<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/mike-adams/rss" /><link>https://www.ivanti.com/blog/authors/mike-adams</link><item><guid isPermaLink="false">a4b3439f-a2e4-4872-8222-26862b11fc3b</guid><link>https://www.ivanti.com/blog/the-key-benefits-of-modernizing-your-vpn-and-bridging-to-a-zero-trust-model-let-ivanti-show-you</link><atom:author><atom:name>Mike Adams</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-adams</atom:uri></atom:author><category>Security</category><title>The Key Benefits of Modernizing Your VPN and Bridging to a Zero Trust Model - Let Ivanti Show You</title><description>&lt;p&gt;I am excited to announce the launch of our latest network security offering known as Ivanti Neurons for Secure Access (nSA). This new cloud-based management solution will allow our existing L3 VPN customers using Connect Secure to take the next step in their journey toward a zero trust architecture. And this all can happen while still utilize existing Connect Secure VPNs that are already setup and configured. Ivanti firmly believes that a zero trust architecture is the path forward but realizes at the same time that VPN won’t be going away anytime soon. Some competitors in the market believe this but it just isn’t reality.&lt;/p&gt;

&lt;p&gt;The biggest customer benefit of Ivanti Neurons for Secure Access in my mind is the time savings associated with streamlining management (see figure 1). Let’s drill down in two specific areas, gateway update management and analytics/visibility, to understand how customers will benefit from a Ivanti Neurons for Secure Access deployment.&lt;/p&gt;

&lt;h2&gt;Gateway Update Management&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;w/o Neurons for Secure Access&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Administrator downloads update package and then uploads the package to each individual Connect Secure gateway, then selects to install.&amp;nbsp; This is very time intensive, especially having to upload the update to each individual gateway. &lt;strong&gt;Usually around 30 minutes+, &lt;/strong&gt;depending on how many gateways to update, connection speeds, update package size, etc.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;w/Neurons for Secure Access&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Administrator signs into nSA and navigates to the gateway to update. Administrator selects "Upgrade to version XYZ". Gateway is updated from Ivanti Neurons for Zero Trust Access (nZTA) with no further interaction from admin. &lt;strong&gt;Time savings can be minutes to hours, depending on how many gateways need to be updated, as the time involved here is literally less than a minute to upgrade. &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ivanti Internal Testing Comparison&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;30x reduction in time spent&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Analytics and Visibility&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;w/o Neurons for Secure Access&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Administrator would need to sign into each Connect Secure gateway individually to review user and data analytics. This can be &lt;strong&gt;very cumbersome and time consuming &lt;/strong&gt;in large Connect Secure deployments as each gateway/cluster must be touched individually.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;w/Neurons for Secure Access&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Administrator signs into nSA and is able to review user and data analytics for entire deployment from a single pane of glass.&lt;strong&gt; For large deployments this can provide massive time savings for admins who only need to review one interface instead of each individual device.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ivanti Internal Testing Comparison&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;2.5x reduction in time spent&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="operational efficiencies with neurons for secure access" src="https://static.ivanti.com/sites/marketing/media/images/blog/nsa-general.png"&gt;&lt;/p&gt;

&lt;p&gt;Your mileage may vary but Ivanti believes administrators will see these productivity gains with Ivanti Neurons for Secure Access. My colleagues Nathan McLean and Scott Erickson have also written technical blog articles around &lt;a href="https://www.ivanti.com/blog/introducing-neurons-for-secure-access-saving-time-while-providing-unified-visibility-and-management-for-distributed-ivanti-connect-secure-deployments" target="_blank"&gt;Neurons for Secure Access&lt;/a&gt; and how &lt;a href="https://www.ivanti.com/blog/co-existence-using-legacy-vpn-with-neurons-for-zero-trust-access-through-the-neurons-for-secure-access-platform" target="_blank"&gt;Neurons for Secure Access is the easiest path to Neurons for Zero Trust Access&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For more information, check out our short demo below and our &lt;a href="https://www.ivanti.com/products/secure-access-management"&gt;product page&lt;/a&gt; on Ivanti.com.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="vimeo"&gt;&lt;param name="id" value="638059909"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Tue, 26 Oct 2021 11:01:00 Z</pubDate></item><item><guid isPermaLink="false">3c0081d7-5f3b-40d2-9cac-a54402079125</guid><link>https://www.ivanti.com/blog/3ps-of-security-protect-prioritize-and-patch</link><atom:author><atom:name>Mike Adams</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-adams</atom:uri></atom:author><category>Security</category><title>3Ps of Security: Protect, Prioritize and Patch</title><description>&lt;p&gt;Like a football or soccer team, security also has two lineups that must be continuously managed. One lineup involves protecting the digital assets and data of a business. The other: managing the security risk and vulnerability exposure of these environments and endpoints. The tension between these two lineups keep security and IT very busy.