<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/kate-kim/rss" /><link>https://www.ivanti.com/blog/authors/kate-kim</link><item><guid isPermaLink="false">9bfc3ff7-27f5-45a5-9f4d-5172fd30e9c1</guid><link>https://www.ivanti.com/blog/a-single-pane-of-glass-how-it-transforms-it-asset-monitoring</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Endpoint Management</category><title>A Single Pane of Glass: How It Transforms IT Asset Monitoring</title><description>&lt;p&gt;How large is your company’s IT infrastructure? How many devices and assets are attached to it? As large as it was yesterday, it’s probably&amp;nbsp;larger&amp;nbsp;today&amp;nbsp;—&amp;nbsp;and will be still larger tomorrow. This is compelling organizations to embrace device and asset monitoring under a “single pane of glass,” meaning via a unified, “single console” view of their entire network to enable unified endpoint management (UEM).&lt;/p&gt;

&lt;p&gt;Part of what’s driving the increase in&amp;nbsp;the number&amp;nbsp;and distribution of IT assets is the move to remote and hybrid work. An associated factor is the growth of&amp;nbsp;new&amp;nbsp;devices, especially Internet of Things (IoT) endpoints:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWREzU" rel="noopener" target="_blank"&gt;Ponemon Institute&lt;/a&gt;&amp;nbsp;found that 65% of companies said IoT/OT (operational technology) devices were among the&amp;nbsp;least secured assets&amp;nbsp;in their infrastructure.&lt;/li&gt;
	&lt;li&gt;50% said attacks on those devices had increased.&lt;/li&gt;
	&lt;li&gt;Only 29% claimed they had an inventory of all IoT/OT devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;The dangers of tool sprawl&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Imagine a scenario where your organization has a complex technology infrastructure running multiple software products on a wide range of devices. For each application or asset in that stack or network, there may be a standalone monitoring tool.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But this requires IT teams to constantly hopscotch between&amp;nbsp;different&amp;nbsp;tools to monitor all those endpoints and (hopefully) identify and remediate risks before they’re critical.&lt;/p&gt;

&lt;p&gt;Beyond the problem of monitoring gaps, how big an issue is “tool sprawl”?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A recent survey by 451 Research&amp;nbsp;found&amp;nbsp;that &lt;a href="https://www.networkworld.com/article/971354/7-ways-to-fight-network-tool-sprawl.html" rel="noopener" target="_blank"&gt;39% of respondents&lt;/a&gt; were using 11 to 30 monitoring tools to keep track of their application, infrastructure and cloud environments.&lt;/li&gt;
	&lt;li&gt;8% percent were juggling between 21 and 30 tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This creates knock-on problems:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Excessive monitoring tools can lead to alert fatigue and lack of context; some teams must prioritize over 1,000 alerts per day, so many get ignored.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Correlating data between tools can be challenging,&amp;nbsp;delaying&amp;nbsp;resolution.&lt;/li&gt;
	&lt;li&gt;Purchasing and licensing multiple tools may get costly, and many have features that never get used.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In this article, we'll explore:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;How a single pane of glass monitoring solution helps counteract “tool sprawl” problems. &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;The benefits of a single pane of glass UEM for IT teams.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;How it can help security and IT team alignment within an organization.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#four"&gt;How to address monitoring tool sprawl issues now, even before adopting a unified solution.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="one"&gt;The meaning of “single pane of glass” in UEM&lt;/h2&gt;

&lt;p&gt;With its comprehensive insights and unified view of data, “single pane of glass” IT asset monitoring can prove invaluable for IT teams.&amp;nbsp;&amp;nbsp;By&amp;nbsp;collecting and&amp;nbsp;displaying data from multiple sources on a single dashboard, it helps IT teams reduce the time needed to identify problems, maintain compliance with industry regulations&amp;nbsp;andgain visibility into their environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As well as making it easier for IT teams to stay on top of their assets, this technology also provides valuable insights that wouldn’t be available through traditional analytics tools. Those insights make single pane of glass asset monitoring an essential resource for any organization looking to maximize performance across its entire IT infrastructure.&lt;/p&gt;

&lt;h2&gt;Plugging the gaps and other benefits of single pane of glass monitoring for UEM&lt;/h2&gt;

&lt;p&gt;It’s challenging for IT to bring different types of devices into compliance and make them productive for all users. If you’re using multiple monitoring tools, this can potentially allow&amp;nbsp;for compliance&amp;nbsp;gaps. For example:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Let’s say that kiosks for frontline workers are managed with tool A.&lt;/li&gt;
	&lt;li&gt;But devices for knowledge workers are managed with tool B.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;If you’re using separate tools to manage these different types of endpoints, gaps can occur, which can allow risks to go undetected.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, by not having a single, unified view,&amp;nbsp;an&amp;nbsp;IT admin runs the risk of having devices with critical data that are highly vulnerable. That’s because they’re not up to date from a cybersecurity standpoint or compliant with regulations and standards&amp;nbsp;—&amp;nbsp;which can impact the entire environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once you have a unified view where&amp;nbsp;all&amp;nbsp;devices and assets are visible, you’ll spot any gaps and can measure them against your complete asset management environment. You’ll rest easy knowing that all endpoints have been discovered, properly managed and secured.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Let’s dig down further into the major benefits of single pane of glass monitoring in UEM.&lt;/p&gt;

&lt;h3&gt;Less toggling, more managing!&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;As we’ve said, single pane of glass monitoring for UEM provides IT teams with comprehensive monitoring of their entire IT estate. That visibility makes it easier to quickly identify and respond to endpoint issues, while also helping maintain compliance and providing greater visibility into performance and usage. In other words, making it easier to&amp;nbsp;&lt;em&gt;monitor&lt;/em&gt;&amp;nbsp;the system and its assets means we’re better able to&amp;nbsp;&lt;em&gt;manage&lt;/em&gt;&amp;nbsp;it.&lt;/p&gt;

&lt;p&gt;Even the most expert IT admin can find it frustrating to toggle through a range of tools to monitor endpoints. By consolidating different tools into one unified platform, IT teams can therefore not only save time (and headaches) in identifying and troubleshooting problems, but also gain actionable insights into the&amp;nbsp;way&amp;nbsp;devices are being used and ensure that compliance standards are met.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Providing better system security&lt;/h3&gt;

&lt;p&gt;Solid security&amp;nbsp;—&amp;nbsp;whether it’s at the local bank or across your IT infrastructure&amp;nbsp;—&amp;nbsp;relies on&amp;nbsp;visibility, on what you can see. Because it’s what you&amp;nbsp;can’t&amp;nbsp;see that hurts you. Remember that statistic about how only 29% of companies have full IoT/OT inventories? What kind of stress&amp;nbsp;must IT&amp;nbsp;teams at the other 71% have to contend with?&lt;/p&gt;

&lt;p&gt;So, what may be the most important benefit&amp;nbsp;of&amp;nbsp;putting your entire network under a single pane of glass, meaning you have unified visibility into every connected asset?&amp;nbsp;Now,&amp;nbsp;you can secure those endpoints and eliminate the gaps where risk may fester.&lt;/p&gt;

&lt;p&gt;Without&amp;nbsp;a single&amp;nbsp;pane of glass monitoring to track every asset and potential vulnerability, IT and security teams are constantly cycling through different tools. It’s like trying to take in the Grand Canyon using just coin-op tourist telescopes: you’re never able to step back and see all the risks around you holistically.&lt;/p&gt;

&lt;h3&gt;Streamlining compliance&lt;/h3&gt;

&lt;p&gt;Compliance becomes easier under a single pane of glass, meaning your IT team can now be sure they’re meeting industry regulations and security standards such as HIPAA, GDPR and CCPA across every monitored endpoint. It’s why UEM has gained traction in industries like healthcare, logistics and others where there are important data to protect or supply chains to monitor.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With consolidated monitoring, it’s far simpler for an organization to meet compliance requirements and keep its systems in step with any regulatory or policy changes.&lt;/p&gt;

