<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/steve-feldstein/rss" /><link>https://www.ivanti.com/blog/authors/steve-feldstein</link><item><guid isPermaLink="false">c451639f-7b24-46ea-ab52-732a7033ee38</guid><link>https://www.ivanti.com/blog/ivanti-protecto</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How to Safeguard Healthcare Data in ITSM: Ivanti and Protecto</title><description>&lt;p&gt;The healthcare sector, perhaps more than any other, needs to scrutinize the balance between data utility and data privacy. Healthcare organizations must manage large amounts of sensitive data while complying with stringent regulations such as the Health Insurance Portability and Accountability Act (HIPAA). For IT teams seeking to implement AI-augmented service management, that responsibility weighs heavily.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;A notable recent incident involved over four million customers affected by &lt;a href="https://therecord.media/healthcare-data-breaches-blue-shield-california" rel="noopener" target="_blank"&gt;a data breach at Blue Cross Blue Shield&lt;/a&gt;, where Google Analytics had been configured in a manner that allowed member data to be shared with Google Ads, likely including protected health information.&lt;/p&gt;

&lt;p&gt;Forward-looking IT leaders want to take advantage of advanced IT service management capabilities to improve operational efficiency, including emerging AI applications. But to avoid becoming the latest headline, they also need the highest standards of data protection. In this article, we’ll go into how Ivanti integrates with Protecto to do just that.&lt;/p&gt;

&lt;h2&gt;Where healthcare compliance and AI intersect&lt;/h2&gt;

&lt;p&gt;The myriad regulations that healthcare organizations must follow (HIPAA, GDPR, CCPA and others) are designed to protect patient data and ensure that it is handled securely and ethically. Data security and privacy are fundamental aspects of patient trust, and noncompliance can result in significant fines and legal actions.&lt;/p&gt;

&lt;p&gt;At the same time, AI and ML technologies require access to large datasets – data that may include sensitive information that is subject to these stringent requirements. To add another layer of complexity, healthcare organizations are often large and complex, with multiple departments and locations, which means any data privacy solutions need to be able to scale without compromising performance.&lt;/p&gt;

&lt;h2&gt;Healthcare requirements for ITSM&lt;/h2&gt;

&lt;p&gt;IT organizations that want to take advantage of advanced ITSM use cases without fear of compromising data privacy have specific requirements – requirements that the integration between Ivanti Neurons for ITSM and Protecto deliver.&lt;/p&gt;

&lt;h3&gt;Data masking&lt;/h3&gt;

&lt;p&gt;Intelligent data masking identifies and masks sensitive information such as PII and PHI. This lets AI agents operate on data without exposing sensitive elements, preventing data leaks and reducing misuse. Additionally, data masking ensures that the context and utility of the information remain intact, enabling effective analysis and decision-making.&lt;/p&gt;

&lt;h3&gt;Role-based access controls&lt;/h3&gt;

&lt;p&gt;Role-based access controls and policy-driven unmasking ensure data is only accessed by authorized users with appropriate roles. Only users with the necessary permissions can access or unmask sensitive data.&lt;/p&gt;

&lt;h3&gt;Audit trails&lt;/h3&gt;

&lt;p&gt;To comply with regulations, healthcare organizations need a comprehensive audit trail of how sensitive data is accessed, used and protected. Detailed logs simplify compliance workflows and support regulatory audits.&lt;/p&gt;

&lt;h3&gt;Seamless integration&lt;/h3&gt;

&lt;p&gt;Protecto integrates with Ivanti APIs, which allows existing processes to remain uninterrupted – and for IT teams to deliver the best possible service – adding a layer of protection without disrupting operations.&lt;/p&gt;

&lt;h3&gt;Scale&lt;/h3&gt;

&lt;p&gt;A single instance of Protecto can support over 3,000 tenants, safeguarding the data of millions of users. It can handle large-scale deployments while maintaining operational resilience, making it a reliable choice for AI initiatives.&lt;/p&gt;

&lt;h2&gt;Ivanti and Protecto’s partnership&lt;/h2&gt;

&lt;p&gt;The partnership between Ivanti and Protecto brings immense value to Ivanti customers in highly regulated sectors with heightened data privacy concerns.&lt;/p&gt;

&lt;p&gt;Already available features such as custom masking policies, on-premises and private cloud alternatives, and improved audit logs and reports ensure customers can meet compliance requirements with confidence.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our commitment to research and development in AI, machine learning and data protection mean customers will always be at the forefront of managing large-scale datasets.&lt;/li&gt;
	&lt;li&gt;Our work with healthcare organizations, regulatory bodies and technology partners helps customers put in place practical data protection solutions without compromising IT efficiency.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Combining Ivanti Neurons for ITSM with advanced data security and privacy features ensures that our customers’ ITSM operations are both efficient and compliant with the most stringent guidelines, whether they’re in the healthcare industry or any other highly regulated field.&lt;/p&gt;

&lt;h2&gt;Ivanti’s partner ecosystem&lt;/h2&gt;

&lt;p&gt;Ivanti works with a wide range of technology partners like Protecto to help customers make the most of their investment in Ivanti solutions. To learn more, visit the &lt;a href="https://marketplace.ivanti.com/xchange/64b5b48e2ee9d6e08c3e6724" target="_blank"&gt;Ivanti Partner Markeplace&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 02 Jun 2025 17:00:31 Z</pubDate></item><item><guid isPermaLink="false">9e6325d5-83df-4492-9534-37f2b0428a89</guid><link>https://www.ivanti.com/blog/improve-vendor-management</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>Grand Bank's Success Story: Enhancing Vendor Management with Ivanti's External Attack Surface Management Solution</title><description>&lt;p&gt;In today’s dynamic cybersecurity environment, effectively managing vendor relationships is crucial for protecting digital assets. According to &lt;a href="https://www.pwc.com/gx/en/issues/cybersecurity/global-digital-trust-insights-2022.html" rel="noopener" target="_blank"&gt;PwC’s 2022 Global Digital Trust Survey&lt;/a&gt;, 75% of executives reported that their organizations are overly complex, leading to concern about cyber and privacy risks.&lt;/p&gt;

&lt;p&gt;Grand Bank, a prominent financial institution, faced similar challenges in monitoring and mitigating risks with its vendors. To address this, they partnered with Latest Solutions to implement Ivanti’s External Attack Surface Management (EASM). This provided Grand Bank with improved visibility into vendor security, streamlined onboarding and improved their overall cybersecurity program.&lt;/p&gt;

&lt;h2&gt;Overcoming vendor security challenges&lt;/h2&gt;

&lt;p&gt;Maintaining strong vendor relationships is crucial for safeguarding an organization’s digital assets. Grand Bank encountered significant difficulties in securing its vendor ecosystem. The adoption of External Attack Surface Management (EASM) addresses the need to identify and mitigate risks linked to an organization’s extended digital environment, encompassing third-party vendors and partners.&lt;/p&gt;

&lt;p&gt;By deploying EASM solutions, companies can achieve enhanced visibility into their vendors’ external attack surfaces, thereby reducing overall cybersecurity risk and strengthening supply chain security.&lt;/p&gt;

&lt;p&gt;Before adopting Ivanti's EASM solution, Grand Bank carried out vulnerability assessments and penetration tests on their internal systems. "As we moved to the cloud, it became evident that this approach was necessary for our cloud assets and vendors as well. Evaluating vendor security proved especially difficult. We required a method to assess our vendors' security stance," said Robert Hanson, CTO of Grand Bank.&lt;/p&gt;

&lt;p&gt;The bank's previous vendor security procedures were outdated and inefficient, increasing the bank's vulnerability to security threats. Forrester highlights that EASM is crucial for thorough due diligence, especially during mergers and acquisitions, where uncovering hidden vendor assets is vital for assessing risk.&lt;/p&gt;

&lt;p&gt;To address these challenges, Grand Bank opted for Ivanti’s EASM solution. It offers an automated, comprehensive vendor management approach that continuously monitors vendors' attack surfaces, assesses and mitigates risks. With Ivanti's EASM, the bank has streamlined vendor onboarding and greatly enhanced &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt;. To further bolster their security measures, Grand Bank also engaged one of Ivanti’s strategic partners, Latest Solutions, to assist with the implementation.&lt;/p&gt;

&lt;h2&gt;The value of the latest solutions partnership&lt;/h2&gt;

&lt;p&gt;&lt;img alt="interactive easm display" src="https://static.ivanti.com/sites/marketing/media/images/blog/2024/12/content-image-01.jpg"&gt;&lt;/p&gt;

&lt;p&gt;2018, the collaboration between Grand Bank and Latest Solutions has been mutually beneficial. Combining their industry knowledge with Latest Solutions' cybersecurity expertise, the Grand Bank implemented Ivanti’s EASM solution to improve vendor security management. This partnership allows Grand Bank to continuously monitor and assess vendor risks, streamline onboarding, and mitigate third-party threats, thus strengthening its overall cybersecurity framework.&lt;/p&gt;