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;There is a critical shortage of expert security professionals, which means no expanding the bench of talent, even if you can afford it. The day-to-day playbook for security boils down to the 3Ps: protect, prioritize, and patch. And do all three as best and fast as possible to keep ahead of adversaries and cyber threats.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;If a security control fails, or is bypassed, there is an open gap to possible compromise. When a gap is detected, there is a rush to tackle the problem and to understand the root cause to block it from happening again.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;However, the same urgency doesn’t exist in vulnerability management or patching. Ivanti’s recent survey &lt;em&gt;Patch Management Challenges&lt;/em&gt; highlights this problem:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A daunting 61% of the IT and security professionals said that they receive requests from line of business owners to postpone maintenance windows once a quarter. Another 28% said that they get such requests once every month&lt;/em&gt;&lt;em&gt;. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Cybersecurity Awareness Month presents a good opportunity to not only share what end users can do to protect themselves, but also to highlight challenges within the various disciplines of security.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;One major challenge: prioritization. Gone are the days when professionals can predict the types and scale of attacks that the company many encounter. Also gone is the assumption that work environments are limited to a contained space where IT-controlled PC workstations are the center of productivity. There has been a monumental increase in acceleration of digital business as organizations pivot to respond to COVID-19 pandemic impacts. &lt;a href="https://www.ivanti.com/blog/cyber-attacks-be-cyber-smart-and-avoid-collateral-damage" target="_blank"&gt;The playing field has dramatically changed&lt;/a&gt; as all businesses should consider they are working in a&amp;nbsp;hostile environment. So how can businesses prioritize based on risk if they’re operating in an Everywhere Workplace with a constantly evolving threat landscape?&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The three Ps of protect, prioritize, and patch aren’t meant to be siloed instructions that happen in subsequent order. In this new business environment, all three Ps must be continually active. According to our &lt;em&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;Patch Management Challenges survey&lt;/a&gt;&lt;/em&gt;, 53% of respondents say that organizing and prioritizing patches takes up most of their time. This would be equivalent to a player watching on the sidelines until halftime, while his role goes unfulfilled.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;That means the team will have been playing without full bench strength and will have to come from behind to try to win. Ivanti’s goal is to get all security players the patch and vulnerability intelligence that gets them into action faster and with confidence. Patch intelligence means that when line of business owners request a delay or want to postpone maintenance to security, IT can clearly share the level of risk that they are exposing the business to by delaying action.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti’s Patch Intelligence release this month continues to provide the insights needed to accelerate remediation, as it now supports macOS endpoints. This couldn’t have come at a better time as &lt;a href="https://www.ciodive.com/news/macos-enterprise-growth-IT-management-cost/594170/" rel="noopener" target="_blank"&gt;more work-from-home systems are MacBooks&lt;/a&gt;. Quickly shifting organizations sought systems to support their remote workers, and many opted for macOS systems because they tended to have less malware and threats, while others had to resort to macOS because this was the only type of system they could procure at the time. However, its notable that the increase in the business use of these systems has also coincided with critical vulnerabilities appearing in the last few months.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Apple has patched a critical macOS vulnerability (&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2021-30657" rel="noopener" target="_blank"&gt;CVE-2021-30657&lt;/a&gt;) that has been exploited by Shlayer malware for months. This was reported by the vendor with a severity of 5.5 looking at the vulnerability in isolation; however, this vulnerability has been weaponized with an available exploit. The Ivanti Patch Intelligence and Vulnerability Intelligence (formerly RiskSense VULN KB) solutions scores this vulnerability based on a wide perspective of threat intelligence and expert insights. In this case, this vulnerability scored a 10, the highest priority for remediation.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;This is where having the right prioritization, akin to the coach giving the plays on the sidelines, helps everyone to move quickly against security risks. We know it’s not easy. Ivanti is in the business to make that easier.