<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/nayaki-nayyar/rss" /><link>https://www.ivanti.com/blog/authors/nayaki-nayyar</link><item><guid isPermaLink="false">fd6fe481-1635-4b6a-a49b-4970ee1b3d8e</guid><link>https://www.ivanti.com/blog/ivanti-wins-three-best-of-awards-from-expert-insights</link><atom:author><atom:name>Nayaki Nayyar</atom:name><atom:uri>https://www.ivanti.com/blog/authors/nayaki-nayyar</atom:uri></atom:author><category>Ivanti News</category><title>Ivanti Wins Four "Best-Of" Awards from Expert Insights</title><description>&lt;p&gt;I’m excited to announce that Ivanti is the recipient of not one, not two, but &lt;em&gt;four&amp;nbsp;&lt;/em&gt;“Best-Of” awards from Expert Insights for Spring 2022. Expert Insights’ &lt;a href="https://expertinsights.com/insights/expert-insights-best-of-award-winners-spring-2022/" rel="noopener" target="_blank"&gt;Best-Of Awards&lt;/a&gt; are designed to recognize cloud technology providers across multiple software categories including cloud software, security, and storage. Ivanti is an award winner in the following categories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Best-Of Enterprise Password Policy Enforcement&lt;/li&gt;
	&lt;li&gt;Best-Of Patch Management Software&lt;/li&gt;
	&lt;li&gt;Best-Of Unified Endpoint Management&lt;/li&gt;
	&lt;li&gt;Best-Of Business VPNs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Best-Of award winners are chosen by Expert Insights’ editors, based on extensive research into each solution’s merits as a solution provider, customer reviews and how they compare to their competitors. Expert Insights is a leading resource for cybersecurity analysis, research&amp;nbsp;and news, with over 80,000 monthly visitors.&lt;/p&gt;

&lt;p&gt;Ivanti earned these independently judged awards by hitting key judging criteria including “impressive features, strong capabilities&amp;nbsp;and positive user experiences.” Expert Insights also considers factors such as the deployment process, pricing&amp;nbsp;and target markets.&lt;/p&gt;

&lt;p&gt;Expert Insights detailed the specific reasons for each award in their newly-released Buyers Guide. Here’s a summary:&lt;/p&gt;

&lt;h2&gt;Best-Of: Password Policy Enforcement&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/user-workspace-manager"&gt;Ivanti Password Director&lt;/a&gt; “features simple – but robust – password policy creation and enforcement tools which enable admins to define the length and complexity of user passwords.”&lt;/p&gt;

&lt;p&gt;Expert Insights says, “We recommend Password Director for organizations who want to simplify the process of creating secure, strong passwords for their end users, and add an extra layer of protection against account compromise.”&lt;/p&gt;

&lt;h2&gt;Best-Of: Patch Management Software&lt;/h2&gt;

&lt;p&gt;With &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Patch&lt;/a&gt;, “IT teams can automatically distribute patches across their environments – including remote and mobile endpoints – with minimum impact on end users.&lt;/p&gt;

&lt;p&gt;Expert Insights says, “We recommend Ivanti’s patch management solutions for midsize organizations looking for comprehensive vulnerability management and response tailored to their specific use case."&lt;/p&gt;

&lt;h2&gt;Best-Of: Unified Endpoint Management&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management"&gt;Unified Endpoint Manager&lt;/a&gt; “enables organizations to consolidate their endpoint and workspace management via a single management suite,” says the award report. In addition, Unified Endpoint Manager “gives admins detailed insights into which devices are connected to their network, as well as enabling and simplifying remote software delivery.”&lt;/p&gt;

&lt;p&gt;Expert Insights says, “We recommend Ivanti’s Unified Endpoint Manager as a powerful solution for midsize enterprises looking to manage endpoints and deploy applications remotely without the need for a VPN.”&lt;/p&gt;

