members.&lt;/p&gt;

&lt;p&gt;Another of these employee experience impacts comes in how collecting employee experience data through telemetry enables businesses to protect the rights and privacy of their workers at all times.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;The dangers of collecting employee experience data&lt;/h2&gt;

&lt;p&gt;The utilization of employee experience data via telemetry carries with it several possible risks which must be managed carefully.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Employers&amp;nbsp;must&amp;nbsp;take the proper steps to ensure that any private information gathered is securely stored and protected from unauthorized access or use. Companies should also consider how long such data should be kept on file to avoid collecting unnecessary information.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They need to assess the balance between monitoring employees' activities for the purposes of fostering positive employee experience impacts and driving performance optimization without workers feeling as if they’re being constantly monitored and judged.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's essential that an open dialogue exists between employer and employee. That way, everyone can agree on what metrics will be tracked while also allowing workers to provide meaningful feedback if needed.&lt;/p&gt;

&lt;p&gt;It's important for employers to recognize the potential impact that collecting this type of data may have on employees' morale. If not done properly, it could create resentment towards management and high turnover rates if individuals feel their work isn't valued for anything beyond its output metrics.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Companies should always remain cognizant of any legal ramifications associated with collecting employee experience data without obtaining prior approval from workers beforehand. To ensure that privacy is maintained and regulations such as GDPR are adhered to, any identifying data can be anonymised to ensure that users remain incognito and no PII (Personal Identifying Information) is stored.&lt;/p&gt;

&lt;h2&gt;Developing an ethical telemetry collection protocol&lt;/h2&gt;

&lt;p&gt;Creating an ethical framework for collecting telemetry data from employees is essential to protecting their rights and privacy. It requires employers to take the proper steps and adhere to legal frameworks while considering the potential risks associated with this type of data collection.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To build trust with their employees, employers should conduct a thorough data audit to determine what information is necessary for monitoring performance and measuring engagement.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They should also create policies outlining how personal information collected via telemetry will be stored securely and only accessed by those with appropriate authorization levels.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Involving employees in decisions about telemetry protocols is equally important. Employees should be consulted, given the&amp;nbsp;opportunity to provide feedback (such as via an employee survey, forum or council) on how their data is being used, and informed of any potential impacts on morale or comfort levels related to its collection.&lt;/p&gt;

&lt;p&gt;Ensuring that any agreement with employees is documented and always accessible will help to ensure that the agreed rules and boundaries are maintained. Whenever a disagreement or grievance is lodged, being able to refer to a documented policy will help both parties familiarize themselves with the telemetry protocols.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Taking into account these considerations can help employers make informed decisions about how best to use telemetry while still taking advantage of its benefits for employee experience improvement.&lt;/p&gt;

&lt;h2 id="three"&gt;Implementing the telemetry collection protocol in the workplace&lt;/h2&gt;

&lt;p&gt;Once a telemetry protocol has been drafted and agreed upon between the business and employees, it’s important to take the right next steps to ensure that it’s implemented.&lt;/p&gt;

&lt;p&gt;The initial step towards implementing a telemetry collection protocol is assigning personnel who are accountable for handling the gathered data, setting clear expectations for how the information will be used, and making sure employees understand their rights when it comes to safeguarding their personal information.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Employers should develop internal regulations outlining how employee experience data will be safeguarded securely and what measures will be taken to protect employee privacy.&lt;/p&gt;