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The big takeaway: like on any great team, protect, prioritize and patch need to be in sync and operate in simultaneous alignment. None of them can win the game alone.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ready to learn more? We’ve compiled resources to get you on top of the game. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Report: &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;Patch Management Challenges&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2634/3d40e0d22ef3"&gt;Infographic&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Webinar: &lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday" target="_blank"&gt;October Patch Tuesday&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Webinar: &lt;a href="https://www.ivanti.com/webinars" target="_blank"&gt;3 Secret Elements that Accelerate Risk-Based Patch Management&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 07 Oct 2021 04:01:00 Z</pubDate></item><item><guid isPermaLink="false">dbbee340-b178-4f15-9acb-2ac0ef466f90</guid><link>https://www.ivanti.com/blog/cyber-attacks-be-cyber-smart-and-avoid-collateral-damage</link><atom:author><atom:name>Mike Adams</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-adams</atom:uri></atom:author><category>Security</category><title>Cyber Attacks ‘Be Cyber Smart and Avoid Collateral Damage’</title><description>&lt;p&gt;&lt;a href="https://www.cisa.gov/cybersecurity-awareness-month" rel="noopener" target="_blank"&gt;Cybersecurity Awareness Month&lt;/a&gt;, now in its 18&lt;sup&gt;th&lt;/sup&gt; year, is an opportunity to highlight the continually escalating conflict that is, for the most part, hidden from the public – unless it becomes media-worthy. Every day, those who are responsible for security (IT staff, threat and security analysts to CISOs) face new challenges. Digital transformation has accelerated at hyperspeed because organizations are focused on adjusting to COVID-19 disruptions. And that’s not the only dynamic changing the threat landscape and driving a need for a different approach to security and risk management.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Those with malicious intentions have an easier time targeting and disrupting than ever before. Conflicts have moved from geographies into&amp;nbsp;cyberspace. We’re seeing rampant activity from ransomware families and threat actors associated with APT groups attributed to nation-states – and even some for-hire.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;As a baseline, all businesses should consider that they are working in a&amp;nbsp;hostile environment. That means being concerned with their &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface&lt;/a&gt;, risk exposure, and whether their security controls are effective. This is not necessarily because they are a specific target, but rather because they’re part of a broader ecosystem that&amp;nbsp;adversaries are targeting. Finance, telecommunications, and healthcare have always been targets for the monetary value of their data. Now the ecosystem is broadening. Industries that previously felt immune are no longer protected. Today we’re seeing such wide-ranging industries as meat-processing plants, schools, and regional transportation services coming to a halt because of ransomware attacks. It feels different because it &lt;em&gt;is &lt;/em&gt;different. And yet we still don’t know the whole story. The number of organizations experiencing breaches is not widely publicized (for PR, logistical, and a host of other reasons), and it can be assumed that breaches occur even more frequently than the estimated reports.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Adversaries are automating, and ransomware as a service is accelerating the speed at which one point of exposure, or a lapse in a security control, can bring down a business. You &lt;em&gt;could&lt;/em&gt; consider this collateral damage of doing business in a hostile cyber environment, letting your guard down, or being unprepared for changes in the threat landscape. Or you could take action.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;There is a Norwegian proverb that says, ‘There is no such thing as bad weather’ just bad clothing.’ Ivanti continues to provide the solutions that secure and protect business and the Everywhere Workplace. This includes addressing the rapidly evolving challenges of business in this hostile cyber landscape. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The need is constant – it certainly doesn’t wait for this month – but Cybersecurity Awareness Month is an opportunity for everyone to evaluate their situation and get up to speed on what they need to thrive in – not just survive – this new business landscape. We’re glad to have the chance to educate about the latest cybersecurity challenges and ways to overcome them.