&lt;p&gt;Additionally, it helps Grand Bank comply with regulatory standards, protect sensitive data and maintain client trust. This partnership has notably improved Grand Bank's security and that of its vendors.&lt;/p&gt;

&lt;p&gt;Moreover, the continuous support and technical expertise provided by Latest Solutions has enabled Grand Bank to stay ahead in the rapidly evolving cybersecurity landscape. The collaboration ensures that Grand Bank remains resilient against emerging threats, thereby securing its operations and improving stakeholder confidence.&lt;/p&gt;

&lt;p&gt;The strategic alignment between the two organizations has fostered a proactive approach to cybersecurity, creating a robust and reliable vendor management system. This seamless cooperation has been exemplified through the effective implementation of Ivanti's EASM solution, as detailed in the following use case.&lt;/p&gt;

&lt;p&gt;"EASM is a pretty easy lift from a partner's perspective as a lot of the lift comes from the product itself in the background. Four hours and you're up and running...pulling data and it just gets more fine-tuned...it's basically doing something that would take a team to do for your organization," said Jared Carver, President of Latest Solutions.&lt;/p&gt;

&lt;h2&gt;Vendor management use case of Ivanti's EASM solution&lt;/h2&gt;

&lt;p&gt;Grand Bank's implementation of Ivanti's External Attack Surface Management (EASM) solution follows a multi-phased approach that has greatly improved their cybersecurity posture. Initially, Grand Bank used Ivanti EASM to assess its assets, uncovering unknown vulnerabilities and gaining a comprehensive overview of its security landscape. This self-evaluation serves as the foundation for a more robust and informed vendor management program.&lt;/p&gt;

&lt;p&gt;In the second phase, Grand Bank focused on evaluating the security posture of their existing vendors. By using Ivanti's EASM, they gained unprecedented visibility into their vendors' &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;attack surfaces, identifying potential risks and vulnerabilities&lt;/a&gt; that had previously remained undetected. This included insights from the dark web, providing a deeper understanding of exposure management and enabling Grand Bank to take proactive measures to mitigate potential threats.&lt;/p&gt;

&lt;p&gt;The ability to continuously monitor their vendors' security postures ensured that Grand Bank could swiftly address any issues, thereby fortifying their overall cybersecurity stance.&lt;/p&gt;

&lt;p&gt;The final phase involved integrating EASM into Grand Bank's pre-onboarding checks for potential vendors. This streamlined the vendor onboarding process, ensuring that only vendors meeting stringent security standards were brought on board. The continuous monitoring capabilities of EASM also facilitate efficient offboarding, reducing the risk of residual vulnerabilities from former vendors.&lt;/p&gt;

&lt;p&gt;This not only saved time and resources but also ensured compliance with industry regulations, a crucial aspect of GRC (Governance, Risk and Compliance).&lt;/p&gt;

&lt;p&gt;Robert Hanson explains their approach: "If I'm going to check my vendors, why don't I just check my vendors before I onboard those vendors? So now it's part of our TPRM (Third-Party Risk Management) process where we're redrafting our policy and procedures. As we're looking at bringing vendors on board to work with us, we're going to thoroughly assess them before granting approval. This proactive strategy sets the stage for using some of the advanced features that Ivanti’s EASM solution offers.”&lt;/p&gt;

&lt;h2&gt;Key features and benefits of Ivanti's EASM Solution&lt;/h2&gt;

&lt;p&gt;Ivanti's EASM solution has revolutionized the way organizations handle vendor management and cybersecurity. One of its most significant strengths is its ability to offer detailed recommendations for addressing vulnerabilities, making it particularly helpful for organizations with limited cybersecurity resources. This feature allows organizations to improve their vendor security without requiring additional personnel.&lt;/p&gt;

&lt;p&gt;Another advantage of Ivanti's EASM is its use of CVSS scores to prioritize and resolve security issues effectively. By providing a standardized method for assessing vulnerabilities, organizations can concentrate on the most urgent threats. This feature is crucial in optimizing resource allocation and ensuring prompt resolution of critical issues.&lt;/p&gt;

&lt;p&gt;According to Robert Hanson, “Ivanti's EASM reporting capabilities are regularly presented to the risk group and board, providing an overall picture of the bank's and its vendors' risks. It's a crucial solution in balancing the delivery of innovative products while safeguarding the bank's data and assets.”&lt;/p&gt;

&lt;p&gt;Furthermore, Ivanti's EASM solution promotes collaboration between organizations and their vendors to improve security. This approach streamlines the vendor onboarding process, thanks to continuous monitoring and actionable insights provided by the solution. This encourages vendors to understand their vulnerabilities and take proactive measures to mitigate risks.&lt;/p&gt;

&lt;p&gt;Jared Carver, President of Latest Solutions, notes that “Ivanti's EASM is effortless to implement from a partner's perspective, as most of the work is done by the product itself in the background. It eliminates the need for a dedicated team to manage these tasks for the organization.”&lt;/p&gt;

&lt;p&gt;Besides these features, Ivanti's EASM solution also ensures compliance with GRC guidelines. By offering comprehensive exposure management, the solution enables organizations to meet industry standards and regulations.&lt;/p&gt;

&lt;p&gt;This not only minimizes the risk of non-compliance penalties but also builds trust with customers and partners. The user-friendly and practical benefits of Ivanti's EASM solution make it an ideal choice for businesses seeking to improve their cybersecurity and vendor management strategies.&lt;/p&gt;

&lt;h2&gt;Plans for Ivanti EASM&lt;/h2&gt;

&lt;p&gt;Grand Bank’s implementation of Ivanti’s EASM solution hasn't only improved their current cybersecurity posture but also established a framework for a more secure tomorrow. The bank is strategically planning to deepen the integration of EASM within their GRC processes, creating a comprehensive security framework that's both resilient and flexible. This alignment will ensure that every facet of the bank’s operations, from internal controls to vendor partnerships, meets the highest security standards and regulatory mandates.&lt;/p&gt;

&lt;p&gt;Looking ahead, Grand Bank plans to further integrate EASM into their GRC processes to create a more holistic security framework. This will ensure that all aspects of the bank’s operations, from internal controls to vendor relationships, are aligned with the highest security standards and regulatory requirements.&lt;/p&gt;

&lt;p&gt;The bank will also use EASM to enhance their vendor management practices. Regular security assessments will be a cornerstone of their strategy, ensuring that vendors are continually evaluated, and risks are mitigated in real time. This proactive approach will help in vendor onboarding and maintaining strong, secure relationships with existing vendors.&lt;/p&gt;

&lt;p&gt;As Grand Bank continues to move more of its services to cloud-based platforms, the role of EASM becomes even more critical. The solution will be key in identifying and mitigating risks that result from this transition, ensuring that the bank’s vendor security posture remains strong. By continuously monitoring the external attack surfaces of their vendors, Grand Bank can proactively address potential threats, thereby protecting their assets and maintaining customer confidence.&lt;/p&gt;

&lt;h2&gt;Additional resources and support&lt;/h2&gt;

&lt;p&gt;For more information on Ivanti, exposure management and how our solutions can benefit your organization, &lt;a href="https://www.ivanti.com/exposure-management"&gt;visit the Ivanti website&lt;/a&gt;. Additionally,&amp;nbsp; to find an authorized partner for support, visit the Ivanti &lt;a href="https://marketplace.ivanti.com/xchange/64b5b48e2ee9d6e08c3e6724/partner"&gt;partner area&lt;/a&gt; online. Last, join our upcoming &lt;a href="https://www.ivanti.com/webinars/2024/proactive-protection-with-exposure-management"&gt;live webinar&lt;/a&gt; with Ivanti and Grand Bank on December 12th, focusing on proactive protection through Exposure Management, featuring practical advice on improving your cybersecurity posture.&lt;/p&gt;

&lt;p&gt;This blog post was enhanced by the contributions of Kalyan Vishnubhotia.&lt;/p&gt;
</description><pubDate>Wed, 11 Dec 2024 17:40:59 Z</pubDate></item><item><guid isPermaLink="false">3b6d779f-16af-49cb-bf91-a5db1d364718</guid><link>https://www.ivanti.com/blog/itsm-migration-case-study</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>Changing IT Service Management: East Coast City’s Journey with Ivanti’s Enterprise Service Management Solutions</title><description>&lt;p&gt;In every city, a complex web of technology ensures seamless operations. Imagine the chaos if traffic lights or the subway stopped functioning. Information Technology Service Management (ITSM) plays a crucial role in maintaining urban environments and preventing city-wide disruptions.&lt;/p&gt;

&lt;p&gt;Recognizing this, the City embarked on a journey to transform its &lt;a href="https://www.ivanti.com/glossary/itsm"&gt;ITSM&lt;/a&gt; capabilities, creating a blueprint for future enterprise service management. By transitioning to Ivanti’s Enterprise Service Management (ESM) solutions and partnering with T4S Partners, the city addressed the limitations of its previous system and introduced functionalities that better align IT with broader business objectives.&lt;/p&gt;

