<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/lauren-bujaky/rss" /><link>https://www.ivanti.com/blog/authors/lauren-bujaky</link><item><guid isPermaLink="false">55882337-f063-48bc-92a4-5eadb83d3454</guid><link>https://www.ivanti.com/blog/12-days-itam-awareness</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>ITAM Awareness Month: Let Your IT Assets Celebrate the Season</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/lp/itam/demos/ivanti-neurons-asset-management" target="_blank"&gt;&lt;img alt="Request a demo for it asset manager" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/12/cta-demo.png"&gt;&lt;/a&gt;Round up your assets, hang up your spreadsheets because it’s time for ITAM Awareness Month! It’s no surprise that the last month of the year—what with all its celebratory cheer—is also focused on &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;IT Asset Management&lt;/a&gt;. There are a number of similarities between properly managing your IT assets and ensuring the holiday season goes off without a hitch, after all.&lt;/p&gt;

&lt;blockquote&gt;
&lt;h4&gt;&lt;a href="/resources/v/doc/ivi/2302/55db2a0149a7" target="_blank"&gt;ITAM and ITSM Are Better Together: Free Whitepaper&lt;/a&gt;&lt;/h4&gt;
&lt;/blockquote&gt;

&lt;p&gt;For instance, checking every tiny lightbulb while hanging holiday lights is akin to checking each of your org’s software licenses are up-to-date.&lt;/p&gt;

&lt;p&gt;Or, like Santa Claus checking his list not once but twice, you’re checking that your IT hardware assets are where they need to be and working as they should.&lt;/p&gt;

&lt;p&gt;Or even, as family holiday dinners are a hectic mix of good, bad, and everything in between, your IT asset management solution feels much the same—hidden assets, unneeded licenses, and spreadsheets included.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Holiday or IT Asset Management season? Why not both!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Ivanti is offering ’12 Days of ITAM,’ chock full of helpful blogs and resources around managing your IT software and hardware:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Two blogs a day for 12 days from ITAM product experts and thought leaders&lt;/li&gt;
	&lt;li&gt;&lt;a href="/resources/v/doc/ivi/2302/55db2a0149a7" target="_blank"&gt;5 Instances Where ITSM and ITAM Are Better Together whitepaper&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;An &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2340/0a2a6ef7e9d1"&gt;informative infographic&lt;/a&gt; about ITAM’s importance to your business&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/lp/itam/demos/ivanti-neurons-asset-management" target="_blank"&gt;Ivanti Asset Manager demo&lt;/a&gt; to see the holiday magic of managed assets for yourself&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here’s a sneak peak of our upcoming ITAM blog schedule, where we asked ITAM experts and thought leaders to contribute blogs covering a wide range of ITAM topics. Make sure you mark your calendars for the next 12 days; you won’t want to miss a single post.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Schrödinger’s Licenses: License Optimizer's Perfect Paradox / Simon Harrison&lt;/li&gt;
	&lt;li&gt;5 Reasons Why IT Asset Management is Key To Your Business / Mareike Fondufe&lt;/li&gt;
	&lt;li&gt;Shadow IT is a Pain for Healthcare / Rob DeStefano&lt;/li&gt;
	&lt;li&gt;Key ITAM Skills They Don't Tell You About / David Foxen (@SAMBeastDavid on Twitter)&lt;/li&gt;
	&lt;li&gt;Software Asset Management Tips Explained in 5 Classic Movie Quotes / Rory Canavan&lt;/li&gt;
	&lt;li&gt;If IT Assets Could Talk, What Would They Say? / Erica Azad&lt;/li&gt;
	&lt;li&gt;Software Asset Management: It's More than Audit and Compliance / Lara Hellman&lt;/li&gt;
	&lt;li&gt;The 5 Keys of a Successful ITAM Execution Framework / Edward Zarzour&lt;/li&gt;
	&lt;li&gt;Education, Education, Education: The Value of Technical Knowledge in IT Asset Management / Barry Pilling&lt;/li&gt;
	&lt;li&gt;ITAM: 4 Tips to Break Down your Organization's Data Silos / Mark McGinn&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Maybe this holiday season your IT assets are trying to tell you something, and it’s time to listen up! Join us for the most wonderful time of the year and celebrate ITAM Awareness Month with ’12 Days of ITAM.’ Ho-ho-ho and fa-la-la-la-la!&lt;/p&gt;</description><pubDate>Mon, 02 Dec 2019 22:41:04 Z</pubDate></item><item><guid isPermaLink="false">5593f207-0535-4456-941e-4734fdf2bffa</guid><link>https://www.ivanti.com/blog/ivanti-insiders-cybersecurity</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Security</category><title>Ivanti Insiders Weigh-In on Cybersecurity Best Practices</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Join Thousands Who Have Benefitted from the Virtual Event of the Year - WATCH NOW " src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-thousands2.png"&gt;&lt;/a&gt;The name of the game right now is cybersecurity, and phishing attempts, malware threats, and hacking tragedies are par for the course more often than we’d like to admit. In fact, according to a recent Forbes study, cyberattacks will cause an estimated $6 trillion in damages worldwide by 2021—that’s more than a year’s worth of damage caused by the globe’s natural disasters or more than the global trade of all illegal drugs.&lt;/p&gt;

&lt;p&gt;Cyberattacks are real, and for the foreseeable future, they’re not going anywhere. So what can you and your org do to manage cybersecurity risks?&lt;/p&gt;

&lt;p&gt;We’ve asked our Ivanti Insiders, the crème de la crème of IT professionals, just how they’re managing their own organization’s cybersecurity concerns. Their responses are insightful. Heck, even we could learn a thing or two. Grab yourself a steaming cup of something and let’s get stuck in.&lt;/p&gt;

&lt;h3&gt;What do you wish your users knew about cybersecurity?&lt;/h3&gt;

&lt;p&gt;“Understand how serious the threats are.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“We put tough policies in place to try and protect everyone, because we're only as secure as our weakest link. The weakest link tends to be the human component, and hackers are good at making something look legitimate to exploit that component.” – Kelly Ruston, Technical Support Specialist, William Osler Health System&lt;/p&gt;

&lt;p&gt;“Random companies won’t send you software to install via email.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“It is imperative to stay vigilant on the lookout for phishing scams and other malicious threats that they are exposed to.” – Katelyn Eubanks, Info. Security Administrator, City of Sioux Falls&lt;/p&gt;

&lt;p&gt;“As IT professionals, I believe we have a duty to provide practical, effective steps non-IT users can use to mitigate cybersecurity risks.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“It is not the sensationalized portrayals in the movies, with power grids crashing and anarchy taking over the world. Cyber security is the protection of our systems so we can do our day-to-day jobs.” – David Jimenez, Operations Engineer, Emerson Electric Co.&lt;/p&gt;

&lt;p&gt;“1. Never open things you don't expect.&lt;/p&gt;

&lt;p&gt;2. Check URLS before clicking on them.&lt;/p&gt;

&lt;p&gt;3. Do not use unknown USB sticks.&lt;/p&gt;

&lt;p&gt;4. Don't be a stubborn user.&lt;/p&gt;

&lt;p&gt;5. Don't install your own software.&lt;/p&gt;

&lt;p&gt;6. Don't even think about trying to use torrent and downloads on our network or company laptop.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“No General in Africa is trying to send you 2 million dollars.” – Ivanti Insider&lt;/p&gt;

&lt;h3&gt;What tips do you have for users looking to be more secure?&lt;/h3&gt;

&lt;p&gt;“Lock your devices up. Make backups. Stay on top of your accounts.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“Be vigilant and be up-to-date. Verify you're typing in the correct web address. Before you click anything in an email, verify the sender is who you think it is and the link/attachment is something they themselves sent. Verify that your antivirus products are up-to-date (and that you have one installed!) and scanning, and that your PC is staying up-to-date with patches. Most issues can be avoided by being careful to always visit legitimate sites, ensuring you aren't opening attachments from unknown individuals, by keeping your PC patched, and your antivirus up-to-date and performing regular scans.” – Kelly Ruston, Technical Support Specialist, William Osler Health System&lt;/p&gt;

&lt;p&gt;“When you are going to click a link on a webpage or an email, hover over the link first and check the bottom left of your browser to see if it will take you to the page you are expecting.” – Adam Howard, Systems Administrator, Rack Room Shoes&lt;/p&gt;

&lt;p&gt;“Consider using a fake or one-time-use email address for non-important signups.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“Make sure you pay attention to the required cyber security training. We are all targets now!” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“Don't trust anyone. Use common sense. Longer passwords are better than ‘use 4 categories’ passwords.” – David Jimenez, Operations Engineer, Emerson Electric Co.&lt;/p&gt;

&lt;p&gt;“Audit: Review everything that you install on your computer and only install from trusted sources. NEVER discuss private matters (username / password / personal information) with anyone that you do not fully trust. (Again, even personal information can be dangerous, like when Paris Hilton's email was ‘hacked’ because she used her dog as a ‘security response’ and then made public the name of the dog because it was lost.)” – Daniel Cogny, Systems Developer, OPS&lt;/p&gt;

&lt;h3&gt;What is your biggest cybersecurity concern right now?&lt;/h3&gt;

&lt;p&gt;“Data theft.” – Deshon Pile, Jr. Team Lead, SCI&lt;/p&gt;

&lt;p&gt;“Ransomware.” -- Katelyn Eubanks, Info. Security Administrator, City of Sioux Falls&lt;/p&gt;

&lt;p&gt;“Not knowing what users click.” Thomas Smith, Director Telecom and IT Support, SCI&lt;/p&gt;

&lt;p&gt;“GDPR.” -- Viviana Radosta, Inside Sales, Ready Informatica Srl&lt;/p&gt;

&lt;p&gt;“Phishing.” – Josh Castleberry, Cyber Security Administrator, MDU Resources Group Inc.&lt;/p&gt;

&lt;p&gt;“Limiting personal data owned by third-party companies. No company can guarantee perfect security, so I try to limit the amount of information given to any third party. As the recent disclosure of a major credit reporting company illustrates, disclosures happen, and when they do companies who've been hacked are not required to compensate you for the attack.” – Ivanti Insider&lt;/p&gt;

&lt;p&gt;“Privacy. There are many services that are hard to avoid these days (i.e. as an immigrant, I use Facebook despite hating it, to keep in touch with people ‘back home’), and most corporations are pushing hard to learn (and use) everything from you. Lately I am focusing on looking for Open Source (or at least privacy aware) alternatives to my ‘day-to-day’ software. – Daniel Cogny, Systems Developer, OPS&lt;/p&gt;

&lt;p&gt;“The lack of knowledge of our users. The worst thing is, we can tell a user 30 times how they can keep their computer safe and they agree with us. And then suddenly it is again ‘OOPSIE!’ I got a virus or malware.” – Ivanti Insider&lt;/p&gt;
</description><pubDate>Fri, 18 Oct 2019 17:07:46 Z</pubDate></item><item><guid isPermaLink="false">4c0deaeb-040a-4a16-bfb8-a9ac489862b4</guid><link>https://www.ivanti.com/blog/iaitam-predictions-for-2019-get-ready-it-asset-managers</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>IAITAM Predictions for 2019: Get Ready, IT Asset Managers!</title><description>&lt;p&gt;Get out your crystal balls, shuffle those tarot cards, and crack open a fortune cookie. It’s 2019, and we’re here for IT Asset Management predictions. IAITAM—the industry’s authoritative training organization dedicated to the needs of the IT Asset Management community—did some fortune telling for the new year, and their predictions wouldn’t come without a look back at what ITAM folks learned in 2018.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Hardware Asset Management Best Practices" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/01/itam.unified.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let’s dive into the past before delving into the future. In 2018:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Data leaks and hacking incidents were at an all-time high, leaving a lasting impression on consumers&lt;/li&gt;
	&lt;li&gt;The GDPR was felt throughout all global business&lt;/li&gt;
	&lt;li&gt;IT Asset Managers needed to increase the offerings they provide to their organizations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Okay, maybe IAITAM slipped a prediction into that list without anyone noticing because IT Asset Managers will &lt;em&gt;always &lt;/em&gt;need to increase the offerings they provide to their organizations. That won’t change in 2019. Now that we’ve got a grip on the past, it’s on to the future!&lt;/p&gt;

&lt;h2&gt;Resolve to be Challenged&lt;/h2&gt;