&lt;h2&gt;Best-Of: Business VPNs&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/connect-secure-vpn"&gt;Connect Secure&lt;/a&gt; (formerly Pulse Connect Secure) "provides zero trust secure access from any device to all network apps and cloud services." Its key features include a simple web interface, no need for software installation, granular admin control and comprehensive single sign-on for cloud-based apps and data centers.&lt;/p&gt;

&lt;p&gt;Expert Insights says, "We recommend Pulse Connect Secure as a strong VPN solution for organizations of any size."&lt;/p&gt;

&lt;p&gt;These are the latest in a remarkable string of awards for Ivanti, reinforcing our emergence as an industry leader in integrated solutions for the Everywhere Workplace.&lt;/p&gt;
</description><pubDate>Tue, 12 Apr 2022 12:38:59 Z</pubDate></item><item><guid isPermaLink="false">de1bfa22-2cc3-495a-814c-e5359d68c6cb</guid><link>https://www.ivanti.com/blog/the-gender-gap-is-hurting-the-tech-industry-it-s-time-to-breakthebias-now-by</link><atom:author><atom:name>Nayaki Nayyar</atom:name><atom:uri>https://www.ivanti.com/blog/authors/nayaki-nayyar</atom:uri></atom:author><category>Ivanti Culture</category><title>The Gender Gap is Hurting the Tech Industry: It’s Time to #BreaktheBias Now</title><description>&lt;p&gt;The gender gap in the technology sector is narrowing, but not nearly as fast as it should be. Women in tech have a long way to go for equal representation, especially in leadership positions. Several of the leading companies in the United States still have only &lt;a href="https://www.statista.com/chart/4467/female-employees-at-tech-companies/" rel="noopener" target="_blank"&gt;one woman for every four tech roles&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The current landscape demands better representation. As our lives become increasingly intertwined with technology, the gaps in representation become increasingly apparent. Case in point: early developments of vehicle air bags were tailored for male bodies, which resulted in avoidable loss of lives among women in car crashes. That’s one example among countless, and the takeaway is clear: &lt;strong&gt;Women need a voice in the technological advancements of today and tomorrow.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Of course, increasing representation is not only about making the world safer and more user-friendly for all. Equal representation also brings diversity of thought and perspective to business decisions, which is, unquestionably, a competitive advantage.&lt;/p&gt;

&lt;h2&gt;STEM Education&lt;/h2&gt;

&lt;p&gt;One of the big barriers to women in tech is at the education level. Historically, more men than women have chosen to pursue degrees in science, technology, engineering, and math (STEM). More than half of bachelors degrees are awarded to women, but the majority of these are still in areas outside of STEM. Research indicates that &lt;a href="https://ngcproject.org/sites/default/files/2022-02/ngcp_stateofgirlsandwomeninstem.pdf" rel="noopener" target="_blank"&gt;only around 20% women&lt;/a&gt; pursue degrees in the fields of computer sciences, engineering and physical sciences.&lt;/p&gt;

&lt;p&gt;To be clear, this is not for a lack of skill. Mathematics is seen as key for success in the STEM fields, and girls in high schools, on average, are matching or exceeding the achievements of their male counterparts. Girls are earning credits in math and sciences at the same rate as boys, and &lt;a href="https://www.lectitopublishing.nl/download/revisiting-race-and-gender-differences-in-stem-can-inclusive-stem-high-schools-reduce-gaps-5840.pdf" rel="noopener" target="_blank"&gt;even earning higher grades.&lt;/a&gt; Girls in high schools also tend to hold themselves to a higher standard than boys with similar achievements, as they believe they must be exceptional to succeed in a male-dominated field.&lt;/p&gt;

&lt;p&gt;Statistically, the change occurs at the college level. The implicit bias that science and math fields are for people who identify as males and humanities and arts fields are for people who identify as females persists to this day, even among those who would like to think they reject gendered stereotypes.&lt;/p&gt;

&lt;h2&gt;What needs to happen&lt;/h2&gt;

