<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/robin-rowe/rss" /><link>https://www.ivanti.com/blog/authors/robin-rowe</link><item><guid isPermaLink="false">b0cc17b0-ae97-41f4-b7f1-637a81c2849a</guid><link>https://www.ivanti.com/blog/how-consolidating-your-tech-stack-drives-dex-outcomes</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>DEX</category><title>How Consolidating Your Tech Stack Drives DEX Outcomes</title><description>&lt;p&gt;Every month, it seems that a new “must use” tool hits the market.&amp;nbsp;What ends up happening is IT teams are gifted a&amp;nbsp;hodge-podge&amp;nbsp;of tools&amp;nbsp;—&amp;nbsp;snowballing into unnecessary frustration and increased workloads.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“The issue is there are so many&amp;nbsp;technologies and ways you can&amp;nbsp;have this experience, and it is very&amp;nbsp;easy to fall into a trap of&amp;nbsp;having too&amp;nbsp;many tools&amp;nbsp;and that will dilute your&amp;nbsp;experience and lead to frustration.&amp;nbsp;We have information on multiple&amp;nbsp;SharePoint sites, Teams, Yammer,&amp;nbsp;Service Now, One Drive&amp;nbsp;and who&amp;nbsp;knows what else exists, so we have&amp;nbsp;a very bad experience as you do&amp;nbsp;not know where to find things, and&amp;nbsp;if you do not follow any of those&amp;nbsp;channels, you will miss stuff. Pick&amp;nbsp;your standard and do not fall into&amp;nbsp;the trap of implementing the flavor&amp;nbsp;of the month.”​&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;- Team Lead, Emerson Electric Co​&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Growing digital environments with too many disparate tools has created a scenario where optimizing&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-solutions-ebook"&gt;digital experiences&lt;/a&gt;&amp;nbsp;across various devices and locations is falling short, preventing your organization’s ability to effectively adapt to&amp;nbsp;Everywhere Work.&lt;/p&gt;

&lt;p&gt;When laying the foundation for an improved digital employee experience (DEX),&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2746/3b85c03540a6"&gt;consolidating your tech stack&lt;/a&gt; is a crucial component.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why unmanaged tools and assets&amp;nbsp;are&amp;nbsp;hurting your DEX&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Some organizations have reported their digital transformation being&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2022/01/11/accelerated-enterprise-digital-transformation/" rel="noopener" target="_blank"&gt;accelerated by three to five years&lt;/a&gt;&amp;nbsp;since 2020. Unlike a few years ago, assets no longer live just in the office. They are scattered across the globe and increasing in quantity. Recent reports show the average employee uses&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2663/8abb292d288f"&gt;2.6 devices&lt;/a&gt;&amp;nbsp;to get their job done.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But with more assets come more problems.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;45% of employees&lt;/a&gt;&amp;nbsp;have experienced more tech issues since 2020, with the average employee running into&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2663/8abb292d288f"&gt;3.67 endpoint issues a day&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This volume of daily issues means that valuable insights are growing fast and in different places.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Being able to navigate this complex environment in a timely manner to address all issues proactively poses a challenge when your tools and systems don't talk to each other.&lt;/p&gt;

&lt;p&gt;A more complex environment without the proper tools has IT and security professionals feeling the heat.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;73% report an increased workload&lt;/a&gt;&amp;nbsp;since their organization adopted hybrid/remote work.&amp;nbsp;In fact,&amp;nbsp;nearly&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;1 in 3 IT and security professionals&lt;/a&gt;&amp;nbsp;report losing at least one team member due to burnout.&lt;/p&gt;

&lt;p&gt;And these types of work environments aren’t going away anytime soon. According to our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;Everywhere Work research&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&amp;nbsp;71% of office workers want to work either&amp;nbsp;hybrid (with control over which days they come to the office) or remote.&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;66% of employees say they have experienced no negative side effects due to remote work.&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;71% of C-Suite admit hybrid working has had a positive impact on employee morale.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Some organizations are already&amp;nbsp;taking action. A recent&amp;nbsp;&lt;a href="https://rs.ivanti.com/reports/ema-modern-itam-in-the-modern-workplace-2022.pdf"&gt;survey conducted by EMA&lt;/a&gt;, found that a resounding&amp;nbsp;86% of respondents are looking to consolidate asset-related tools&amp;nbsp;and 18% are actively planning to manage all asset types on one platform.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&amp;nbsp;“Centralization&amp;nbsp;is critical. Having too&amp;nbsp;many tools is an issue for us.”​&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;- System Administrator,&amp;nbsp;​CFCU Community Credit Union​&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Consolidating your tech stack lays the groundwork for&amp;nbsp;&lt;a href="https://www.ivanti.com/products/automation"&gt;automation&lt;/a&gt;,&amp;nbsp;which helps decrease workloads and ultimately&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/take-care-of-your-team-improve-your-dex-to-combat-digital-burnouts-and-work-related-stress"&gt;deter digital burnouts&amp;nbsp;&lt;/a&gt;for your IT and security teams. With technology becoming more entwined with the daily&amp;nbsp;operations&amp;nbsp;of employees,&amp;nbsp;making sure you provide efficient ways to&amp;nbsp;manage, secure and support this environment for your IT teams is crucial to delivering improved experiences.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Space for video&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;Benefits of consolidating your tech stack&lt;/h2&gt;

&lt;p&gt;Consolidating your tech stack aids DEX initiatives in many ways, including: &amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Reducing complexity for your IT staff&lt;/h3&gt;

&lt;p&gt;It's time to kick manual processes and inefficient workloads to the curb. Connecting and simplifying your organization’s workflows streamlines and automates your IT environments. This removes unnecessary complexity and enables improved experiences for your IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;More responsive and efficient IT support&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;28% of employees&lt;/a&gt;&amp;nbsp;wish for a more responsive service desk. When IT has all the information in a single place, they can address and resolve tickets quicker and more effectively.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Preventing issue before they happen&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Quickly resolving issues and, ideally, preventing issues in the first place, creates betterexperiences.&amp;nbsp;Research shows it can take up to&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook"&gt;20 minutes for workers to refocus on a task&lt;/a&gt;.&amp;nbsp;When you simplify your tech stack and enable access to valuable insights in one place, preventing issues becomes a breeze. You get to keep employees out of the service queue and focused on their jobs, reclaiming thousands of hours of lost productivity across your organization.&lt;/p&gt;

&lt;p&gt;When looking to create better employee experiences in the Everywhere Work era, consolidating your tech stack is a step you can’t afford to skip. Simplifying and streamlining your IT structure makes life easier for your IT and security teams&amp;nbsp;—&amp;nbsp;freeing up their time to understand employee sentiment, track and optimize experiences over time and prevent issues before they occur.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="wL6qQKTeuYI"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;To learn more about DEX, watch our on-demand webinar to&amp;nbsp;get&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/a-step-by-step-guide-to-planning-and-measuring-digital-employee-experience-dex"&gt;A step-by-step guide to planning and measuring digital employee experience&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;</description><pubDate>Thu, 29 Jun 2023 15:25:35 Z</pubDate></item><item><guid isPermaLink="false">87f8eaee-0987-4fd6-a4e4-78208d0f412b</guid><link>https://www.ivanti.com/blog/dex-s-role-in-bringing-generations-together</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>DEX</category><title>DEX's Role in Bringing Generations Together</title><description>&lt;h2&gt;Key takeaways&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;There are four generations in the workforce – each expecting something else from technology.&lt;/li&gt;
	&lt;li&gt;Organizations need to find a balance between technological innovations and comfortable tools for all generations.&lt;/li&gt;
	&lt;li&gt;By integrating accessibility into technologies and methodologies, organizations can build work environments that work for everyone.&lt;/li&gt;
	&lt;li&gt;Organizations should consider implementing automation and AI to improve their digital employee experience and bring generations together.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Download the&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;Digital Employee Experience Report&lt;/a&gt;&amp;nbsp;and explore research results.&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;For the first time in history, there are&amp;nbsp;&lt;a href="https://blog.qualia.com/4-generations-in-workforce/" rel="noopener" target="_blank"&gt;four generations&lt;/a&gt;&amp;nbsp;in the workforce:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Baby Boomers (1946 to 1964).&lt;/li&gt;
	&lt;li&gt;Generation X (1965-1980).&lt;/li&gt;
	&lt;li&gt;Millennial (1981-1996).&lt;/li&gt;
	&lt;li&gt;Generation Z (1997-2012).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This puts organizations in a unique situation – how do you make the correct adjustments for such a wide-ranging workforce? We are interacting with tech in nearly every aspect of our lives. And each generation has their own preferences, expectations and drivers for using tech.&lt;/p&gt;