&lt;p&gt;Ultimately, businesses must provide transparent communication about accumulating employee experience data through telemetry. Again, the point is to generate positive employee experience impacts, not dissension and distrust. They also need to guarantee that all gathered data always remains confidential and secure. Plus, they should outline any potential&amp;nbsp;consequences for failing to adhere to established protocols or misuse of access privileges granted via telemetry usage.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These consequences would be specific to the business implementing a telemetry protocol but could include disciplinary action or even termination of employment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The employee experience impacts of telemetry-based data collection can be significant and beneficial for the organization and its workers. By following these guidelines and staying aware of the consequences and legalities, you can ensure its success for everybody.&lt;/p&gt;
</description><pubDate>Tue, 05 Sep 2023 14:16:43 Z</pubDate></item><item><guid isPermaLink="false">d4915504-6ac0-47be-a291-f82ca71071e8</guid><link>https://www.ivanti.com/blog/circumvent-the-global-chip-shortage-with-ivanti-virtual-desktop-extender</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><title>Circumvent the Global Chip Shortage with Ivanti Virtual Desktop Extender</title><description>&lt;p&gt;We’ve known for some time that the demand for new graphics cards is far exceeding the supply.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;A combination of the pandemic, natural disasters and unprecedented consumer demand has led to a global chip shortage. &lt;a href="https://arstechnica.com/gadgets/2021/04/intel-nvidia-tsmc-execs-agree-chip-shortage-could-last-into-2023/" target="_blank" rel="noopener"&gt;The major names in the industry confirm that the supply problem may last in to 2023&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;At a time when many companies are having to shift more processing to the cloud to support remote workers – this supply problem could not have come at a worse time.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Resource hungry applications that are hosted in the data centre (both private and cloud) are consuming large amounts of resources and pushing hardware to its capacity – with upgrades now delayed until next year at the earliest.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;There is an untapped resource at your fingertips though – and one that is often forgotten!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/user-workspace-manager"&gt;Ivanti Virtual Desktop Extender&lt;/a&gt; allows you to utilise the resources of your endpoints to run powerful applications – such as design or graphics software - and bring those into your virtual environment.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The experience is seamless for your users. They will connect to their virtual desktop as usual and find their locally installed applications available to them from the start menu.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;A win for your users due to better performance – and a win for IT by reducing the load in the data centre!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Read more about how Ivanti Virtual Desktop Extender can help you to solve the problem of data centre performance issues &lt;a href="https://www.ivanti.com/products/user-workspace-manager"&gt;here&lt;/a&gt; – and check out the demo video below to see how seamless the experience is for your users!&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="616026113"&gt;&lt;/object&gt;&lt;/p&gt;</description><pubDate>Wed, 29 Sep 2021 23:36:19 Z</pubDate></item><item><guid isPermaLink="false">5ea8b734-dba5-4a81-a76a-c36df068fc82</guid><link>https://www.ivanti.com/blog/enhanced-microsoft-teams-integration-with-ivanti-service-desk</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><title>Enhanced Microsoft Teams Integration with Ivanti Service Desk</title><description>&lt;p&gt;Providing flexible solutions to your users creates a more co-operative and engaging environment where people can choose how, and where they interact with your services.&lt;/p&gt;

&lt;p&gt;That’s why over the past year we’ve been working on adding more choices when it comes to engaging with Ivanti Service Desk, and our latest Microsoft Teams App opens up an entire new channel for communication.&lt;/p&gt;

&lt;p&gt;Your analysts and end users can now interact directly with Ivanti Service Desk from the Microsoft Teams app - allowing them to raise Incidents, get progress updates and notifications without having to leave Teams at all!&lt;/p&gt;

&lt;p&gt;Our updated integration with Teams builds on our initial release of this feature last year and utilises your existing forms, permissions and designs so that you don’t have to rebuild or duplicate any previous work to get access to what you need.&lt;/p&gt;

&lt;p&gt;The new App template only requires basic configuration before it can be deployed to your users and a comprehensive step-by-step guide is provided to help you get up and running quickly.&lt;/p&gt;

&lt;p&gt;The enhanced Teams integration is provided at no extra cost to Ivanti Service Desk customers and can be downloaded today from the &lt;a href="https://forums.ivanti.com/s/article/Ivanti-Service-Desk-2018-3-Download" target="_blank" rel="noopener"&gt;Ivanti Community site&lt;/a&gt;! Check out the video below to learn more.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="568649323"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Wed, 30 Jun 2021 17:49:32 Z</pubDate></item><item><guid isPermaLink="false">fd2e4bb4-1306-4aca-9524-a16c2df3b90e</guid><link>https://www.ivanti.com/blog/service-desk-now-integrates-with-microsoft-teams</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Service Management</category><title>Service Desk Now Integrates With Microsoft Teams</title><description>&lt;p&gt;As part of our re-affirmed commitment to customers, Ivanti formed an Independent Business Unit that consists of a dedicated set of Ivanti products and services with the single purpose of pleasing its customers by providing long term value. This new unit’s development is driven by our customers’ feedback and requirements.&lt;/p&gt;