&lt;p&gt;The City faced significant challenges with its existing ITSM system, which became difficult to manage and scale. Relying on a highly customized Cherwell Service Management (CSM) platform approaching its end-of-life, complexities and fragmented data across multiple sources led to inefficiencies, hampering operations and strategic decision-making.&lt;/p&gt;

&lt;p&gt;Despite the challenges, the benefits were significant, such as improved service delivery and quality of life for residents. Advanced automation capabilities and a comprehensive &lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;Configuration Management Database (CMDB)&lt;/a&gt; streamlined IT operations and laid a robust foundation for future digital transformation. The successful ITSM migration not only improved day-to-day operations but also set a precedent for future technological progress. To achieve a successful migration, the first phase focused on a comprehensive project plan aimed at elevating Information Technology Service Management (ITSM) capabilities.&lt;/p&gt;

&lt;h2&gt;ITSM Migration Project Overview&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Mission:
	&lt;ul&gt;
		&lt;li&gt;Elevate Information Technology Service Management (ITSM) capabilities.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Goals:
	&lt;ul&gt;
		&lt;li&gt;Integrate key systems.&lt;/li&gt;
		&lt;li&gt;Enhance process maturity.&lt;/li&gt;
		&lt;li&gt;Leverage automation.&lt;/li&gt;
		&lt;li&gt;Bolster portal and reporting capabilities.&lt;/li&gt;
		&lt;li&gt;Streamline IT operations.&lt;/li&gt;
		&lt;li&gt;Align IT services with the city's business goals.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Platform Selection
	&lt;ul&gt;
		&lt;li&gt;Chosen Platform: Ivanti's Enterprise Service Management (ESM) solutions.&lt;/li&gt;
		&lt;li&gt;Key Features:
		&lt;ul&gt;
			&lt;li&gt;Robust capabilities.&lt;/li&gt;
			&lt;li&gt;Scalability.&lt;/li&gt;
			&lt;li&gt;Proven track record in large-scale implementations.&lt;/li&gt;
			&lt;li&gt;Comprehensive Configuration Management Database (CMDB).&lt;/li&gt;
			&lt;li&gt;Advanced Change Management capabilities.&lt;/li&gt;
		&lt;/ul&gt;
		&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Implementation Partnership
	&lt;ul&gt;
		&lt;li&gt;Partner: T4S Partners, a Premier Channel Sales Ivanti partner.&lt;/li&gt;
		&lt;li&gt;Role and Requirements:
		&lt;ul&gt;
			&lt;li&gt;&amp;nbsp; Deep understanding of Ivanti's offerings.&lt;/li&gt;
			&lt;li&gt;&amp;nbsp; Navigated migration complexities.&lt;/li&gt;
			&lt;li&gt;&amp;nbsp; Ensured seamless implementation without disrupting existing operations.&lt;/li&gt;
			&lt;li&gt;&amp;nbsp; Key to achieving improved process maturity and service delivery.&lt;/li&gt;
		&lt;/ul&gt;
		&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To further enhance these successes and future impacts, the City undertook a strategic migration to Ivanti's ITSM and ITAM solutions.&lt;/p&gt;

&lt;h2&gt;Migration benefits of Ivanti ITSM and ITAM&lt;/h2&gt;

&lt;p&gt;The City gained significant advantages by switching from the outdated Cherwell system to Ivanti's modern ITSM and ITAM solutions. This transition prevented end-of-life issues and provided a more robust framework for enterprise systems management. It not only solved immediate problems but also brought new features that improved overall service delivery.&lt;/p&gt;

&lt;p&gt;Retiring old systems reduced technical debt and brought benefits. Ivanti's platform improved the service catalog and support portal, making it easier for users to request services. The centralized configuration management database provided accurate data, increasing the efficiency of support operations. Neurons for Discovery automated asset management, making the IT environment more transparent.&lt;/p&gt;

&lt;p&gt;The migration included automation features to improve service requests and onboarding. Automating routine tasks freed up IT staff to focus on strategic initiatives and ensured efficient handling of service requests, leading to faster resolutions and improved user satisfaction.&lt;/p&gt;

&lt;p&gt;Ivanti's solutions provided a systematic approach to change control, ensuring changes were well-documented, authorized and implemented smoothly. This was essential for preserving the integrity and reliability of the city's IT services. Despite the systematic approach and benefits provided by Ivanti's solutions, the City faced several challenges during the transition to the new ESM system.&lt;/p&gt;

&lt;h2&gt;Overcoming challenges&lt;/h2&gt;

&lt;p&gt;As the City aims to streamline operations and improve service delivery, a comprehensive Configuration Management Database (CMDB) became vital. Serving over 4,000 users, the service desk's limitations in asset management and discovery hindered timely incident response and asset tracking.&lt;/p&gt;

&lt;p&gt;One primary hurdle was integrating with Microsoft's Entra ID, initially posing a significant roadblock for seamless migration of user data and access control. Ivanti’s technical support team stepped in with robust solutions, ensuring smooth integration and maintaining the project's momentum.&lt;/p&gt;

&lt;p&gt;Data fragmentation was another challenge. The previous ITSM system caused data to be scattered, making it difficult to use the new CMDB and Asset Management solution fully. Ivanti’s solutions introduce a cohesive data management strategy, consolidating and streamlining information to improve IT asset tracking and management.&lt;/p&gt;

&lt;p&gt;The City’s complex customization requirements added another layer of complexity. The absence of advanced Change Management solutions and automation capabilities was also a critical pain point. These features are essential for ensuring service delivery continuity and operational efficiency in a fast-paced urban setting. Recognizing these gaps underscored the need for a more robust ITSM solution that aligned IT services with business goals.&lt;/p&gt;

&lt;p&gt;With the support of T4S Partners and Ivanti’s advanced solutions, these challenges were effectively addressed. Ivanti's solution's flexibility allowed seamless integration of custom processes, ensuring a smooth transition without disrupting ongoing operations.&lt;/p&gt;

&lt;p&gt;Overcoming challenges in automation and discovery was also critical. These abilities were essential for improving service delivery, and careful planning ensured their successful implementation. The collaboration with T4S Partners was instrumental in managing the initial setup and setting the stage for future digital transformation.&lt;/p&gt;

&lt;p&gt;The City’s experience highlights the importance of a robust and adaptable ITSM solution, a well-thought-out transition strategy and the value of expert support. Advanced ITSM solutions have a transformative impact on improving operational efficiency and service delivery.&lt;/p&gt;

&lt;h2&gt;Aligning IT with business goals&lt;/h2&gt;

&lt;p&gt;Building on this understanding, the City strategically adopted Ivanti’s Enterprise Service Management (ESM) solution to further align IT Service Management with its goals for enhanced efficiency, accuracy and user experience.&lt;/p&gt;

&lt;p&gt;By integrating Neurons for Discovery with the CMDB, the City improved asset and configuration management, addressing Intune connector issues and laying the groundwork for better incident handling and change management. This led to efficient asset tracking, reduced downtime and improved service delivery.&lt;/p&gt;

&lt;p&gt;Ivanti’s platform also improved incident handling and streamlined change management, boosting response times and service quality. Comprehensive surveys ensured IT services met user needs, refining service request workflows and improving the customer portal's user-friendliness. Automating service request management allowed IT to focus on strategic initiatives, aligning IT capabilities with the City's goals and modernizing service management for future digital transformation.&lt;/p&gt;

&lt;p&gt;These strategic improvements positioned the City for long-term success, showing its dedication to improving service delivery and the quality of life for its citizens through aligned IT and business goals. Having established these strategic improvements, the City continued its digital transformation journey by moving to IT Service Management.&lt;/p&gt;

&lt;h2&gt;Implementation Approach&lt;/h2&gt;

&lt;p&gt;The City’s move to IT Service Management with Ivanti Neurons for ITSM is a major step in the city’s digital transformation journey. The move not only addressed the immediate challenges of the previous system, but also introduced advanced capabilities such as automation and a full CMDB, which will help the city grow and innovate in the future. The new platforms capabilities in asset management and discovery have significantly improved the city’s IT capabilities, ensuring that IT services are closely aligned with the city’s business goals.&lt;/p&gt;

&lt;p&gt;The partnership between T4S Partners and Ivanti was key to the success of the transition. T4S Partners’ expertise made the migration process seamless and non-disruptive to the City’s operations. This partnership has laid a strong foundation for the City to continue to improve its IT operations, showing the City’s commitment to improving service delivery and the quality of life for its residents. The implementation of advanced Change Management tools has further enhanced the City’s ability to adapt to the ever-changing technology landscape, ensuring the City’s IT infrastructure remains robust and efficient.&lt;/p&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;The City’s transition to Ivanti Neurons for ITSM marks a major milestone in its digital transformation journey. This move overcame previous system limitations, significantly improving IT capabilities. The modernization project introduced advanced ITSM functionalities like a robust CMDB, Asset Management and Change Management to align IT with the city’s business goals. Automation and discovery capabilities will help the city adapt to technological changes, improving service delivery and residents' quality of life.&lt;/p&gt;