&lt;p&gt;IAITAM predicts that the industry will face three distinctly unique challenges in 2019, pushing the profession even further forward in 2019.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;em&gt;Contract management will become a new emphasis for IT Asset Managers&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Either strengthen your relationship with legal and contract departments or become more adept contract managers because this will become a new requirement for managing assets in the future.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="2"&gt;&lt;em&gt;A strong focus on cybersecurity will continue &lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The NIST (National Institute of Standards and Technology), along with NCCoE (National Cybersecurity Center of Excellence) published a cybersecurity standard for IT Asset Managers and will continue in 2019. Help aid your organization’s cybersecurity efforts!&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="3"&gt;&lt;em&gt;ITAM and ITSM will continue to blend, and not always harmoniously&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Work to mature your IT Asset Management program so you can better facilitate IT Service Management. Both are necessary, not one or the other.&lt;/p&gt;

&lt;h2&gt;Fulfill Your Destiny, Get with the Trends&lt;/h2&gt;

&lt;p&gt;Stay ahead of the curve and get with the trends! Impact your organization through IT Asset Management, it’ll surely be grateful.&lt;/p&gt;

&lt;p&gt;And check out our &lt;a href="https://www.ivanti.com/" target="_blank"&gt;free IT Asset Management resources&lt;/a&gt; to move beyond basic discovery and optimize your hardware and software performance. Free resources include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Software Savings Calculator&lt;/li&gt;
	&lt;li&gt;Hardware Asset Management Best Practices&lt;/li&gt;
	&lt;li&gt;Automating Software Requests Infographic&lt;/li&gt;
	&lt;li&gt;IT Asset Management Trends On-Demand Webinar&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Mon, 07 Jan 2019 23:40:43 Z</pubDate></item><item><guid isPermaLink="false">af2b2664-d78b-44af-9ec2-2162b8fe8de1</guid><link>https://www.ivanti.com/blog/it-asset-management-for-risk-mitigation-compliance-and-business-scalability</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>IT Asset Management for Risk Mitigation, Compliance, and Business Scalability</title><description>&lt;p&gt;Food for thought:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;30% of IT fixed assets are lurking around as ‘ghosts’ in today’s enterprises.&lt;/li&gt;
	&lt;li&gt;56% of organizations verify asset location only once a year, with 10-15% only making asset location inventories every five years.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, what? Besides a few missing assets, what’s the big deal? Well for one, ‘ghost’ assets are costing you—you’re making purchases you don’t need to. What’s worse, you’re missing a large percentage of assets that need to be patched and integrated into your security processes to avoid cyber-intrusions. Risks such as rogue devices, ‘shadow IT,’ fileless malware are elevated when you don’t have a thorough, global view of hardware and software in your asset inventory. Essentially, you can’t protect what you don’t know exists.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Hardware Asset Management Best Practices" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/01/itam.unified.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At the same time, the added complexity of rapid cloud adoption, the proliferation of IoT devices, and the demands of compliance regulations is a lot for your IT team to face.&lt;/p&gt;

&lt;p&gt;The good news: there are practices you can put in place to enable you to take a more unified, powerful approach to IT asset management on a global scale. Consider these five areas around IT Asset Management where improvements will help mitigate risk, achieve compliance, securely scale your operations, and better control costs:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Visibility and Performance&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For visibility, engage a reliable discovery tool that can discover and run an inventory of every asset attached to the corporate network. For performance, build a clear tracking process and refresh policy to ensure productivity by knowing when to refresh or retire an asset. (hint, hint: Ivanti has an &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;IT Asset Management solution&lt;/a&gt; that can give you both visibility and performance).&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="2"&gt;&lt;strong&gt;Compliance and Risk Management&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A critical best practice for risk management: a thorough auditing of all assets. Auditing happens continually and the best defense in knowing whether software or hardware assets present a threat to data security or a larger disruptive event. For compliance, discovery tools provide an accurate representation of licensing agreements and which users are allowed which application and device based on their identity and organizational status.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="3"&gt;&lt;strong&gt;Cost Management and Fiscal Accountability&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Asset discovery and auditing that can manage and track &lt;em&gt;all&lt;/em&gt; digital assets are foundational to cost control, and the digital assets must include all servers, virtual machines, software containers, and installed software. The easiest way: unified IT via automation, where a database of assets integrates with procurement, service management, and key suppliers. Those using the software and hardware assets are therefore just as accountable as IT—enabling the organization as a whole to control costs.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="4"&gt;&lt;strong&gt;Business Scalability and the Cloud&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Before you can begin scaling your business, with additional employees, applications, and locations, you need to know what assets should be repurposed, retired, or newly purchased. This demands a solid &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;IT Asset Management strategy&lt;/a&gt;. The cloud plays an integral part of this scaling up, with cost-sensitive organizations choosing to add new applications in the cloud, which still requires a dynamic picture of your IT assets—hardware or software.&lt;/p&gt;

&lt;ol&gt;
	&lt;li value="5"&gt;&lt;strong&gt;End User Experience&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Put an automated system in place—with set refresh dates and the ability to capture IT service tickets and requests—that allows end users to refresh or replace their assets. And what’s more, an automated IT Asset Management solution will flag asset performance issues and track usage, ultimately allowing for a more productive user experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Learn More, Manage Your Assets Better&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Read Phil Merson’s &lt;a href="https://virtual-strategy.com/2018/12/07/five-ways-to-mitigate-risk-achieve-compliance-securely-scale-your-operations-and-control-costs-with-it-asset-management/" target="_blank" rel="noopener"&gt;full article&lt;/a&gt; in Virtual Strategy Magazine to get the complete picture of the IT asset management practices you can put into place to mitigate risk, achieve compliance, securely scale your operations, and better control costs.&lt;/p&gt;

&lt;p&gt;Also, check out some of Phil’s other insights from the Ivanti blog:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/topics/service-management" target="_blank"&gt;Hardware and Software Lifecycle Management Using Ivanti’s Unified IT Approach&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/it-asset-management-for-the-modern-workplace-podcast-recap-with-phil-merson" target="_blank"&gt;IT Asset Management for the Modern Workplace: Podcast Recap With Phil Merson&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ditch the spreadsheets and embrace IT asset management with tools that match today’s workforce. Explore our &lt;a href="https://www.ivanti.com/" target="_blank"&gt;free resources&lt;/a&gt; today and make 2019 your year for IT Asset Management.&lt;/p&gt;</description><pubDate>Fri, 04 Jan 2019 00:03:01 Z</pubDate></item><item><guid isPermaLink="false">2e4f4a98-1cc5-4709-80fe-a60524403d2e</guid><link>https://www.ivanti.com/blog/it-automation-for-the-win-find-out-just-how</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>IT Automation for the Win! Find out Just How</title><description>&lt;p&gt;Plenty of things are automated today – even the most mundane, daily tasks are part of the conveyor belt of our lives. For example, take the beginning of our days. We wake up to our alarm (with our phone having recorded our sleep cycles), brush our teeth with an electric toothbrush (which is synced to help us brush efficiently), and brew our coffee via autotimer (with perfect drip sequences for optimal coffee flavor).&lt;/p&gt;

&lt;p&gt;Though perhaps subtle, each of these previously manual tasks has been eclipsed by an automated, efficient, and innovative solution. We no longer wake up with the sun, brush our teeth cursorily, or brew subpar coffee. Humans have moved up in the world, due in part to automating and innovating.&lt;/p&gt;

&lt;p&gt;If every other part of our day is automated, why can’t our IT processes be too? Ivanti is here to tell you that they can!&lt;/p&gt;

&lt;h2&gt;Break IT Free from Manual Tasks&lt;/h2&gt;

&lt;p&gt;Many IT organizations today find themselves responsible for managing complex hybrid environments with limited resources. The demands on IT services have simply outpaced the resources available. This growing list of requirements includes: supporting mobile workers, maintaining a secure digital workspace, provisioning new cloud-based resources, and complying with internal governance policies and government regulations.&lt;/p&gt;

&lt;p&gt;All of these requirements consume IT and service desk resources, limiting IT’s ability to move ahead with higher-impact, strategic projects. And on top of that, these manual processes have the potential to be inconsistently implemented and prone to errors. All of this, the requirements and the manual processes, results in frustrated and unproductive workers and over-stretched IT teams.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Needed Solution? &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Organizations struggling with manual, time-consuming processes need a solution that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Empowers IT to automate routine and manual tasks&lt;/li&gt;
	&lt;li&gt;Accelerates ROI from existing technology investments through integration&lt;/li&gt;
	&lt;li&gt;Quickly gives people access to the digital resources they need to do their jobs&lt;/li&gt;
	&lt;li&gt;Enforces essential security and compliance policies&lt;/li&gt;
	&lt;li&gt;Expedites the transition of on-premises or virtual workloads to the cloud&lt;/li&gt;
	&lt;li&gt;Shifts IT spending to more strategic projects&lt;/li&gt;
	&lt;li&gt;Optimizes the service desk to reduce or eliminate ticket resolution times&lt;/li&gt;
	&lt;li&gt;Aligns with and provides agility to support dev-ops initiatives&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Our Solution: Ivanti Automation &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Ivanti Automation&amp;nbsp;streamlines the management of complex hybrid environments by automating infrastructure, cloud, and workspace processes required to support and deliver IT services to the business. And, we’ve &lt;a href="https://www.ivanti.com/company/press-releases/2018/ivanti-unifies-it-service-management-and-security-operations-with-ivanti-automation" target="_blank"&gt;recently announced&lt;/a&gt; that the solution spans Ivanti products (including ITSM, Security, ITAM, etc.), providing automated workflows across IT departments for unified IT management. Talk about a one stop shop for all your IT needs! The shared environment across Ivanti products can also automate many on-premises infrastructure processes and tools, including multiple public cloud services such as Amazon and Microsoft Azure. Integrating with third-party technologies is supported through pre-built connectors and add-ons, which are available in the &lt;a href="https://marketplace.ivanticloud.com/" target="_blank" rel="noopener"&gt;Ivanti Marketplace&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;IT can transform once manual and laborious tasks into automated workflows that are all maintained in a single, easily navigated repository, where they can be readily found by anyone who needs them, freeing up resources to focus on strategic projects. Automating IT tasks helps enforce essential security controls and compliance policies by removing the risk of error and creating a strong audit trail. Key capabilities of Ivanti Automation&amp;nbsp;include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Task automation&lt;/strong&gt;: Automate configuration, provisioning, and upgrades with over 300 out-of-the-box tasks and queries to maintain on-premises and cloud infrastructure. Utilize existing PowerShell scripts to get started quickly and ensure they are repeatable and sharable. Run books support complex changes, where multiple systems are touched often in sequence.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Flexible administration&lt;/strong&gt;: Simplify the management of complex hybrid environments with intuitive web-based administration. Delegation and advanced job scheduling enables you to control who can make changes and when they will be executed within the infrastructure. Every module and run book can be exported to building blocks for easy backup and transition to development, testing, and production.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cloud-readiness&lt;/strong&gt;: Take advantage of a shared automation environment that can be applied to conventional on-premises infrastructure, as well as public cloud services such as Amazon and Azure. Quickly define appropriate rules and policies for provisioning services and granting users permission to access cloud services.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Integration&lt;/strong&gt;: Get more ROI out of existing investments by integrating with other data sources via the powerful API and utilizing add-ons that integrate with various third-party technologies, including mobile device management, IT service management, virtualization and cloud provisioning, PC lifecycle management, and SaaS apps.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Governance&lt;/strong&gt;: Reduce risk and ensure compliance through insight and visibility. Version control and trust security improves auditability, traceability, and change control. To meet compliance initiatives, perform troubleshooting, and improve infrastructure management, you can utilize the audit trails, historical reporting and configuration analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Greater Agility, More Benefits&lt;/h2&gt;