&lt;h2 id="two"&gt;Reduced costs and easier onboarding&lt;/h2&gt;

&lt;p&gt;There are training costs and time required for your IT or security teams to familiarize themselves with a medley of different monitoring tools or stay updated when new features are rolled out.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Moving to a single pane of glass monitoring solution&amp;nbsp;—&amp;nbsp;especially one with an intuitive UI and UX&amp;nbsp;—&amp;nbsp;means an organization isn’t saddled with those multiple (and repetitive) outlays. It’s also much easier for new hires in IT and security to get onboarded to a single dashboard, rather than having to get trained on a slew of monitoring products.&lt;/p&gt;

&lt;h3&gt;Enhancing digital employee experience (DEX)&lt;/h3&gt;

&lt;p&gt;For many employees, the Everywhere Workplace is practically&amp;nbsp;anywhere. So, delivering a consistent DEX is important&amp;nbsp;to&amp;nbsp;keep them engaged and productive, regardless of their location. Part of that consistency involves giving them access to the resources and tools they need, and also maintaining the controls the company requires to limit and secure that access.&lt;/p&gt;

&lt;p&gt;Don’t forget the fact that a UEM platform&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/maximize-your-investment-do-more-with-less"&gt;reduces the stress and workload&lt;/a&gt;&amp;nbsp;on your IT team. Their DEX matters, too, since they’re struggling with burnout at even higher rates than the average office worker:&lt;a href="#four"&gt; &lt;/a&gt;&lt;a href="/resources/v/doc/ivi/2765/df9a470841ea"&gt; Ivanti research &lt;/a&gt; found nearly 1 in 3 IT professionals reported having a colleague quit due to burnout.&lt;/p&gt;

&lt;h3 id="three"&gt;Better alignment for security and IT teams&lt;/h3&gt;

&lt;p&gt;It's imperative for an organization’s cybersecurity posture to have alignment between the IT and security teams. So, you can imagine how forcing everyone into using a host of different monitoring tools might complicate that. One team may be more up to speed on a particular tool than the other team, or the raft of tools leads to fragmentation of effort since it’s hard to get everyone to use multiple tools in a coordinated manner.&lt;/p&gt;

&lt;p&gt;Adopting a single pane of glass monitoring solution helps improve alignment and collaboration between these teams. Since both are using the same single pane of glass dashboard, they’re sharing a single source of truth that eliminates friction and confusion.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How can you fight tool sprawl right now?&lt;/h2&gt;

&lt;p&gt;You may not yet&amp;nbsp;be able to&amp;nbsp;deploy a single pane of glass monitoring solution. Fear not! There are best practices you can follow&amp;nbsp;today&amp;nbsp;to alleviate the pain points caused by monitoring tool proliferation. At the same time, these practices set a good foundation for eventual migration to that unified solution.&lt;/p&gt;

&lt;h3 id="four"&gt;1.&amp;nbsp;Review your existing monitoring tools&lt;/h3&gt;

&lt;p&gt;First, evaluate your current monitoring tools to understand how well they’re really performing. Are there monitoring gaps or wasteful overlaps? How well do they perform? Are they worth the time and money you’re spending on them?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This also reveals what sort of data consolidation will be needed for an eventual migration to a single pane of glass monitoring solution. That helps you project the costs and time involved, and you may be able to leverage existing integration points to help minimize migration efforts.&lt;/p&gt;

&lt;h3&gt;2.&amp;nbsp;Consolidate those tools&lt;/h3&gt;

&lt;p&gt;Is there a platform available that houses some of the monitoring features you’re already using with different point solutions? Maybe it’s time to consider adopting a platform like that, if it solves multiple issues for you and offers cost advantages.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If you’re using multiple tools from a single vendor, it can be smart to press them to help you out by scripting APIs to provide better integration of those tools. Just be sure that you don’t have too many outliers who can’t fit into a particular integration ecosystem.&lt;/p&gt;

&lt;h3&gt;3.&amp;nbsp;Improve processes and training&lt;/h3&gt;

&lt;p&gt;It’s not just about the technology. Take a look at your&amp;nbsp;processes&amp;nbsp;to see if they’re clearly defined and serve to remove improvisation and “winging it” from IT resolution. Make sure your people are properly&amp;nbsp;trained&amp;nbsp;in how to not only use monitoring tools, but in the workflows you’ve designed to optimize their use. Develop focused policies on how to use the monitoring tools you’ve already got in hand and educate teams on them.&lt;/p&gt;

&lt;p&gt;Better processes and better-trained people are central to technology success in any context. Putting them in place now will help ensure down-the-road adoption of a single pane of glass monitoring solution is a success.&lt;/p&gt;

&lt;h3&gt;4.&amp;nbsp;Break down data silos&lt;/h3&gt;

&lt;p&gt;Another consequence of tool sprawl? There’s a huge flow of data being generated from the monitoring of networked devices, but the data&amp;nbsp;is&amp;nbsp;often locked into department- or application-specific silos. Breaking down these silos means you can maximize the value of all that data through analytics.&lt;/p&gt;

&lt;p&gt;Be forewarned that teams often get possessive about their data, so senior leadership should lead the way in promoting this collaboration. And as with the other practices we’ve preached, mandating data consolidation today will give your future single pane of glass solution a head start.&lt;/p&gt;

&lt;h2&gt;Moving to single pane of glass monitoring&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;It only&amp;nbsp;seems&amp;nbsp;daunting for IT and security teams accustomed to using multiple monitoring tools to get started with single pane of glass monitoring. But when taken one step at a time, it’s a straightforward transition whose dividends are worth the effort.&lt;/p&gt;

&lt;h3&gt;1.&amp;nbsp;Evaluate existing tools&lt;/h3&gt;

&lt;p&gt;We’ve covered this above: evaluate&amp;nbsp;current monitoring tools so you know what type of data consolidation will be needed for the migration. This helps determine the costs and time involved, and your teams may be able to leverage existing integration points to help minimize migration efforts.&lt;/p&gt;

&lt;h3&gt;2. Evaluate single pane of glass solutions&lt;/h3&gt;

&lt;p&gt;It’s the old cliché: “Not all solutions are created equal.” The right solution will integrate seamlessly with your existing IT architecture so data moves freely, and will have scalability and flexibility to meet changing requirements. Also, don’t neglect checking out the track record and user sentiments about the&amp;nbsp;provider, especially when it comes to the quality of their customer support.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Just because a provider&amp;nbsp;promises&amp;nbsp;they’ll deliver a true single pane of glass solution, it doesn’t mean the product will check every box on your requirements list. If they’re a viable and trustworthy vendor, they’ll bend over backwards to &lt;a href="https://www.ivanti.com/lp/uem/assets/s3/ivanti-neurons-for-uem"&gt;demo how the solution&lt;/a&gt; will perform in your environment.&lt;/p&gt;

&lt;h3&gt;3.&amp;nbsp;Test and optimize&lt;/h3&gt;

&lt;p&gt;Your team should have the opportunity to test the solution before purchase and have explicit discussions with the provider’s support team on how to customize&amp;nbsp;it&amp;nbsp;as needed, to suit your specific requirements.&amp;nbsp;Post-adoption, monitor usage metrics to make any adjustments needed to extract optimal performance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 09 Nov 2023 15:31:21 Z</pubDate></item><item><guid isPermaLink="false">4b89ce94-5428-458b-acc1-90d22295a021</guid><link>https://www.ivanti.com/blog/uem-vs-mdm-everything-you-need-to-know</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Endpoint Management</category><title>UEM vs. MDM: Everything You Need to Know!</title><description>&lt;p&gt;Microsoft's release of Windows 10 modernized how IT teams approach device management.&lt;/p&gt;