&lt;p&gt;Partnership with T4S Partners was crucial, as their expertise ensured a seamless migration without disrupting daily operations. This collaboration met project goals, from initial implementation to ongoing optimization.&lt;/p&gt;

&lt;p&gt;By leveraging the strengths of both organizations, the City has set a strong foundation for continued IT improvements and created a blueprint for other municipalities aiming to modernize ITSM. The investment in Ivanti's ESM solutions promises long-term benefits, allowing the city to keep pace with technological advancements and respond to residents' evolving needs. This transformation underscores the City's commitment to innovation and the value of strategic partnerships in achieving successful digital transformations. Other municipalities are encouraged to explore similar upgrades to improve their services and meet community needs.&lt;/p&gt;

&lt;p&gt;Learn more about Ivanti’s &lt;a href="https://www.ivanti.com/solutions/enterprise-service-management"&gt;Enterprise Service Management solutions&lt;/a&gt;. For insights from industry experts, check out Ivanti's &lt;a href="https://www.youtube.com/results?search_query=ivanti+partner+insights" rel="noopener" target="_blank"&gt;YouTube Partner Insights&lt;/a&gt; interviews featuring various Ivanti partners and Michelle Hodges, Ivanti’s Senior Vice President for Global Channels and Alliances. Additionally, we encourage you to engage with our &lt;a href="https://forums.ivanti.com/s/?language=en_US&amp;amp;_gl=1*1veyx1p*_gcl_aw*R0NMLjE3Mjc4NzU3NjYuQ2owS0NRanczdk8zQmhDcUFSSXNBRVdibGNBYzRnaVd1ZGxoMlBmZE03NmxMLWlLRUhFV0l0c1ZiZ1JXbXUxLWM0aUEyVTJrQ2JjcE5mSWFBbnFQRUFMd193Y0I.*_gcl_au*NzYxNjkxODc0LjE3MjY1MDgyNTU." target="_blank"&gt;online community&lt;/a&gt; by participating in our forums and webinars. These are great opportunities to connect with other IT professionals, share your experiences and learn from industry experts.&lt;/p&gt;
</description><pubDate>Tue, 26 Nov 2024 16:08:57 Z</pubDate></item><item><guid isPermaLink="false">135e3a2f-ea8e-4d80-93c6-b4bae8275fd1</guid><link>https://www.ivanti.com/blog/ivanti-partner-brings-customer-success-to-the-olympics-and-beyond</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>Ivanti Partner Brings Customer Success to the Olympics and Beyond</title><description>&lt;p&gt;When a customer needed to update its SSL VPN solution to meet teleworkers’ needs for the Paris Olympics, Ivanti’s key distribution partner Westcon-Comstor illustrated its expertise in zero trust access and commitment to helping users get the most benefit from their Ivanti solutions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The story of Westcon-Comstor’s approach is one of the numerous partner success stories we’ll share in the coming months to show the critical role our partners play in helping Ivanti customers navigate the ever-changing cybersecurity landscape.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Westcon-Comstor shines in Paris&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Westcon-Comstor, a leading technology distributor, has been instrumental in helping organizations modernize their security infrastructure. Its partnership with Ivanti is a testament to Westcon-Comstor’s commitment to providing cutting-edge solutions.&lt;/p&gt;

&lt;p&gt;Westcon-Comstor demonstrated that commitment with its recent collaboration with a social protection group with five hundred employees. Westcon-Comstor ensured that they were well-equipped to support their customers as they migrated from Pulse Secure Access to Ivanti Neurons for Secure Access and VPN, minimizing disruptions and maximizing Security benefits.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The customer’s biggest challenge with the Paris Olympics approaching was to update their SSL VPN solution to meet their teleworkers’ needs, as they expected a busy period. By using Ivanti’s zero trust access products, they achieved significant improvements in their network performance, Security posture and operational flexibility.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A standout feature was the option to integrate a Unified Access Layer (UAL), streamlining the transition toward a zero trust architecture (ZTA). This ensured the customer was well-prepared for future security challenges by maintaining an adaptive and resilient IT environment.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The power of zero trust access&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The success of this project showcased Westcon-Comstor’s deep expertise in zero trust access, cloud migration, network access control, VPN and secure remote access. Their investment in 3D Labs further demonstrates Westcon-Comstor’s commitment to showcasing the benefits of zero trust architecture to potential customers, enabling them to make informed decisions about their security infrastructure. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;The customer was highly satisfied with the Ivanti solution, and its user-friendliness led the customer to make an additional purchase.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Westcon-Comstor’s data-driven approach and Renewal Center of Excellence are testament to its commitment to ensuring customers receive ongoing support and value from their technology investments. Westcon-Comstor’s partnership with Ivanti and their customer-centric approach has resulted in a modernized security infrastructure that enabled the social protection group to deliver on its mission with increased efficiency, security and scalability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;“The standard of excellence we maintain at Westcon-Comstor, from our Renewal Center of Excellence to our presales, is what sets us apart,” explains Matt Piddington, Vice President of Services for Westcon Europe. “We work tirelessly with Ivanti to bring the best to customers and partners, and their success is our proudest achievement. By focusing on comprehensive solution lifecycle management, we ensure customers are equipped with the latest technology to safeguard their operations. We don’t just sell solutions. We create and manage them, driving essential tech refresh initiatives that keep end customers protected.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This commitment to excellence and partnership with Ivanti naturally extends into the resources and support offered by Ivanti itself. As Westcon-Comstor focuses on delivering and managing top-tier solutions, Ivanti complements this effort by providing a robust framework of support and resources designed to improve secure access infrastructures.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Pulse Secure sunsetting and end of life (EOL)&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;As Ivanti continues to innovate and evolve our technology offerings, it's important to address the lifecycle of our products to ensure we are providing the most advanced and secure solutions. This commitment to innovation and security is reflected in our recent announcement regarding the Pulse Security Appliance (PSA) hardware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;On July 15th, 2022, a notification was sent to Ivanti customers stating that all PSA hardware will reach end of engineering on June 30th, 2024. As part of our "Secure by Design" initiative, Ivanti has decided to discontinue support for Pulse Security Appliance (PSA) hardware on Aug. 1st, 2024. After this date, the hardware will no longer receive feature updates or bug fixes. We highly recommend that our customers transition to our more advanced Ivanti Security Appliance (ISA) or virtual solutions for optimal performance and Security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To ensure the ongoing Security and compliance of your organization's access infrastructure, we strongly advise migrating to Ivanti's zero trust access portfolio before the end of life (EOL) date. This comprehensive set of solutions can effectively safeguard your networks and data from unauthorized access.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What’s at stake?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The legacy PSA platform was developed before the broad adoption of modern cloud infrastructure and services — and at a time when the threat landscape was less volatile and more predictable. This legacy platform can expose an organization to multiple risks.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Business risks&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Unplanned downtime.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Impact on core applications and business continuity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure of sensitive data.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure to ransomware and other security vulnerabilities and threats.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Potential regulatory compliance issues.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Operational risks&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Not designed for modern cloud architectures.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;No protection for application (layer 7) traffic.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Limited capacity and performance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Difficult to configure and manage.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;No automated system upgrades.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;No automated patching.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By migrating to Ivanti, customers gain increased visibility and control over their entire landscape, ensuring that only authorized users have access to critical resources. Additionally, they benefit from protection against evolving cyber threats and access to the latest cloud-based innovations, ensuring their organizations remain secure and compliant in the face of emerging IT challenges.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti zero trust access resources and support&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti is committed to not only developing cutting-edge &lt;a href="https://www.ivanti.com/network-security/zero-trust-security"&gt;zero trust access solutions&lt;/a&gt; but also ensuring that our partners and customers thrive in an increasingly complex IT environment. This case study demonstrates the power of Ivanti’s zero trust access solutions, which helped their customer streamline operations, strengthen Security and gain the flexibility they need to thrive.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To help organizations on their journey to a secure access infrastructure, Ivanti offers a variety of resources and support options to meet their needs. Visit our &lt;a href="https://www.ivanti.com/network-security/zero-trust-security"&gt;website&lt;/a&gt; to learn more about our secure access portfolio and the potential of our comprehensive solutions. Additionally, our team of dedicated Ivanti security specialists is here to help.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For those who want a trusted partner like Westcon to help guide them through the migration process, the &lt;a href="https://marketplace.ivanti.com/xchange/64b5b48e2ee9d6e08c3e6724/partner"&gt;partner area&lt;/a&gt; on our website provides a list of authorized Ivanti partners. These partners have the knowledge and experience to help you get the most out of our solutions and ensure a smooth transition to a secure and robust access infrastructure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, view our new Partner Insights interviews on &lt;a href="https://www.youtube.com/@Ivanti" target="_blank" rel="noopener"&gt;YouTube&lt;/a&gt; with various Ivanti partners and Michelle Hodges, Ivanti’s Senior Vice President for Global Channels and Alliances.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We also encourage you to engage with our &lt;a href="https://forums.ivanti.com/s/?language=en_US" target="_blank"&gt;online community&lt;/a&gt; by participating in our forums and webinars. These are great opportunities to connect with other IT professionals, share your experiences and learn from industry experts. You can stay up to date on the latest zero trust access developments, exchange best practices and explore new strategies to improve your security posture.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 05 Sep 2024 20:14:02 Z</pubDate></item><item><guid isPermaLink="false">0f67413a-4631-4f4c-b1c8-b35eff4f2c2d</guid><link>https://www.ivanti.com/blog/securing-iomt-devices-best-practices-for-hospitals-to-prevent-cyberattacks</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>Securing IoMT Devices: Best Practices for Hospitals to Prevent Cyberattacks</title><description>&lt;p&gt;The Internet of Medical Things (IoMT) has revolutionized the healthcare industry, connecting medical devices to the internet and allowing for greater patient care. However, with this new technology comes new security threats. Hospitals must be aware of these risks and understand how to find, fix&amp;nbsp;and&amp;nbsp;secure connected medical devices to protect their patients from cyberattacks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This article will discuss examples of cyberattacks on hospitals, best practices for securing connected medical devices, the role of advanced automation in preventing IoMT security breaches and how data analytics can help organizations monitor security issues.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Overview of IoT medical device security threats in hospitals&lt;/h2&gt;