&lt;p&gt;We are pleased to announce our most recent release for &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank"&gt;Ivanti Service Desk&lt;/a&gt; 2018.3 - update 14! The name doesn’t exactly roll off the tongue, but we’re working on that. It’s the biggest release that we’ve made in more than 3 years!&lt;/p&gt;

&lt;p&gt;We are excited to share the brand-new features that we’ve been working on during the past few months:&lt;/p&gt;

&lt;h3&gt;Office 365 OAuth2 Authentication&lt;/h3&gt;

&lt;p&gt;Microsoft announced the end of support for Basic Authentication to Office365 in October 2020, and guess what &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;Service Desk&lt;/a&gt; used? Yep, you guessed it!&lt;/p&gt;

&lt;p&gt;So, we’ve introduced OAuth2 Authentication into Service Desk using Microsoft Graph which allows you to connect to your Office365 mailbox for incoming emails without having to use Basic Authentication.&lt;/p&gt;

&lt;p&gt;This new way of connecting was a &lt;em&gt;huge&lt;/em&gt; undertaking for our engineers and although Microsoft very kindly pushed back the date until 2021 - due to the current circumstances with COVID19 - it’s ready for you to use!&lt;/p&gt;

&lt;h3&gt;Microsoft Teams Integration&lt;/h3&gt;

&lt;p&gt;As indicated in the intro of this blog: Ivanti Service Desk is here to stay. What better way to prove that by continuing to innovate and keep up to date with current circumstances?&lt;/p&gt;

&lt;p&gt;For obvious reasons, Microsoft Teams is now a huge part of our customers’ everyday life. By integrating Teams with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank"&gt;Service Desk&lt;/a&gt; we seamlessly fit into&amp;nbsp; everyday practices and keep up with the latest technologies.&lt;/p&gt;

&lt;p&gt;The Service Desk 2018.3 release – update 14 is the first Microsoft Teams integration release which allows you to send notifications to Teams Channels and Individuals from Service Desk.&lt;/p&gt;

&lt;h3&gt;What Microsoft Teams integrations would you like to see next?&lt;/h3&gt;

&lt;p&gt;We are planning to add more features into the Service Desk Teams integration in the future, but since there a so many possibilities, we’d like to hear from you! What would you like us to add next?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://success.ivanti.com/customers/Community_RegStep1_Page?startURL=%2Fcustomers%2Fidp%2Flogin%3Fapp%3D0sp1B000000002b%26SAMLRequest%3DhZJfT8MgFMW%252FSt94aum%252FuY60NXWLyZJpzKY%252B%252BGIYpY6kBeTC1G8vazXqg8oj%252BZ1z7j1QAh16TRpnD3LLnx0HGzQA3Fih5FJJcAM3O26OgvG77aZCB2s1EIzFkUorhIUhch4%252FKg9ETA34ZIjZpETByhsKSU9uX1pwjHGAaPIYVcyBVT4KsGg17tWTkOdU6yoGnVzEHyfdo2C9qtDj2Zx3bMbmYVcUXZgXLQ%252F3bTwL0yxZzDLGcpYWHgVwfC3B%252BpQKpXGahPEiTPLbNCPxnOTZAwrufeQ4WxrFKHgdegnktEGFnJFEURBAJB04EMvIrrnaEA8S%252BtnQd4n%252BW6ONsoqpHtXliSbjdKb%252Br88Sf6fL6bmuvft6daN6wd6Cpu%252FVy9JwanmFrHG%252B9UtlBmp%252FnyeJkvFGtGE3osRJ0JyJTvAW4XoK%252Ffkt6nc%253D" target="_blank" rel="noopener"&gt;Please submit your enhancement request via the Ivanti Community site. We’re excited to hear from you!&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Ivanti Service Desk 2020 Roadmap&lt;/h3&gt;