&lt;p&gt;Workers of all generations&amp;nbsp;&lt;a href="https://www.worklife.news/talent/why-gen-xers-are-struggling-with-remote-work/" rel="noopener" target="_blank"&gt;have struggled&lt;/a&gt;&amp;nbsp;to adapt to remote and hybrid work environments, finding themselves in an uphill battle to build positive interactions with new tools and devices. This has been exacerbated by the&amp;nbsp;&lt;a href="https://www.forbes.com/sites/forbesbusinesscouncil/2021/02/25/the-unprecedented-pace-of-change/?sh=3e476c3340ed" rel="noopener" target="_blank"&gt;rapid pace of technological development&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“DEX is great, but I believe we should also leave some space to the&amp;nbsp;older generations&amp;nbsp;who are not so familiar with new technologies and can function more efficiently in traditional environments.”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;- Ivanti Innovator&lt;/p&gt;

&lt;p&gt;By 2030,&amp;nbsp;&lt;a href="https://www.census.gov/library/stories/2019/12/by-2030-all-baby-boomers-will-be-age-65-or-older.html" rel="noopener" target="_blank"&gt;one in every five Americans&lt;/a&gt;&amp;nbsp;will be of retirement age, with&lt;a href="https://www.fool.com/retirement/2017/07/29/9-baby-boomer-statistics-that-will-blow-you-away.aspx" rel="noopener" target="_blank"&gt;&amp;nbsp;65% of Boomers&lt;/a&gt;&amp;nbsp;planning on working past the retirement age of 65.&amp;nbsp;By 2050, people in the European Union aged 75-84 years will&amp;nbsp;&lt;a href="https://inclusiveworkplace.eu/2021/11/30/is-multigenerational-workforce-an-asset/" rel="noopener" target="_blank"&gt;expand by 56.1%&lt;/a&gt;.&amp;nbsp;Employment rates for people aged 50-69 are also expected to rise to&amp;nbsp;&lt;a href="https://ilcuk.org.uk/healthequalswealth/" rel="noopener" target="_blank"&gt;65% in 2035&lt;/a&gt;, with 12% of office workers already being 59 years or older. This can’t be overlooked as it points to more diversity in how workers interact with their technology and what they expect from their employers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For example, Millennials in a&amp;nbsp;&lt;a href="https://www.gartner.com/en/documents/3985298" rel="noopener" target="_blank"&gt;Gartner report&lt;/a&gt;&amp;nbsp;rated socialization and passion as strong motivators for working at an organization, giving it the highest rating of five. Meanwhile, Baby Boomer and Gen X rate these two categories at one and three, respectively.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even though a large portion of the workforce is still over the age of 50, Gen Z is projected to make up&amp;nbsp;&lt;a href="https://www.weforum.org/agenda/2022/05/gen-z-don-t-want-to-work-for-you-here-s-how-to-change-their-mind/" rel="noopener" target="_blank"&gt;27% of the workforce&lt;/a&gt;&amp;nbsp;by 2025. This growing dichotomy means that employees, even if they work for the same company or on the same team, will have vastly different work methods and expectations from their employers.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Inclusivity is the key to tapping into new growth in this era of&amp;nbsp;&lt;a href="https://www.ivanti.com"&gt;Everywhere Work&lt;/a&gt;. Investing in your&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-digital-experience"&gt;digital employee experience&lt;/a&gt;&amp;nbsp;(DEX), which equips your employees with the right tools, is a great start.&lt;/p&gt;

&lt;p&gt;The correct investment helps to foster improved workflows and help with&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/the-role-of-dex-in-talent-retention"&gt;talent retention&lt;/a&gt;. On top of that, the tools it brings to your organization, such as 360-degree monitoring of devices and automatic self-healing of devices, offer you the necessary insights to identify how to&amp;nbsp;&lt;strong&gt;bridge generational divides&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;A flexible and scalable employee experience for everyone&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Organizations need to balance adopting technological innovations and making sure all generations can stay productive and comfortable with the tools they use. Because at the end of the day,&amp;nbsp;&lt;strong&gt;a great digital employee experience works for everyone – regardless of their age&lt;/strong&gt;. But, just like Albert Einstein’s saying, “everything is relative,” a “great” experience is different for everyone.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What works well for one generation may not translate equally to another.&amp;nbsp;You need to make sure your IT team can cater to all their needs&amp;nbsp;and&amp;nbsp;&lt;strong&gt;monitor trends&lt;/strong&gt;&amp;nbsp;to adjust and inform your strategy and investment.&amp;nbsp;For example,&amp;nbsp;&lt;a href="https://www.the-future-of-commerce.com/2022/05/05/digital-natives-definition-stats-marketing-strategies/" rel="noopener" target="_blank"&gt;Gen Z and Millennials,&lt;/a&gt;&amp;nbsp;who’ve been surrounded by tech their entire lives, might not be inclined to seek support. They’ll opt for resolving it themselves.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This type of DIY culture can eventually snowball into&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-shadow-it.html" rel="noopener" target="_blank"&gt;shadow IT&lt;/a&gt;&amp;nbsp;– a risk growing globally. In fact, our Everywhere Work report shows there’s been a &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;26% increase in shadow IT because of remote work environments&lt;/a&gt;. In some countries, like Germany, there’s been an astounding 45% increase in shadow IT.&lt;/p&gt;

&lt;p&gt;That’s why&amp;nbsp;basing it on the context of the user and noting specific preferences and expectations, thanks to&amp;nbsp;&lt;a href="https://www.ivanti.com/products/automation"&gt;heightened levels of automation and AI&lt;/a&gt;,&amp;nbsp;opens the door for more personalized support for all generations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While it’s important to keep generational differences in mind, it’s equally important not to fall victim to stereotyping – sometimes referred to as&amp;nbsp;&lt;a href="https://www.vanderbilt.edu/diversity/unconscious-bias/" rel="noopener" target="_blank"&gt;unconscious bias&lt;/a&gt;.&amp;nbsp;Rather, get a gauge directly from your employees and look at what areas need to be addressed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;research&lt;/a&gt;&amp;nbsp;found that 14% of workers say their organization doesn’t even collect employee feedback on a regular basis. With 26% of employees saying they’d quit their job partly because of the tools available, taking no action isn’t an option.&amp;nbsp;&amp;nbsp;&lt;strong&gt;Asking for direct feedback&lt;/strong&gt;&amp;nbsp;from your employees is key. Additionally, you can augment this by&amp;nbsp;&lt;strong&gt;measuring&lt;/strong&gt;&amp;nbsp;your users’&amp;nbsp;DEX score and&amp;nbsp;sentiment&amp;nbsp;on a continuous basis.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A common cause of employee frustration stems from&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/how-to-balance-security-with-dex-for-a-critical-advantage"&gt;lost work and interrupted momentum&lt;/a&gt;. In fact, 42% of office workers have spent their own money on hardware and software to help stay productive and ease frustration for themselves.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When workers lack the necessary tools to work effectively, their&amp;nbsp;&lt;strong&gt;productivity and morale&lt;/strong&gt;&amp;nbsp;suffer. This is highlighted in a recent Harvard Business Review study where only&amp;nbsp;&lt;a href="https://hbr.org/2019/11/why-are-we-here" rel="noopener" target="_blank"&gt;28% of employees&lt;/a&gt;&amp;nbsp;feel connected to their organization’s mission. And this can lead to a mass exodus. According to our Everywhere Work report, &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;25% of office workers&lt;/a&gt; say they switched jobs in the last year because they didn’t feel engaged with the values and culture of their company.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Seeing what works for employees and what areas need to be addressed is key to improving your organization’s DEX and putting your employees in a position to succeed.&lt;/p&gt;