&lt;p&gt;Revolutionizing healthcare, the Internet of Medical Things (IoMT)&amp;nbsp;connects&amp;nbsp;medical devices to the web, promoting improved patient care. Unfortunately, this technology also brings a risk&amp;nbsp;—&amp;nbsp;cyberattacks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To safeguard connected medical devices from malicious actors, healthcare facilities must be aware of these threats and understand proper precautionary measures to take. According to a recent report,&amp;nbsp;&lt;a href="https://www.cynerio.com/ponemon-survey-insecurity-of-connected-devices-in-healthcare-2022" rel="noopener" target="_blank"&gt;43% of hospitals&lt;/a&gt; have been victims of ransomware in the past year.&lt;/p&gt;

&lt;p&gt;Cyberattacks on hospitals can range from data breaches to ransomware attacks. And IoMT devices are vulnerable without the proper security measures in place. Implementing advanced automation and data analytics tools can prevent these&amp;nbsp;risks&amp;nbsp;by detecting IoMT security threats in&amp;nbsp;real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, advanced automation solutions can automate processes like patching (with the assistance of the healthcare device manufacturer) and updating software operating systems, ensuring all systems are up-to-date with the latest defense measures against cyberattacks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automated solutions can also monitor network traffic for suspicious activity or unauthorized access to health data. Automation also has the added benefit of freeing up time for IT staff so they can focus on other critical tasks, such as responding quickly to potential security threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Data analytics is another key tool for securing connected medical devices. Data analytics solutions allow healthcare organizations to monitor their&amp;nbsp;systems&amp;nbsp;in&amp;nbsp;real time&amp;nbsp;for anomalies or malicious activities that could indicate a breach or attack is underway. By analyzing large volumes of data, organizations can identify trends or patterns that may indicate an attack is occurring before it becomes too late.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The combination of automation and data analytics&amp;nbsp;makes&amp;nbsp;it possible for healthcare organizations to protect their IoMT devices from malicious&amp;nbsp;actors&amp;nbsp;while still providing quality patient care at a lower cost than manual processes would allow.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To&amp;nbsp;ensure the security of their connected medical devices, hospitals must be aware of the risks posed by IoMT technology and understand how best practices such as advanced automation and data analytics tools can help them find, fix and secure even the most complex threats.&lt;/p&gt;

&lt;h2&gt;Examples of cyberattacks on hospitals&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Many hospitals are particularly vulnerable to cyberattacks due to their reliance on connected medical devices, not updating their security standards and having limited resources available for security measures. Ransomware is one of the most common attack types seen in healthcare settings, but other threats such as&amp;nbsp;phishing,&amp;nbsp;emails, malware&amp;nbsp;and&amp;nbsp;malicious insiders can also lead to data loss. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;In August of this year, a&amp;nbsp;&lt;a href="https://www.post-gazette.com/business/healthcare-business/2023/08/04/cyberattack-hospitals-health-care-prospect-medical-holdings/stories/202308050020" rel="noopener" target="_blank"&gt;cyberattack disrupted hospital computer systems&lt;/a&gt;&amp;nbsp;in several states, including Pennsylvania, forcing some emergency rooms to close and ambulances to be diverted, and many primary care services remained closed for several days.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In 2020,&amp;nbsp;&lt;a href="https://cybersecuritynews.com/the-rise-in-cyber-attacks-aimed-at-healthcare-providers-during-covid-19/" rel="noopener" target="_blank"&gt;several hospitals around the world&lt;/a&gt;&amp;nbsp;were hit by ransomware attacks that led to critical systems being locked down or disrupted entirely.&amp;nbsp;For one hospital in Germany, the attack lasted over three weeks and resulted in delayed treatments for some patients while IT personnel worked around the clock to prevent further damage and gain control over their systems again.&amp;nbsp;The financial cost of this breach was estimated at upwards of $1 million USD.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to financial costs related to a cyberattack, there are also reputational costs associated with it. Patients may lose trust in an organization if they learn that their personal data has been compromised or that treatment delays occurred due to an attack on the hospital’s system infrastructure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, legal actions may be taken against hospitals for failing to&amp;nbsp;follow&amp;nbsp;industry regulations when it comes to protecting sensitive patient information from cyber threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The importance of finding, fixing and securing connected medical devices&amp;nbsp;can't&amp;nbsp;be overstated. Failure can have serious&amp;nbsp;consequences,&amp;nbsp;both financially and&amp;nbsp;reputationally,&amp;nbsp;for healthcare organizations involved. Investing in advanced automation and data analytics tools alongside compliance with regulatory standards is essential for reducing risk from cybersecurity threats within hospitals today.&lt;/p&gt;

&lt;h2&gt;How to identify and classify cyber threats on IoMT devices&lt;/h2&gt;

&lt;p&gt;Using&amp;nbsp;connected medical devices in healthcare facilities has created a range of security risks. To protect against the potential dangers posed by IoMT devices,&amp;nbsp;it's&amp;nbsp;critical to understand how to identify and classify cyber threats on these devices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;First, hospitals should conduct thorough risk assessments on each device to evaluate its vulnerability to attack. This assessment entails examining all aspects of the device, including software, hardware, communication protocols&amp;nbsp;and&amp;nbsp;other potential weak points that could be taken advantage of by malicious actors.&amp;nbsp;It's&amp;nbsp;essential that particular attention is paid to any known or plausible attack vectors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When the assessment process is finished, organizations must then categorize the threats according to patient safety, patient confidentiality&amp;nbsp;and&amp;nbsp;service availability. High-risk issues should take precedence when dealing with vulnerabilities and preventing future&amp;nbsp;attacks,&amp;nbsp;as they are more likely to cause substantial damage. Low-risk concerns may still pose a risk if left&amp;nbsp;unaddressed but&amp;nbsp;may not always require immediate action depending on the situation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ultimately, hospitals must maintain strategies for mitigating cyber threats associated with IoMT devices over time. These strategies include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Patching and updating software systems when new risks are detected.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Employing advanced automation tools such as machine learning algorithms.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Monitoring network traffic for anomalies or malicious behavior.&lt;/li&gt;
	&lt;li&gt;Adhering&amp;nbsp;to regulatory standards like HIPAA and GDPR.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Embracing these measures means healthcare providers can reduce their exposure while creating safe spaces for patients and staff alike.&lt;/p&gt;

&lt;h2&gt;Best practices for securing connected medical devices&lt;/h2&gt;

&lt;p&gt;Healthcare organizations must take steps to protect their IoMT systems from cyberattacks and malicious activities. Regularly patching and updating software is a must, along with establishing an access control policy for authorized personnel only.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Authentication measures such as&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/the-landscape-of-zero-trust-adoption"&gt;two-factor authentication&lt;/a&gt;&amp;nbsp;or biometric scanning are also important to safeguard patient data. Encryption of stored data is critical for protecting confidential information from unauthorized access, while firewalls and IPS&amp;nbsp;protect&amp;nbsp;against external threats and malware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to these measures, healthcare organizations should conduct frequent vulnerability scans to identify any potential weaknesses in the system that&amp;nbsp;maybe exploited&amp;nbsp;by attackers. Advanced analytics tools can help detect anomalies in device&amp;nbsp;behavior,&amp;nbsp;which may signal a possible attack, allowing organizations to quickly act before serious damage can occur.&lt;/p&gt;