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Make sure to check out the Ivanti blog each week in October. Ivanti will be bringing out new materials designed to inform our prospects, customers and partners on the best ways to navigate the security space with the most value and protection available. From endpoint security to vulnerability management to network security and more, Ivanti has you covered. Here are just a few of the items we have planned:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Week of October 4&lt;sup&gt;th&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-New survey results&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-Infographics&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Week of October 11&lt;sup&gt;th&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-Examining phish and ransomware&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-&lt;/sup&gt;&lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday"&gt;&lt;sup&gt;Patch Tuesday Webinar series&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Week of October 18&lt;sup&gt;th&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-Knowledge quizzes&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-Interviews with Ivanti senior security professionals&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Week of October 25&lt;sup&gt;th &lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;-Watch for something new!&lt;/sup&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti secures the Everywhere Workplace. Learn how our world-class solutions blend hyperautomation and leading-edge protection for the simple, powerful answers your IT team is looking for.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Thanks for recognizing Cybersecurity Awareness Month with us!&lt;/p&gt;
</description><pubDate>Fri, 01 Oct 2021 10:00:00 Z</pubDate></item><item><guid isPermaLink="false">0859cc75-8027-4a23-bdaf-ae5cf92758c0</guid><link>https://www.ivanti.com/blog/what-s-important-in-2021-bold-predictions-in-the-digital-workplace-and-delivering-security-with-a-remote-workforce</link><atom:author><atom:name>Mike Adams</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-adams</atom:uri></atom:author><category>Security</category><title>What’s Important in 2021? – Bold Predictions in the Digital Workplace and Delivering Security with a Remote Workforce</title><description>&lt;p&gt;At Ivanti, our highest priority is our customer. With that in mind, I thought it would be a good idea to share some research that my team and I have found valuable as we have migrated through the COVID period. The two pieces of Gartner research, highlighted below and linked to on our landing page below, really hit home at Ivanti so we wanted to share them with all of you.&lt;/p&gt;

&lt;p&gt;The first piece, “&lt;a href="https://www.ivanti.com/resources/library" target="_blank"&gt;Predicts 2021: Digital Workplace Infrastructure and Operations&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;”, centers around predictions for 2021 when it comes to one of Ivanti’s key focus areas. The makeup of digital workplace infrastructure and operations can make all the difference in the world in terms of delivering to the bottom-line. These types of research pieces are always helpful to make sure you don’t miss anything and you can see some of the broad strokes the year may have in store. Gartner does a great job with these pieces because they have a deep bench and strong expertise on the topic. An added bonus here, if you are a geek like me, is the ability to go back later in the year to see how many have happened and how many are yet to come.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Here are some specific thoughts on why we believe this piece is important:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Great statistics and recommendations on why and how users can deliver unified endpoint management (UEM), security, along with how to tie that in with automation. Sound familiar?&lt;/li&gt;
	&lt;li&gt;Cloud-hosted workplaces and cloud workplace infrastructure adoption are key and will be continuing to accelerate moving forward.&lt;/li&gt;
	&lt;li&gt;Further research on this topic is noted and linked inside the piece itself&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The second piece, “&lt;a href="https://www.ivanti.com/resources/library" target="_blank"&gt;Designing Security for Remote-Work-First Enterprises&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;”, centers around remote working and thinking about security in that context – a favorite topic in today’s day. We aren’t going back to the office any time soon unfortunately, but there are ways to maximize our efforts. Security with a majority of the workforce at home has now moved to the front of the line in terms of critical issues.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Here are some specific thoughts on why we believe this piece is important:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Security teams are being challenged in news ways and must adopt a new way of thinking in this area&lt;/li&gt;
	&lt;li&gt;Remote access infrastructure is noted as a critical service&lt;/li&gt;
	&lt;li&gt;Good descriptions of how different players interact in this area&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Special thanks to my new team as they have really done their collective homework. We hope to continue to delight you the customer more here in 2021 and beyond.&lt;/p&gt;

&lt;p&gt;You can find more great Ivanti content at &lt;a href="https://www.ivanti.com/" target="_blank"&gt;ivanti.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;More to come, always!&lt;/p&gt;

&lt;p&gt;-Mike Adams&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;1&lt;/sup&gt; Gartner, Predicts 2021: Digital Workplace Infrastructure and Operations, Stuart Downes, Dan Wilson, Nathan Hill, Michael Silver, Chris Silva&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;sup&gt;2&lt;/sup&gt; Gartner, Designing Security for Remote-Work-First Enterprises, Jeremy D'Hoinne, De'Onn Griffin, Rob Smith, 30 June 2020&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 01 Feb 2021 22:10:43 Z</pubDate></item></channel></rss>