&lt;h2&gt;Integrate accessibility into your technologies and methodologies&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;As you head towards improving your digital employee experience, assessing how to&amp;nbsp;&lt;strong&gt;make your technology flexible and scalable&amp;nbsp;for everyone&lt;/strong&gt;&amp;nbsp;is a step in the right direction.&lt;/p&gt;

&lt;p&gt;Some examples of improving accessibility can include:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Going beyond post-ticket surveys and collecting sentiment via interactive automation bots.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Offering audio options.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Tracking and optimizing experiences over time.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Implementing automation to reduce workloads and solve problems before they impact users.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Organizations have an opportunity to be trailblazers in how they run their digital employee experience initiatives. Not only will improving your DEX build work environments that cater to each employee’s needs, increase productivity levels and align them with the goals of your organization, it will help bridge generational divides – making your organization more inclusive and productive.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Improving&amp;nbsp;diversity, equity and inclusion (DEI) is something C-suites can’t avoid. &lt;a href="https://www.gartner.com/en?utm_source=google&amp;amp;utm_medium=cpc&amp;amp;utm_campaign=GTR_NA_2022_GTR_CPC_SEM1_BRANDCAMPAIGNCORE&amp;amp;utm_adgroup=137260808579&amp;amp;utm_term=gartner&amp;amp;ad=603410086008&amp;amp;matchtype=e&amp;amp;gclid=EAIaIQobChMIgZP-m-O2_gIVFWxvBB1SsgtKEAAYASAAEgK74vD_BwE" rel="noopener" target="_blank"&gt;56% of full-time employees&lt;/a&gt; say having an ethnically, racially or culturally diverse workforce is very important to them – with Gen Z and Millennial employees valuing it more than Gen X and Boomers.&lt;/p&gt;

&lt;p&gt;Improving your digital employee experience efforts can also aid in DEI efforts by:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Building clearer connections to specific business outcomes.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Maximizing data-driven decision making.&lt;/li&gt;
	&lt;li&gt;Providing a consolidated view of DEI technology programs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Not only does DEX create environments where employees have a choice in how they work, it breaks barriers that’ve been&amp;nbsp;&lt;a href="https://www.diversityintech.co.uk/barriers-to-workplace-inclusion-and-diversity" rel="noopener" target="_blank"&gt;ingrained into traditional work settings&lt;/a&gt;&amp;nbsp;– paving the way for a more diverse and inclusive workplace.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;If you’d like to learn more about DEX, explore our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2734/f6efbc801083"&gt;eBook&lt;/a&gt;&amp;nbsp;and watch&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/a-step-by-step-guide-to-planning-and-measuring-digital-employee-experience-dex"&gt;our webinar&lt;/a&gt;&amp;nbsp;for a step-by-step outline.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 11 May 2023 09:00:00 Z</pubDate></item><item><guid isPermaLink="false">d2714ee7-b68c-4e8b-96bc-029102d4fb68</guid><link>https://www.ivanti.com/blog/the-role-of-dex-in-talent-retention</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>DEX</category><title>The Role of DEX in Talent Retention</title><description>&lt;h2&gt;Key takeaways&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The&lt;a href="/resources/v/doc/ivi/2663/8abb292d288f"&gt;&amp;nbsp;average knowledge worker&lt;/a&gt;&amp;nbsp;uses&amp;nbsp;&lt;strong&gt;2.6 devices&lt;/strong&gt;&amp;nbsp;to get their jobs done and runs into an average of&amp;nbsp;&lt;strong&gt;3.67 digital endpoint issues&lt;/strong&gt;&amp;nbsp;a day.&lt;/li&gt;
	&lt;li&gt;Research shows that&amp;nbsp;almost &lt;strong&gt;a third of employees quit a job&lt;/strong&gt;&amp;nbsp;within the first six months.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oak.com/blog/employee-retention/" rel="noopener" target="_blank"&gt;87% of HR professionals&lt;/a&gt;&amp;nbsp;say improving&amp;nbsp;retention rates are among their highest priorities&amp;nbsp;in the next five years.&lt;/li&gt;
	&lt;li&gt;Thanks to digital burnouts and better job opportunities,&amp;nbsp;&lt;a href="https://legaljobs.io/blog/employee-retention-statistics" rel="noopener" target="_blank"&gt;20% of HR professionals&lt;/a&gt;&amp;nbsp;are expecting a&amp;nbsp;&lt;strong&gt;decrease in employee retention rates&lt;/strong&gt;, based on current trends at their organization.&lt;/li&gt;
	&lt;li&gt;By providing the right tools for their employees, organizations can&amp;nbsp;&lt;strong&gt;increase talent retention&lt;/strong&gt;&amp;nbsp;and reduce the risks of work-related stress and digital burnouts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Download the&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;Digital Employee Experience Report&lt;/a&gt;&amp;nbsp;and explore research results.&lt;/p&gt;

&lt;p&gt;Recruiting talent to your organization is one thing, keeping said talent is a different beast.&amp;nbsp;&lt;a href="https://www.ivanti.com"&gt;Everywhere Work&lt;/a&gt; has given the workforce an increased sense of power in choosing where and how they work.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;As a result, retaining employees has become a challenge for organizations. Research has shown that&amp;nbsp;&lt;a href="https://www.linkedin.com/pulse/why-your-employees-leaving-first-six-months-amber-hurdle-cvacc-fca" rel="noopener" target="_blank"&gt;31% of employees quit a job within the first six months&lt;/a&gt;&amp;nbsp;and&amp;nbsp;France experienced&amp;nbsp;&lt;a href="https://tradingeconomics.com/france/turnover-in-services-eurostat-data.html" rel="noopener" target="_blank"&gt;record-high turnover&lt;/a&gt;&amp;nbsp;in 2021, with a rate of 24.20%. This massive employee shift, sometimes called the “great resignation”, is a worldwide phenomenon.&lt;/p&gt;

&lt;p&gt;Recent reports are showing:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.theaccessgroup.com/en-au/blog/hcm-the-great-resignation-australia/" rel="noopener" target="_blank"&gt;38% of Australian workers&lt;/a&gt;&amp;nbsp;intend to leave their current employer during the next 12 months.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The US saw&amp;nbsp;&lt;a href="https://workforce.com/news/7-statistics-on-employee-turnover-in-2022-every-hr-manager-should-be-aware-of" rel="noopener" target="_blank"&gt;5.9 million total separations&lt;/a&gt;&amp;nbsp;in July 2022 – 20% higher than pre-pandemic levels.&lt;/li&gt;
	&lt;li&gt;The Netherlands had&amp;nbsp;&lt;a href="https://lepaya.com/en/the-great-resignation-europe-2023/#why-europeans-quit" rel="noopener" target="_blank"&gt;1.9 million people start a new job&lt;/a&gt;&amp;nbsp;at the beginning of 2022&amp;nbsp;– 400,000 more than at the same time in 2021.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://web.jobvite.com/rs/328-BQS-080/images/2022-12-2022JobSeekerNationReport.pdf" rel="noopener" target="_blank"&gt;45% of US employees&lt;/a&gt;&amp;nbsp;are currently looking for a better position elsewhere.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Knowledge workers’ expectations have changed in the age of Everywhere Work; especially when it comes to the technology they use day-to-day. The average employee now uses&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2663/8abb292d288f"&gt;2.6 devices&lt;/a&gt;&amp;nbsp;to get their job done and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;49%&amp;nbsp;of employees&lt;/a&gt;&amp;nbsp;are frustrated with their current tools – with&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;26%&lt;/a&gt;&amp;nbsp;even contemplating leaving their job partly because of it.&lt;/p&gt;