&lt;p&gt;Windows 10 is not a strict evolution of Windows 7 and 8. It’s an evolution of Windows Phone 8 and 10, where an MDM API was available to manage all aspects of a device, such as DLP, restrictions, software distribution&amp;nbsp;and so on.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;UEM vs. MDM: how Windows 10 changed the game&lt;/h2&gt;

&lt;p&gt;The big change that arose with Windows 10? It now had features similar to those on mobile OS (and macOS) that alleviated the task of onboarding and provisioning devices within an enterprise endpoint management (EMM) solution.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With Windows 10, IT admins were now able to manage &lt;a href="https://www.ivanti.com/devices/windows-device-management"&gt;Windows&lt;/a&gt;, &lt;a href="https://www.ivanti.com/devices/mac-device-management"&gt;macOS&lt;/a&gt;, &lt;a href="https://www.ivanti.com/devices/ios-device-management"&gt;iOS&lt;/a&gt; and &lt;a href="https://www.ivanti.com/devices/android-device-management"&gt;Android&lt;/a&gt; devices from the same centralized platform.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;(Read more about&amp;nbsp;Microsoft’s &lt;a href="https://learn.microsoft.com/en-us/windows/client-management/manage-windows-10-in-your-organization-modern-management" rel="noopener" target="_blank"&gt;concept of modern device management&lt;/a&gt; in Windows 10.)&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the same time, when Internet of Things devices and others (such as kiosks) started to adopt and standardize around one of the “big four” OS (Windows IoT, also with MDM/EMM capabilities) and Android AOSP (TVs, boxes, kiosks, dedicated devices, etc), the same management capabilities started applying.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is when EMM evolved into UEM (unified endpoint management), a single solution to drive any kind of device and display all insights through a “single pane of glass.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;UEM platforms are now open to interact with other solutions respecting this model through APIs. It allows solution providers to extend the services that modern managed devices can consume, without compromising the sandboxed OS model. This capability is another contributor to any debate about UEM vs. MDM.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;MDM alone?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Just as Apple soon understood that MDM commands and configurations alone couldn’t fulfill all the key use cases that most customers expect on laptop and desktop devices, Microsoft found itself facing the very same situation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Pure MDM features provide a reasonable amount of control for basic use cases.&amp;nbsp;The more restrictive, the better.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Mature customers need a higher level of control, integrations and flexible specific use cases that are far beyond the available pure MDM features, a.k.a. those that don’t require any agent to work.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Legacy agent-based solutions should be able to enhance what MDM alone cannot do. But when both methods don’t go together, orchestrated by a single director solution, this “co-management” becomes a catastrophe rather than a benefit.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, what’s the right way to go if you’re evaluating UEM vs. MDM?&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Benefits of a mature UEM solution&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;A mature UEM solution can provide not only all the MDM features that each OS system supports, but also all the critical capabilities that MDM cannot provide, such as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Custom configuration profiles / CSP profiles → macOS / Windows.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Custom scripting → macOS and Windows.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Legacy configurations to silently configure software that is not using MDM to be configured, such as:&amp;nbsp;&amp;nbsp;
	&lt;ul&gt;
		&lt;li&gt;Registry entries.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;PowerShell scripts. &amp;nbsp;&lt;/li&gt;
		&lt;li&gt;VBS scripts.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Flexible software distribution: MDM-based software distribution is intended for apps that are public and usually not very large. Mature customers distribute and consume bigger software packages that need&amp;nbsp;to be deployed in a very specific way, with flexibility to avoid impacting users during work hours.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Flexible patching: always keeping updated to the latest version of a desktop OS is not always an option, so admins need to be able to have control of when and how to patch.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Automated scripting: the ability to query devices and apply automated remediation actions based on results. This capability is what transforms troubleshooting tasks from minutes or hours to mere seconds.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;DEX score: the more complex your environment and the number of apps that your users handle for work, the more relevant the data is that you get from their devices. Gathering DEX scores from your users and their devices provides three big benefits:&amp;nbsp;
	&lt;ul&gt;
		&lt;li&gt;You get up-to-date sentiments from your internal customer experience while working with the tools you provide.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;You get a super-powerful tool based on metrics, machine learning and behavioral statistics to troubleshoot (in most cases) any issue that can be driving your DEX scores down, and possibly automate response actions to increase scores with low or no interaction with user devices.&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;It translates device data, metrics and statistics into user quantifiable satisfaction, accountability and device/software performance.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But there’s even more to understand about UEM vs. MDM, and how Windows 10 moved the needle on device management.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Local admin rights&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The most important concept to assimilate when it comes to modern device management as applied to desktop OS such as Windows or macOS? It’s that any centrally-imposed restriction will apply and win, even when a user has local admin rights.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is a &lt;em&gt;big&lt;/em&gt; change because most software is developed to run smoothly on an OS. When user permissions are restricted, this adds complexity because of the need to figure out how to make software run properly without having to lower the legacy level of security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The same way that an admin&amp;nbsp;can set the software and apps that are allowed to run and provide different levels of autonomy for users depending on profiles on iOS or Android, Windows 10/11 and macOS admins can do the same. That removes the complexity of limiting user permissions to adopt the desired security level.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As an example, let’s say we’re sending a set of restrictions based on native MDM API to allow only regular Windows software and corporate apps to run.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If a user tries to install or run any non-approved software, the OS will decline to open it and inform&amp;nbsp;them that the administrator has disabled this app.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The same logic applies to a command line interface, PowerShell console, task manager, etc.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The result is that Windows and macOS devices are automatically built at registration to allow only the right software to run, removing any required interaction from IT.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;If a device is also part of an Automated Device Enrollment program, like Microsoft's AutoPilot or Apple's Automated Device Enrollment (ADE), IT can send the device directly to the end user&amp;nbsp;and the system will initiate the automatic provisioning alone.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Enterprise processes made easier&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another consideration in weighing UEM vs. MDM? How a mature UEM solution can enable high-value features for:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Onboarding.&lt;/li&gt;
	&lt;li&gt;Management.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Policy enforcement. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software distribution.&lt;/li&gt;
	&lt;li&gt;Security enforcement.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These no longer require a direct connection to the corporate network to be triggered. It only takes an internet connection, and even includes integrated countermeasures to ensure that a device is not being provisioned only for personal use.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This became crucial when the pandemic began in early 2020, as most companies had to quickly adopt a bring-your-own-device (BYOD) and laptop-based strategy. This had to quickly replace the historical fixed desktop workplace model, where devices sat inside the corporate network, protected by corporate perimetral security.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The success of this pivot illustrated how IT can save time, money and effort in managing all devices without interaction compared to legacy management models.&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Today, IT executives demand a solution that’s able to connect from everywhere. There’s a growing demand to be able to use and secure access to a mix of SaaS and on-premise-based solutions that can provide service regardless of the network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Because of this model, other concepts gained more importance, such as &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust access,&lt;/a&gt; where security levels should be maintained in any situation — regardless of whether a device is inside the corporate network, or if it’s partially or fully managed. As the axiom goes, &lt;em&gt;never trust&lt;/em&gt;, always verify.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What’s up next? Modern device management with UEM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another wrinkle in the UEM vs. MDM story? Right now, some vendors already provide additional features based on apps that complete MDM/EMM-focused management. This way, organizations can extend the level of control, provide more features, retrieve and consume security data&amp;nbsp;and fill gaps that the MDM API cannot solve alone.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As before, it first appeared in mobile OS, in the form of agent apps that provided capabilities such as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device posture: detect, monitor and remediate compromised OS.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Notifications: allows direct communication of alerts or messages to end users within the agent app.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Location: when relevant, the management agent app can provide location insights and interact with the device.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Mobile threat defense protection against cyberattacks based on device, app, network and anti-phishing attack surfaces.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Private app store to allow users to install optional apps.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;UEM native configurations are written and sent in the native language of each OS:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Windows uses CSP (Configuration Service Provider) configurations, which are then sent to devices using CustomSyncML commands on the OMA-DM protocol.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;iOS/iPadOS/macOS/TvOS use Apple's MDM protocol.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Android uses the Google FCM protocol and Managed Google Play APIs.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the case of iOS/iPadOS, UEM vendors distribute an agent app to perform tasks (while adding more value) that an MDM API cannot do alone, such as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device posture (jailbreak, root detection).&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Location.&lt;/li&gt;
	&lt;li&gt;Notifications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Mobile threat defense.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the case of Windows and macOS it comes as additional agent apps as well that work in tandem with UEM's native configurations. This adds more value by accomplishing tasks that are critical, but not included as part of the&amp;nbsp;MDM API, as mentioned above.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Those co-manager apps provide any feature that may not be available as part of the MDM API protocol.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Examples include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Custom management profiles (custom CSPs, custom payloads, etc.)&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Scripts.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Task sequence-based software distribution.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Flexible patching.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Risk-based vulnerability management. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Risk-based access control to services.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The natural next step in this UEM vs. MDM evolution will be a mix of both models, optimized to run smoothly together by following development best practices. Which also adds some extra concepts that are now tightly tied to what analysts have started calling MDM 2.0.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In this new model, different fleets of devices are all registered to the UEM solution, but so are &lt;em&gt;all other devices&lt;/em&gt; within the same network. By performing active and passive scans (discovery), the UEM solution ensures that all of them are naturalized, as it detects the devices that are not managed and that may create a security risk if they’re not up to date.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The device fleet is also naturalized to work with all the service providers and services the company is consuming, such as AD, AAD, Office365, Salesforce, Adobe and so on.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This also allows the UEM solution to build a persona that reflects the specific requirements of business units, processes&amp;nbsp;or even users. It can save and share this information with other systems, such as ASM and ITSM solutions, which opens the door to automating tasks and adding AI, already a feature with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Perhaps the most important thing to keep in mind when contracting UEM vs. MDM is that unified endpoint management also means universal endpoint management. It gives organizations control over every asset and device that’s attached to their network, not just mobile ones. As the variety and complexity of endpoints multiply at dizzying speed, the “universality” of a good UEM solution is nearly invaluable.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 27 Oct 2023 15:21:14 Z</pubDate></item><item><guid isPermaLink="false">553d4b9c-a6fd-4663-b9bf-ee4573f1ffec</guid><link>https://www.ivanti.com/blog/in-a-world-of-managing-risk-do-you-have-shiny-tech-syndrome</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Endpoint Management</category><title>In a World of Managing Risk, Do You Have Shiny Tech Syndrome?</title><description>&lt;p&gt;There is always something new on the horizon when it comes to technology. Isn’t it human nature to want to wait for the next 'new' model car, the next 'bigger' TV or the next 'faster' smart phone?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The&amp;nbsp;newest release might be more appealing – especially to higher-ups, who want the latest and greatest trending technology. But there are hidden risks associated with waiting to implement a new tool or solution.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To help your organization quickly resource needed solutions to current problems and avoid poor product fit, it’s important to know the risks of waiting for a newly released technology versus immediately implementing an existing tool that already fulfills your requirements.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Same problems, “new” product?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Let’s take Unified Endpoint Management (UEM) solutions&amp;nbsp;as&amp;nbsp;an example.&amp;nbsp;There&amp;nbsp;are several known UEM solutions that have been on the market for many years, yet there are new UEM-related products releasing constantly.&lt;br /&gt;
&lt;br /&gt;
The only way to know if you should wait for a new UEM&amp;nbsp;product&amp;nbsp;instead of opting for a proven solution is by truly narrowing down&amp;nbsp;why&amp;nbsp;your organization needed a UEM solution to its problems in the first place.&lt;br /&gt;
&lt;br /&gt;
The importance of enabling anywhere operations has placed an increased importance on a comprehensive UEM solution.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Despite top tier analysts such as Gartner and Forrester viewing UEM solution as a mature market with limited growth opportunities, there has been significant growth in use cases supporting remote, hybrid and frontline workforce in recent years. It is critical for organizations to find a UEM solution that can support those use cases and also deliver differentiated capabilities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Remote working also has fueled challenges in managing and securing endpoints.&amp;nbsp;&lt;a href="https://www.cybersecurity-insiders.com/portfolio/2022-endpoint-security-visibility-report-tanium/" rel="noopener" target="_blank"&gt;Top threats&lt;/a&gt;&amp;nbsp;when securing a hybrid, remote or from home workforce include cyberattacks, human error, cloud computing vulnerabilities and mobile device security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.courthousenews.com/wp-content/uploads/2021/05/pfpt-us-wp-voice-of-the-CISO-report.pdf" rel="noopener" target="_blank"&gt;58% of CISOs&lt;/a&gt;&amp;nbsp;have seen more targeted attacks since enabling widespread remote working. IT teams now find themselves burdened with managing and securing ever growing endpoints against phishing attacks and cyber threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The remote and hybrid shift requires a new security approach.&amp;nbsp;&amp;nbsp;Organizations need to protect remote workers from skyrocketing phishing attempts and provide personalized and&amp;nbsp;&lt;a href="https://www.cybersecurity-insiders.com/portfolio/2022-endpoint-security-visibility-report-tanium/" rel="noopener" target="_blank"&gt;productive digital experience&lt;/a&gt;&amp;nbsp;with them. IT needs a combined tool to perform and automate endpoint management and security tasks that provides a 360˚ view of their environment.&lt;/p&gt;