&lt;p&gt;Even the smallest of changes at the college level can help alter this perception. Introductory courses that give a broader perspective of the field are more likely to attract female students. Similarly, an increase in female faculty in the STEM fields can also attract higher rates of female students, for the powerfully simple reason that representation matters. To that end, colleges should make efforts to attract and retain female academics. Historically, female academics have higher rates of attrition due to a variety of reasons, including unsatisfactory workplaces, unfair pay or treatment, and imbalanced pressures of familial obligations.&lt;/p&gt;

&lt;p&gt;Women entering the workplace would also benefit from mentors who can help them navigate pitfalls. Having women in leadership positions who have successfully treaded that path can help motivate other young women to follow in their footsteps.&lt;/p&gt;

&lt;p&gt;There has been a noticeable change in perception with respect to women in tech, but that needs to convert into an increase in the actual hiring of female workers. Even at the first opportunity for a promotion, there is a gender gap, with &lt;a href="https://wiw-report.s3.amazonaws.com/Women_in_the_Workplace_2019.pdf" rel="noopener" target="_blank"&gt;only 38% of women making up first-level managers&lt;/a&gt;. Organizations also need to hire women to leadership roles early, as that allows for diversity and inclusion in the company’s culture. Tech companies also need to refrain from restricting women to routine and mundane tasks that show they’re diligent but do not help them express their strategic skills.&lt;/p&gt;

&lt;p&gt;As President and Chief Product Officer of a leading technology company, I understand the impact women can have, despite myriad barriers. Removing those barriers means mitigating bias and viewing equal representation not as a PR stunt rather but as an investment in innovation, creativity, and positive business outcomes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.msci.com/www/research-report/women-on-boards-2019-progress/01667826614" rel="noopener" target="_blank"&gt;Women in leadership positions&lt;/a&gt; in science and engineering companies have only marginally grown in the last two decades, but the pace of change must ramp up dramatically.&lt;strong&gt; If not, it could take more than a decade – or even far longer – for equal representation and pay parity, and neither women – nor the sector itself – can afford to wait.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;</description><pubDate>Tue, 08 Mar 2022 15:06:47 Z</pubDate></item><item><guid isPermaLink="false">70c82d27-91d2-4fdb-bf11-4a6b4c564e99</guid><link>https://www.ivanti.com/blog/statement-pulse-secure-vpn-code-signing-certificate</link><atom:author><atom:name>Nayaki Nayyar</atom:name><atom:uri>https://www.ivanti.com/blog/authors/nayaki-nayyar</atom:uri></atom:author><category>Security</category><title>Statement from Nayaki Nayyar, Ivanti Chief Product Officer and President Service Management Solutions Group</title><description>&lt;p&gt;&lt;strong&gt;Regarding the issue with our Ivanti PulseSecure VPN solution&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Sincere Apology:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We apologize to all customers impacted by the disruption this has caused. We&amp;nbsp;began working diligently on a solution as soon as we were aware of the issue to resolve.&lt;/p&gt;

&lt;p&gt;Our intent has been to remedy this quickly in the most complete way possible. Our goal is to be transparent while providing regular and ongoing communications to you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;An Update on Where We are:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We are on target to deliver releases on a rolling basis for all supported versions with the timeline outlined in the &lt;a href="https://forums.ivanti.com/s/welcome-pulse-secure?language=en_US" target="_blank" rel="noopener"&gt;Knowledge Base article&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;PCS Version 9.1R11.3 General Access&lt;/strong&gt; fix was made available at 8:05 a.m. MT, Tuesday, 13 April.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;PCS Versions 9.1R8.4, 9.1R9.2, and 9.1R10.2 General Access&lt;/strong&gt; fix was made available at 1:20 a.m. MT, Wednesday, 14 April.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What was involved:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While we would have liked this to be a quick fix, we wanted to ensure that we adequately tested for quality and security. Our General Availability releases will be fully packaged and will have gone through complete internal validation procedures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Our Support and Your Feedback:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We are actively working with impacted customers to provide support, help restore their services and get feedback. We know this is more than an inconvenience. We are focusing on resolving this in an expedited manner. We know we can do better and we will do better moving forward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Our Continued Commitment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We will continue to reach out and provide updates until this issue is completely resolved.&lt;/p&gt;