&lt;p&gt;With real-time visibility into the state of your systems, the organization can respond to operational and security issues with network isolation to ensure that vulnerable devices are no longer putting other devices at risk and provide recommendations on how to deal with those threats.&lt;/p&gt;

&lt;h2&gt;The role of advanced automation in preventing IoMT security breaches&lt;/h2&gt;

&lt;p&gt;The prevalence of cyberattacks on healthcare organizations has made advanced automation an essential component of IoMT security. Automation can keep IoMT devices up to date with the latest security&amp;nbsp;patches, detect&amp;nbsp;anomalies in user behavior and device activities&amp;nbsp;and&amp;nbsp;quickly identify and block suspicious network connections or malicious files. Additionally, automation helps hospitals minimize their risk of a breach by ensuring their systems are always secure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Advanced automation solutions combine real-time analytics with AI algorithms to monitor user behavior patterns for any signs of malicious activity. By using these solutions, hospitals can detect threats such as an unauthorized user attempting to access a secure system resource or an abnormal increase in outbound network traffic&amp;nbsp;—&amp;nbsp;allowing quick response before the attack becomes serious, minimizing disruption and financial losses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automating routine tasks also helps reduce alert fatigue for hospital staff&amp;nbsp;—&amp;nbsp;freeing up time so they can focus on other important security issues that require human intervention. Furthermore, automated monitoring strategies provide 24/7 protection against potential threats while personnel are offsite or unavailable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With automated tools at their disposal, healthcare organizations can stay one step ahead of cybercriminals and ensure that their systems remain safe and secure from harm.&lt;/p&gt;

&lt;h2&gt;How to leverage data analytics for IoMT security monitoring&lt;/h2&gt;

&lt;p&gt;Analyzing data generated by connected medical devices is essential for improving IoMT security. By leveraging the power of data analytics, healthcare organizations can quickly identify any anomalies or suspicious activities and take appropriate action to address them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automating security processes also ensures that all devices are running on the latest software versions with the most up-to-date patches from the healthcare device manufacturer. Ultimately, leveraging data analytics provides hospitals and other healthcare organizations with an effective way to monitor IoMT security in real time and ensure their systems remain secure from cyberattacks.&lt;/p&gt;

&lt;p&gt;Want to learn more?&amp;nbsp;Visit Ivanti's&amp;nbsp;webinar discussing ways to&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/practical-demo-how-to-find-fix-and-prioritize-healthcare-device-threats"&gt;find, fix and prioritize healthcare device threats&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 21 Sep 2023 16:00:01 Z</pubDate></item><item><guid isPermaLink="false">5dcefb45-f387-4139-a835-1e1224eb7fe8</guid><link>https://www.ivanti.com/blog/mapping-it-services-for-improved-alignment-between-business-and-it</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>Mapping IT Services for Improved Alignment Between Business and IT</title><description>&lt;p&gt;Running a business in today's digitalized world comes with many challenges, such as industry regulations, escalating costs as businesses grow&amp;nbsp;and continuity planning. To effectively manage IT services and align them with business goals, organizations are turning to service management solutions to optimize their resources, budgets and cross-functional collaboration.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By automating the management of IT services, businesses can save time,&amp;nbsp;money and reduce the number of potential manual errors, while ensuring efficient and consistent delivery of IT services.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With the right service management solution in place, organizations can leverage automation tools to maximize efficiency and improve resource utilization.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The importance of IT service mapping&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The process of service mapping can be manual or automated with service-mapping tools which use data collected from network scans to link processes with objectives.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ultimately, the outcome of the process is the production of mapping diagrams to visualize all the dependencies between your physical and virtual computers, networks and storage assets. Documentation of all the dependencies is also extremely valuable for those industries that require auditing, such as banking.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Rapid impact, risk and root cause analysis can be performed accurately due to the mapping diagrams showing IT infrastructure relationships, application dependencies, communication flows, ghost devices, network topology, cloud relationships&amp;nbsp;and IT service management incidents and changes. These diagrams also give insight into how service delivery ties into customer satisfaction or cost reduction, as well as identifying areas where improvements can be made.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A survey from Gartner found that nearly 80% of organizations believe that IT Service Mapping can help align IT services with business outcomes.​&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;- “A Guide to IT Service Mapping Aligned with Business Outcomes”, 2020​&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Documentation of dependencies between different systems is also important for gaining a full picture of service delivery and for anticipating outages or other issues that could arise if one system affected another.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Knowing these details allows organizations to act quickly and efficiently – without disrupting operations – when an issue arises, ultimately reducing the risks associated with unexpected downtime or security breaches. However, the critical success factor is a robust CMDB (Configuration Management Database) that's proactively and automatically updated on a continual basis.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;According to Gartner, 80% of CMDB initiatives fail mainly due to manual updates, limited resources, incomplete or untrustworthy data, complacency or lack of governance.​&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;- “Renovating your CMDB to Improve Business Outcomes”, 2019&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Develop a process to improve CMDB initiatives &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Automated IT service mapping helps administrators identify and resolve any issues within the CMDB more efficiently, leading to improved IT service performance and availability. The service map visualizations we’ve described above will allow your team to quickly identify and analyze relationships between various components within the CMDB.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition to using automated discovery and &lt;a href="https://www.ivanti.com/products/it-service-mapping"&gt;service mapping tools&lt;/a&gt;, it’s important to establish a core process your initiative will follow, ensuring data is managed in a secure and consistent manner and that the initiative moves forward in a way that meets organizational goals. Your process should include the following steps (which can be used in any order):&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&lt;/strong&gt;&lt;br&gt;
	Assessing the current situation, identifying shortfalls and developing a plan to address any gaps is vital in ensuring that your initiative is successful. &amp;nbsp;&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Measure and improve&amp;nbsp;&lt;/strong&gt;&lt;br&gt;
	Ensure you have a touchpoint every 30/60/90 days to track progress and make any amendments.&amp;nbsp;&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Design with automation in mind&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;br&gt;
	It's critical to design your initiative around using automated automated data collection and/or processes to help ensure the likelihood of successfully meeting your progress goals. &amp;nbsp;&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish governance&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;br&gt;
	To ensure that all data is managed in a consistent and secure manner, you’ll need procedures, policies, and processes for data management and decision-making.&amp;nbsp;&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Goals and metrics&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;br&gt;
	The identification of goals and metrics will help track and measure success, informing stakeholders about how the initiative is progressing and making it easier to identify areas of improvement. Examples of metrics include:&amp;nbsp;
	&lt;ul&gt;
		&lt;li&gt;Configuration Item (CI) accuracy to determine accuracy of the CIs within the organization’s CMDB.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
		&lt;li&gt;User Adoption to measure the success rate of rolling out the system and getting employees to use it.&lt;/li&gt;
		&lt;li&gt;Incident Resolution to track the time it takes to resolve incidents over time.&amp;nbsp;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Overall, utilizing this five-step process can significantly improve CMDB initiatives. By meeting regularly with your team to track progress, automating processes, establishing governance procedures, identifying goals and metrics and assessing the current situation, you'll improve the likelihood an initiative will succeed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Finding the best service management solution&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;IT service mapping and an accurate CMDB can provide an organized structure for service management, allowing for clear visibility of the services being delivered and the relationships between them. This provides a single source of truth for service management, and that’s key to empowering IT teams to be more efficient and proactive.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In an era of Everywhere Work, organizations increasingly look to service management solutions to help improve resource utilization, optimize budgets and collaborate with teams.&amp;nbsp;But how do you find the best solution for your organization?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Evaluate available ITSM solutions&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The first step is to examine and assess various service management solutions and compare them against each other. Consider factors such as cost, features, usability, scalability and customer support when evaluating each option.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's also important to look at how well a service management solution can integrate with existing systems and processes to maximize its benefits, such as increased efficiency, lower costs, improved service delivery, decreased learning time by staff and increased customer satisfaction. Additionally, consider any customization options that may be available with various solutions.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Utilize automation&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Once you’ve selected the right service management solution for your organization? It's time to take advantage of the considerable benefits it can offer.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Automation tools can help streamline processes and reduce manual labor, while enhanced analytics capabilities make it easier to quickly and accurately identify potential issues or risks. Improved resource utilization means long-run cost savings for your business, while having access to real-time data helps ensure that IT services meet business objectives without fail.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Want to learn more? &lt;/strong&gt;See how &lt;a href="https://www.ivanti.com/customers/the-first-bank"&gt;The First Bank&lt;/a&gt; utilized Ivanti Neurons for Service Mapping to automate processes, reduce time and headcount assigned to manual tasks, optimize costs and enable continuity planning. &amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 20 Jul 2023 15:01:05 Z</pubDate></item><item><guid isPermaLink="false">e676833e-c2c5-440f-b781-35c5ce82671d</guid><link>https://www.ivanti.com/blog/how-it-device-discovery-can-identify-your-network-s-assets-and-vulnerabilities</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities</title><description>&lt;p&gt;The security of your organization’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensuring compliance requires you to know what’s on your network. But how can that be done when only&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2732/7b4205775465"&gt;48% of leaders and security professionals&lt;/a&gt;&amp;nbsp;say they run their asset discovery program at least once per week?&amp;nbsp;One of the most effective tools for identifying assets and vulnerabilities on a network is IT asset discovery.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is IT discovery and why is it important for IT security?&lt;/h2&gt;