&lt;p&gt;Therefore, a proper investment in your Digital Employee Experience (DEX) process and tools can help you both recruit and keep talent, as well as align them with the goals of your organization.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;The value of DEX across your organization&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Talent retention has become a topic no organization can escape. An overwhelming&amp;nbsp;&lt;a href="https://www.oak.com/blog/employee-retention/" rel="noopener" target="_blank"&gt;87% of HR experts&lt;/a&gt; consider improving retention rates to be among their highest priorities in the next five years.&lt;/p&gt;

&lt;p&gt;“&lt;em&gt;I think&amp;nbsp;‘Attracts and retains talent’&amp;nbsp;has an edge at the moment since good employees are hard to come by in the current job market!&lt;/em&gt;”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;- &lt;span&gt;Mick Verbunt,&amp;nbsp;System Engineer / Workspace Engineer,&amp;nbsp;ACA IT Solutionsty&amp;nbsp;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Over the past few years, businesses have reassessed embracing user-centric approaches to IT. In particular, the “modern management theory” postulates that job satisfaction predicates workforce productivity, rather than financial compensation. Applying this principle to the present day, the use of IT requires digital technology to &lt;a href="https://rs.ivanti.com/reports/ema-modern-itam-in-the-modern-workplace-2022.pdf"&gt;serve the workers&lt;/a&gt;, rather than the other way around.&lt;/p&gt;

&lt;p&gt;Today, the type and usability of the technology businesses offer to employees are chief factors for attracting and retaining a talented workforce. According to research,&amp;nbsp;41%&amp;nbsp;of businesses&amp;nbsp;reported they had &lt;strong&gt;lost IT workers&lt;/strong&gt; because they were unhappy with having to perform excessive workloads.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Rather than focusing on delivering “user-centric” technology that solely targets the goal of making workers productive, modern management approaches address the broader objective&amp;nbsp;of enhancing employee experiences to elevate both productivity and job&amp;nbsp;satisfaction.&lt;/p&gt;

&lt;h3&gt;Deter digital burnouts&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Everywhere Work hasn’t been just a bed of roses.&amp;nbsp;It has created an always-on environment where workers can’t “plug out.” Unrestricted access to the internet and their work devices has caused a spike in&amp;nbsp;&lt;a href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/reliably-connecting-the-workforce-of-the-future-which-is-now" rel="noopener" target="_blank"&gt;digital burnouts&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Digital burnouts, a contributing factor to mental health conditions like depression and anxiety, are costing UK organizations over&amp;nbsp;&lt;a href="https://www.hse.gov.uk/statistics/causdis/stress.pdf" rel="noopener" target="_blank"&gt;15 million days of lost work&lt;/a&gt;. HR professionals estimate up to&amp;nbsp;&lt;a href="https://legaljobs.io/blog/employee-retention-statistics" rel="noopener" target="_blank"&gt;50% of their annual turnover&lt;/a&gt;&amp;nbsp;is caused by digital burnouts. In fact, 20% of organizations are&amp;nbsp;&lt;a href="https://www.oak.com/blog/employee-retention/" rel="noopener" target="_blank"&gt;predicting a decrease in talent retention&lt;/a&gt;&amp;nbsp;based on current trends.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When workers experience digital burnout, they find themselves &lt;strong&gt;disengaged from the goals&lt;/strong&gt; of their organization. That’s further confirmed by research saying&amp;nbsp;only&amp;nbsp;&lt;a href="https://hbr.org/2019/11/why-are-we-here" rel="noopener" target="_blank"&gt;28% of employees&lt;/a&gt;&amp;nbsp;feel connected to their company's mission.&lt;/p&gt;

&lt;p&gt;By providing the right tools for their employees, organizations can be proactive in &lt;strong&gt;reducing work-related stress and digital burnouts&lt;/strong&gt;, leading to a more engaged and invigorated workforce. When workers feel more in line with their organization’s goals, productivity will increase.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What value do higher retention rates have?&lt;/h2&gt;

&lt;p&gt;Employees bring the most value to an organization when they’re energized, motivated and willing to take on challenges and strategic projects. None of that can start without a great relationship with their devices and tools. And workers are vocal about it –&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;our&amp;nbsp;survey on digital employee experience&lt;/a&gt;&amp;nbsp;found that&amp;nbsp;65% of employees and 71% of IT professionals said they could be &lt;strong&gt;more productive&lt;/strong&gt; if they had different tools.&lt;/p&gt;

&lt;p&gt;There are also financial factors to consider. It’s estimated that low retention rates will cost the US economy $430 billion in lost revenue by 2030 and replacing a trained employee can exceed their salary by&amp;nbsp;&lt;a href="https://www.enrich.org/blog/The-true-cost-of-employee-turnover-financial-wellness-enrich" rel="noopener" target="_blank"&gt;up to 200%&lt;/a&gt;. In the UK, work-related stress is costing organizations&amp;nbsp;&lt;a href="https://www.hse.gov.uk/statistics/causdis/stress.pdf" rel="noopener" target="_blank"&gt;over&amp;nbsp;£5 billion annually&lt;/a&gt;.&amp;nbsp;Improving your retention rates, through the correct investment in DEX, can maximize a company's profits&amp;nbsp;&lt;a href="https://legaljobs.io/blog/employee-retention-statistics" rel="noopener" target="_blank"&gt;up to four times&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“Between&amp;nbsp;reducing risk and retaining our healthcare talent, we believe improving the DEX of our employees is very important for our business.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;- Robert Garza,&amp;nbsp;Systems Architect,&amp;nbsp;University Health System&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Investing in DEX is no longer a question of “if” or “when”. The toll digital burnouts are taking on your teams are now clearly impacting organizations’ ability to attract and retain talent. Empower your teams with great tools that drive productivity and employee engagement.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Learn more about which areas to focus on first in our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2734/f6efbc801083"&gt;Getting started with DEX&amp;nbsp;eBook&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 04 Apr 2023 17:04:26 Z</pubDate></item><item><guid isPermaLink="false">c564c25f-b00f-4a59-9dbd-21ac4ba381d4</guid><link>https://www.ivanti.com/blog/hounded-by-cyber-security</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>Security</category><title>Hounded by Cyber Security?</title><description>&lt;h2&gt;On This Day&lt;/h2&gt;

&lt;p&gt;One of these latter moments happened during a recent weekend on a longer walk. Social media popped up to notify me that a decade ago I had posted reminding my social connections of the importance of patching (yes, I really am that interesting).&lt;/p&gt;

&lt;p&gt;I recalled that I had been involved in a Sasser worm clean-up for a client of the company I worked for at the time. As I’m sure many reading this post will remember, Sasser was a self-propagating virus that could tear through unpatched Windows XP/2000 networks at lightning pace and cause frequent crashes and reboots.&lt;/p&gt;

&lt;p&gt;Whilst my task of patching and securing the network on that day was unremarkable, it did occur to me both how much and how little some things have changed from a cyber security perspective over the last decade.&lt;/p&gt;

&lt;h2&gt;The Need to Patch&lt;/h2&gt;