&lt;p&gt;Ivanti Automation&amp;nbsp;brings greater agility for cloud infrastructure projects. IT teams can fully automate processes, including around how and when apps and services are delivered. The scalable architecture and automation fabric provides over 300 built-in tasks and a portfolio of connectors for seamless integration with existing technology investments. Resulting benefits include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Greater strategic business value from IT&lt;/li&gt;
	&lt;li&gt;Significantly faster responsiveness to business users’ needs&lt;/li&gt;
	&lt;li&gt;Better performance and uptime for critical applications and services&lt;/li&gt;
	&lt;li&gt;Reduced security and compliance risks&lt;/li&gt;
	&lt;li&gt;Improved business agility&lt;/li&gt;
	&lt;li&gt;Less vulnerability to loss of key technical employees&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With Ivanti Automation,&amp;nbsp;IT can support even the largest and complex enterprise environments without generating excessive overhead. It is so easy to use that customers begin automating on day one.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Common Uses for Ivanti Automation: &lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Routine configuration, provisioning, and upgrade tasks&lt;/li&gt;
	&lt;li&gt;Auditable compliance&lt;/li&gt;
	&lt;li&gt;Advanced change control&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Want to Automate Now? Learn More.&lt;/h2&gt;

&lt;p&gt;Want your IT tasks to match the rest of your life. Check out &lt;a href="https://www.ivanti.com/products/automation" target="_blank"&gt;www.ivanti.com/products/automation&lt;/a&gt;. And to see how Ivanti Automation&amp;nbsp;now spans the entire product set, take a look at our press release – &lt;a href="https://www.ivanti.com/company/press-releases/2018/ivanti-unifies-it-service-management-and-security-operations-with-ivanti-automation" target="_blank"&gt;“Ivanti Unifies IT, Service Management and Security Operations with Ivanti Automation.”&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 11 Sep 2018 15:23:54 Z</pubDate></item><item><guid isPermaLink="false">315b6474-2d2c-4334-bdb7-2cf75bd86967</guid><link>https://www.ivanti.com/blog/secure-and-productive-from-day-one</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Security</category><title>Secure and Productive From Day One</title><description>&lt;p&gt;Getting workers the right access to the right apps and resources often takes days, even weeks. IT teams are often bogged down by manual processes, leading to downtime, inefficiencies, and possible security risks. And not only do employees need the correct apps and resources when they’re hired, but roles change and employees leave. IT must keep up with all of it – ensuring that access changes when employees change roles and denied when employees leave. Proper offboarding processes are vital to the security of an organization, without which assets are left vulnerable and security risks increase.&lt;/p&gt;

&lt;p&gt;Along with service and asset management, identity is essential to the success of an organization’s onboarding and offboarding process. Why? Let’s break down just how the identity of your employees is vital to them receiving or being denied the right access to apps and resources.&lt;/p&gt;

&lt;h2&gt;Onboarding and Offboarding the Identity Way&lt;/h2&gt;

&lt;p&gt;Here’s Jeff. He’s a marketing professional at your organization who needs access to a slew of apps and resources (perhaps Marketo, MS Suite, or even Slack for team communication). For Jeff to be provisioned these apps and resources, his identity means everything. What his role is, what computer he uses, where he likes to work (whether at home or at the office), how often he works – all are vital to the onboarding process.&lt;/p&gt;

&lt;p&gt;And then, Jeff decides he doesn’t want to be a marketing professional at your organization anymore (perhaps he’s leaving to start his own business selling grass-fed, gluten free butter). His access to specific apps and important resources should be denied – he won’t need them any longer. The offboarding process will happen in minutes, not months. Jeff’s identity makes it simple and easy to decommission his devices, deny him apps and resources, and ensure your org’s assets are secure.&lt;/p&gt;

&lt;p&gt;Employee identity sits at the cornerstone of your organization’s failure or success – without a proper grasp on your employees’ identities, IT has a difficult time enforcing complex access policies while onboarding and offboarding within the ever-changing, hybrid environment of the modern workplace. And if IT struggles, everyone struggles – especially your employee’s productivity.&lt;/p&gt;

&lt;h2&gt;Identity by Ivanti&lt;/h2&gt;

&lt;p&gt;Ivanti can help you answer the identity question for your organization. How? Let’s break it down.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;The Solution: Automation with Ivanti Identity Director&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;By automating everything (and yes, we mean everything about the onboarding and offboarding process), IT can address both rising security risks &lt;em&gt;and &lt;/em&gt;new, complex technology. Through automation, IT can balance the responsibility of meeting compliance and governance requirements, while also providing workers with more flexibility than ever – that’s a win-win. IT knows your workers’ identities, onboards them accordingly, and they’re free to work effectively, with peace of mind and flexibility, until they need to be offboarded.&lt;/p&gt;

&lt;p&gt;How do you achieve this IT-worker win? With Ivanti Identity Director,&amp;nbsp;of course!&lt;/p&gt;

&lt;p&gt;With an attribute-based approach to identity and access management including automated provisioning, workflows, and self service, workers are guaranteed access on day one based on their identity, the business remains secure if they ever leave the organization, and IT is free to get on with innovating.&lt;/p&gt;

&lt;p&gt;As your organization becomes increasingly dependent on IT services, conventional approaches to managing identities and access and providing services to users just don’t cut it. But, by implementing Ivanti Identity Director,&amp;nbsp;your organization can handle the intensifying requirements of onboarding and offboarding processes with ease, efficiency, and excellence.&lt;/p&gt;

&lt;h2&gt;Want to Know Who You Are? Learn More.&lt;/h2&gt;

</description><pubDate>Thu, 06 Sep 2018 18:09:56 Z</pubDate></item><item><guid isPermaLink="false">9164fe7c-0bff-40c0-9806-3c19c9b32f43</guid><link>https://www.ivanti.com/blog/forrester-study-uncovers-the-value-in-ivanti-endpoint-security-solutions</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Security</category><title>Forrester Study Uncovers the Value in Ivanti Endpoint Security Solutions</title><description>&lt;h2&gt;SUSCEPTIBLE WITHOUT IVANTI&lt;/h2&gt;

&lt;p&gt;Prior to using Ivanti, the organizations Forrester interviewed had a high degree of threat exposure. Manual processes made it difficult to update operating systems and third-party applications, for example. And alternative solutions were not meeting their needs.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;INFOGRAPHIC:&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2208/44df1ff7a047"&gt;With Ivanti Endpoint Security, Be More…&lt;/a&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A manager of deployment services even said, “When we implemented our previous solution, we had issues right from the start. Detection logic wasn’t finding the correct number of vulnerable endpoints.”&lt;/p&gt;

&lt;p&gt;The solution that organizations were searching for? One with more consistent cybersecurity practices for patching, application control, etc. They wanted:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automated patching for third-party applications and operating systems&lt;/li&gt;
	&lt;li&gt;Additional features beyond patch management, such as application and device control, privilege management, reporting, etc.&lt;/li&gt;
	&lt;li&gt;Advanced reporting to help meet compliance requirements&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After Forrester’s interviews with four &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security" target="_blank"&gt;Ivanti Endpoint Security&lt;/a&gt; customers, they determined the following benefits for a composite organization:&lt;/p&gt;

&lt;h2&gt;IMPROVED PRODUCTIVITY&lt;/h2&gt;

&lt;p&gt;Patching is automated and requires fewer resources to complete. &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Ivanti’s automated patching&lt;/a&gt; capabilities reduce the resources required to complete patching activities by two-thirds.&lt;/p&gt;

&lt;p&gt;An interviewed Ivanti user said, “We deploy six million patches across all the endpoints each year in multiple languages and we only need five people to support 50,000 devices. Without automated patching with Ivanti, we would need 25 people.”&lt;/p&gt;

&lt;p&gt;And what’s more, reports can be produced in a quarter of the time — over three years, that’s an average savings of $832,785. This is specifically helpful for compliance reporting, where auditors will require numerous reports to verify they have met or exceeded standards.&lt;/p&gt;

&lt;p&gt;The director of end user computing for a healthcare organization says, &lt;a href="https://www.ivanti.com/products/xtraction" target="_blank"&gt;Ivanti Xtraction&lt;/a&gt; “greatly simplified our software audits; it showed the query and the data, and the reports could be emailed with high confidence.”&lt;/p&gt;

&lt;h2&gt;THAT UNQUANTIFIABLE “IT” FACTOR&lt;/h2&gt;

&lt;p&gt;Equally felt among the customers interviewed, Ivanti forges a strong customer experience and partner focus.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;“With Ivanti we can also get the correct applications to these employees quickly, in under two hours, creating a happy end user.” – An interviewed Ivanti user&lt;/p&gt;

&lt;p&gt;Forrester also found Ivanti partnerships helped improve overall security strategy. Customers were able to obtain critical, integrated security solutions not offered by Ivanti through our partnership program.&lt;/p&gt;

&lt;p&gt;“Ivanti is a huge part of our security posturing, and they bring other solutions they don’t own through their partner program, helping us meet all our cybersecurity needs.” – An interviewed Ivanti user&lt;/p&gt;

&lt;h2&gt;SECURED FOR THE FUTURE&lt;/h2&gt;

&lt;p&gt;As ransomware and other threats are on the rise, it’s becoming increasingly important for organizations to act, and act fast. Ivanti helps organizations address essential components of their security strategy, including the first five security controls from the Center for Internet Security’s Critical Security Controls list: inventory and control of hardware and software assets, continuous vulnerability management, controlled use of administrative privileges, and secure configuration.&lt;/p&gt;

&lt;p&gt;The risk reduction is demonstrable, with a 40% risk reduction of a large data incident (one involving more than 1,000 records). And the number of critical and high-risks items can be reduced by up to 50%. On average, Forrester found that this risk reduction amounted to $585,146 over three years for their composite organization.&lt;/p&gt;

&lt;p&gt;“Had we not patched, we’d most likely have had a breach or incident with WannaCry.” – Associate director of infrastructure security, telecommunications company&lt;/p&gt;

&lt;h2&gt;COST EFFECTIVE&lt;/h2&gt;

&lt;p&gt;With Ivanti capabilities such as &lt;a href="https://www.ivanti.com/products/automation" target="_blank"&gt;automation&lt;/a&gt;, &lt;a href="https://www.ivanti.com/use-cases/manage-my-os-and-third-party-application-patches" target="_blank"&gt;third-party application patching&lt;/a&gt;, application whitelisting, and privilege management, other legacy solutions that lacked automation capabilities or didn’t function as expected were retired – for a savings of 30% to 50% in license and support costs.&lt;/p&gt;

&lt;p&gt;Overall, Forrester found a total benefit of $3.5 million over three years, with a net present value of $2.3 million — an ROI of 176%. And this payback begins at seven months.&lt;/p&gt;

&lt;p&gt;Check out the &lt;a href="https://www.ivanti.com/resources/library" target="_blank"&gt;Forrester Total Economic Impact™ of Ivanti Security Solutions&lt;/a&gt; or take Forrester’s online assessment for a more customized analysis based on your organization’s individual needs. Visit our site for more helpful resources on &lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;Ivanti Endpoint Security Solutions&lt;/a&gt; and how they can help you reduce the risk of ransomware and other cybersecurity threats infiltrating your organization.&lt;/p&gt;

&lt;p&gt;Check out our new infographic “&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2208/44df1ff7a047"&gt;With Ivanti Endpoint Security, Be More…&lt;/a&gt;” Or, if you want a more comprehensive look at just how Ivanti Endpoint Security Solutions can help you reduce the risk of ransomware and other cybersecurity threats infiltrating your organization, take Forrester’s online assessment and check out the&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library" target="_blank"&gt;Forrester Total Economic Impact™ of Ivanti Security Solutions&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Wed, 15 Aug 2018 21:08:54 Z</pubDate></item><item><guid isPermaLink="false">82f96d2d-381d-405d-90f5-bc8cbeeabd92</guid><link>https://www.ivanti.com/blog/achieve-hardware-asset-management-nirvana-with-seven-key-principles</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>Achieve Hardware Asset Management Nirvana with Seven Key Principles</title><description>&lt;p&gt;The new-age of IT is here, and you’re looking to integrate, consolidate, intercommunicate – all those ‘ate’ words. Where IT strategies across various silos are unified, that wonderfully magical place, that’s IT nirvana. And to achieve IT nirvana, you’ve got to optimize everywhere.&lt;/p&gt;

&lt;p&gt;But, and this is important to note, &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;proper hardware asset management&lt;/a&gt; is &lt;em&gt;absolutely necessary&lt;/em&gt; for every IT discipline – security, end user experience, IT service management, etc. – to experience total enlightenment.&lt;/p&gt;