&lt;p&gt;In many situations, already established UEM solutions solve most of – if not all – of these issues.&lt;/p&gt;

&lt;p&gt;Ultimately, for UEM or any other technology, organizations would be better served to go with a new, unvetted product&amp;nbsp;only&amp;nbsp;if&amp;nbsp;they cannot resolve the problems with a known and proven quantity.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Additional hidden risks of new products: quality, opportunity cost, price bundling and implementation woes&lt;/h2&gt;

&lt;h3&gt;New products offer unknown quality – even from known vendors&lt;/h3&gt;

&lt;p&gt;The potential for the new solution to not be as good as the original tool is perhaps the most significant risk to consider. Even if the new solution comes from a known and trusted vendor, whether a newly announced product will actually improve upon what is already available is impossible to tell by the announcement alone.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Your organization’s processes and implementations become a de facto test environment for the vendor, as the new product sorts out its flaws and issues in real-time. After all, it is often only after a new solution has been implemented that its shortcomings become apparent.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This scenario easily leads to frustration with wasted time and resources if&amp;nbsp;organizations discover that they installed an inferior product when they already knew about the better solution from the start.&lt;/p&gt;

&lt;h3&gt;Delaying for new products decreases overall return on investment due to opportunity cost&lt;/h3&gt;

&lt;p&gt;Another risk to consider is the potential for a lower return on investment (ROI) when waiting for a newly announced technology solution. After all – based on the exercise we ran through with the UEM use case above – there were strategic operational reasons why you were seeking out this technology in the first place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Therefore, if organizations wait too long to implement any solution, then they will continue to suffer through the problems that were pressing enough to require a budgeted investment in an external solution.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Just how long will your organization be willing to wait for a new, “better” solution when there’s an answer to the internal friction and struggles that already exists?&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;New products from established vendors may be bundled with less-desired solutions&amp;nbsp;for&amp;nbsp;a higher price tag&lt;/h3&gt;

&lt;p&gt;There’s not just opportunity cost to consider, but possibly a higher realized price tag, as well. In some cases, organizations may also have to pay more for a newly released product – as the provider works out their pricing strategy and bundling options – than they would have if they had implemented an existing tool.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If the vendor sees the newer product as an “add on” for an existing technology suite, then they may succumb to the temptation of bundling together&amp;nbsp;all&amp;nbsp;of their related technologies into one.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even if your organization only requires – and waits for – the one solution, then it may be stuck paying for tools and features it doesn’t need because the vendor requires the purchase of all related products to obtain the one product you really wanted in the first place.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;New products introduce unknown variables within critical business environments&lt;/h3&gt;