&lt;p&gt;If you’d like to find out more about the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank"&gt;Service Desk&lt;/a&gt; roadmap for the rest of 2020, then please get in touch with your account manager to arrange a roadmap session!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://help.ivanti.com/docs/help/en_US/LDSD/12.0/Default.htm#NewFeatures/2018.htm" target="_blank" rel="noopener"&gt;For more details on this release, please check the release notes here&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 28 Jul 2020 22:59:09 Z</pubDate></item><item><guid isPermaLink="false">9be4d24e-e808-40f8-951f-6e6d0b931180</guid><link>https://www.ivanti.com/blog/new-year-same-challenges-why-in-2016-appsense-is-still-the-only-user-environment-management-choice</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>New Year, Same Challenges: Why in 2016, AppSense is still the only User Environment Management choice</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignleft size-full wp-image-12737" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/02/2016_02_win10-office365-01.png" alt="2016_02_Win10-Office365-01"&gt;&lt;br&gt;
With 2016 upon us, and 2015’s challenges becoming this year’s reality, I’m going to recap several 2015 hot topics and cover how to address them. This post will review Microsoft’s significant 2015 releases—Windows 10 and Office 2016, both now appearing in the enterprise—and the excellent value-add that AppSense adds to both&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Windows 10:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In September 2015, an AppSense blog by Jon Rolls (5 reasons why you need UEM more than ever with Windows 10) summarized both the current state-of-play and also how we see Windows 10 adoption landscape. In November 2015, &lt;a href="https://www.gartner.com/en/newsroom" target="_blank" rel="noopener"&gt;Gartner&lt;/a&gt;&amp;nbsp;underlined that, in the 1st half of 2016, the majority of enterprises will already have Windows 10 pilots underway and by January 2017 at least half of enterprises will already have begun Windows 10 production deployments.&lt;/p&gt;

&lt;p&gt;&lt;img class="alignleft wp-image-12166 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2015/09/windows-10-screenshot.jpg" alt="Windows 10"&gt;&lt;/p&gt;