&lt;p&gt;IT discovery is the process of identifying and cataloging the various hardware, software and other components that make up an IT infrastructure. This is an essential process to ensure the smooth functioning of IT networks as it allows IT administrators to identify potential issues and plan for future growth.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once this identification and cataloging of IT inventory is completed, you can maintain a comprehensive inventory of all your assets.&amp;nbsp;Keeping track of all the components making up your network in one place means IT administrators can quickly identify any problems and take the necessary steps to fix them.&lt;/p&gt;

&lt;p&gt;And since,&amp;nbsp;on average, up to&amp;nbsp;&lt;a href="https://comparesoft.com/asset-management-software/eliminate-ghost-assets/" rel="noopener" target="_blank"&gt;30% of an organization’s IT assets&lt;/a&gt;&amp;nbsp;are ghost assets,&amp;nbsp;missing or unaccounted for,&amp;nbsp;it is even more important to have accurate, up to date information about your device landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quickly detect changes in the network and respond to potential&amp;nbsp;threats,&amp;nbsp;it’s worth automating the discovery process&amp;nbsp;—&amp;nbsp;ultimately,&amp;nbsp;it'll&amp;nbsp;ensure&amp;nbsp;a secure and compliant network. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How does IT discovery work?&lt;/h2&gt;

&lt;p&gt;IT discovery&amp;nbsp;typically uses manual scanning or automated scanning tools. Manual scans involve manually entering IP addresses into a scanner, while automated scans are done with specifically designed software programs. These programs will search through an organization's environment, looking for:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Hardware components such as computers, servers, routers and switches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software components such as operating systems and applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Network connections such as LANs (Local Area Networks) or WANs (Wide Area Networks).&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additionally, as not every asset will be on the network, the ability to discover devices from other sources via connectors is just as critical in providing a comprehensive picture of your entire IT estate.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Benefits of IT discovery for IT security&lt;/h2&gt;

&lt;p&gt;Accurate device information is an essential component of any organization’s IT network. Without it, organizations are unable to identify and track assets on their networks or ensure compliance with relevant regulations and standards.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By automating the process of discovering devices connected to your&amp;nbsp;network,&amp;nbsp;you can capitalize on the following benefits:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Provide real-time alerts regarding any changes in the device inventory&lt;/strong&gt;.&amp;nbsp;This kind of visibility can help your organization quickly detect potential threats and respond accordingly. With accurate device information, identifying unknown assets and reducing attack surface by removing outdated or unauthorized hardware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ensure that a network is compliant with relevant security regulation&lt;/strong&gt;s&amp;nbsp;and standards such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act).&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Accurately monitor the performance of IT infrastructure and ensure that it always remains secure&lt;/strong&gt;.&amp;nbsp;With real-time visibility into all the devices connected to the network, your IT team can easily identify problems, even before they become critical issues, and respond quickly when issues arise. This helps reduce downtime for employees, which in turn leads to improved productivity and employee experience across the organization.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Respond&amp;nbsp;Quickly to Potential Threats&lt;/h2&gt;

&lt;p&gt;When responding to potential threats, it’s important for organizations to act quickly to minimize the impact of the attack. With extended visibility into your entire network, you can quickly locate any malicious actors or vulnerabilities that could lead to an attack.&lt;/p&gt;

&lt;p&gt;This also allows for more accurate and timely monitoring of changes in your network's architecture, which are critical in identifying potential weaknesses before exploitation can occur.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, keeping track of who has access to what parts of your network makes monitoring user activities and maintaining up-to-date user profiles a breeze. With threat actors getting better at disguise, ensuring that only authorized personnel have access to the information they need helps reduce the risk of any unauthorized access or misuse.&lt;/p&gt;

&lt;p&gt;And if a threat occurs, it’s much easier to determine where it originated from and take appropriate action against it.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Finally, providing valuable insights into how your organization is responding to potential threats can help improve your security strategy. By measuring response time and tracking incidents over time, you can evaluate which strategies are working best and which ones to amend.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hungry for more? Watch our webinar recording and explore&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs"&gt;5 Best Practices From Real‑World RBVM Programs&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 22 Jun 2023 20:09:10 Z</pubDate></item><item><guid isPermaLink="false">c3110dfe-73ae-4c93-88e7-4cd771dc706e</guid><link>https://www.ivanti.com/blog/top-10-reasons-service-mapping-can-accelerate-your-it-service-management-capabilities</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>Top 10 Reasons Service Mapping Can Accelerate your IT Service Management Capabilities</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/products/it-service-mapping"&gt;Service mapping&lt;/a&gt; is an essential tool for&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itsm"&gt;IT&amp;nbsp;service management&lt;/a&gt;, as it allows you to gain a clear and comprehensive understanding of the various components and dependencies that make up their IT services.&amp;nbsp;Service mapping focuses on discovering data center devices, infrastructure, application dependencies and the corresponding relationships.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This enables your organization to manage and optimize their IT operations, improve service delivery and more effectively reduce disruptions and outages risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Here are the top 10 reasons service mapping can accelerate your IT service management capabilities:&lt;/p&gt;

&lt;h2&gt;1. Improved visibility and understanding of your IT infrastructure&lt;/h2&gt;

&lt;p&gt;Service mapping provides a comprehensive and visual representation of your IT infrastructure, which can help you better understand the relationships and dependencies between different components and services. This heightened visibility can help you identify potential issues and risks and make more informed decisions about optimizing your IT operations.&lt;/p&gt;

&lt;h2&gt;2. Enhanced collaboration and communication&lt;/h2&gt;

&lt;p&gt;Service mapping can facilitate better collaboration and communication within your IT team and across different departments. Providing a common language and understanding of your IT services helps break down silos and improve coordination and cooperation.&lt;/p&gt;

&lt;h2&gt;3. Faster problem resolution and incident management&lt;/h2&gt;

&lt;p&gt;Service mapping can help you quickly identify the root cause of &lt;a href="https://www.ivanti.com/glossary/problem-management"&gt;problems&lt;/a&gt; and &lt;a href="https://www.ivanti.com/glossary/incident-management"&gt;incidents&lt;/a&gt; and to implement effective remediation measures. Providing a clear and comprehensive view of your IT services can also help you prioritize and allocate resources more efficiently – minimizing the impact of disruptions and outages.&lt;/p&gt;

&lt;h2&gt;4. Improved service quality and customer satisfaction&lt;/h2&gt;

&lt;p&gt;Service mapping can help identify and address potential bottlenecks and weaknesses in your IT services, ensuring that they are designed and delivered to meet your customers’ needs and expectations. Providing better visibility and control over your IT operations helps you proactively prevent issues and improve service quality.&lt;/p&gt;

&lt;h2&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;Reduced risk and compliance costs&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Service mapping can help you identify and mitigate potential risks and vulnerabilities in your&amp;nbsp;ITinfrastructure and ensure you comply with relevant regulations and standards. Providing a clear and up-to-date view of your IT services can help you easily&amp;nbsp;demonstrate compliance and reduce the cost and effort associated with audits and regulatory compliance.&lt;/p&gt;

&lt;h2&gt;6. More effective capacity planning and resource allocation&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Service mapping can provide valuable insights into the performance and capacity of your IT services, helping you optimize the allocation of resources to meet changing business needs and demands. Providing a clear and comprehensive view of your IT infrastructure can also help you identify potential bottlenecks and capacity restraints before they become an issue.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;7. Better support for digital transformation and innovation&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Service mapping can help you align your IT operations with your business goals and objectives, and to support the development and implementation of new digital initiatives and technologies. Providing a clear and comprehensive view of your IT services can help you identify opportunities for innovation and improvement, and to&amp;nbsp;integrate modern technologies and systems more easily&amp;nbsp;into your IT infrastructure.&lt;/p&gt;

&lt;h2&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp;Enhanced agility and flexibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Service mapping can help you&amp;nbsp;adapt quickly and easily&amp;nbsp;to changing business needs and conditions and to respond to new challenges and opportunities. Providing a clear and comprehensive view of your IT infrastructure helps you easily and efficiently make changes more to your IT services and introduce&amp;nbsp;modern technologies&amp;nbsp;and capabilities.&lt;/p&gt;

&lt;h2&gt;9.&amp;nbsp;Improved cost management and efficiency&lt;/h2&gt;

&lt;p&gt;Service mapping can help you&amp;nbsp;manage and control the cost of your IT operations and to identify and eliminate waste and inefficiency more effectively. Providing a clear and comprehensive view of your IT services can help you&amp;nbsp;identify and prioritize opportunities for cost savings and optimization – and make more informed decisions about investments in modern technologies and capabilities.&lt;/p&gt;