&lt;p&gt;Even back in 2008, there was a consensus that patching was an important security prerequisite. It still is today. In fact, on their list of &lt;a href="https://www.cisecurity.org/controls" target="_blank" rel="noopener"&gt;top 20 cyber security controls&lt;/a&gt;, the Center for Internet Security places &lt;a href="https://www.cisecurity.org/controlscontinuous-vulnerability-management/" target="_blank" rel="noopener"&gt;Continuous Vulnerability Management&lt;/a&gt; (which includes patching) as the third most important thing you can do to secure your network after hardware and software asset discovery and control.&lt;/p&gt;

&lt;p&gt;Yet, according to &lt;a href="https://www.forrester.com/report/The-Forrester-Wave-Vulnerability-Risk-Management-Q1-2018/RES141053" target="_blank" rel="noopener"&gt;Forrester Research&lt;/a&gt;, in 2017 an estimated 24 percent of enterprises suffered at least one breach due to vulnerability exploits. And according to &lt;a href="https://www.gartner.com/smarterwithgartner/focus-on-the-biggest-security-threats-not-the-most-publicized" target="_blank" rel="noopener"&gt;Gartner&lt;/a&gt;, 99 percent of the vulnerabilities exploited at the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident&lt;/p&gt;

&lt;p&gt;Many of Ivanti’s customers use one of our market-leading &lt;a href="https://www.ivanti.com/network-security" target="_blank" rel="noopener"&gt;patch products&lt;/a&gt;, which can help automate the patching of a vast array of applications and components across various operating systems. Concerning zero-day exploits, the research time from discovery to exploit is &lt;a href="https://securityintelligence.com/news/zero-day-research-time-from-discovery-to-exploit-shrinks-to-four-days/" target="_blank" rel="noopener"&gt;ever falling&lt;/a&gt;, which makes it more important than ever to have a robust vulnerability management program.&lt;/p&gt;

&lt;h2&gt;What Has Changed?&lt;/h2&gt;

&lt;p&gt;The cyber threat landscape has evolved dramatically over the last few years. This is due in part to increased opportunity and accessibility for nefarious threat actors. More and more of us are conducting business, finance, and leisure online across an ever-increasing array of devices and mediums. The demarcation point between home and work for many has all but gone, and the consumerisation of IT has ‘happened.’&lt;/p&gt;

&lt;p&gt;Antivirus solutions, once hailed as the holy grail of cyber security, are still undeniably important. However, in 2018, they are not prioritised at the top of the Center for Internet Security (CIS) cyber security controls.&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;em&gt;&lt;img alt="Free Whitepaper: What to do BEFORE all hell breaks loose" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/hell.breaks.loose.400267.jpg"&gt;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Malware creation frameworks have been commercialised, making powerful cyber weaponry available to organised criminals, which at one time would only have been the domain of hacktivists, nation states, or ‘script kiddies’ (the latter I can thank for my fight with the Sasser worm all those years ago).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Nation state-sponsored cyber-attacks are also no longer the realm of science fiction, with two such alleged attacks making news headlines just recently.&lt;/p&gt;

&lt;p&gt;Defence-in-depth is hailed as the most effective cyber security strategy available today, with no point solution offering complete protection from the diverse and sophisticated threats faced in today’s world. It’s defense-in-depth with a solid strategy—layered defences that experts have prioritized as those most likely to protect against modern cyber-attacks.&lt;/p&gt;

&lt;p&gt;This is a strategy that resonates strongly with us here at Ivanti. As well as the patch solutions mentioned above, we offer a strong &lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them" target="_blank"&gt;portfolio of security solutions&lt;/a&gt; that work in concert to contribute to a robust cyber security posture.&lt;/p&gt;

&lt;h2&gt;The Next 10 Years&lt;/h2&gt;

&lt;p&gt;The next decade is likely to be an extremely eventful time in the cyber security space, with emerging technologies like blockchain, IoT, AI, 5G, and quantum computing (to name a few) providing a hint of the future challenges. That said, you can bet that Ivanti will continue to innovate at the bleeding edge to keep our customers secure and the world moving.&lt;/p&gt;

&lt;p&gt;Here’s to the next 10 years.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Robin Rowe is a product manager at Ivanti focusing on security and cloud solutions. Based in the UK, Robin has also worked as a senior solutions engineer, data center project engineer, senior consultant, and customer support engineer. &lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 22 Oct 2018 22:17:21 Z</pubDate></item><item><guid isPermaLink="false">6795a1ef-4792-41af-b7ad-ac6a87a5aada</guid><link>https://www.ivanti.com/blog/cybersecurity-in-a-consumer-iot-world-why-should-i-be-worried</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>Security</category><title>Cybersecurity in a Consumer IoT World: Why Should I Be Worried?</title><description>&lt;p&gt;I’m a self-confessed geek and early adopter of new tech (when I can convince my long-suffering wife of its merits). Home automation has been something of a recent hobby.&lt;/p&gt;

&lt;p&gt;When cooking, I can set a timer with my voice. When the countdown elapses, it triggers an audible alarm and the Wi-Fi light bulbs in my house will flash. If I fail to notice these, at some point the smart smoke alarms will send a notification to my smart watch to indicate that my dinner is on fire. I can then invoke plan B and order takeaway using my voice via my digital assistant.&lt;/p&gt;

&lt;h2&gt;Smart Devices – A Global Trend&lt;/h2&gt;

&lt;p&gt;Most folks I speak to (even outside the tech industry) have some form of smart devices in their home, whether it’s to stream or watch media, to keep an eye on their pets and property, or a wearable such as a smart watch.&lt;/p&gt;

&lt;p&gt;Statistics show this is a global trend. In fact, within the next year the number of &lt;em&gt;consumer&lt;/em&gt;-connected Internet of Things (IoT) devices is predicted to overtake the human population, currently at circa seven billion. By 2020, Gartner predicts the number of consumer IoT devices will have nearly doubled to almost 13 billion devices. &lt;a href="https://www.zdnet.com/article/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time/" target="_blank" rel="noopener"&gt;See ZDNet article&lt;/a&gt;. Gartner also predicts that in the same timeframe, IoT will be in 95% of new electronic product design. &lt;a href="https://www.itpro.com/technology/artificial-intelligence-ai/368107/what-good-ai-cyber-security-software-looks-like/" target="_blank" rel="noopener"&gt;See: Is IoT security being regulated?&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Powering these devices are an array of sensors—microphones, cameras, GPS, accelerometers, health data, thermometers, and barometers to name a few. These are constantly gathering information from the environment to support their feature sets.&lt;/p&gt;

&lt;h2&gt;IoT Security Concerns&lt;/h2&gt;

&lt;p&gt;From a security perspective there are some obvious concerns:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Home networks don’t have the sophisticated firewalls and intrusion detection systems that enterprises generally have.&lt;/li&gt;
	&lt;li&gt;Consumers don’t always follow security best practices, such as changing default passwords.&lt;/li&gt;
	&lt;li&gt;IoT devices often have a rapid hardware lifecycle with little or no ongoing vulnerability mitigation provided by the vendor.&lt;/li&gt;
	&lt;li&gt;Consumers may have an assumption that security will be dealt with by the vendor.&lt;/li&gt;
	&lt;li&gt;Some IoT devices require manual patching, which many users will not do. (If it’s not broken, why fix it?)&lt;/li&gt;
	&lt;li&gt;Devices like webcams can require routing rules set up to allow access from the internet, which makes these devices a particularly easy target.&lt;/li&gt;
	&lt;li&gt;Teleworkers may use their home broadband/network, which may contain vulnerable or compromised IoT devices that could be an attack vector.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There have already been some high-profile IoT vulnerabilities disclosed or exploited, such as the &lt;a href="https://en.wikipedia.org/wiki/Mirai_(malware)" target="_blank" rel="noopener"&gt;Mirai botnet&lt;/a&gt; and this rather alarming &lt;a href="https://www.kaspersky.com/blog/blackhat-jeep-cherokee-hack-explained/9493/" target="_blank" rel="noopener"&gt;automotive hack&lt;/a&gt; amongst others, but it’s likely these are just the tip of the iceberg.&lt;/p&gt;