&lt;p&gt;New products are, by their very nature,&amp;nbsp;new. There are no known best practice guides for implementation or use; no references to consult for advice; no identified problem areas to avoid.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In use cases and situations where technology forms the backbone of an entire organization’s operations, any unknown variable creates the greatest possible risk for headaches (at best) and failure (at worst). The reward of a new product must be extreme, to outweigh such substantial risks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In general, organizations should avoid waiting for the shiny technology solution that addresses all their needs; perfect rarely, if ever, exists.&amp;nbsp;Carefully consider the costs – known and unknown – of waiting for that shiny new product that promises the world, especially when you already have vetted a solution that satisfies your organization’s current friction points.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 23 Feb 2023 14:50:25 Z</pubDate></item><item><guid isPermaLink="false">49dc48bc-f256-4e36-9781-9c6725fae239</guid><link>https://www.ivanti.com/blog/how-to-create-the-perfect-kiosk-mode-on-shared-ipads-1</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Endpoint Management</category><title>How to Create the Perfect Kiosk Mode on Shared iPads</title><description>&lt;p&gt;Since the release of the first iPad, businesses have been clamoring to use it as a corporate device.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over the years, more enterprise capabilities have been added to iPads, allowing IT admins to provide protection while fulfilling various use cases – depending on whether the device is corporate-owned or a BYOD deployment.&lt;/p&gt;

&lt;h2&gt;Using the kiosk mode on shared iPads&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;One of the key use cases that many companies adopted for iPads was the kiosk mode model, where the device is restricted and can only use a single app – usually Safari.&lt;/p&gt;

&lt;p&gt;This is what Apple called &lt;a href="https://support.apple.com/zh-sg/guide/deployment/dep80a981/web" rel="noopener" target="_blank"&gt;Single App Mode&lt;/a&gt; or Guided Access, which has been proven to fit better within frontline worker scenarios than actual kiosks in lobbies.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It was not a bad approach, but there was room for improvement, mainly because Single App Mode has limitations related to management and updates.&lt;/p&gt;

&lt;p&gt;The nice thing about single app mode is that you don't need to use Apple Business Manager - all you have to do is make sure the device is in supervised mode. However, this mode has limitations.&lt;/p&gt;

&lt;p&gt;For the same reason, customers who enjoyed the benefits of Apple Business Manager were not enjoying the added functionalities when it came to dedicated devices in kiosk mode.&lt;/p&gt;

&lt;p&gt;With the arrival of shared iPads for businesses, Apple opened a new door for customers to enhance and extend their use cases:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Allowing several users to log in using their own credentials, with each user’s info and apps remaining separate.&lt;/li&gt;
	&lt;li&gt;Allowing guest mode sessions to be started without impacting any other user on the device.&lt;/li&gt;
	&lt;li&gt;Creating a dedicated device that only allows temporary sessions where data will be removed after the user’s session ends.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This last use case is what companies that use kiosk mode should focus on.&lt;/p&gt;

&lt;h2&gt;The positive benefits of enabling guest mode-only&lt;/h2&gt;

&lt;p&gt;You do need to use ABM to provision shared iPads with guest mode-only sessions enabled. In return, companies will see how devices are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Provisioned silently from scratch, adding an additional layer of protection that prevents thefts.&lt;/li&gt;
	&lt;li&gt;Registered against a legal owner, designated by procurement or IT.&lt;/li&gt;
	&lt;li&gt;Fully managed, so there’s no way to take control over the device.&lt;/li&gt;
	&lt;li&gt;Privacy hardened, because info is removed after a user session is finished – which can be manual, programmatic or on-demand by admin.&lt;/li&gt;
	&lt;li&gt;Restricted, because users will not be able to log in using their Apple ID, but in a natural way that provides an experience built at the OS level.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="screenshot of attempted login where it says your data will not be saved after logging out" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/07/picture1.png"&gt;&lt;img alt="apple id field blocked screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/07/picture2.png"&gt;&lt;/p&gt;

&lt;p&gt;Hotels and office reception areas with iPads are good examples of a shared iPad on guest-only&amp;nbsp;mode.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Seamless use for customers and employees&lt;/h2&gt;

&lt;p&gt;Now, the experience of the user is improved by allowing only one app, letting admins push for upgrades and restrictions silently – without leaving the kiosk.&lt;/p&gt;

&lt;p&gt;Thanks to the Apple Volume Purchase Program, a device-based app deployment model, retail customers can login and use their own corporate apps, which are always installed silently.&lt;/p&gt;

&lt;p&gt;Once the device is locked again, customers can start a guest session to check the catalog –&amp;nbsp;without impacting or accessing the information from sales representatives.&lt;/p&gt;

&lt;p&gt;Any employee can use any shared iPad if access is granted and there’s available space for new sessions. This can be extended to any business where IT centrally manages devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="shared ipad in guest mode" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/07/picture3.png"&gt;&lt;/p&gt;

&lt;h2&gt;Taking advantage of corporate shared iPads&lt;/h2&gt;

&lt;p&gt;The campaigns where iPads can be deployed are wide-ranging – from signing a contract, voting or paying at your local street food stand.&amp;nbsp;This is a real revolution that will allow companies to take advantage of corporate shared iPads for their business, employees and customers.&lt;/p&gt;

&lt;p&gt;And it all starts with Apple Business Manager, iPads on iOS 15 or newer with 32 gigabytes of storage space or more and a great UEM solution that’s able to fulfill all these new use cases.&lt;/p&gt;

&lt;p&gt;Curious? Read our blog&amp;nbsp;to learn more about &lt;a href="shared-ipad-for-business"&gt;the positive influence shared iPads can have on your business&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 29 Aug 2022 14:13:52 Z</pubDate></item><item><guid isPermaLink="false">5c6e1fc7-76c6-463e-8097-9472c67a6e3c</guid><link>https://www.ivanti.com/blog/what-does-ivanti-being-named-as-a-first-time-leader-in-the-2022-gartner-magic-quadrant-for-uem-tools-really-mean</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Endpoint Management</category><title>What Does Ivanti Being Named as a First-Time Leader in the 2022 Gartner® Magic Quadrant™ for UEM Tools Really Mean?</title><description>&lt;p&gt;The &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;latest 2022 Gartner® Magic Quadrant™ for Unified Endpoint Management Tools report&lt;/a&gt; has been published!&lt;/p&gt;

&lt;p&gt;Here at Ivanti, we’re excited Gartner recognized us in the Leader quadrant for completeness of vision and ability to execute. 2022 marks the first time we’ve been recognized as a Leader, after Gartner named us their only Visionary in the UEM Magic Quadrant for 2021.&lt;/p&gt;

&lt;p&gt;But what does being named a “Leader” or a “Visionary” by Gartner really mean? For that matter, what does “completeness of vision” or “the ability to execute” have to do with anything?&lt;/p&gt;

&lt;p&gt;In this blog, we’ll offer some definitions and explanations as to how Gartner researchers and analyst arrive at their conclusions – as well as why we believe Gartner named Ivanti a Leader in their 2022 Magic Quadrant for UEM Tools report for our &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM solution&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;How Gartner found vendors to consider for the 2022 Gartner Magic Quadrant for UEM Tools report&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Gartner&lt;sup&gt;®&lt;/sup&gt;, a company that delivers actionable, objective insight to its executive and their teams, offers an unbiased, quantitative perspective on available tools in a wide variety of technical industries.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They measure various technology offerings and services as part of their annual Magic Quadrant™ reports.&lt;/p&gt;