&lt;p&gt;Without a savvy hardware asset management solution, it can feel like your organization is living in the stone age, with rudimentary spreadsheets and unaccounted-for assets. We’ve talked with the &lt;a href="https://player.vimeo.com/video/266558764?mkt_tok=eyJpIjoiTUdRNVpHSTFaakppTldObCIsInQiOiJFYmU4dEY2UExFalg5SUpwYmlpT1k2YzZqWVk5TXhNUE9wVk1GZ0tBMFNLUVJmaDlHQXVSbVMxbnM1Znd3eVRSXC9KZXlaT05ZNkRJWnZtN1pyVmJXNmdcL0xYV0lBbk9XTDlJTXBkS01obEVjdDZwdDVEcDIxY244ZHpDN0pXUExSIn0%3D" target="_blank" rel="noopener"&gt;experts in IT asset management strategies&lt;/a&gt;, and the following are seven key principles of hardware asset management that will get you to IT nirvana fast. Follow the path laid before you, oh young apprentice, and you too will belong to the great kingdom that is &lt;a href="https://www.ivanti.com/support/global-renewal-policies-and-practices" target="_blank"&gt;unified IT&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Achieve Seven for Hardware Asset Management Heaven&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Breadth&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: Review accuracy of hardware numbers to drive positive change&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Identify one data point as a source of truth&lt;/li&gt;
	&lt;li&gt;On monthly/quarterly basis, compare data point to others to identify breadth of accuracy&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Depth&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: Understand total purview of hardware asset fields &lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Measuring the &lt;em&gt;actual&lt;/em&gt; device vs. your &lt;em&gt;expectation &lt;/em&gt;of the device&lt;/li&gt;
	&lt;li&gt;Best practices: locked down hardware, automated request system (allows you to keep track of hardware/software before their deployment), and change control&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Ownership&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: To know where the asset is and who’s using it&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Sense of accountability allows for more efficient, better innovation&lt;/li&gt;
	&lt;li&gt;Important for both security and software licensing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;4. Naming Conventions&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: Being able to identify a hardware asset when we see one&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Build a naming convention around your unique environment&lt;/li&gt;
	&lt;li&gt;Standards and uniformity are necessary for logical conventions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;5. Performance Metrics&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: To show business value of hardware asset management&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Track metrics that show value against your original business plan&lt;/li&gt;
	&lt;li&gt;Ex. Unknown device metrics, maintenance metrics, leasing expiree metrics, assets lost/stolen metrics, etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Manage your own success!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Major Process Areas&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: Managing hardware effectively throughout its lifecycle&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Processes include: hardware request, hardware move, hardware replacement, employee offboarding, lifecycle steps, reclaim/redeploy, disposal/recycle&lt;/li&gt;
	&lt;li&gt;Chance for integration between IT Service Management and Asset Management&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;7.&amp;nbsp; Stakeholders&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Goal: To engage various stakeholders from across an organization into the hardware asset management process&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Stakeholders such as:
	&lt;ul&gt;
		&lt;li&gt;Software Asset Management&lt;/li&gt;
		&lt;li&gt;Service Management&lt;/li&gt;
		&lt;li&gt;Information Security&lt;/li&gt;
		&lt;li&gt;Procurement&lt;/li&gt;
		&lt;li&gt;IT Projects/Enterprise Architecture&lt;/li&gt;
		&lt;li&gt;Finance&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;IT Nirvana: Successful Hardware Asset Management &amp;amp; Beyond&lt;/h2&gt;

&lt;p&gt;Following these seven, key hardware asset management principles will help you on your way to achieving total IT nirvana. Because again, if your hardware assets are mismanaged, so too is your entire IT environment. Get enlightened with Ivanti.&lt;/p&gt;

&lt;p&gt;Check out the webinar recording, &lt;a href="https://player.vimeo.com/video/266558764?mkt_tok=eyJpIjoiTUdRNVpHSTFaakppTldObCIsInQiOiJFYmU4dEY2UExFalg5SUpwYmlpT1k2YzZqWVk5TXhNUE9wVk1GZ0tBMFNLUVJmaDlHQXVSbVMxbnM1Znd3eVRSXC9KZXlaT05ZNkRJWnZtN1pyVmJXNmdcL0xYV0lBbk9XTDlJTXBkS01obEVjdDZwdDVEcDIxY244ZHpDN0pXUExSIn0%3D" target="_blank" rel="noopener"&gt;“Seven Pillars of Modern Hardware Asset Management (HAM) Practice,”&lt;/a&gt; which features Martin Thompson, owner and founder of &lt;a href="https://itassetmanagement.net/" target="_blank" rel="noopener"&gt;The ITAM Review&lt;/a&gt;, and Darren Wilensky and Todd Hogan, both ITAM product managers with Ivanti.&lt;/p&gt;

&lt;p&gt;And to ensure you’re on the right track, learn more about our unified IT strategies &lt;a href="https://www.ivanti.com/lp/quote" target="_blank"&gt;here&lt;/a&gt;!&lt;/p&gt;</description><pubDate>Mon, 30 Jul 2018 17:22:46 Z</pubDate></item><item><guid isPermaLink="false">3d2153c5-cc1d-4549-b987-17ffcc64f2a3</guid><link>https://www.ivanti.com/blog/ivanti-ditches-the-instructional-manual-with-asset-manager-essentials-and-so-can-you</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>Ivanti Ditches the Instructional Manual with Asset Manager Essentials, and So Can You!</title><description>&lt;p&gt;We’ve all been there. Trying to piece together cumbersome parts of furniture in vain. You could’ve sworn piece A attached to piece B, or should that screw have gone into that leg? You’re ready to rip the instruction manual to pieces or give up – leaving you with a poorly built, frustrating chair (who needs to sit on it anyway, right?)&lt;/p&gt;

&lt;p&gt;Much like building big box store furniture, IT Asset Management can be equally complex, costly, and time-consuming. And what’s more, to get the most out of any IT Asset Management solution, you should be able to do three things:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Know what assets you have and where they reside&lt;/li&gt;
	&lt;li&gt;Track contracts and regulatory compliance&lt;/li&gt;
	&lt;li&gt;Understand your cost of ownership&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tracking assets using manual, outdated processes is an administrative nightmare, much like your chair is a hazard.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;With Ivanti Asset Manager Essentials, ditch the instructional manual!&lt;/h2&gt;

&lt;p&gt;As a pre-built ITAM solution running in the cloud, Asset Manager Essentials significantly accelerates time to value, enabling you to get full visibility of your IT assets, track contracts, and understand cost of ownership.&lt;/p&gt;

&lt;p&gt;Delivered in a pre-packaged, fixed design, you can enjoy rapid, budget-friendly implementation of Asset Manager Essentials so you can receive out-of-the-box reports and dashboards configured to meet the specific needs of your IT asset management team.&lt;/p&gt;

&lt;p&gt;And on top of the sweet, pre-built functionalities, feature updates are automatic in the cloud, removing the administrative headaches around software maintenance that keep your team from focusing on vital IT assets. Don’t overcomplicate things, opt for a pre-built solution that tackles all your IT asset management needs.&lt;/p&gt;

&lt;h2&gt;The Short&lt;/h2&gt;

&lt;p&gt;With Ivanti Asset Manager Essentials, you have capabilities right out of the box:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Track asset availability and performance&lt;/li&gt;
	&lt;li&gt;Retrieve data with barcode scanning&lt;/li&gt;
	&lt;li&gt;Gain cost and contract visibility&lt;/li&gt;
	&lt;li&gt;Deliver enhanced user experiences with a product catalog&lt;/li&gt;
	&lt;li&gt;Drive vendor management&lt;/li&gt;
	&lt;li&gt;Improve growth, support capabilities, and end-user satisfaction with unified IT&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;The Long&lt;/h2&gt;

&lt;p&gt;Now that you’ve got the short list, let’s get into a few of the Essentials’ best features:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tracking asset availability and performance&lt;/em&gt; has become easier than ever. No more grappling with multiple systems and inaccurate spreadsheet data. Asset Manager Essentials simplifies the entire process with an Asset Repository, enabling consistent management from procurement to purchase order, receipt deployment, and disposal. And to maintain repository accuracy, Asset Manager Essentials includes powerful data-importing capabilities that allow imported data from several different sources, including Ivanti Endpoint Manager, Data Center Discover, or barcode scans.&lt;/p&gt;

&lt;p&gt;Now that tracking assets is a breeze, with Asset Manager Essentials, &lt;em&gt;gain valuable cost and contract visibility&lt;/em&gt;. Now you can store and view procurement data, providing accurate, timely financial and contractual information to help you optimize your asset purchases for the business. Things such as opening and maintaining purchase orders, rolling up to your TCO, or assigning financial ownership to report on IT spend is now available. And what’s more, you can view and manage your complete list of contracts tied to individual assets, ensuring you’re in compliance and anticipating contract-renewal dates.&lt;/p&gt;

&lt;p&gt;On top of these sweet, pre-built capabilities, Asset Manager Essentials is built on the proven Ivanti cloud platform and integrated with Ivanti Help Desk Essentials for an &lt;em&gt;overall foundation for growth, improved support capabilities, and boosted end-user satisfaction&lt;/em&gt;. &lt;strong&gt;Want to ditch the instructions too?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To learn more about the ins and outs of the new out-of-the-box Asset Manager Essentials, visit &lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;www.ivanti.com/asset-manager-essentials&lt;/a&gt;. And, read the &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2181/b26fe5fc3c75"&gt;datasheet&lt;/a&gt; to see how Asset Manager Essentials meets the specific needs of your ITAM team.&lt;/p&gt;

&lt;p&gt;Get the solution you want (and the chair you need), without overcomplicating things.&lt;/p&gt;</description><pubDate>Tue, 17 Jul 2018 20:48:17 Z</pubDate></item><item><guid isPermaLink="false">1ef083c8-dccc-4e63-9337-22757fb3ec8c</guid><link>https://www.ivanti.com/blog/the-gdpr-how-to-avoid-a-fine</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><title>The GDPR – How to Deal with the Aftermath</title><description>&lt;p&gt;The General Data Protection Regulation (GDPR) took effect Friday, May 25&lt;sup&gt;th&lt;/sup&gt;, 2018.&lt;/p&gt;

&lt;p&gt;You’ve probably heard about the GDPR by now – its trending on all your feeds, your own company is concerned – but you’re wondering how it truly affects you. The long and short of it: The GDPR will touch all companies globally that hold the data of &lt;a&gt;EU citizens.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A lot of companies are staring down the barrel of some pretty hefty fines if they don’t get their act together to comply with the protections the GDPR grants EU citizens.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://interactive.ivanti.com/WebGDPRAssessment" rel="noopener" target="_blank"&gt;&lt;img alt="Ivanti - Ready for GDPR - take the test - graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/06/screen-shot-2018-06-13-at-1.57.48-pm.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But, let’s say Friday has come and gone. Your company is in compliance with the GDPR, but WHAM – a data breach occurs. What do you do? Where do you go from here?&lt;/p&gt;

&lt;p&gt;Option 1: Panic!&lt;/p&gt;

&lt;p&gt;Option 2: Ignore it.&lt;/p&gt;

&lt;p&gt;Option 3: Keep calm, and discover, provide insight, take action.&lt;/p&gt;

&lt;h2&gt;DAY 1 &lt;em&gt;Discover &lt;/em&gt;- Ask yourself some key questions:&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Do you have systems in place to protect data?&lt;/li&gt;
	&lt;li&gt;Do you have processes in place to detect and respond to a data breach?&lt;/li&gt;
	&lt;li&gt;Do you have a data protection officer?&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;DAY 2 &lt;em&gt;Provide Insight &lt;/em&gt;– Figure out how the breach happened:&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Where did it occur?&lt;/li&gt;
	&lt;li&gt;How widespread is it?&lt;/li&gt;
	&lt;li&gt;Has any damage occurred?&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;DAY 3 &lt;em&gt;Take Action &lt;/em&gt;– If personally identifiable information (PII) was exposed, you need to take action:&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Inform relevant supervisory authority&lt;/li&gt;
	&lt;li&gt;Inform affected individual(s) without delay&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You may believe your company is protected, but don’t chance hefty fines if you’re breached after the 25&lt;sup&gt;th&lt;/sup&gt; has come and gone. Follow Ivanti’s approach by discovering the breach, providing insight into it, and taking action against it.&lt;/p&gt;