&lt;p&gt;IoT devices are designed and manufactured by a broad spectrum of vendors, ranging from the tiny crowd-funded startups through billion-dollar ‘unicorns’ to established enterprises. There are some 3,000 companies in the IoT space in North America alone. &lt;a href="https://www.forbes.com/sites/johnkoetsier/2017/07/10/iot-in-the-usa-3000-companies-125b-in-funding-613b-in-valuation-342000-employees/#4c76e4b43ef5" target="_blank" rel="noopener"&gt;See Forbes article&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Security’s Varying Role&lt;/h2&gt;

&lt;p&gt;Security is likely to play a varying role across the spectrum of vendors, with new startups often needing to cut corners to get to market. Gartner predicts that by 2022, half of IoT security budget will be spent reactively (remediating faults and product recalls) rather than on proactive protections.&lt;/p&gt;

&lt;p&gt;On the brighter side, there are steps underway toward implementing regulatory policy to define a minimum level of security for IoT devices. Of course, the big challenge will be achieving worldwide adoption and enforcement.&lt;/p&gt;

&lt;p&gt;So what can we do in the meantime? Microsoft cited some &lt;a href="https://www.microsoft.com/en-us/industry?rtc=1" target="_blank" rel="noopener"&gt;cyber security statistics&lt;/a&gt; earlier this year that make for interesting reading. In particular, the following are very relevant to IoT:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Eighty-one percent of security incidents are caused by credential theft.&lt;/li&gt;
	&lt;li&gt;Seventy-three percent of users use password duplicates.&lt;/li&gt;
	&lt;li&gt;Ninety percent of login requests are from credential stuffing attacks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some basic approaches that can help are adopting a &lt;a href="https://www.nist.gov/blogs/taking-measure/easy-ways-build-better-p5w0rd" target="_blank" rel="noopener"&gt;good password policy&lt;/a&gt; (at the very least, ensure you do not re-use passwords across different systems) and being generally risk aware.&lt;/p&gt;

&lt;p&gt;It’s also important to keep devices up-to-date with any available security updates supplied by the IoT vendor. It’s worth noting that not all IoT devices can be patched, and for those that are patchable, it can be very difficult and requires technical knowledge to apply the update.&lt;/p&gt;

&lt;p&gt;Finally, make sure your friends, family, and colleagues are aware of the potential security risks around IoT devices and encourage them to use good &lt;a href="https://iotuk.org.uk/cyber-hygiene-infographic/" target="_blank" rel="noopener"&gt;cyber hygiene practices&lt;/a&gt; to minimize their chances of becoming a victim of cyber-crime.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Robin Rowe is a product manager at Ivanti focusing on security and cloud solutions. Based in the UK, Robin has also worked as a senior solutions engineer, data center project engineer, senior consultant, and customer support engineer. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/library?eol=rl" target="_blank"&gt;&lt;img alt="National Cybersecurity Month: How to be Prepared" src="https://static.ivanti.com/sites/marketing/media/images/blog/2018/10/sm-copy-of-cybersec-month_ppc-bnr-1200x628.jpg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Tue, 02 Oct 2018 23:11:00 Z</pubDate></item><item><guid isPermaLink="false">8ff26084-281c-4272-ba02-727e961eaeb5</guid><link>https://www.ivanti.com/blog/kick-logon-issues-to-the-kerberos-how-to-get-smart-with-your-datanow-authentication</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>Kick Logon issues to the Kerb(eros). How to get ‘smart’ with your DataNow authentication</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img class="alignleft size-full wp-image-12845" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/03/2016_03_datanow-authentication-01-01.png" alt="2016_03_DataNow Authentication-01-01"&gt;&lt;/p&gt;
&lt;p&gt;Smart card authentication is becoming increasingly popular in the Enterprise. This is mainly due to the increased security and user convenience they offer. They do require special consideration for software packages that leverage single sign-on (SSO) technology.&lt;/p&gt;
&lt;p&gt;AppSense DataNow is no exception to this. The good news is that we support Kerberos single sign-on for the Windows client. In this blog, I’ll run through the considerations and configuration required for Kerberos support, so by the end you’ll be an SSO pro.&lt;/p&gt;
&lt;p&gt;The first step is to choose which scenario(s) match your organisation’s requirements&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;NTLM SSO – Users log on to Windows with a Username and Password - In this mode, the DataNow Windows client will sign in silently at Windows logon from any internet enabled location. No additional appliance or infrastructure prerequisites required to support this mode. (note: this mode does not support smart-card logon) This is the recommended mode for most environments due to the lower complexity&lt;/li&gt;
&lt;li&gt;Kerberos SSO – Users log on to Windows with a Username and Password and / or a with a Smart card. In this mode, the DataNow Windows client will sign in silently at windows logon from endpoints with internal network connectivity (ie. On the internal network, or connected by a VPN tunnel so they can acquire their Kerberos ticket granting ticket from the domain controller)&lt;/li&gt;
&lt;li&gt;Mixed environment – Some smart-card enabled endpoints and some traditional password configured endpoints. DataNow supports logins from both types, but you need to specify the SSO type as part of the client configuration.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;If you read my previous blog,&amp;nbsp;you’ll have a good grasp of the requisite steps for the client side configuration from an SSO standpoint.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Kerberos Prerequisites&lt;br&gt;
&lt;/strong&gt;If you’re planning to use Kerberos SSO there are some additional steps required&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The creation of an Active Directory ‘Pre-authentication’ account. This facilitates the following:&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;The acquisition of the Kerberos Keytab from a user account so that the server can trust the authorised user to access it&lt;/li&gt;
&lt;li&gt;Pre-authentication checks&lt;/li&gt;
&lt;li&gt;The determination of the ‘Service Principal’ used to access the DataNow appliance (As part of the ticket granting process)&lt;/li&gt;
&lt;li&gt;The re-use of service tickets sent to the platform so that the service can access data on the user’s behalf via Kerberos Constrained Delegation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This user account should be a standard (non-administrative) account with minimal privileges. The account should be secured with a complex password, and we recommend that to avoid platform reconfiguration with new credentials, that the password be configured to not expire (this is not a strict requirement however)&lt;/p&gt;
&lt;ol start="2"&gt;
&lt;li&gt;Ensure that DataNow has a valid DNS A record configured, and used by the connecting DataNow clients, eg datanow.mycompany.com&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="3"&gt;
&lt;li&gt;Ensure a reverse DNS (PTR) record and corresponding A record are present for any File servers servicing map points (these should be defined in the DataNow admin console as FQDN as opposed to via IP address)&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="4"&gt;
&lt;li&gt;Ensure that TCP/UDP 123 is open from the DataNow appliance to the Internet (this is used by Network Time protocol (NTP) to synchronise the appliance clock with an accurate time source which is an important Kerberos prerequisite. You should also check that your domain controller / file server and endpoint clocks are accurate. Chances are that if you’re already using smart cards, these should be fine.&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="5"&gt;
&lt;li&gt;From a domain controller, with administrative credentials run the following command:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;[code]setspn –S http/dn.mycompany.com dnpreauth[/code]&lt;/p&gt;
&lt;p&gt;Where dn.mycompany.com is the FQDN of your DataNow appliance as used by your clients and ‘dnpreauth’ is the name of your AD pre-authentication account created above.&lt;/p&gt;
&lt;p&gt;This allows the Kerberos Ticket Granting server within AD to locate the key information associated with the user account and allow a token to be returned to the Windows client on the endpoints which are then used to access the DataNow appliance(s).&lt;/p&gt;
&lt;p&gt;Following this step, an extra tab called ‘delegation’ will appear in the properties dialogue of the pre-authentication user account in Active Directory.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignleft size-full wp-image-12837" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/03/active-directory.png" alt="active directory"&gt;&lt;/p&gt;
&lt;ol start="6"&gt;
&lt;li&gt;Navigate to this tab, and select ‘Trust this user for delegation to any service (Kerberos only)’&lt;br&gt;
This ensures that the DataNow appliance has authorisation to utilise the Kerberos ticket forwarded to it by the DataNow client or web browser so that it can reuse the user identity to access file service resources.&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="7"&gt;
&lt;li&gt;The next step is to move on to the configuration of the DataNow Appliance(s). To do this you firstly need to log on to a DataNow appliance admin console at https://dn.mycompany.com:8443/config/kerberos&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="8"&gt;
&lt;li&gt;Enter the configuration details (This example is based on a single domain. In environments where users and network resources such as storage are in differing domains, these details will need to be added as required):
&lt;ul&gt;
&lt;li&gt;Pre-auth user and password (created in step 1)&lt;/li&gt;
&lt;li&gt;The realm name - usually the DNS name of the domain in upper case e.g.&amp;nbsp;MYCOMPANY.COM&lt;/li&gt;
&lt;li&gt;KDC - the FQDN of the Domain Key Distribution Centre (usually the same DNS name as the AD controller)(Note: if you are unsure of the KDC name try using&lt;br&gt;
nslookup _&lt;em&gt;_&lt;/em&gt;tcp.&amp;lt;domainFQDN&amp;gt;&lt;br&gt;
from a domain joined client to get the IP of the KDC, followed by&lt;br&gt;
ping -a &amp;lt;ip address&amp;gt;&lt;br&gt;
to get the canonical name of the KDC.)&lt;/li&gt;
&lt;li&gt;Default domain - the domain in lower case e.g.&amp;nbsp;mycompany.com&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;ol start="9"&gt;
&lt;li&gt;Click update, then save:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;img class="alignleft size-full wp-image-12838" src="https://static.ivanti.com/sites/marketing/media/images/blog/2016/03/dn-admin-console.png" alt="DN admin console"&gt;&lt;/p&gt;
&lt;ol start="10"&gt;
&lt;li&gt;To configure a domain-joined (and connected) Windows endpoint to use Kerberos SSO, use Environment Manager or Group Policy (with DataNow ADMX) to configure either:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Registry Key:&lt;/strong&gt; HKLM\Software\AppSense\DataNow&lt;br&gt;
&lt;strong&gt;Value Name:&lt;/strong&gt; EnableSSO&lt;br&gt;
&lt;strong&gt;Value Type:&lt;/strong&gt; Reg DWORD&lt;br&gt;
&lt;strong&gt;Value Data:&lt;/strong&gt; 2&lt;br&gt;
Or:&lt;br&gt;
&lt;strong&gt;Registry Key:&lt;/strong&gt; HKLM\Software\Policies\AppSense\DataNow&lt;br&gt;
&lt;strong&gt;Value Name:&lt;/strong&gt; EnableSSO&lt;br&gt;
&lt;strong&gt;Value Type:&lt;/strong&gt; Reg DWORD&lt;br&gt;
&lt;strong&gt;Value Data:&lt;/strong&gt; 2&lt;/p&gt;
&lt;p&gt;Once the other pre-requisite settings have been applied you should be able to reboot the client endpoint and then see DataNow automatically log in with Kerberos SSO!&lt;/p&gt;