&lt;p&gt;For inclusion &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;in the 2022 Magic Quadrant™ for Unified Endpoint Management Tools report&lt;/a&gt;, Gartner researchers identified and analyzed “the most relevant providers and their products” within the UEM market.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=ar" rel="noopener" target="_blank"&gt;Quoting directly from this year’s report&lt;/a&gt;, UEM tool providers qualified for inclusion and consideration needed to have:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;"A generally available, single-license product that demonstrates:
	&lt;ol&gt;
		&lt;li&gt;Agentless management of Apple iOS, iPadOS and macOS, Google Android, and Windows 10, which includes:
		&lt;ol&gt;
			&lt;li&gt;Device enrollment and provisioning&lt;/li&gt;
			&lt;li&gt;Device configuration and policy enforcement&lt;/li&gt;
			&lt;li&gt;OS patching and update management&lt;/li&gt;
			&lt;li&gt;Application deployment in native format&lt;/li&gt;
		&lt;/ol&gt;
		&lt;/li&gt;
		&lt;li&gt;Agent-based management or prebuilt connector for CMT integration&lt;/li&gt;
		&lt;li&gt;Direct integration with the Microsoft Intune Graph API for app and data protection&lt;/li&gt;
		&lt;li&gt;Location-agnostic endpoint management (&lt;em&gt;not dependent on LAN/VPN&lt;/em&gt;)&lt;/li&gt;
	&lt;/ol&gt;
	&lt;/li&gt;
	&lt;li&gt;Evidence that the UEM product has at least 10 million devices under management, excluding managed devices entitled under trial, freemium or other no-cost use arrangements&lt;/li&gt;
	&lt;li&gt;UEM offering as turnkey SaaS (&lt;em&gt;UEM vendor hosted and operated, not IaaS&lt;/em&gt;)&lt;/li&gt;
	&lt;li&gt;Rank among the top organizations in the market momentum index defined by Gartner for this Magic Quadrant. Data inputs used to calculate UEM platform market momentum include a balanced set of measures, such as:
	&lt;ol&gt;
		&lt;li&gt;Gartner customer search, inquiry volume and trend data&lt;/li&gt;
		&lt;li&gt;Volume of job listings specifying experience within the UEM platform as a job requirement of Talent Neuron and on a range of employment websites in the U.S., Europe and China&lt;/li&gt;
		&lt;li&gt;Frequency of mentions as a competitor to other UEM platform vendors within reviews on Gartner’s Peer Insights forum between April 2021 and March 2022”&lt;/li&gt;
	&lt;/ol&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;What “Ability to Execute” and “Completeness of Vision” metrics meant for Gartner UEM Tools this year&lt;/h2&gt;

&lt;p&gt;Once identified by Gartner, any qualified providers were then evaluated on two proprietary metrics: Completeness of Vision and Ability to Execute.&lt;/p&gt;

&lt;h3&gt;Gartner Ability to Execute metric for UEM Tools in 2022&lt;/h3&gt;

&lt;p&gt;Per the 2022 &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Gartner® Magic Quadrant™ for Unified Endpoint Management Tools report&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“The Ability to Execute criteria evaluate the vendor’s ability to properly resource product development, marketing and sales. The emphasized criteria center on the product itself, but consider the operational support from sales, marketing and R&amp;amp;D, as well as the vendor’s reputation with customers and performance in the market relative to competitors.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The various criteria for the 2022 Ability to Execute metric – specifically for evaluated UEM Tool vendors – &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;included&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Product or Service&lt;/li&gt;
	&lt;li&gt;Overall Viability&lt;/li&gt;
	&lt;li&gt;Sales Execution/Pricing&lt;/li&gt;
	&lt;li&gt;Market Responsiveness/Record&lt;/li&gt;
	&lt;li&gt;Marketing Execution&lt;/li&gt;
	&lt;li&gt;Customer Experience&lt;/li&gt;
	&lt;li&gt;Operations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each criterion was weighted for different values, to then combine and create the aggregate Ability to Execute metric. This metric was plotted along the vertical “Y” axis of the Magic Quadrant™ graphic for each qualifying vendor.&lt;/p&gt;

&lt;h3&gt;Gartner Completeness of Vision metric for UEM Tools in 2022&lt;/h3&gt;

&lt;p&gt;Per the 2022 &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Gartner® Magic Quadrant™ for Unified Endpoint Management Tools report&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Completeness of Vision focuses on the performance of a vendor’s product as it applies to current market needs, the strategy and performance in delivering to meet that understanding, and the vendor’s ability to innovate for current and emerging needs, as well as against its competitors.&amp;nbsp;This metric also assesses a vendor’s geographic strategy and presence, its strategy and roadmap for the product, and its general business model.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The various criteria for the 2022 Completeness of Vision metric – specifically for evaluated UEM Tool providers – &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;included&lt;/a&gt;:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Market Understanding&lt;/li&gt;
	&lt;li&gt;Marketing Strategy&lt;/li&gt;
	&lt;li&gt;Sales Strategy&lt;/li&gt;
	&lt;li&gt;Offering (Product) Strategy&lt;/li&gt;
	&lt;li&gt;Business Model&lt;/li&gt;
	&lt;li&gt;Vertical/Industry Strategy&lt;/li&gt;
	&lt;li&gt;Innovation&lt;/li&gt;
	&lt;li&gt;Geographic Strategy&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;What the Gartner&lt;sup&gt;®&lt;/sup&gt; Magic Quadrant™ positions and Leader recognition meant for UEM Tools&lt;/h2&gt;

&lt;p&gt;Here’s the final &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;2022 Magic Quadrant™ for UEM Tools&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;&lt;img alt="2022 Magic Quadrant™ for UEM Tools" src="https://static.ivanti.com/sites/marketing/media/images/blog/gartner-uem.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As you can see, Ivanti was placed as only one of three vendors within the Leaders quadrant of the 2022 Magic Quadrant™ for UEM Tools. But, what does the “Leader” position mean within this context?&lt;/p&gt;

&lt;h3&gt;What the Gartner leader position means for the 2022 Magic Quadrant™ for UEM Tools report&lt;/h3&gt;

&lt;p&gt;The following quote describes how Gartner considers companies and organizations placed within the Leader quadrant for the &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;2022 Magic Quadrant for UEM Tools report&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Leaders exhibit strong execution and vision scores, and exemplify the suite of functions that assist organizations in managing their mobile devices and PCs. Leaders also provide guidance and tools to help migrate from traditional client management to modern management, as well as deep integration with endpoint analytics and endpoint security tools to provide a simpliﬁed IT administrator and an improved employee experience.”&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;What the Gartner Visionary position means for the Magic Quadrant™ for UEM Tools report&lt;/h3&gt;

&lt;p&gt;While Ivanti was named by Gartner as a Visionary last year – in 2021 – we thought it would be useful to also quote what Gartner considers to be a Visionary for &lt;em&gt;this &lt;/em&gt;year’s &lt;a href="https://www.ivanti.com/resources/library?eol=ar"&gt;Magic Quadrant for UEM Tools&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Visionaries exhibit strong capabilities in their current offerings and a complete set of functionalities to address common use cases. However, the vendor’s size, the size of its installed base, platform breadth or integration points make it appropriate for some, but not all, buyers.”&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;We at Ivanti personally believe that our new Leader position within the 2022 Magic Quadrant for UEM Tools means that we have proven that our &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Neurons for UEM solution&lt;/a&gt; “walks the walk” in execution.&lt;/p&gt;

&lt;p&gt;That is to say, between last year and this one, we feel that we proved out our UEM vision and foundation through our increased ability to execute on that vision – and we’re committed to keep improving through next year, too.&lt;/p&gt;

&lt;h2&gt;Validation of Ivanti’s UEM solutions for your Everywhere Workplace&lt;/h2&gt;

&lt;p&gt;We truly believe that this new recognition and Leader placement received from Gartner is a demonstration and validation of our strategy. The team here at Ivanti believes that &lt;a href="/resources/v/doc/ivi/2663/8abb292d288f"&gt;the Everywhere Workplace is here to stay&lt;/a&gt;, and we will likely continue to experience fast growth in endpoints, data and remote workers.&lt;/p&gt;

&lt;p&gt;After all, in today’s on-site, hybrid and remote Everywhere Workplaces, IT teams need a single tool to analyze, perform and automate endpoint management and security tasks now more than ever.&lt;/p&gt;