&lt;p&gt;And, get the ultimate form of protection with Ivanti solutions – we secure data, detect breaches, and respond to the fallout. &lt;a href="https://www.ivanti.com/company/contacts"&gt;Contact us&lt;/a&gt; for more information.&lt;/p&gt;
</description><pubDate>Wed, 13 Jun 2018 20:42:08 Z</pubDate></item><item><guid isPermaLink="false">58fd33d0-1297-465b-ae30-6903d4bf2292</guid><link>https://www.ivanti.com/blog/it-asset-management-for-the-modern-workplace-podcast-recap-with-phil-merson</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>IT Asset Management for the Modern Workplace: Podcast Recap With Phil Merson</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/products/it-asset-management" target="_blank"&gt;IT asset management&lt;/a&gt; is having a bit of a moment, and quite honestly, why shouldn’t it be? Shadow IT is bigger than ever, IT teams are struggling for visibility, and auditors are making their rounds. You need to know what assets you have to utilize them more efficiently and effectively.&lt;/p&gt;

&lt;p&gt;So&amp;nbsp;let’s review an Ivanti podcast with one of our own IT asset management experts, Phil Merson. Learn a bit about Merson, where IT asset management was, is, and will be, how an IT asset management solution can save you some serious cash, and so much more!&lt;/p&gt;

&lt;p&gt;&lt;iframe allowfullscreen="" height="360" mozallowfullscreen="" msallowfullscreen="" oallowfullscreen="" scrolling="no" src="//html5-player.libsyn.com/embed/episode/id/6450140/height/360/width/640/theme/standard/autonext/no/thumbnail/yes/autoplay/no/preload/no/no_addthis/no/direction/backward/" webkitallowfullscreen="" width="640"&gt;&lt;/iframe&gt;&lt;/p&gt;

&lt;h2&gt;Phil Merson Uncovered&lt;/h2&gt;

&lt;p&gt;Starting his career in IT asset management in the late 1990s with the Federation Against Software Theft in the UK, Merson made sure companies were paying for the licenses they were using—a rudimentary but nonetheless necessary beginning to the asset management market.&lt;/p&gt;

&lt;p&gt;But, Merson ultimately believed that customers should become more proactive about managing their own IT assets, or as he puts it: “[I] formed my own business to actually help customers build their own asset management practices, and that’s how it started.”&lt;/p&gt;

&lt;h2&gt;IT Asset Management: Then to Now&lt;/h2&gt;

&lt;p&gt;More now about reducing a company’s risk of audit than merely license agreement compliance, the IT asset management field has changed significantly, with more awareness of its necessity than ever. Where is the IT world in relation to effectively tracking their IT assets? Merson says it started in more regulated countries like the Nordics and the UK, trickling back down into lower-mid markets. In the last five to six&amp;nbsp;years, the U.S. has begun to take hold of the trend, with companies deciding that they have to know what assets they own, what software they buy, and what to do in order to optimize.&lt;/p&gt;

&lt;p&gt;Merson: “It’s growing across the world. We’re seeing it right the way through into Asia, into Asia PAC, South Africa, [etc.] It is becoming quite a big industry now.”&lt;/p&gt;

&lt;p&gt;How did companies track assets pre-networks? Merson chuckles while elaborating that many customers were, and still are, used to updating a spreadsheet manually to track their assets. No longer can organizations use the Donald Rumsfeld phrase, “We don’t know what we don’t know,” for you really can discover everything with proper software asset management tools, saving as much as 30 percent of your software budget along the way.&lt;/p&gt;

&lt;p&gt;In fact, the amount of money you can save in one year of using a software asset management solution can pay for three years of those same products and services.&lt;/p&gt;

&lt;h2&gt;Savings, You Say?&lt;/h2&gt;

&lt;p&gt;That being said, 75 percent of organizations are over-licensed for fear of audits. I.e., their license position is entirely unknown for fear of under-licensing and being audited. What’s a license position, you ask? Merson explains: “License position is being able to find all the software you have on all of your devices and marrying those discovered software assets with your licenses.”&lt;/p&gt;

&lt;p&gt;And funny enough, &lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;License Optimizer&lt;/a&gt; does that marrying work for you—it’s the officiant of the IT world, bringing together previously undiscovered IT assets with the correct number of licenses.&lt;/p&gt;