&lt;p&gt;I hope this blog has been insightful – Please do not hesitate to comment below if you have any questions or feedback.&lt;/p&gt;</description><pubDate>Mon, 07 Mar 2016 06:00:38 Z</pubDate></item><item><guid isPermaLink="false">fa188ebe-05fa-43d3-8298-b4b68c23bd7b</guid><link>https://www.ivanti.com/blog/datanow-electing-to-exclude</link><atom:author><atom:name>Robin Rowe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/robin-rowe</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><category>Supply Chain</category><title>DataNow- Electing to Exclude</title><description>&lt;p&gt;&lt;strong&gt;&lt;em&gt;*This post originally appeared on the AppSense blog prior to the &lt;a href="https://www.ivanti.com/company/press-releases/2017/landesk-and-heat-are-now-ivanti" target="_blank"&gt;&lt;span class="s2"&gt;rebrand in January 2017&lt;/span&gt;&lt;/a&gt;, when AppSense, LANDESK, Shavlik, Wavelink, and HEAT Software merged under the new name Ivanti.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2015/02/blog_banners_main-page1.png" target="_blank" rel="noopener"&gt;&lt;img class=" size-full wp-image-11391 alignleft" src="https://static.ivanti.com/sites/marketing/media/images/blog/2015/02/blog_banners_main-page1.png" alt="Blog_Banners_main-page[1]"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Today I’d like to talk about a couple of new, powerful features introduced in the DataNow 3.5 Windows client that&amp;nbsp;offers administrative control over what data is allowed to sync (exclusions) and what data is excluded from being populated automatically in a user’s cache by default in automatic map points (electives).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Exclusions-&amp;nbsp;&lt;/strong&gt;Why would you want to exclude data from being synced? A common use case of DataNow is to provide users with seamless offline access to their data from multiple platforms, and to ensure that any locally created data is automatically synced with the copy on the organization’s file servers. One&amp;nbsp;way of doing this is to redirect the Windows user profile folders into the local DataNow cache.&lt;/p&gt;
&lt;p&gt;This is great from the user’s perspective, since they can continue working in a familiar way with their Desktop/Document folders, but inevitably there will be some content that either the administrator will not want to sync back to the server (a&amp;nbsp;user’s music or film library for example) or is backed up via another method (Outlook OST files for example). Some other file types, like in-use database files just don’t support being replicated by any file level sync product.&lt;/p&gt;
&lt;p&gt;Earlier versions of DataNow 3.5 supported path/extension based exclusions for uploading files/folders.&lt;/p&gt;
&lt;p&gt;DataNow 3.5 introduces advanced bi-directional client-side conditional exclusions based on regular expressions with new criteria that can be evaluated by type, age, size and path.&lt;/p&gt;
&lt;p&gt;Let’s look at how it works.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DataNow 3.5 Exclusion Registry Keys&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;DataNow exclusions are controlled via four, new registry keys:&lt;/p&gt;
&lt;h4&gt;HKCU\Software\AppSense\DataNow\FilePolicy\Exclusions&lt;/h4&gt;
&lt;h4&gt;HKCU\Software\AppSense\DataNow\FilePolicy\ExclusionOverrides&lt;/h4&gt;
&lt;h4&gt;HKCU\Software\AppSense\DataNow\DeltaPolicy\Exclusions&lt;/h4&gt;
&lt;h4&gt;HKCU\Software\AppSense\DataNow\DeltaPolicy\ExclusionOverrides&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;FilePolicy&lt;/strong&gt; is concerned with file sync exclusions (and electives covered later in this post)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DeltaPolicy&lt;/strong&gt; allows you to control which file types are excluded from ‘delta sync’ where we only sync portions of the file that changed.&lt;/p&gt;
&lt;p&gt;We can build exclusion expressions based on combinations of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;File &amp;amp; Folder Paths&lt;/li&gt;
&lt;li&gt;File Extension&lt;/li&gt;
&lt;li&gt;File Age&lt;/li&gt;
&lt;li&gt;File Size&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;By default, DataNow excludes certain temporary files from syncing to and from the server. For reference these are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Files with the extension tmp, lnk, partial, crdownload, part and download&lt;/li&gt;
&lt;li&gt;Office backup files starting with ~$&lt;/li&gt;
&lt;li&gt;Excel temporary files&lt;/li&gt;
&lt;li&gt;Open Office temporary files&lt;/li&gt;
&lt;li&gt;The Recycle Bin&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;When any custom exclusion is defined in the registry, the implicit default exclusions are ignored (allowing for customization of this list if required). I’d recommend re-adding these with the following expression:&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;(Ext In [tmp lnk partial crdownload part download]) OR (Name == /~\\$.*/) OR (Name == /[0-9A-F]{8,8}/) OR (Name == /\\.~lock.*#?/) OR (Name == /.*~/) OR (Path == /\\$Recycle.Bin$/)&lt;/h2&gt;
&lt;p&gt;This expression is added as a registry string value with an arbitrary name under the&lt;/p&gt;
&lt;h2&gt;HKCU\Software\AppSense\DataNow\FilePolicy\Exclusions&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://static.ivanti.com/sites/marketing/media/images/blog/2015/03/blogexclusions.png" target="_blank" rel="noopener"&gt;&lt;img class="alignnone wp-image-11515" src="https://static.ivanti.com/sites/marketing/media/images/blog/2015/03/blogexclusions.png" alt="blogexclusions"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Example-&amp;nbsp;&lt;/strong&gt;To demonstrate the power of the new rule based exclusion expressions, take the following example, where you want to configure DataNow so that it will &lt;strong&gt;only sync files that are younger than 1 year AND under 100MB but NOT Word or excel files &lt;/strong&gt;(these can sync regardless of size / age).&lt;/p&gt;
&lt;p&gt;First configure the exclusion:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registry Key: &lt;/strong&gt;HKCU\Software\AppSense\DataNow\FilePolicy\Exclusions&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Type:&lt;/strong&gt; REG_SZ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Name: &lt;/strong&gt;(arbitrary)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Data: &lt;/strong&gt;Age &amp;gt; 1Y And Size &amp;gt; 100Mb"&lt;/p&gt;
&lt;p&gt;This puts a blanket, bi-directional sync exclusion on files matching both of the above criteria (you could use the OR statement if you wanted to block either).&lt;/p&gt;