&lt;p&gt;So, we’re committed to helping IT teams like yours to manage and secure your workplace – wherever it may be, and with whatever devices you need! – so that your end users can be productive anywhere.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;Ivanti Neurons for UEM&lt;/a&gt; enables your IT team to leverage a single pane of glass view into their devices to efficiently discover, manage and secure all endpoints through accurate and actionable insights.&lt;/p&gt;

&lt;p&gt;Plus, Ivanti’s built-in, on-device, out-of-the-box mobile phishing protection requires minimal user interaction and results in better end user experience and protection.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;And, &lt;/em&gt;your IT team can also leverage the Neurons’ artificial intelligence (AI) / machine learning (ML) powered automation platform to detect and remediate any device issues or security threats before they can cause harm in your environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Finally, consolidating tools is top of mind for many customers. We truly believe that the level of integrated capabilities to discover, manage and secure endpoints will help improve IT efficiency and productivity.&lt;/p&gt;

&lt;p&gt;We will continue to innovate and deliver &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-unified-endpoint-management"&gt;the UEM tools that help our customers succeed&lt;/a&gt;. We’re excited about next innovations that we will bring to the market, and we hope you will continue to join us for the journey.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Disclaimers and attributions:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;GARTNER and Magic Quadrant are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Ivanti.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Gartner, Magic Quadrant for Unified Endpoint Management Tools, Tom Cipolla, Dan Wilson, Chris Silva, Craig Fisler,&amp;nbsp;1st August 2022&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 16 Aug 2022 17:57:39 Z</pubDate></item><item><guid isPermaLink="false">7ac23234-735c-4717-8f8a-9ce13319bb52</guid><link>https://www.ivanti.com/blog/what-s-new-in-ivanti-neurons-for-mobile-device-management</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><atom:author><atom:name>Charlie Rasch</atom:name><atom:uri>https://www.ivanti.com/blog/authors/charlie-rasch</atom:uri></atom:author><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><title>What's New in Ivanti Neurons for Mobile Device Management?</title><description>&lt;p&gt;The latest release of &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for MDM&lt;/a&gt;&amp;nbsp;includes enhancements for managing COSU devices and transitioning to cloud-based device management.&lt;/p&gt;

&lt;h2&gt;Provide&amp;nbsp;extra security and support for your Android COSU devices&lt;/h2&gt;

&lt;p&gt;Corporate-owned single-use (COSU) devices are dedicated for a single use, and Android Enterprise's capabilities can help configure those devices to best serve that purpose. Use cases for COSU devices include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Point-of-sale (POS) systems in retail.&lt;/li&gt;
	&lt;li&gt;Handheld barcode scanners in supply chain.&lt;/li&gt;
	&lt;li&gt;Smart panels (such as information kiosks, timecard entry panels, physical access entry panels, etc.) across a number of industries, including healthcare, retail and manufacturing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These locked-down devices can be dedicated to a single user, multiple users&amp;nbsp;or external users. The Android Enterprise COSU configuration provides more control over how your staff and customers use the device&amp;nbsp;by compartmentalizing the operating system to deploy in a locked-down environment, running a single application or a specific set of apps. Usually, one application is intended to run on the device and that’s all. COSU improves security, efficiency, processes, compliance and user experience by locking devices down to execute a small range of specific tasks.&lt;/p&gt;

&lt;p&gt;With the latest release of Ivanti Neurons for MDM, several new features have been added to better secure and support your COSU devices.&lt;/p&gt;

&lt;h3&gt;5G slicing support&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With more COSU devices deployed in remote locations, 5G support becomes more essential for securing those devices. Not only does Neurons for MDM provides 5G information to let you know if your device is part of your private 5G network slice, 5G network slicing allows your provider to take a shared physical network and portion it out into logical segments. Each segment is provisioned for a different set of users, devices&amp;nbsp;and applications,&amp;nbsp;and the logical separations mean the traffic from one slice does not interfere with another.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In a retail environment, different slices can be configured to provide for your mobile POS&amp;nbsp;devices and for your customer kiosks. Your remote retail environments might employ these slicing schemes to provide better employee and customer experience, while behind the scenes keeping track of inventory. These slices would separate each other’s traffic and resources, improving security. 5G slicing can be enabled in the lockdown Android Enterprise configuration within Ivanti Neurons for MDM.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Configuring higher app priority distribution and updates on your COSU devices&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With Ivanti Neurons for MDM, IT can set higher-priority apps for enrollment and update on COSU devices. This will allow admins to set which applications are critical for deployment and updating.&amp;nbsp; This is important especially if the update would resolve or prevent a production-related issue. Getting these updates out as fast as possible can reduce downtime or even prevent a production-affecting event from surfacing.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Providing additional USB security to your COSU devices&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;With Ivanti Neurons for MDM, you can configure the USB port to be used for charging only to prevent the USB port from being used as a physical vector for malicious attacks, keeping unauthorized users from accessing confidential data. This&amp;nbsp;is important particularly important for&amp;nbsp;COSU devices in an open area, such as kiosks and POS devices in retail stores.&lt;/p&gt;

&lt;h3&gt;Unattended remote session support&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Remote session support becomes even more of a necessity for remote COSU devices,&amp;nbsp;particularly in a retail environment where there maybe no one is available&amp;nbsp;after the store closes&amp;nbsp;to troubleshoot and resolve technical issues.&lt;/p&gt;

&lt;p&gt;With Neurons for MDM, you can initiate a remote session from within the console without requiring input from any user at that location, making it easy&amp;nbsp;to manage COSU devices when there is no physical access to those devices.&lt;/p&gt;

&lt;h2&gt;Easily transition Windows devices to cloud-based modern management&lt;/h2&gt;

&lt;p&gt;We are excited to announce an Ivanti Neurons for MDM deployment package with the Q2 release to support customers with an easy transition for their Windows devices from traditional management to modern management.&lt;/p&gt;

&lt;h3&gt;Ivanti Neurons for MDM deployment package&lt;/h3&gt;

&lt;p&gt;IT can enroll devices managed by Microsoft Configuration Manager (formerly SCCM) or Ivanti Endpoint Manager into Ivanti Neurons for MDM. The Deployment Package tool allows organizations to streamline the transition of Windows devices to cloud-based modern management, without downtime or end-user interruption. Seamless transition is achieved by downloading a unique deployment package from the Neurons for MDM console, then deploying it through the existing management tool or domain. Once the package is deployed, it will silently enroll endpoints into Neurons for MDM for ongoing management. This approach allows administrators to first migrate devices easily, then have flexibility to configure devices later over the air. When device enrollment is completed silently into Neurons for MDM, it is joined with MDM and gets co-managed by two management authorities. Once an administrator configures the desired Windows experience within Neurons for MDM, a legacy management platform can be decommissioned, leaving Neurons for MDM as the&amp;nbsp;single management authority of the device.&lt;/p&gt;

&lt;p&gt;This package can be deployed in environments that do not leverage Azure Active Directory (AAD). The main elements of Neurons for MDM modern Windows management suite do not require AAD. Co-management or co-existence may require certain workloads or configurations to be deployed upon silent enrollment, to avoid any impact during transition.&lt;/p&gt;

&lt;h3&gt;Why move to cloud-based modern management?&lt;/h3&gt;

&lt;p&gt;As UEM solutions have evolved and added more capabilities over the years, it has become&amp;nbsp;critical to provide a consistent user experience and management capabilities between mobile (iOS and Android) and Windows devices. Cloud-based modern device management on Windows devices is fundamentally different from&amp;nbsp;traditional device management, but similar to mobile device management on iOS and Android.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One of key differences is profile-based management. Breaking from image-based management relieves significant IT workload from manual device imaging and maintenance. A profile is a collection of configuration settings that are applied to a device based on group membership, which allows profiles to be created as a module with multiple profiles assigned to a single user depending on their job function and required apps.&amp;nbsp;With profile-based management, IT can remotely make changes on any configuration and push patch updates over the air.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Those differences mean that cloud-based modern management significantly reduces IT overhead and the complexity of managing Windows devices.&lt;/p&gt;