&lt;p&gt;To find out how License Optimizer can unify your IT assets with the correct number of licenses, track their usage, and identify which can work harder for you, &lt;a href="https://www.ivanti.com/company/contacts"&gt;contact us&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and never miss a new episode!&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://open.spotify.com/show/7cFWhtygyS18tObahJ3MK5" rel="noopener" target="_blank"&gt;Spotify&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://music.youtube.com/googleplaymusic" rel="noopener" target="_blank"&gt;Google Play&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://soundcloud.com/user-966027341" rel="noopener" target="_blank"&gt;SoundCloud&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.facebook.com/groups/180572639144043/" rel="noopener" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://twitter.com/InterchangePod" rel="noopener" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.instagram.com/accounts/login/" rel="noopener" target="_blank"&gt;Instagram&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;er miss a new episode!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://podcasts.apple.com/us/podcast/interchange-it-podcast/id1299928336" rel="noopener" target="_blank"&gt;iTunes&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://open.spotify.com/show/7cFWhtygyS18tObahJ3MK5" rel="noopener" target="_blank"&gt;Spotify&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://music.youtube.com/googleplaymusic" rel="noopener" target="_blank"&gt;Google Play&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://soundcloud.com/user-966027341" rel="noopener" target="_blank"&gt;SoundCloud&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Drop us a line on social media:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.facebook.com/groups/180572639144043/" rel="noopener" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://twitter.com/InterchangePod" rel="noopener" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.instagram.com/accounts/login/" rel="noopener" target="_blank"&gt;Instagram&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Fri, 25 May 2018 20:58:16 Z</pubDate></item><item><guid isPermaLink="false">350936c4-0ba7-4a99-8295-12db2035bef1</guid><link>https://www.ivanti.com/blog/service-quality-compliance-unified-it</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>Improved Service Quality and Compliance With Unified IT</title><description>&lt;p&gt;An iconic catchphrase attributed to the world’s number one fast food restaurant, &lt;em&gt;Would you like fries with that?&lt;/em&gt;, seems rather arbitrary. It’s as if the McDonald’s marketing department decided off hand to have their customer associates begin asking one simple question with the hope of improving service quality.&lt;/p&gt;
&lt;p&gt;Well, according to &lt;a href="https://thenextweb.com/news/what-mcdonalds-can-teach-us-about-selling" target="_blank" rel="nofollow noopener"&gt;business analysis&lt;/a&gt;, that’s exactly what happened.&lt;/p&gt;
&lt;p&gt;Knowing that a McDonald’s burger only tastes as good as the fries you have with it, the company’s formula was brilliant. One phrase, billions in additional revenue, and happy customers.&lt;/p&gt;
&lt;p&gt;Wouldn’t you like a silver bullet for your user &lt;a href="https://www.ivanti.com/use-cases/endpoint-application-control" target="_blank" rel="noopener"&gt;endpoint management&lt;/a&gt;&amp;nbsp;system? The &lt;em&gt;Would you like fries with that?&lt;/em&gt; for the IT world?&lt;/p&gt;
&lt;p&gt;Well, perhaps you can with an automated and unified endpoint management solution. Such a simple approach to UEM seems like the McDonald’s value prop—too good to be true. Can you really experience the following benefits with automation?&lt;/p&gt;
&lt;p&gt;Let’s take a look at how service quality and compliance can be improved:&lt;/p&gt;
&lt;h2&gt;1. Reduce fines and penalties&lt;/h2&gt;
&lt;p&gt;With the complexity of today’s environments, ensuring compliance from an IT perspective can become incredibly complicated, resulting in fines/penalties. Change, Release, and Configuration Management improve compliance and governance with: change and release templates and workflow that ensure separation of duties and oversight; and multi-level approval assignment to streamline change approvals and provide detailed audit trails.&lt;/p&gt;
&lt;p&gt;The sample organization was able to reduce fines by one fine per year and the cost per fine by 10 percent, with an impact of $110,000 in annual cost savings.&lt;/p&gt;
&lt;h2&gt;2. Improve service quality by increasing service desk agent motivation and productivity&lt;/h2&gt;
&lt;p&gt;When call centers are outfitted with hardwired/land-line phone systems, it results in very little mobility or choice of work location for the service agents, essentially keeping them at a single desk in a single room all day. Voice Solutions allows service desk agents a great deal of flexibility in work arrangements. The software-based system doesn’t require agents to be stationed at a hardwired phone all day, allowing them to take calls from various locations, including tele-commuting. In addition, call overflow can be handled easily by having more agents sign on, as there is no constraint on the number of phones available.&lt;/p&gt;
&lt;p&gt;The sample organization witnessed a five-percent improvement in overall service desk agent productivity, with an impact of $70,000 in annual revenue gains.&lt;/p&gt;
&lt;h2&gt;3. Reduce the risk of exposure to hacking and malware&lt;/h2&gt;
&lt;p&gt;Ineffective patch management can expose an organization to security compliance risks such as hacking and malware, which often target weak points of operating systems and applications. Ivanti enables a high level of automation for all phases of &lt;a href="https://www.ivanti.com/products/security-controls" target="_blank" rel="noopener"&gt;patch management&lt;/a&gt;, from identifying vulnerabilities in the network and selecting relevant patches, to quality control and rules-based implementation. Automated searches provide a complete overview of threats.&lt;/p&gt;
&lt;p&gt;The sample organization reduced the time per patch deployment by 80 percent and the exposed vulnerabilities still affecting machines by 50 percent, with an impact of $171,600.&lt;/p&gt;
&lt;h2&gt;4. Reduce time spent transferring data between systems&lt;/h2&gt;
&lt;p&gt;When the IT service and endpoint management systems are not integrated, it can result in users having to wait a long time to have software installed, as the process would often contain a number of manual steps to enter and pull the needed data from the two separate systems. Combining the IT service management and endpoint management systems allows requests that require information from both systems to be handled much more quickly, as no human interaction is needed in transferring the information from one system to the other.&lt;/p&gt;
&lt;p&gt;The sample organization was able to reduce the time spent transferring data and requests between systems by 95 percent, with an impact of $168,700 in annual productivity improvements.&lt;/p&gt;
&lt;h2&gt;5. Improve overall customer service/end-user uptime and customer satisfaction&lt;/h2&gt;
&lt;p&gt;Interrupted business processes can significantly impact employee productivity and satisfaction. And given the complexity of today’s IT management challenges, the risk that service disruptions could occur is considerable.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.ivanti.com/service-management" target="_blank" rel="noopener"&gt;IT Service Management&lt;/a&gt; allows for the measurement of actual service-delivery quality against established benchmarks and availability metrics for every component within a service. Robust analytics help to determine where fine tuning will improve and transform the overall business service, so that productivity, performance, and quality can be optimized. In addition, Endpoint Management works across all areas of desktop and server management to reduce the amount of downtime incurred by end users, whether it be from waiting for new applications and upgrades installed, re-setting their preferences once an upgrade is complete, having vulnerabilities removed, or other issues and trouble that can arise. This reduced downtime increases end user productivity and satisfaction significantly.&lt;/p&gt;
&lt;p&gt;The sample organization improved overall end-user productivity due to better uptime and customer service, with an impact of $140,000 in annual revenue gains.&lt;/p&gt;
&lt;p&gt;With Ivanti, we enable you to improve service quality and compliance—a true&amp;nbsp;&lt;em&gt;Would you like fries with that?&lt;/em&gt; value, where with the power of unified automation, your end user is happy and your organization securely compliant.&lt;/p&gt;
&lt;p&gt;To look back at the other two value props associated with an automated and unified IT solution, check out the other blogs in this series:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/unified-it-the-swiss-army-knife-of-the-it-world" target="_blank" rel="noopener"&gt;Automated and Unified IT: The Swiss Army Knife of the IT World?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/maximizing-operational-efficiencies-removing-unified-solutions" target="_blank" rel="noopener"&gt;Maximizing Operational Efficiencies: Removing the Thorn From IT’s Side With Unified Solutions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/reducing-it-costs-ivantis-unified-it-approach" target="_blank" rel="noopener"&gt;3 Ways of Reducing IT Costs With Ivanti’s Unified IT Approach&lt;br&gt;
&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;And to see how the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Ivanti Service Manager&lt;/a&gt; solution could help your organization, download the full whitepaper &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2033/d8d554778aa9"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://interactive.ivanti.com/BITAMCalc" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-21813 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/04/screen-shot-2018-04-06-at-2.29.05-pm.png" alt="cut software costs"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Mon, 16 Apr 2018 19:17:40 Z</pubDate></item><item><guid isPermaLink="false">eefc6ef8-72b4-4125-b8ca-95f0dfbf44a3</guid><link>https://www.ivanti.com/blog/reducing-it-costs-ivantis-unified-it-approach</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><category>Endpoint Management</category><title>3 Ways of Reducing IT Costs With Ivanti's Unified IT Approach</title><description>&lt;p&gt;Reducing IT costs reminds me of a song: “I don’t know what they want from me / It’s like the more money we come across / The more problems we see…”&lt;/p&gt;
&lt;p&gt;Humorous song lyrics aside, IT pros encounter the same problem—where there’s more money at stake, there’s bound to be more problems.&amp;nbsp;Significant IT changes&amp;nbsp;(such&amp;nbsp;as OS deployments, etc., etc.) cost money, and usually, cause problems as the organization goes about changing.&lt;/p&gt;
&lt;p&gt;As in the previous blog in the series, &lt;a href="https://www.ivanti.com/blog/maximizing-operational-efficiencies-removing-unified-solutions" target="_blank" rel="noopener"&gt;Maximizing Operational Efficiencies: Removing the Thorn from IT’s side with a Unified and Automated Solution&lt;/a&gt;, we’ll be pursuing the benefits within the value area of reducing IT costs. With the&amp;nbsp;&lt;a href="https://www.ivanti.com/service-management" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Service Manager solution&lt;/a&gt;, a unified and automated IT solution, more money doesn’t have to mean more problems—just the opposite in fact.&lt;/p&gt;
&lt;p&gt;Let’s&amp;nbsp;take a look:&lt;/p&gt;
&lt;h2&gt;1. Reducing IT costs with less downtime due to unplanned/unapproved changes.&lt;/h2&gt;
&lt;p&gt;Failures caused by changes in IT can have a significant impact on end-user productivity and can result in significant added costs due to downtime. Change, Release, and Configuration Management mitigate the risks of failures caused by changes in IT. They can control the variations of IT asset configurations with sophisticated reconciliation and enforcement tools, and improve deployment time and quality by managing planning, authorization, and deployment from a single interface.&lt;/p&gt;
&lt;p&gt;The sample organization reduced unplanned downtime and unapproved changes by 80%, with an impact of $172,700 in annual revenue gains.&lt;/p&gt;
&lt;h2&gt;2. Reducing IT costs with no purchase of unnecessary end-user hardware and software.&lt;/h2&gt;
&lt;p&gt;In today’s complex environments, knowing exactly what hardware and software exists and where it’s located on the network is a real challenge and can result in unneeded purchases of additional hardware components or software licenses.&amp;nbsp;&lt;a href="https://www.ivanti.com/products/discovery" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Discovery&lt;/a&gt; makes it easy to catalog all&amp;nbsp;IP addressable&amp;nbsp;hardware (including servers, desktops, laptops, network printers, switches, and devices) and software, as part of a complete IT inventory that is always up to date. This 100-percent visibility can help control sprawling networks and manage them efficiently.&lt;/p&gt;
&lt;p&gt;The sample organization reduced its annual end-user hardware and&amp;nbsp;software costs by 5%, with an impact of $125,700 in annual cost savings.&lt;/p&gt;
&lt;h2&gt;3. Reduce IT systems and maintenance costs.&lt;/h2&gt;
&lt;p&gt;When IT service management and endpoint management are managed across&amp;nbsp;a number of&amp;nbsp;disparate systems, or across different systems and vendors in different departments, it can result in significant internal IT hardware and software costs. By moving to a single system across all IT Service Management and Infrastructure/Desktop and Server Management groups, the server, software, and maintenance costs are substantially reduced.&lt;/p&gt;
&lt;p&gt;The sample organization consolidated five systems into one across IT&amp;nbsp;Service and &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank" rel="noopener"&gt;Endpoint Management&lt;/a&gt;, with an impact of $200,000 in annual costs savings.&lt;/p&gt;
&lt;p&gt;So&amp;nbsp;where's there&amp;nbsp;mo&amp;nbsp;money doesn't always mean&amp;nbsp;mo&amp;nbsp;problems. In fact, with unified IT, the&amp;nbsp;mo&amp;nbsp;money there is at stake, the&amp;nbsp;mo&amp;nbsp;money there is to save. Let a unified solution reduce downtime, the purchases of unneeded end-user hardware and software, and the costs of IT systems and maintenance. That's&amp;nbsp;mo&amp;nbsp;money across three value areas within an IT organization.&lt;/p&gt;
&lt;p&gt;No,&amp;nbsp;more money doesn't have to mean&amp;nbsp;more problems.&lt;/p&gt;
&lt;p&gt;To see how the&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Service Manager solution&lt;/a&gt;&amp;nbsp;could help your organization, download the full whitepaper&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2033/d8d554778aa9"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://interactive.ivanti.com/BITAMCalc" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-21067 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/03/spend-smarter-eml.jpg" alt="Learn How to Spend Smarter w IT Asset Management graphic"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 10 Apr 2018 16:39:19 Z</pubDate></item><item><guid isPermaLink="false">adda7964-7906-4df8-be28-90d1e2e35012</guid><link>https://www.ivanti.com/blog/maximizing-operational-efficiencies-removing-unified-solutions</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><category>Endpoint Management</category><title>Maximizing Operational Efficiencies: Removing the Thorn From IT's Side With Unified Solutions</title><description>&lt;p&gt;In the previous post, &lt;a href="https://www.ivanti.com/blog/unified-it-the-swiss-army-knife-of-the-it-world" target="_blank" rel="noopener"&gt;Automated and Unified IT:&amp;nbsp;The Swiss Army Knife of the IT World?&lt;/a&gt;, I introduced you to the jack of all trades for IT professionals: a unified and automated service and &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank" rel="noopener"&gt;endpoint management solution&lt;/a&gt;. And of that solution, there are multiple value areas that are worth investigating,&amp;nbsp;namely operational efficiencies (which we will address today), reducing IT costs, and improving service quality and compliance.&lt;/p&gt;
&lt;p&gt;Most technical operations&amp;nbsp;are considered a thorn in the side of the beast that is IT—a thorn whose negative effects are evident to both IT pros and end users alike. Time spent on routine tasks is far above what it should be, the number of service requests is astronomically high, call details are&amp;nbsp;manually and painstakingly collected, etc.&lt;/p&gt;
&lt;p&gt;With the&amp;nbsp;&lt;a href="https://www.ivanti.com/service-management" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Service Manager solution&lt;/a&gt;, the coup de grace of IT Service and &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank" rel="noopener"&gt;Endpoint Management solutions&lt;/a&gt;, such processes can be improved. Let’s see what an automated solution can really do:&lt;/p&gt;
&lt;h2&gt;1. Reduce time spent on routine tasks.&lt;/h2&gt;
&lt;p&gt;Service issues can often gobble up time to resolve and often require a good deal of time spent on routine tasks, such as updating end users on ticket status when the process is not fully automated. Incident Management provides the ability to diagnose problems quickly, determine workarounds, and restore service with: best-practices workflow, escalations, and notification to automate routine tasks; easily accessible knowledge base; drill-through analytics; intelligent ticketing; ITIL best practices workflows; and SLA traffic lights.&lt;/p&gt;
&lt;p&gt;The sample organization we tested reduced time spent on routine tasks, such as updating end users on ticket status, by 95%. And was impacted by $232,900 in annual productivity improvements.&lt;/p&gt;
&lt;h2&gt;2. Reduce the number of service requests into the IT group.&lt;/h2&gt;
&lt;p&gt;A significant number of calls that come into the service desk are for services that could be standardized&amp;nbsp;fairly easily, but which today take up significant IT time, both in answering calls and in setting up services for other departments. Service Catalog makes it easy to define, publish, and manage services with a drag-and-drop workflow designer and engine, significantly reducing or eliminating IT time needed. In addition, many standard requests can also be completed directly by the user by choosing an option from the service catalog.&lt;/p&gt;
&lt;p&gt;The sample organization&amp;nbsp;was able to&amp;nbsp;reduce the number of service requests and the time-per-service request by 10%, with an impact of $296,200.&lt;/p&gt;
&lt;h2&gt;3. Reduce time spent collecting call details.&lt;/h2&gt;
&lt;p&gt;Time spent collecting&amp;nbsp;all of&amp;nbsp;the details for any given service call can be extensive. In addition, calls back out to the user might be required&amp;nbsp;if key data is missing and&amp;nbsp;needd&amp;nbsp;before the incident can be addressed, slowing resolution time. Voice Automation speeds resolution time. The service desk technician can answer calls with a pre-populated intelligent ticket that provides immediate access to the customer’s contact information, PC inventory, and compliance&amp;nbsp;information for easy routing to the correct area for resolution. The automated attendant may also be used as the primary interface to provide extended after-hours support.&lt;/p&gt;
&lt;p&gt;The sample organization reduced the time spent collecting call details by 40 percent, with an impact of $108,000 in annual productivity improvements.&lt;/p&gt;
&lt;h2&gt;4. Reduce time spent creating software packages.&lt;/h2&gt;
&lt;p&gt;Whether it’s provisioning new employees or managing a mass migration, package configuration is one of the most time-consuming software management tasks.&amp;nbsp;Ivanti&amp;nbsp;Endpoint Management solutions allow packages to be created quickly and easily, as well as making it easy to find the right drivers. In addition to time saved, these tools allow the work to be done by a broader group of people since the level of technical expertise required is reduced.&lt;/p&gt;
&lt;p&gt;The sample organization&amp;nbsp;was able&amp;nbsp;to&amp;nbsp;reduce the time needed to build packages by 85 percent per package, with a $120,000 impact in annual productivity improvements.&lt;/p&gt;
&lt;h2&gt;5. Reduce time spent on application deployments.&lt;/h2&gt;
&lt;p&gt;The ever-increasing complexity in client computing— including new devices (laptops, notepads, smart phones); new delivery methods (cloud computing, hosted virtual desktops); new users, and new platforms—make application deployment difficult and time consuming.&amp;nbsp;Ivanti&amp;nbsp;Endpoint Management solutions automate application management tasks with a single-console interface for packaging, testing, deploying, and configuring software applications. Software sets can be created quickly and easily, and then applications can be deployed automatically to users based on criteria such as job description, location, department, or individual user profile.&lt;/p&gt;
&lt;p&gt;The sample organization&amp;nbsp;reduced the time spent on application deployments by 95 percent per machine, with $465,800 in annual productivity improvements.&lt;/p&gt;
&lt;p&gt;The persistent difficulties that plague IT ops—and eventually affect an end users’ experience—can be a thing of the past with an automated and unified solution. That thorn in the flesh is no more! One deployment officer claimed an automated solution “reduced the time needed to build each software package from as much as a day down to about one hour.”&lt;/p&gt;
&lt;p&gt;To see how IT costs can be reduced, one of the three value props associated with an automated and unified IT solution, click through to the next blog in the series:&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/reducing-it-costs-ivantis-unified-it-approach" target="_blank" rel="noopener"&gt;3 Ways of Reducing IT Costs With Ivanti’s Unified IT Approach&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;And to see how the&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Service Manager solution&lt;/a&gt; could help your organization, download the full whitepaper&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2033/d8d554778aa9"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://interactive.ivanti.com/BITAMCalc" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-21813 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/04/screen-shot-2018-04-06-at-2.29.05-pm.png" alt="cut software costs"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Mon, 09 Apr 2018 22:59:21 Z</pubDate></item><item><guid isPermaLink="false">e64ed19b-8dd3-4744-9fc7-ebe933f35599</guid><link>https://www.ivanti.com/blog/asset-management-software</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>Think You Know How IT Assets Are Actually Managed?</title><description>&lt;p&gt;In terms of &lt;a href="https://www.ivanti.com/use-cases/optimize-software-hardware-assets" target="_blank" rel="noopener"&gt;asset management&lt;/a&gt; software, did you know that only 36 percent of the software businesses pay for is utilized? That’s right! Only 36 percent. That’s an extra 64 percent that’s being paid for but going unused.&lt;/p&gt;
&lt;p&gt;So, what does it mean to manage your software assets effectively—where 100 percent of your software investments are used?&lt;/p&gt;
&lt;h3&gt;Getting the Facts&lt;/h3&gt;
&lt;p&gt;The official definition of "software asset management," or SAM for short, is:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A process for making software acquisition and disposal decisions. It includes strategies that identify and eliminate unused or infrequently used software, consolidating software licenses or moving toward new licensing models.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;So, eliminating, consolidating, and revitalizing old software licensing models is the name of the game. But if you don’t know the lay of the land around software (i.e. how often organizations over-license software, how much time is spent resolving data accuracy issues, how much software license complexity indirectly costs an organization, etc.), you’ll never have the wherewithal to manage your own software.&lt;/p&gt;
&lt;h3&gt;We’ve Got You Covered&lt;/h3&gt;
&lt;p&gt;Knowing the painful facts about asset management software will properly equip you to face your own licensing fears.&lt;/p&gt;
&lt;p&gt;Our Software Asset Management experts have formulated a simple, &lt;a href="https://interactive.ivanti.com/BSAMQuiz" target="_blank" rel="noopener"&gt;5 question quiz&lt;/a&gt; that tests your knowledge about how organizations &lt;em&gt;actually&lt;/em&gt; manage their software.&lt;/p&gt;
&lt;p&gt;After you test your knowledge, we’ll give you the right answers and some accompanying helpful tips for managing your own software in the future. The more you know, the more capable you are of properly managing your software.&lt;/p&gt;
&lt;p&gt;Take our &lt;a href="https://interactive.ivanti.com/BSAMQuiz" target="_blank" rel="noopener"&gt;Software Asset Management 5 question quiz&lt;/a&gt; to test your knowledge about SAM today!&lt;/p&gt;</description><pubDate>Mon, 19 Mar 2018 18:19:39 Z</pubDate></item><item><guid isPermaLink="false">7d770837-2b7d-43c5-b217-5066d890f6fe</guid><link>https://www.ivanti.com/blog/the-real-news-about-it-asset-management</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>The REAL NEWS About IT Asset Management</title><description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;The term "fake news" has had a ubiquitous presence in the media over the last 12 months, with an increase in usage by 365 percent since &lt;span class="s2"&gt;2016&lt;/span&gt;. It has been a nearly inescapable buzzword lately, being defined as: “false, often sensational, information disseminated under the guise of news reporting.”&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;So how does this term&amp;nbsp;relate to managing IT assets? Well frankly, everything. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Too many executives view &lt;a href="https://www.ivanti.com/products/it-asset-management" rel="noopener" target="_blank"&gt;ITAM&lt;/a&gt; as redundant. "Doesn’t my organization already have insight into the assets we’re utilizing? What’s the big deal if they don’t? Aren’t my employees still productive and the organization still thriving? I bet ITAM is just some scam IT organizations have created to take more resources from us.” &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;And to that, I respond—no. &lt;a href="https://www.ivanti.com/glossary/itam"&gt;IT Asset Management (ITAM)&lt;/a&gt; is not a scam. Let me explain.&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;Flaunt your assets. IT assets, that is.&lt;/h2&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Your IT assets are your greatest assets and you should flaunt them—pardon the expression. They help your business achieve financial and strategic goals, and when managed properly, they can drive your organization towards success.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;ITAM allows you to:&lt;/p&gt;