&lt;p&gt;One of the common aspects of Windows 10 that organizations are keen to test is the user migration experience. Since the Windows 10 v5 user profile is incompatible with its predecessors, AppSense plays a significant role in delivering an uneventful (and even pleasant!) user experience during a Windows 10 migration.&lt;/p&gt;
&lt;p&gt;AppSense has been at the forefront of enabling the enterprise to say Goodbye to Windows Migrations. In July 2015, AppSense released Service Packs for both Application Manager (AM 8.9 SP1) and Environment Manager (EM 8.6 SP1) to ensure that Windows 10 is a Maintained Platform (see here for our Maintained Platform Matrices). In late 2015, AM and EM further enhanced Windows 10 functionality with their respective Service Pack 2 releases, available from http://support.appsense.com.&lt;/p&gt;
&lt;p&gt;To simplify Windows 10 transitions further, we have also released a Windows 10 Personalization Template via AppSense Exchange: &lt;strong&gt;Windows Personalization Template - Windows 10 Custom Settings&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Windows 10 Personalization Template gives customers a method of applying/testing Windows 10 Personalization, allowing users to roam between Windows 7, 8.1 and 10. The Windows 10 Personalization Template includes updates for Windows 10-specific areas, including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows Appearance (Color &amp;amp; Themes)&lt;/li&gt;
&lt;li&gt;Taskbar &amp;amp; Notification Area&lt;/li&gt;
&lt;li&gt;Tablet Mode&lt;/li&gt;
&lt;li&gt;Action Center&lt;/li&gt;
&lt;li&gt;File Explorer Views and General Settings&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Customers can already roam User Credentials (Windows and Internet Explorer) and Certificates to and from Windows 10 desktops using Application Personalization without this Template.&lt;/p&gt;
&lt;p&gt;One of the notable omissions from this Windows 10 Personalization Template is the Start Menu. &amp;nbsp;The humble Windows Start Menu has been through the mill at Microsoft of late, with Windows 8 abandoning it, Windows 8.1&amp;nbsp;resurrecting it in a limited form, and finally Windows 10 restoring it in an enhanced form. This enhancement at present is also it's 'Achilles Heel'—you can read about the native profile roaming issues that this New Start Menu design can introduce (still present in the latest Windows 10 TH2 release) by viewing the following article - &amp;nbsp;http://www.appsense.com/kb/150910053449235&lt;/p&gt;
&lt;p&gt;Due to this underlying Microsoft issue it is not possible at present to personalize all the&amp;nbsp;necessary&amp;nbsp;Start Menu Tile Settings required, but AppSense understands that Microsoft will be resolving this problem by March 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Office 2016 /365:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;With an initial release in September 2015, Microsoft Office Suite is the first to be designed&amp;nbsp;and built primarily for the Cloud and mobile world. &amp;nbsp;At present Office 2016/365 is available only in a “First Release” form. The current estimate is that Office 2016 will be generally available for Office 365 customers beginning in February 2016. (Similarly, an Office 2016 Branch for Business release is also scheduled for this time).&lt;/p&gt;
&lt;p&gt;Office 365 commercial seat adoption has grown rapidly in companies of all sizes in the last year. Although Office 2016 is very much in early adoption phase, customers currently evaluating or using Office 2016/365 can now use the following Personalization&amp;nbsp;Template recently made available on AppSense Exchange:&amp;nbsp;&lt;strong&gt;Windows Personalization Template - Office 2016 / 365&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For customers using Office 365 Subscriptions and Online Services (such as OneDrive and SharePoint), it’s important to note that to use this template, a user's Office 365 Identity, Registration and Online settings need to be accessible outside of the AppSense Virtual Personalization Layer. The template accommodates this by&amp;nbsp;utilizing our Windows Settings Group feature in a similar manner to how AppSense manages the Mail Profile (more on the increasing value of Windows Settings Groups in a later post).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;AppSense is planning to include both Windows 10 and Office 2016/365 Personalization Settings (Out-Of-Box) in a 2016 release of Environment Manager. In the interim, we recommend that customers evaluate and test personalization using the Personalization Templates provided on AppSense Exchange.&lt;/p&gt;
&lt;p&gt;Finally, it is interesting to note that Office 2016 is moving to&amp;nbsp;the same Update Branch strategy as Windows 10, meaning that there will be 3 cumulative feature updates per year, in addition to Monthly Security Updates. &amp;nbsp;2016 is a changing time for the enterprise – in Microsoft's words: 'Admins - Get Ready'&lt;/p&gt;</description><pubDate>Wed, 03 Feb 2016 10:00:00 Z</pubDate></item><item><guid isPermaLink="false">a716471e-6403-4ab4-8089-11ea4c2576ad</guid><link>https://www.ivanti.com/blog/new-on-appsense-exchange-community-submissions</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>New on AppSense Exchange: Community Submissions</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;AppSense Exchange has been live for several years now, giving AppSense a way to quickly share best practice templates, snippets, configurations, and tools with our customers and the broader community outside of major software releases.&lt;/p&gt;
&lt;p&gt;The use of templates and snippets gives DesktopNow particularly powerful&amp;nbsp;flexibility. The ability to import and export templates from DesktopNow allows us to share updates and best practices with you quickly and easily.&lt;/p&gt;
&lt;p&gt;For example, if a major software vendor releases a new version of the desktop application that you use, AppSense can quickly generate a template for managing the user settings for that application and then make it available on AppSense Exchange. This means that you don't have to wait for the next release of DesktopNow before you have the correct template for your environment!&lt;/p&gt;
&lt;p&gt;Now, for the first time, we have added the ability for&amp;nbsp;&lt;em&gt;you&lt;/em&gt; to share your template creations with the world directly through AppSense Exchange.&lt;/p&gt;
&lt;p&gt;Have you created a personalization template for an application that you're particularly proud of? Have you written a configuration, script or tool that you think others would benefit from?&lt;/p&gt;
&lt;p&gt;Check out the video below to see how you can share your creations with the wider AppSense Community!&lt;/p&gt;
&lt;p&gt;[video poster="https://static.ivanti.com/sites/marketing/media/images/blog/2015/06/ban02_knowledgeshared.jpg" width="1064" height="684" mp4="https://static.ivanti.com/sites/marketing/media/images/blog/2015/06/exchange_uploads_small.mp4"][/video]&lt;/p&gt;