&lt;p&gt;You can use the Exclusion Overrides key to add exceptions to all configured rules (these are evaluated last).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registry Key: &lt;/strong&gt;HKCU\Software\AppSense\DataNow\FilePolicy\ExclusionOverrides&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Type: &lt;/strong&gt;REG_SZ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Name: &lt;/strong&gt;(arbitrary)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Data: &lt;/strong&gt;Ext In [doc docx xls xlsx]&lt;/p&gt;
&lt;p&gt;Files not modified in over a year will not be uploaded to the server. Files not modified in over a year present on the server, but not present locally, will not appear in listings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Important note-&amp;nbsp;&lt;/strong&gt;One of the key challenges faced when applying exclusions to existing data, is how to address the relationship between the server and client side data once the exclusion is applied. We handle it as follows.&lt;/p&gt;
&lt;p&gt;By default, if an exclusion is applied that matches in-sync data, we will ignore the exclusion for that data and continue to sync changes, invoked locally or out-of-band. If new content is created that matches the exclusion filter, then the exclusion will be applied.&lt;/p&gt;
&lt;p&gt;If it is desired to override this behaviour and prevent any further sync activities with defined exclusions, there is a mechanism provided to allow this via the ‘insync’ property. This returns ‘true’ or ‘false’ depending on the sync state of the file, which is tracked in the local ADS metadata.&lt;/p&gt;
&lt;p&gt;Great, so how do I do this?&lt;/p&gt;
&lt;p&gt;The easiest way is to use an exclusion override that duplicates the exclusion rule and additionally adds the ‘insync’ flag and a ‘not’ statement.&lt;/p&gt;
&lt;p&gt;E.g. if you had an existing exclusion defined to exclude .ISO files and .EXE files and wanted this exclusion to apply to existing data, you could add the following exclusion override:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registry Key: &lt;/strong&gt;HKCU\Software\AppSense\DataNow\FilePolicy\ExclusionOverrides&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Type: &lt;/strong&gt;REG_SZ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Name: &lt;/strong&gt;(arbitrary)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Data: insync and not &lt;/strong&gt;Ext In [exe iso]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Electives-&lt;/strong&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;To set the scene, in DataNow we have ‘automatic’ and ‘manual’ sync policies admins can apply to map points.&lt;/p&gt;
&lt;p&gt;In the case of automatic map points, all content not matching an exclusion filter is synced between the map point and the local DataNow cache on the endpoint. Manual map points are not quite as straight forward. In this case, all locally created content syncs to the server and is ‘in-sync’ from that point forwards.&lt;/p&gt;
&lt;p&gt;Server-side content is represented locally by a ‘ghost’ file which doesn’t consume any local disk space, but allows the user to see and interact with the file in the same location. This is only downloaded to the user cache on the first access by the user or their application.&lt;/p&gt;
&lt;p&gt;Users always have flexibility and control over what content is stored in their local DataNow cache via the Explorer right-click menu option. Here they can opt to sync or unsync at any folder level in the map point hierarchy. This will in the case of selecting ‘sync’ subscribe to all content and sub-content, or in the case of ‘unsync’ revert local content to ‘ghost’ files.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;So where do electives fit in?-&amp;nbsp;&lt;/strong&gt;Electives are synonymous with ‘Automatic’ map points, and offer a way to administratively override content from being synced down to a user endpoint &lt;strong&gt;by default&lt;/strong&gt; on an automatic map point. The primary use-case envisaged is conservation of disk space on the endpoint and on-boarding bandwidth consumption by making file types the user is not expected to use download-on-demand.&lt;/p&gt;
&lt;p&gt;Electives are defined in a similar way to exclusions, and we offer the same degree of granularity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DataNow 3.5 Exclusion Registry Keys:&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;HKCU\Software\AppSense\DataNow\FilePolicy\Electives&lt;/h2&gt;
&lt;h2&gt;HKCU\Software\AppSense\DataNow\FilePolicy\ElectiveOverrides&lt;/h2&gt;
&lt;p&gt;As per exclusions, we can build elective expressions based on combinations of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;File &amp;amp; Folder Paths&lt;/li&gt;
&lt;li&gt;File Extension&lt;/li&gt;
&lt;li&gt;File Age&lt;/li&gt;
&lt;li&gt;File Size&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Here’s an example of setting an Elective policy you could apply to an endpoint so that an automatic map point will download everything to an endpoint except for .ISO or .EXE files that are over 500MB and older than a year, unless they’re in a specific folder (\ImportantISOs) in which case they will be downloaded automatically:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registry Key: &lt;/strong&gt;HKCU\Software\AppSense\DataNow\FilePolicy\Electives&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Type:&lt;/strong&gt; REG_SZ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Name: &lt;/strong&gt;(arbitrary)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Data: &lt;/strong&gt;Ext In [iso exe] And Size &amp;gt; 500Mb And Age &amp;gt; 1Y&lt;/p&gt;
&lt;p&gt;Here we’ve created a blanket elective rule to apply to all files with an extension of .iso or .exe&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Registry Key: &lt;/strong&gt;HKCU\Software\AppSense\DataNow\FilePolicy\ElectiveOverrides&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Type:&lt;/strong&gt; REG_SZ&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Name: &lt;/strong&gt;(arbitrary)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Value Data: &lt;/strong&gt;Path == /ImportantISOs\\.*\..*/&lt;/p&gt;
&lt;p&gt;I hope this blog provides some insight into these powerful, new features and how they can be used to sync the right data, keeping your end users happy and productive.&lt;/p&gt;</description><pubDate>Thu, 26 Mar 2015 14:55:32 Z</pubDate></item></channel></rss>