&lt;ul class="ul1"&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;Discover resource availability and performance for better allocation and cost savings &lt;/span&gt;&lt;/li&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;No longer fear audits with compliant contracts and risk management&lt;/span&gt;&lt;/li&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;Find favor with your end users, who are productive and positive with better operational success&lt;/span&gt;&lt;/li&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;Scale the business and earn more money&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span class="s1"&gt;With fiscal accountability of your assets, IT isn’t just serving. It’s innovating. &lt;/span&gt;&lt;/p&gt;

&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;ITAM is REAL NEWS, and we’re going to preach the harsh truth. &lt;/span&gt;&lt;/h2&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;A shocking 76.4 percent of organizations admit to over-licensing in fear of audits, and there’s a 68 percent chance that most organizations will be audited within the next 12 months. That means you’re probably spending too much on licenses because an audit might be coming your way within the year. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Get rid of the software clutter, and hear the good news! With SAM processes and tools—like &lt;a href="https://www.ivanti.com/products/discovery" rel="noopener" target="_blank"&gt;Ivanti’s License Optimizer&lt;/a&gt;—you can save 30 percent of the software spend you would typically put in place in fear of an audit. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Download the infographic &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2074/f85d62d5c606"&gt;&lt;span class="s2"&gt;The REAL NEWS About IT Asset Management&lt;/span&gt;&lt;/a&gt; for even more insight into how managing your IT assets can truly save you money.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/it-asset-management" rel="noopener" target="_blank"&gt;&lt;img alt="Learn How to Spend Smarter w IT Asset Management graphic" class="alignnone wp-image-21067 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/03/spend-smarter-eml.jpg"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Thu, 01 Mar 2018 21:20:18 Z</pubDate></item><item><guid isPermaLink="false">35e1032b-d3f8-43c6-913e-4a65fbc6fba6</guid><link>https://www.ivanti.com/blog/unified-it-the-swiss-army-knife-of-the-it-world</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Service Management</category><title>Automated and Unified IT: The Swiss Army Knife of the IT World?</title><description>&lt;p&gt;Do you remember the Swiss army knife your grandfather carried in his pocket with him? Perhaps there were six to eight different functionalities to it—a nail file, scissors, blade, screwdriver, etc. He used it for just about everything (even picking his teeth with the knife when your grandmother wasn’t watching).&lt;/p&gt;
&lt;p&gt;Whether he’s given you his simple model or you’ve caved and purchased the&amp;nbsp;&lt;a href="https://www.amazon.com/dp/B000JC19FE/ref=asc_df_B000JC19FE5324146/?tag=hyprod-20&amp;amp;creative=394997&amp;amp;creativeASIN=B000JC19FE&amp;amp;linkCode=df0&amp;amp;hvadid=238342763648&amp;amp;hvpos=1o4&amp;amp;hvnetw=g&amp;amp;hvrand=1737424201435322411&amp;amp;hvpone=&amp;amp;hvptwo=&amp;amp;hvqmt=&amp;amp;hvdev=c&amp;amp;hvdvcmdl=&amp;amp;hvlocint=&amp;amp;hvlocphy=9007391&amp;amp;hvtargid=pla-391564018973" target="_blank" rel="nofollow noopener"&gt;$320 mammoth with 83 different functionalities&lt;/a&gt;,&amp;nbsp;the jack-of-all-trades that is the Swiss army knife&amp;nbsp;is a traditionally indispensable tool.&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Much like the variety of simple tasks&amp;nbsp;&lt;em&gt;one&lt;/em&gt;&amp;nbsp;Swiss army knife can complete, a unified and automated service and &lt;a href="https://www.ivanti.com/products/endpoint-manager" target="_blank" rel="noopener"&gt;endpoint management solution&lt;/a&gt;&amp;nbsp;contains all the information for&amp;nbsp;all of&amp;nbsp;an organization’s IT services and its hardware and software inventories. AKA, it’s a single solution to address multiple different incidents and deploy multiple different software packages to your end users.&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Unified IT: Value That’s Immediate and Demonstrable&lt;/h2&gt;
&lt;p&gt;A sample organization with 10,000 employees, 3,000 service requests a month, 40 hours a week spent managing changes, and 25 application/upgrade deployments per year can experience $1.5 million in savings from maximizing operational efficiencies and reduced IT costs alone. Through improved service quality and compliance, annual benefits can be as much as $2.3 million.&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Based on interviews with Directors and Managers of IT Operations, Services Management, Systems Engineering, Deployment, and Delivery and Support at&amp;nbsp;a number of&amp;nbsp;U.S. and international organizations, the value falls into three main categories:&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li data-leveltext="-" data-font="Calibri" data-listid="11" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"&gt;Maximize operational efficiencies&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li data-leveltext="-" data-font="Calibri" data-listid="11" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"&gt;Reduce IT costs&lt;span data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li data-leveltext="-" data-font="Calibri" data-listid="11" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"&gt;Improve service quality and compliance&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Each value can be broken down further into a set of specific benefits, as illustrated in the chart below:&amp;nbsp;&lt;span data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignnone size-full wp-image-20783" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/02/lauren.bujaky.blog_-e1518136692912.png" alt="value area and specific benefits infographic"&gt;&lt;/p&gt;
&lt;p&gt;To get the full picture of each specific benefit within the three value areas, click through to the next blog in this series:&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/maximizing-operational-efficiencies-removing-unified-solutions" target="_blank" rel="noopener"&gt;Maximizing Operational Efficiencies: Removing the Thorn From IT's Side With Unified Solutions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;And to see how the&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank" rel="noopener"&gt;Ivanti&amp;nbsp;Service Manager&lt;/a&gt; solution could help your organization, download the full white paper&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2033/d8d554778aa9"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://interactive.ivanti.com/BITAMCalc" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-21813 size-full" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/04/screen-shot-2018-04-06-at-2.29.05-pm.png" alt="cut software costs"&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Fri, 09 Feb 2018 01:11:15 Z</pubDate></item><item><guid isPermaLink="false">94b49ba3-ada5-4d13-a1e1-758848642408</guid><link>https://www.ivanti.com/blog/10-tips-feds-ace-windows-10-migration-part-2-2</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Endpoint Management</category><title>10 Tips for Feds to Ace Their Windows 10 Migration Part 2 of 2</title><description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;In case you missed it, we featured the &lt;a href="https://www.ivanti.com/use-cases/upgrade-windows-10-to-11" target="_blank" rel="noopener"&gt;first five tips of this series here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;But to Recap…&lt;/span&gt;&lt;/h2&gt;
&lt;ul class="ul1"&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;37% of IT organizations across the public and private sectors plan to fully migrate to Windows 10 within the next year&lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;35% plan to migrate within the next two years &lt;/span&gt;&lt;/li&gt;
&lt;li class="li1"&gt;&lt;span class="s1"&gt;14% have not yet established a migration timeline&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Ivanti’s first five tips to help you gain insight into completing your Windows 10 OS migration process: &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Tip #1: Prepare for a New Release Cadence&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Tip #2: Don’t Let Applications Be a Barrier to Migration &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Tip #3: Pick an OS Deployment Strategy &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Tip #4: Ensure Windows and Applications are Properly Patched &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Tip #5: Stop Malicious or Unlicensed Applications&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;b&gt;Tip #6: &lt;/b&gt;&lt;/span&gt;&lt;span class="s1"&gt;&lt;b&gt;MANAGE USER ADMIN PRIVILEGES&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;By now, federal agency IT organizations understand that providing users with full administrative rights makes endpoints vulnerable to attack, significantly increasing security and manageability expenses, while also reducing regulatory, legal and liability controls. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Out of 20 items on its list of Critical Security Controls, the Center for Internet Security ranks ‘controlled use of administrative privileges’ at number 5. But how can trusted agency IT administrators help maintain user productivity without giving users the keys to the kingdom? By applying granular privilege management techniques, administrators can remove full admin rights from users, quickly and easily, instead providing them with ‘elevated’ privileges to access only the apps or tasks that these users most need. This also helps to simplify endpoint security, reducing support calls, and lowering costs.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;b&gt;Tip #7: &lt;/b&gt;&lt;/span&gt;&lt;span class="s1"&gt;&lt;b&gt;PLAN FOR A HYBRID ENVIRONMENT&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Complexity is a nagging challenge in federal IT environments, and hybrid computing environments, while popular, certainly don’t reduce IT complexity concerns. Increasingly, agency success has little to do with the technologies used, and more to do with how well each agency can bring disparate technologies together in a way that’s efficient for all types of users. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;This creates a new challenge for IT in terms of predicting and reacting to context. Windows 10 is accessible from an array of devices, including PCs, laptops, tablets, handheld smartphones, and even wearable devices. Users today log onto their workspaces from nearly any location, using different types of endpoints. And IT administrators must understand the context in which users are logging on, to adapt each user’s workspace experience accordingly, to help those users be productive from any location. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;For example, a user in an Internet café will typically require a much higher level of security protection to access government resources, especially compared to an employee working from the secure confines of a federal agency office. It’s crucial to utilize information about user context, such as location, device or connection type, even time of day, to determine resource entitlement. This will help you properly secure and protect Windows 10 endpoints.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;b&gt;Tip #8: &lt;/b&gt;&lt;/span&gt;&lt;span class="s1"&gt;&lt;b&gt;CREATE AN *ULTIMATE* USER EXPERIENCE&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;User acceptance of a new workspace starts at logon. If the first logon process is slow, user acceptance of a new workspace will be less-than-stellar from day one. And, with every slow log on and every slow-running, frozen, or unavailable application, user acceptance — and productivity — will diminish. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;To optimize usability and user acceptance of Windows 10, Ivanti recommends running analytics to evaluate user experiences using the new workspace. You should baseline existing environments and record metrics such as logon times, memory and CPU utilization, application usage, and privileges needed to run resources. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;It’s also a good idea to ascertain how and where users are storing their data — which is crucial to ensure a good user experience, both during and after OS migration. This exercise will allow you to pre-empt potential bottlenecks, or resource hogs that could affect quality of service in your new environment. It will also help you understand license requirements and identify users with unnecessary or other less than secure rights/privileges.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;b&gt;Tip #9: &lt;/b&gt;&lt;/span&gt;&lt;span class="s1"&gt;&lt;b&gt;GIVE USERS EASY ACCESS TO THEIR DATA&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;One of the biggest obstacles in migrating to Windows 10 involves how to migrate files and folders stored locally on each user’s prior device. In this situation, how does IT ensure both agency and personal files are securely backed up, so they can be effortlessly migrated to new devices? It’s also difficult for IT administrators to establish how many local files exist on each device, to determine the best way to migrate them to Windows 10.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Storing user files and folders on file shares or home PC drives in the data center is another challenge for agency IT organizations and users, because users working remotely or offline may not be able to access their files stored in the data center. If they have remote access to on-premises file shares, use of a VPN is typically required. This can frustrate users and adds another layer of security and complexity that causes headaches for IT administrators when dealing with break/fix, migration, and upgrade scenarios.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Ivanti® File Director enables effortless migration of user data, no matter where it resides. With File Director, user file and folder migration becomes a simple, stress-free task that, once initiated, prepares agency IT organizations instantly for any future migration projects. In addition, the data migration process is 100% unobtrusive to users.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p3"&gt;&lt;span class="s2"&gt;&lt;b&gt;Tip #10: &lt;/b&gt;&lt;/span&gt;&lt;span class="s1"&gt;&lt;b&gt;PERSONALIZE USER WORKSPACES&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;In a recent Dimensional Research survey, over 90% of users surveyed expressed emotions ranging from annoyance to despair when asked for their reactions to changes on their desktop. The survey also revealed 32% of users are already confused by the Windows 10 interface. &lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;If, after migration to Windows 10, a user’s personal settings are missing, it’s inevitable that user acceptance of the newly delivered Windows 10 workspace will be negatively affected. To avoid this scenario, federal agencies may choose to continue to support users on older operating systems and hardware.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;However, if some users also need new hardware that runs Windows 10, new headaches arise because Windows 10 introduces an additional roaming profile architecture that makes it difficult to persist/maintain prior user settings when users switch between different devices and platforms.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;However, if a user logs onto their new Windows 10 workspace and finds their familiar settings already in place, agency IT administrators will reduce fears and increase user acceptance, speeding the transition away from older Windows versions. To enable the ability to maintain user settings postmigration, you’ll need to capture and manage user personalization information, independently from the underlying operating system and applications. This will ensure personal settings are always available, regardless of the device or platform used.&lt;/span&gt;&lt;/p&gt;
&lt;p class="p1"&gt;&lt;span class="s1"&gt;Check out the first five tips in the full report &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2048/b7a6fe167a5a"&gt;&lt;span class="s3"&gt;here&lt;/span&gt;&lt;/a&gt;. Start your transition now with Ivanti!&lt;/span&gt;&lt;/p&gt;</description><pubDate>Sat, 06 Jan 2018 00:17:36 Z</pubDate></item><item><guid isPermaLink="false">e6a5fc3c-eaf7-451c-b552-15f4dcad3391</guid><link>https://www.ivanti.com/blog/10-tips-feds-ace-windows-10-migration-part-1-2</link><atom:author><atom:name>Lauren Bujaky</atom:name><atom:uri>https://www.ivanti.com/blog/authors/lauren-bujaky</atom:uri></atom:author><category>Endpoint Management</category><title>10 Tips for Feds to Ace Their Windows 10 Migration Pt. 1 of 2</title><description>&lt;p class="p1"&gt;&lt;span class="s1"&gt;The U.S. federal government’s migration to Windows 10 is currently being driven by government-wide mandates that favor industry standard technologies, along with increasingly stringent security requirements. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Agency IT executives fully understand that a lack of OS standards across the government has only generated confusion and complexity, especially when upgrading thousands of user devices at once. With so many devices running multiple, differing OS versions, agencies face difficult, time-consuming and budgetary challenges when deploying, maintaining and upgrading endpoint devices. &lt;/span&gt;&lt;/p&gt;