&lt;p&gt;There are a number of drivers for considering a&amp;nbsp;transition from client-based to cloud-based modern device management:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Higher scalability and lower cost impact.&lt;/strong&gt;&amp;nbsp;We can view scalability into two different ways – faster deployment and ease&amp;nbsp;of scaling.&amp;nbsp;First, a cloud-based solution&amp;nbsp;is&amp;nbsp;faster to deploy compared to an on-prem solution.&amp;nbsp;Second, if you want to deploy more devices with a cloud-based solution, you don’t need to build a new server, which would be required for&amp;nbsp;an on-prem solution to scale.&amp;nbsp;Also, cloud-based solutions are&amp;nbsp;managed by the vendor, so customers can save the cost of&amp;nbsp;managing&amp;nbsp;infrastructure and servers on their own.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Better security posture.&lt;/strong&gt;&amp;nbsp;Some might argue that on-prem has a better reputation when it comes to security posture. And it is true that some customers in heavily regulated industries still prefer to continue using on-prem solutions. The caveat is that security posture really depends on a customer’s infrastructure, and it often&amp;nbsp;requires a heavy investment for customers to build their own security infrastructure and hire experts to manage it.&amp;nbsp;Cloud service providers, including Ivanti, meet a high security standard with various certifications&amp;nbsp;— for example, Ivanti Neurons for MDM is FedRAMP&amp;nbsp;and SOC2 certified.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved productivity and user experience.&lt;/strong&gt;&amp;nbsp;Remember&amp;nbsp;the significant efforts that went into the Windows 10 migration of a few years ago — and the loss of productivity due to downtime during the update?&amp;nbsp;Modern device management minimizes impacts on productivity between Windows OS updates, as devices are being managed like smartphones.&amp;nbsp;Modern device management also allows you to leverage a zero-touch provisioning solution that integrates systems like Windows Autopilot, Apple Business Manager, Android Enterprise&amp;nbsp;and Samsung Knox Mobile Enrollment.&amp;nbsp;IT can ship a Windows device directly to a user, and it automatically gets enrolled into the cloud-based UEM solution.&amp;nbsp;You can cut onboarding time from weeks to two days, which results not only in a faster onboarding but also&amp;nbsp;higher user satisfaction.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Learn more&lt;/h2&gt;

&lt;p&gt;For more information about Ivanti Neurons for MDM, visit the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;product page&lt;/a&gt;&amp;nbsp;or view the &lt;a href="https://help.ivanti.com/mi/help/en_us/cld/8x/rn/default.htm" target="_blank"&gt;release notes&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 02 May 2022 18:25:13 Z</pubDate></item><item><guid isPermaLink="false">0fabcf32-ec19-4499-b013-2bd89bcc18fb</guid><link>https://www.ivanti.com/blog/exciting-announcements-at-wwdc21</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Exciting Announcements at WWDC21!</title><description>&lt;p&gt;Apple has made an exciting announcement at its WWDC21 keynote on Monday, including a lot of upgrades on iOS 15, the new macOS Monterey, big improvements to FaceTime, and more. Among the new features and upgrades, we are most excited about Declarative Device Management (DDM), which we believe will have a major impact on the future of device management.&lt;/p&gt;

&lt;p&gt;One of the challenges of today’s MDM protocols is that they are server-based and rely on a device to check-in to identify state changes and enforce policies. This has limitations as the MDM server needs to keep track of changes by continuously polling the device. We can provide similar capabilities using &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense&lt;/a&gt; solutions. With declarative device management, our MDM capabilities will be further enhanced as the MDM server will be notified of state change on the device directly from the OS. This will further improve the overall interaction between the device and server.&lt;/p&gt;

&lt;p&gt;While there are workarounds to the current server-based protocol, none are elegant or efficient. Another challenge is the overload on both network and UEM servers having to constantly poll and apply policies to the entire device fleet.&lt;/p&gt;

&lt;p&gt;With declarative device management, the device is empowered to be autonomous and is able to proactively apply policies independent of the UEM server. This new approach is in many ways what agent-based management of Windows devices might look like, however it would eliminate a burden of having to run a myriad of agents on the device.&lt;/p&gt;

&lt;p&gt;We are really excited about this update and what it means to the future of device management. Stay tuned to learn more about DDM itself and how we plan to integrate it into our &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;UEM portfolio&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 09 Jun 2021 22:31:16 Z</pubDate></item><item><guid isPermaLink="false">33bb55a0-5181-4c5d-a1a4-8151d13c6b83</guid><link>https://www.ivanti.com/blog/google-i-o-announcements-what-do-ivanti-customers-need-to-know</link><atom:author><atom:name>Kate Kim</atom:name><atom:uri>https://www.ivanti.com/blog/authors/kate-kim</atom:uri></atom:author><category>Security</category><title>Google I/O Announcements – What Do Ivanti Customers Need to Know?</title><description>&lt;p&gt;This week Google unveiled a number of exciting announcements at its annual developers’ conference, Google I/O 2021. Announcements included Android 12 and several security and privacy features that are coming to its platforms.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;At Ivanti, we are particularly excited about what Google is doing to improve user security and privacy.&lt;/p&gt;

&lt;p&gt;The consistent theme of Google I/O was Secure by default, Private by design, and You’re in control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security – Secure by Default&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Passwords are still the top cause of data breaches. In fact, this week during a keynote presentation, Google claimed that the single most common security vulnerability today is still bad passwords. While getting rid of password would be the ultimate solution, there is a long journey ahead of us.&lt;/p&gt;

&lt;p&gt;Until we realize the goal of eliminating passwords, it’s good to see technology leaders working to make the password more secure and more manageable. This week, Google announced four new upgrades for Google Password Manager. It will now recommend strong passwords, secure them for you, detect and alert any compromised passwords in data breaches, and easily change and fix them when you are compromised. In a world of data breaches, consumers have a little more peace of mind knowing that Google is helping to proactively help the user to use secure passwords.&lt;/p&gt;

&lt;p&gt;We agree that this will help strengthen user security particularly in a world where some of the &lt;a href="https://www.beckershospitalreview.com/cybersecurity/10-most-common-passwords-in-2021.html" target="_blank" rel="noopener"&gt;most common passwords in 2021&lt;/a&gt; are still: password, 123456, and 123456789.&lt;/p&gt;

&lt;p&gt;At Ivanti we are particularly excited about these upgrades as we are committed to enhancing user security and have been on a mission to eliminate passwords for organizations with &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;Zero Sign-On (ZSO)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privacy – Private by Design&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Google made significant improvements to Privacy on its Android operating system. Android Private Compute Core will help to ensure privacy of personal data. As mobile devices continue to become an extension of ourselves, the focus from vendors like Google on user privacy is critical.&lt;/p&gt;

&lt;p&gt;At Ivanti, we firmly believe in this principle. Just as larger vendors are making investments in protecting consumer privacy, organizations need to take employee privacy more seriously as well. Being a Unified Endpoint Management (UEM) vendor, we are in a unique position to help organizations accomplish that. We enable privacy using various controls that are available natively in Android and managed by &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti UEM&lt;/a&gt;. In addition to native capabilities, we offer features such as a Visual Privacy Policy which enables users to know exactly what data their organization has access to from their managed devices.&lt;/p&gt;

&lt;p&gt;Learn how your organization can realize a &lt;a href="https://www.ivanti.com/blog/imagine-a-passwordless-world-is-it-possible"&gt;passwordless world&lt;/a&gt; using Ivanti ZSO, and how they can ensure the privacy of employees with the &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti UEM solution&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Thu, 20 May 2021 16:17:51 Z</pubDate></item></channel></rss>