<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/jay-bhansali/rss" /><link>https://www.ivanti.com/blog/authors/jay-bhansali</link><item><guid isPermaLink="false">29071e14-7d6c-43e1-b027-d6a6b030096d</guid><link>https://www.ivanti.com/blog/ivanti-named-as-a-visionary-in-the-2021-gartner-magic-quadrant-for-unified-endpoint-management-tools</link><atom:author><atom:name>Jay Bhansali</atom:name><atom:uri>https://www.ivanti.com/blog/authors/jay-bhansali</atom:uri></atom:author><category>Endpoint Management</category><category>Ivanti News</category><title>Ivanti Named as a Visionary in the 2021 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools</title><description>&lt;p&gt;Have you heard the news? The latest Gartner Magic Quadrant for Unified Endpoint Management Tools (UEM) is out, and here at Ivanti we’re thrilled to be recognized in the Visionary quadrant for completeness of vision and ability to execute. We’re especially proud to be positioned as a Visionary as we feel this reflects the forward momentum we bring to the market. This is the first time we’re recognized as a Visionary after being a Challenger &amp;nbsp;in the UEM Magic Quadrant for four years in a row. We truly believe that the recognition and placement received from Gartner is a testament and validation of our strategy and where we see the UEM market is heading.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The Everywhere Workplace is here to stay and what that really means is that whatever device you are using is your Workplace. We’re committed and passionate about helping IT teams to secure your workplace so that you can get your work done in the most secure manner possible. Ivanti’s UEM platform makes it possible for IT teams to manage all devices from Windows to macOS, iOS to Android and beyond to IoT.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;It’s not just about UEM though. This is deeper than that. Today IT teams need to use cutting edge technologies like artificial intelligence (AI) and machine learning (ML) so that they can keep up with the fast pace of the Everywhere Workplace. Robust security capabilities like passwordless multi-factor authentication (MFA) can make the user experience even better. Put that together with supporting new and emerging use cases like the internet of things (IoT) and wearable technology and you get a sense for what Ivanti’s strategy looks like in the UEM space.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We continue to look for more innovative ways to deliver the tools and solutions that our customers need. We couldn’t do any of this without their support, and we can’t say ‘thank you’ enough. We’re excited for what is to come in the UEM and hope you will continue to join us for the journey!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Learn more about Ivanti’s positioning&lt;/a&gt; in the Gartner Magic Quadrant for Unified Endpoint Management Tools.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner Disclaimers:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner Magic Quadrant for Unified Endpoint Management Tools, Dan Wilson, Chris Silva, Tom Cipolla, 16&lt;sup&gt;th&lt;/sup&gt; August 2021.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Wed, 18 Aug 2021 17:51:57 Z</pubDate></item><item><guid isPermaLink="false">a63e2a0a-f1fa-42eb-986d-d23d1a8ade1d</guid><link>https://www.ivanti.com/blog/mobile-devices-are-ubiquitous-and-so-are-cyberattacks</link><atom:author><atom:name>Jay Bhansali</atom:name><atom:uri>https://www.ivanti.com/blog/authors/jay-bhansali</atom:uri></atom:author><category>Security</category><title>Mobile Devices are Ubiquitous, and so are Cyberattacks</title><description>&lt;p&gt;We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities.&lt;/p&gt;

&lt;p&gt;We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives. However, we often overlook the ‘dark alley at night’ side of security and privacy concerns when we’re traveling through these online pursuits.&lt;/p&gt;

&lt;p&gt;In addition to mobile device ubiquity, they have also become more diversified, with smartphones, smartwatches, tablets, and other devices that use on-premises and cloud apps capable of accessing mission-critical corporate systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We have many reasons for concern&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Even if a mobile device isn’t attached to a business system, hackers can capture user and machine credentials that can be gateways to obtaining access into corporate systems and data. Businesses are concerned, as is evidenced by &lt;a href="https://www.verizon.com/business/resources/reports/mobile-security-index/" target="_blank" rel="noopener"&gt;Verizon’s 2021 Mobile Security Index Report&lt;/a&gt;, where two-thirds of surveyed respondents said risks associated with mobile devices had increased over the past year, and 50% say mobile device risks are growing faster than others.&lt;/p&gt;

&lt;p&gt;Unfortunately, for any organization, when a cybersecurity breach impacts corporate assets, and compromises customer data, the results can be devastating. The fallout can include lost revenue, business disruption, diminished customer loyalty, and loss of brand equity.&lt;/p&gt;

&lt;p&gt;Businesses are now making cybersecurity and data privacy top-priorities. With growing cybersecurity attacks, there is a continuous need to stay ahead of bad actors. As the COVID-19 pandemic spread throughout the world, hackers took advantage of the expanding attack surfaces, as work from anywhere became the defacto corporate norm. They quickly leapt on this massive shift as an opportunity to use new and more creative phishing attacks that exploit our human and technology weaknesses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Verizon Mobile Security Index Report for 2021&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Verizon recently released their &lt;a href="https://www.verizon.com/business/resources/reports/mobile-security-index/" target="_blank" rel="noopener"&gt;2021 Mobile Security Index Report&lt;/a&gt;. It covers mobile device threats, the defenses companies are putting in place, and how those defenses are being compromised.&lt;/p&gt;