&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;Security Concerns Rise, Windows 10 Migrations Do Too &lt;/span&gt;&lt;/h2&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Driven by security concerns and issues with OS standardization complexities, &lt;a href="http://iasecontent.disa.mil/stigs/pdf/U_DoD_CIO_Memo_Migration_to_Windows_10_Secure_Host_Baseline.pdf" rel="nofollow noopener" target="_blank"&gt;&lt;span class="s2"&gt;the Pentagon set a January 2017 deadline&lt;/span&gt;&lt;/a&gt; for Department of Defense agencies to migrate to Windows 10. While the entire DoD didn’t achieve this goal, the aggressive timeline mandated by the Pentagon kickstarted Windows 10 migration efforts across both DoD and civilian agencies. Meanwhile, Microsoft announced it will end all support for Windows 7 in January 2020.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;According to a recent global study by Dimensional Research: &lt;/span&gt;&lt;/p&gt;

&lt;ul class="ul1"&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;37% of IT organizations across the public and private sectors plan to fully migrate to Windows 10 within the next year&lt;/span&gt;&lt;/li&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;35% plan to migrate within the next two years&lt;/span&gt;&lt;/li&gt;
	&lt;li class="li1"&gt;&lt;span class="s1"&gt;14% have not yet established a migration timeline&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;What We Have to Say About It &lt;/span&gt;&lt;/h2&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Ivanti’s created its Top Ten Tips for Windows 10 Migration, which is designed to help agency IT departments gather insights from our extensive, collective experience in helping all types of organizations across the public and private sector to complete Windows 10 OS migration processes.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Tip #1: PREPARE FOR A NEW RELEASE CADENCE&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;With Windows 10, Microsoft has introduced a far more frequent update cadence to ensure Windows 10 endpoints remain up to date. This twice-yearly cadence, called the Semi-Annual Channel, replaces the Current Branch for Business (CBB) and the Long-Term Servicing Branch (LTSB) options for servicing Windows, which was introduced with the advent of Windows 10. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Endpoints that employ the Semi-Annual Channel will receive two major updates per year, while endpoints that use the Long-Term Servicing Channel will receive major feature updates infrequently, perhaps every two to three years. In addition, Microsoft has removed many of the non-essential, built-in Semi-Annual Channel features from the Long-Term Servicing Channel — such as Windows Store Apps, Cortana, and Microsoft Edge — to reiterate its advice that the Long-Tern Servicing Channel is only for point-of-sale and industrial devices.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Most organizations will receive twice-yearly updates from the Semi-Annual Channel. Primary benefits include increased security and feature updates. The downside is that most IT teams will find themselves in a constant state of migration due to more frequent updates.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Tip #2: DON’T LET APPLICATIONS BE A BARRIER TO MIGRATION&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;One of the largest obstacles organizations face when migrating to Windows 10 involves application compatibility. Luckily, there are several alternative application-delivery platforms that help apps to be integrated seamlessly into desktop environments using techniques such as virtualization, layering, or streaming technologies.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;When selecting an application delivery method, consider the questions below to help determine the best approach to fit your agency’s needs/requirements:&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;-- Will my users need access to applications offline?&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;-- What security privileges will users need to run these apps?&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;-- How do I license these apps?&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;-- How will my IT department handle upgrades/patches?&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;-- Based on answers to the questions above, which approach is most cost-effective for this agency/department?&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;In addition, federal agencies must also consider Web applications. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;If in-house agency web apps currently run without issue on IE9 in compatibility mode, or only with a specific version of Java, what will happen when migrating to IE11 or Microsoft Edge? Do you redevelop internal web applications, or do you virtualize them to continue support, which could be costly and time consuming? &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Ivanti recommends re-testing mission-critical agency applications on Windows 10 before migrating them, with a specific emphasis on testing the most secure applications that require administrative rights in order to run.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Tip #3: PICK AN OS DEPLOYMENT STRATEGY&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;There are several device-related caveats to consider when embarking on a desktop migration initiative. Most importantly, some devices may not support Windows 10. Since late 2016, PCs no longer ship with Windows 7 pre-installed, and most modern processors will only be supported on Windows 10. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Federal agencies must decide whether to replace, re-image, or upgrade existing endpoints. The Dimensional Research survey found there is no single best approach to Windows 10 migration. Of respondents surveyed, 52% planned on re-imaging existing endpoints using systems management tools, while 49% were looking at hardware migration, or upgrading to Windows 10 as new devices are deployed. However, by timing computer replacement strategically to coincide with an OS migration, agencies may save time and expenses associated with in-place upgrades.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Tip #4: ENSURE WINDOWS AND APPLICATIONS ARE PROPERLY PATCHED&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;With ransomware and other malicious attacks on the rise, it’s increasingly difficult for federal agencies to satisfy security compliance requirements while protecting against new and more intelligent threats.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Social engineering tactics use deceptive techniques to manipulate users into performing non-secure actions or divulging private information. Many targeted attacks look for vulnerabilities and weaknesses in agency operating systems and application content, typically due to unpatched operating systems and applications. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;A comprehensive patch management solution can help protect your agency’s Windows 10 environment, without disrupting the continuity of operations, by detecting vulnerabilities in both your Windows 10 endpoints and installed applications.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;&lt;b&gt;Tip #5: STOP MALICIOUS OR UNLICENSED APPLICATIONS&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Will agency users employ Windows 10 Store apps? If so, how will agency IT administrators control which apps they may access, install, or run? Agencies are likely to encounter productivity, compliance, and security risks when they fail to use application controls. &lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;In addition, it’s not solely Windows Store apps that must be controlled, but traditional Windows apps as well. Without proper app controls in place, users may introduce unlicensed software, ransomware, or other malicious executables, compromising agency security and increasing serious cybersecurity risks.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Traditional whitelisting and blacklisting technologies typically require ongoing maintenance when new service packs or upgrades are released, or when new, unknown malware is propagated. This can increase the burden on IT staff, along with the cost of IT support. In addition, these solutions are often easily bypassed by renaming unknown or blacklisted applications as an application on the whitelist.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Ivanti® Application Control uses a Trusted Ownership™ model in which any application installed by a non-trusted owner (any standard, typical agency user) is blocked automatically.&lt;/span&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Application Control is recognized by Microsoft for enforcing device-based software license control. By controlling which users or devices have permission to run named applications, agency IT administrators can place limits on the number of application instances, which devices or specific users may run an application, as well as when users may run a program, and for how long.&lt;/span&gt;&lt;/p&gt;

&lt;h2 class="p1"&gt;&lt;span class="s1"&gt;The Next Five? &lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;Be sure to check out &lt;a href="https://www.ivanti.com/blog/10-tips-feds-ace-windows-10-migration-part-2-2" rel="noopener" target="_blank"&gt;10 Tips for Feds to Ace Their Windows 10 Migration Part 2 of 2&lt;/a&gt;&lt;/p&gt;

&lt;p class="p1"&gt;&lt;span class="s1"&gt;Also, read the full report &lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2048/b7a6fe167a5a"&gt;&lt;span class="s2"&gt;here&lt;/span&gt;&lt;/a&gt;.” Start your transition to Windows 10 with Ivanti now!&lt;/span&gt;&lt;/p&gt;</description><pubDate>Thu, 04 Jan 2018 00:44:11 Z</pubDate></item></channel></rss>