&lt;p&gt;All submissions to AppSense Exchange will be checked and verified&amp;nbsp;before being approved. Please read the Terms and Conditions on AppSense Exchange for further details.&lt;/p&gt;</description><pubDate>Tue, 23 Jun 2015 16:52:31 Z</pubDate></item><item><guid isPermaLink="false">59a0c0cb-c8cf-4a89-a883-9bd1797c70de</guid><link>https://www.ivanti.com/blog/application-manager-8-9-updates</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Application Manager 8.9 Updates</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2015/03/blog_banners_spotlight_main-page.png" target="_blank" rel="noopener"&gt;&lt;img class="alignnone size-full wp-image-11468" src="https://static.ivanti.com/sites/marketing/media/images/blog/2015/03/blog_banners_spotlight_main-page.png" alt="Blog_Banners_Spotlight_main-page"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Application Manager 8.9&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Today's announcement of Application Manager 8.9&amp;nbsp;introduced several new features, such as Windows App Store support&amp;nbsp;and customizable message boxes. We’ve also enhanced a number of existing features, such as device rules and self-elevation.&lt;/p&gt;
&lt;p&gt;AppSense’s “user-first” design philosophy ensures user experience is maintained as desktops are being secured. The following are some specific examples of&amp;nbsp;how we achieve this with our new features-&lt;/p&gt;
&lt;p&gt;&lt;iframe class="wistia_embed" src="//fast.wistia.net/embed/iframe/p1zx3oitb2" name="wistia_embed" width="500" height="313" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;System Controls&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Application Manager&amp;nbsp;now has&amp;nbsp;the granular control to specify particular services, event logs and application uninstalls to protect. This means that you can protect vital system controls from tampering, even from local administrators!&lt;/p&gt;
&lt;p&gt;You can also give&amp;nbsp;standard users access to restart a service or uninstall an application. This makes it easier than ever to remove admin rights from your end-users, yet still give them the rights that they need to do their job.&lt;/p&gt;
&lt;p&gt;&lt;iframe class="wistia_embed" src="//fast.wistia.net/embed/iframe/9alb3waz44" name="wistia_embed" width="500" height="313" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Customizable Message Boxes&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Bored with the standard grey message boxes? No problem! You can now fully customize the Application Manager message boxes. Change the font, color, width, height and background through a simple point-and-click interface. Add in your corporate logo, and be as creative as you like! As well as a simple form to make changes, we’ve also given you the option to go ‘Advanced’ and edit the CSS of the message boxes directly to personalize your experience even further.&lt;/p&gt;
&lt;center&gt;&lt;iframe class="wistia_embed" src="//fast.wistia.net/embed/iframe/j3bjoe861s" name="wistia_embed" width="500" height="313" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/center&gt;&amp;nbsp;
&lt;center&gt;&lt;strong&gt;Windows App Store Support&lt;/strong&gt;&lt;/center&gt;With Windows 8.1 making headway in the corporate environment, and Windows 10 just around the corner, the need to control Windows Store apps has become a necessity. Application Manager 8.9 allows you to control which Windows Store apps your users can access. Whether you want to prohibit all Windows Store apps, or just a few, you now have the power to choose which apps are allowed to launch in your environment.
&lt;center&gt;&lt;iframe class="wistia_embed" src="//fast.wistia.net/embed/iframe/cdksjs0afl" name="wistia_embed" width="500" height="313" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;p&gt;&lt;strong&gt;Configurable Hash Algorithms&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Application Manager has long allowed you to generate a signature from a file in order to determine its origin. A signature is a secure way of ensuring that the file that you are allowing to run (or prohibiting) is genuinely the file that you are targeting. In the past, we have used SHA-1 to generate our signatures, but after feedback from our existing customers, we have now added support for the more secure SHA-256, as well as a light weight option, Adler32. The hashing algorithm is selected on a per-configuration basis, and Application Manager 8.9 will support configurations upgraded from previous versions already containing signatures.&lt;/p&gt;
&lt;p&gt;But wait, there’s more!&lt;/p&gt;
&lt;p&gt;Application Manager 8.9 also includes enhancements to self-elevation and URL redirection, as well as support for Computer Groups &amp;amp; OU’s.&lt;/p&gt;</description><pubDate>Tue, 21 Apr 2015 15:09:17 Z</pubDate></item><item><guid isPermaLink="false">e4583f5a-16cb-4e67-94d4-46ccdaaf91e7</guid><link>https://www.ivanti.com/blog/application-manager-web-snippets</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Application Manager Web Snippets</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank" rel="noopener"&gt;rebrand in January 2017&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We’ve recently added several Web Snippets to AppSense Exchange for use with Application Manager. That’s cool you’re thinking, but what are Web Snippets and how can I get them?&lt;/p&gt;