&lt;p&gt;You can also monitor this site or review the latest Knowledge Base article here (linked).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://forums.ivanti.com/s/welcome-pulse-secure?language=en_US" target="_blank" rel="noopener"&gt;https://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44781/?kA13Z000000fzbR&lt;/a&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Wed, 14 Apr 2021 02:46:54 Z</pubDate></item><item><guid isPermaLink="false">b5264bc7-f42a-45d0-b552-87bdabab506c</guid><link>https://www.ivanti.com/blog/ivanti-accelerates-on-its-vision-to-deliver-self-healing</link><atom:author><atom:name>Nayaki Nayyar</atom:name><atom:uri>https://www.ivanti.com/blog/authors/nayaki-nayyar</atom:uri></atom:author><category>Security</category><title>Ivanti Accelerates on its Vision to deliver “Self-Healing Autonomous Edge with Zero-Trust Access and Contextualized, Personalized Experience for Remote Workers”</title><description>&lt;p&gt;Earlier this week, we closed the acquisitions of MobileIron, a leading provider of mobile-centric unified endpoint management solutions, and Pulse Secure LLC, a leading provider of Zero Trust Secure Access and mobile security solutions.&lt;/p&gt;

&lt;p&gt;I’m personally super excited to join forces with MobileIron and Pulse Secure and combine our strengths to deliver unparalleled coverage across all device types in the Everywhere Enterprise. With this announcement, Ivanti is now the only vendor in the market to deliver an end-to-end solution across Unified Endpoint Management (UEM), Zero Trust Security, and IT Service Management (ITSM).&lt;/p&gt;

&lt;p&gt;So, what does this mean for customers? First, let’s look at what’s happening in the market and the challenges that enterprises are facing. The world is changing fast. And the demands on IT are growing exponentially as employees are increasingly working from anywhere, on any device and expecting contextualized, personalized, consumer-like experiences.&lt;/p&gt;

&lt;p&gt;This remote work environment is driving an explosive growth of endpoints, edge devices, and data. ​&lt;a href="https://www.gartner.com/smarterwithgartner/what-edge-computing-means-for-infrastructure-and-operations-leaders" target="_blank" rel="noopener"&gt;According to Gartner&lt;/a&gt;, approximately 75% of enterprise-generated data will be created and processed at the edge by 2025. This is significant if you consider that it was less than 10% in 2018. At the same time, cybersecurity threats are reaching catastrophic new heights and reports are showing up to a 30,000% increase in COVID-19 themed attacks, such as phishing, malicious websites and malware targeted at remote workers, since January.&lt;/p&gt;

&lt;p&gt;Enterprises urgently need to deal with this explosive growth in devices, data, cybersecurity threats and remote workers. In this next normal, applying hyper-automation technologies like deep learning, supervised and unsupervised learning capabilities, is the only way for enterprises to ensure that all endpoints, edge devices and data are discovered, managed, secured and serviced. With hyper-automation, enterprises can proactively and predictably detect issues, self-heal and self-secure devices. This, in turn, results in a seamless, secure and personalized user experience.&lt;/p&gt;

&lt;p&gt;Now that we have closed the acquisitions of MobileIron and Pulse Secure, we will apply Hyper-Automation across our converged pillars of UEM, Zero Trust Security, and ITSM to completely transform enterprise operations. For our customers, this provides a single pane of glass to discover and manage all devices, provide Zero Trust access from Cloud to Edge, and deliver consumer grade employee experience. We’ll also expand our strengths into industry verticals to manage rugged devices for supply chain customers, retail kiosks for retailers, and healthcare devices for healthcare organizations.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In conclusion, I’m very excited for our customers as we deliver integrations across Ivanti Neurons, MobileIron and Pulse Secure technologies. Stay tuned for more innovations as we accelerate on our vision of Self-Healing Autonomous Edge!&lt;/p&gt;

&lt;p&gt;To learn more about Ivanti Neurons, please click &lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 02 Dec 2020 16:13:24 Z</pubDate></item></channel></rss>