&lt;p&gt;The report surveyed 856 professionals responsible for procuring, managing and securing mobile devices. Verizon also worked with leaders in the mobile security industry, including Ivanti, to contribute data. The report is intended to help businesses better understand the mobile security environment and its risks, and provide information that will help them strengthen their mobile security postures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mobile devices continue to be high risk targets &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Mobile devices are prone to the same attacks as other digital equipment. However, they also have their own inherent challenges, with small screens that make it more difficult to spot malicious emails and phishing websites. The mobile devices we carry have more of a tendency to get lost or stolen. They are susceptible to eavesdropping as well, since we frequently use our devices in public settings.&lt;/p&gt;

&lt;p&gt;The report found one in five surveyed companies experienced a compromise involving a mobile device in the past 12 months. These compromises led to loss of data or significant disruption to business operations. And the threats are growing, even as the companies are unaware that they are happening. They either didn’t see them, or they haven’t had the time to fully trace them back to the sources involved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Work from anywhere has greatly exacerbated security risks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The COVID-19 response was the most cited reason for sacrificing mobile device security. The pandemic forced workers out of the office and into their homes. Organizations now rely upon employees using their personal devices to access corporate resources and systems. In fact, 79% of organizations saw a remote work increase. Unfortunately, nearly half of the respondents admitted their company had knowingly cut corners on mobile device security. Of those remaining, 38% came under pressure to cut corners.&lt;/p&gt;

&lt;p&gt;Because mobile devices are a critical component of any business, it is imperative organizations take proactive steps to protect them. A mobile threat detection, or MTD, solution can detect and block phishing attempts however they are instigated, including via apps, social media and even QR codes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Leveraging a zero trust model to support the vanishing perimeter&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The traditional way of thinking about security perimeters has dramatically changed. Just as a moat is no longer a great defense today, traditional security perimeter-focused IT security is a weak defense for today’s perimeter-less business environments.&lt;/p&gt;

&lt;p&gt;The thinking behind zero trust network access (ZTNA) can also be defined as “trust no one”. ZTNA creates an extreme level of tunnel vision, where users can only see what they’ve been given specific access to. ZTNA isn’t a technology; it’s a security framework, and requires multiple technologies to implement.&lt;/p&gt;

&lt;p&gt;A strong security posture needs to include mobility and cloud access as key components of the digital strategy. In doing so, mobile device security will become more seamless to improve the user experience, giving them greater confidence that their data and privacy are safe, while at the same time, adding visibility and management control for organizations to protect their digital business assets.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Wed, 28 Apr 2021 23:43:31 Z</pubDate></item><item><guid isPermaLink="false">75ca871a-26b6-4b41-9150-33a15ddac2d5</guid><link>https://www.ivanti.com/blog/peace-of-mind-in-the-everywhere-workplace-1</link><atom:author><atom:name>Jay Bhansali</atom:name><atom:uri>https://www.ivanti.com/blog/authors/jay-bhansali</atom:uri></atom:author><category>Security</category><title>Peace of Mind in the Everywhere Workplace</title><description>&lt;p&gt;&lt;em&gt;Protect your brand, people and data with an end-to-end, zero trust approach&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;At Ivanti, we make the Everywhere Workplace possible. Our solutions enable fundamental security controls based on zero trust principles and best practices from cloud to the edge. Translation: we secure all endpoints and help organizations move toward an end-to-end, passwordless access authentication experience.&amp;nbsp; Plus, we make it simple.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti’s vision: unify security and IT operations from cloud to data center and to the edge to drive digital transformation. We believe the traditional separation between security and IT results in higher costs, an inferior user experience, and higher risk. Unlike the security point players, we believe that only by tightly integrating security and IT, can we maximize efficiency, flexibility and business continuity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;A snapshot of our unique capabilities:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt; Discovery of an organization’s assets at the edge.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Comprehensive solutions to manage and secure the edge.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Secure access from the edge to an organization’s applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Secure access to data from data center to cloud.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti’s seamless approach automates, heals and services this continuous process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We start with visibility and robust discovery (Neurons). Every CIO understands that assets at the edge are dynamic,&amp;nbsp;and these endpoints can’t be managed and secured if you do not know they exist or where they exist.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;With visibility and centralized control, Ivanti hardens the endpoint by providing industry-leading:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Secure configuration enforcement.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch and vulnerability management.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Application control&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Allow and Deny listing.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Least privilege access.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Continuous automation/healing.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Once the devices are protected, Ivanti provides secure connectivity solutions including traditional virtual private network (VPNs), network access control (NAC) and clientless application access (I.e. zero trust access) for employees and business partners.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Another area of focus: strong authentication. Because people are predictable and passwords are easy to guess or steal, strong authentication is necessary to reduce risk quickly. Ivanti has a path to take organizations to passwordless authentication with Ivanti’s zero sign-on technology.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In the Everywhere Workplace, it’s more important than ever to make sure the right users have access to the right assets anytime, anywhere. Over time, traditional VPNs will evolve to ZTA solutions, enforcing a more flexible approach and minimizing unauthorized lateral movement regardless of whether data and applications reside on-premises, in the public cloud or SaaS services.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;This evolution doesn’t have to mean a slash-and-burn approach. Organizations have invested billions in their technology-installed base and need a hybrid approach, where new solutions augment existing infrastructure, safeguards, applications and processes and provide a graceful migration to cloud-based architectures.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We are here to help make the Everywhere Workplace secure and productive.&amp;nbsp;Ivanti provides the fundamental security solutions that allow our customers to protect what is most important: their people, their brand their people and their data.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 12 Apr 2021 15:00:00 Z</pubDate></item></channel></rss>