&lt;p&gt;Visit this place: www.appsense-exchange.com and search for “web snippets”.&lt;/p&gt;
&lt;p&gt;And as for what are they? They are tiny bits of common code that can be imported in to your Application Manager configuration in order to give your end users the ability, and rights, to install and run certain applications such as Flash player, Silverlight and iTunes and many others.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/09/am1.png" alt="application manager"&gt;&lt;/p&gt;
&lt;p&gt;A large number of web installations require the end user to have administrative rights, even though many of the applications may be perfectly harmless. These types of applications are ones that users probably enjoy on their personal machines, and that your administrators would almost certainly provide if requested. So why not let your users do it themselves?&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/09/am2.png" alt="application manager"&gt;&lt;/p&gt;
&lt;p&gt;The Web Snippets feature not only gives users the privileges to install the applications but include the relevant Application Manager rules to ensure that only the specified installs can take place (by leveraging metadata and other information) and that the applications have the correct permissions to run once installed. Basically, think of this as something you should do to help your friends’ manning your help desk and to help your users become more self-sufficient.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone wp-image-10968" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/09/am3.png" alt="application manager"&gt;&lt;/p&gt;
&lt;p&gt;We'll be adding more Web Snippets to AppSense Exchange shortly, so make sure you keep an eye on the site for any updates.&lt;/p&gt;
&lt;p&gt;Again, to download any of the current Web Snippets, simply log on to www.appsense-exchange.com and search for ‘Web Snippet’.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//fast.wistia.net/embed/iframe/4pua56ob0c" name="wistia_embed" width="600" height="338" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Let us know how they work out, and if there’s any applications out there you’d like us to support sooner rather than later.&lt;/p&gt;</description><pubDate>Wed, 24 Sep 2014 20:07:30 Z</pubDate></item><item><guid isPermaLink="false">581ce706-03d1-4e9f-913b-6bb1911425be</guid><link>https://www.ivanti.com/blog/sql-server-reporting-services-reports-model-appsense-exchange</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>SQL Server Reporting Services Models Available on AppSense Exchange</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;rebrand in January 2017&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I’m delighted to say that two SQL Server Reporting Services (SSRS) models have been made available for download on AppSense Exchange.&lt;/p&gt;
&lt;p&gt;A Report Model is a user-friendly description of an underlying database, with pre-established data relationships and auto-generated queries. The Report Models give you the ability to create highly customized reports from both the Management Server and Personalization Server databases.&lt;/p&gt;
&lt;p&gt;Using the powerful building and customizing options within SSRS and Report Builder, you will be able to produce any number of reports to suit your needs for both the Management Server and Personalization Server Databases.&lt;/p&gt;
&lt;p&gt;Here’s an example, showing when Application Groups were added to various Personalization Groups:&lt;/p&gt;
&lt;p&gt;&lt;img class="wp-image-10819 aligncenter" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/07/sql01.png" alt="SQL01"&gt;To get started, download the SSRS Models from AppSense Exchange.&lt;/p&gt;
&lt;p&gt;Once downloaded, you can import each Model into the SSRS web console.&lt;/p&gt;
&lt;p&gt;The only other step is to create a Data Source in SSRS that points to your Management Server or Personalization Server databases:&lt;/p&gt;
&lt;p&gt;&lt;img class=" wp-image-10821 aligncenter" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/07/sql02.png" alt="SQL Report Model"&gt;Once your Report Model and Data Source are ready, you can start creating your custom reports using Report Builder.&lt;/p&gt;
&lt;h6&gt;&lt;img class=" wp-image-10822 aligncenter" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/07/sql03.png" alt="SQL Personalization Report Model"&gt;A report being created in Report Builder using the Personalization Report Model&lt;/h6&gt;
&lt;p&gt;Below are a few examples of reports created using the Management Server report model and Report Builder:&lt;/p&gt;
&lt;h6&gt;&lt;img class=" wp-image-10823 aligncenter" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/07/sql04.png" alt="SQL Management Server"&gt;A report showing which packages are assigned to each deployment group in the&lt;br&gt;
Management Server&lt;/h6&gt;
&lt;h6&gt;&lt;img class="wp-image-10824 aligncenter" title="A report showing events against each deployment group in the Management Server" src="https://static.ivanti.com/sites/marketing/media/images/blog/2014/07/sql05.png" alt="SQL Management Server"&gt;A report showing events against each deployment group in the Management Server&lt;/h6&gt;
&lt;p&gt;For more information on SSRS, please visit http://msdn.microsoft.com/en-us/library/bb522859.aspx&lt;/p&gt;</description><pubDate>Tue, 08 Jul 2014 22:40:29 Z</pubDate></item></channel></rss>