&lt;h2&gt;10. Enhanced security&lt;/h2&gt;

&lt;p&gt;Service mapping can&amp;nbsp;supply&amp;nbsp;valuable insights into&amp;nbsp;an organization’s security posture.&amp;nbsp;By understanding the relationships between different services and the underlying infrastructure, IT teams can find potential vulnerabilities and take proper action.&lt;/p&gt;

&lt;p&gt;Service mapping has many benefits, from enhanced security to better support for digital transformation and innovation that can help organizations accelerate their IT service management. Ready to take that next step?&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/itsm/demos/ivanti-neurons-for-service-mapping"&gt;Book a demo&lt;/a&gt;&amp;nbsp;to experience it for yourself.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 29 Dec 2022 21:01:33 Z</pubDate></item><item><guid isPermaLink="false">05194d35-4f43-4a8e-84eb-af3774af85ab</guid><link>https://www.ivanti.com/blog/healthcare-it-security-budgets-aren-t-keeping-pace-with-iomt-threats</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>Healthcare IT Security Budgets Aren't Keeping Pace With IoMT Threats</title><description>&lt;p&gt;The&amp;nbsp;impact of&amp;nbsp;ransomware attacks on healthcare&amp;nbsp;is&amp;nbsp;as&amp;nbsp;alarming&amp;nbsp;as it is under-addressed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These&amp;nbsp;attacks on the United States healthcare system alone are causing an&amp;nbsp;annual burden of &lt;a href="https://www.beckershospitalreview.com/cybersecurity/ransomware-attacks-cost-healthcare-orgs-20-8b-in-2020.html" rel="noopener" target="_blank"&gt;nearly $21 billion&lt;/a&gt;, including well over&amp;nbsp;&lt;a href="https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/" rel="noopener" target="_blank"&gt;$100 million in ransoms&lt;/a&gt;.&amp;nbsp;While the financial costs help illustrate the scale of the problem, the true cost is the tragic reality of impacted patient care –&amp;nbsp;&lt;strong&gt;including&amp;nbsp;higher patient mortality rates&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;For every headline related to cyberattacks, there are likely hundreds more that go unreported. Healthcare-related cyberattacks – including data breaches – almost always involve&amp;nbsp;IoT/loMT devices.&lt;/p&gt;

&lt;p&gt;Hospitals have become easy targets for cyberattacks: they are battling a pandemic with exhausted staff, strained resources and limited cybersecurity expertise. Prioritizing an increased budget for IT departments will secure devices, protect valuable information and limit malicious attacks.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The insecurity of connected medical devices&lt;/h2&gt;

&lt;p&gt;In May 2022, CISA Senior Advisor Joshua Corman&amp;nbsp;&lt;a href="https://www.help.senate.gov/imo/media/doc/Corman.pdf" rel="noopener" target="_blank"&gt;documented the rising risks&amp;nbsp;during a Senate HELP Committee hearing&lt;/a&gt;. And now, in August 2022, Ivanti’s partner, Cynerio, has teamed with the Ponemon Institute to dive even deeper into the impact of insecure medical devices on hospitals and patients in&amp;nbsp;their &lt;a href="https://www.cynerio.com/ponemon-survey-insecurity-of-connected-devices-in-healthcare-2022#ponemon-report" rel="noopener" target="_blank"&gt;Insecurity of Connected Devices in Healthcare 2022&amp;nbsp;Report&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The report conducted a survey of over 500 hospitals on IoMT threats and security. The report shows:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;43% of respondents experienced at least one ransomware attack.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;88% of cyberattacks involve an IoMT device.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The average data breach cost is well over $1 million.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Tragically, 24% of attacks result in increased mortality rates.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The report also highlights that reselling patient data is still valuable, as demonstrated by the 43% of respondents who suffered at least one data breach in the prior 24 months.&lt;/p&gt;

&lt;p&gt;Of those that suffered a data breach in the prior 24 months, 65% suffered an average of five or more data breaches in that timeframe, with IoT/IoMT devices involved 88% of the time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Respondents were asked to estimate the total cost of the largest data breach they had experienced involving an IoMT/IoT device, including direct cash outlays, direct expenditures, indirect labor costs, overhead costs and lost business opportunities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The cost, based on the respondents’ answers, was estimated at&amp;nbsp;&lt;strong&gt;$13 million&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;Cyberattacks are frequent with a notable impact on patient care&lt;/h2&gt;

&lt;p&gt;Fifty-six percent of respondents say their organizations experienced one or more cyberattacks involving IoMT/IoT devices in the past 24 months, with an average of 12.5 attacks over the same time frame.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Forty-five percent of these respondents report adverse impacts on patient care from these attacks&amp;nbsp;and 53% percent of those (24% in total) report adverse impacts resulting in increased mortality rates.&lt;/p&gt;

&lt;h2&gt;Ransomware is a vicious, profitable cycle fueled by frequent hospital payments&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Hospital ransomware attacks are crippling to all aspects of a hospital and often present only negative options.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Hospitals are increasingly seeing ransom payments as a viable option for a quick recovery, with 47% choosing to pay.&lt;/p&gt;

&lt;p&gt;Thirty-two percent of the ransoms paid fall between $250k - $500k.&amp;nbsp;Those that did not pay the ransom most frequently attributed their actions to an effective backup strategy (53%) and company policy (49%).&lt;/p&gt;

&lt;h2&gt;Healthcare faces widespread attack types&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Staffing shortages lead not only to empty seats but large gaps in knowledge. Attackers have taken advantage of the IoT/IoMT security knowledge gap by unleashing an array of attacks on healthcare environments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Among the top threats to IoT and other connected devices, respondents expressed the most concern about:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Lack of visibility into IoT networks at 45%.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Phishing at 45%.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Zero-day attacks at 41%.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Ransomware attacks at 39%.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Tragic examples&lt;/h2&gt;

&lt;p&gt;In September 2020, employees at a Fortune-500 owner of a nationwide network of hospitals&amp;nbsp;&lt;a href="https://threatpost.com/ransomware-hits-hospitals-hardest/162096/" rel="noopener" target="_blank"&gt;reported widespread outages&lt;/a&gt;&amp;nbsp;that resulted in delayed lab results, a fallback to pen and paper and patients being diverted to other hospitals.&lt;/p&gt;

&lt;p&gt;And a worst-case scenario happened in 2019 at&amp;nbsp;&lt;a href="https://www.healthcareitnews.com/news/hospital-ransomware-attack-led-infants-death-lawsuit-alleges" rel="noopener" target="_blank"&gt;Springhill Medical Center in Alabama&lt;/a&gt;, where access to heart monitors disabled by a cyberattack allegedly kept staff from spotting blood and oxygen deprivation that led to a baby’s death.&lt;/p&gt;

&lt;h2&gt;Hospitals are not spending enough to secure devices&lt;/h2&gt;

&lt;p&gt;On average, hospitals report spending 3.4% of their IT budget ($5 million annually) to secure devices.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Budget owners often struggle with allocating resources to secure their environments. This will be an ongoing challenge in the IoT/IoMT space for years to come.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The typical&amp;nbsp;&lt;strong&gt;IT budget for respondents averages $145 million&lt;/strong&gt;&amp;nbsp;in the fiscal year, and an average of 17% of that spend is focused on IT security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Of that security spend, an average of 20% was reported to go towards IoT/IoMT device security – an average of $5 million in the fiscal year – not nearly enough given the potential consequences of a data breach or impact on patient safety.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These numbers will probably vary widely but provide an initial baseline for others to work from.&lt;/p&gt;

&lt;h2&gt;Perceived risk in IoT/IoMT devices is high, but proactive security actions and accountability are not&lt;/h2&gt;

&lt;p&gt;Seventy-one percent of respondents rated the security risks presented by IoT/IoMT devices as high or very high, while only 21% report a mature stage of proactive security actions.&lt;/p&gt;

&lt;p&gt;Of the 46% who performed well-known and accepted procedures such as scanning for devices, only 33% of these respondents keep an inventory of the devices that were discovered.&lt;/p&gt;

&lt;h2&gt;A recommended course of action&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;All IoT/IoMT devices need to be secured and accounted for now, before it is too late.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These devices require&amp;nbsp;&lt;a href="https://www.ivanti.com/products/medical-device-management"&gt;industry-specific software&lt;/a&gt;&amp;nbsp;based on NIST guidelines such as one that was recently implemented at a large hospital in the Midwestern US.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;According to the report, responsibility of loT/loMT is distributed widely between different departments – leading to confusion and finger pointing when issues arise. Consolidation of accountability for all IoT/IoMT devices needs to be within one department of the hospital, not multiple departments as currently.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Lastly, hospitals need to increase their&amp;nbsp;average&amp;nbsp;spend on securing IoT/IoMT devices to 5%-7% of their IT total budget at a minimum – up from the current 3%. This equates to $7.25M-$10.1M in spending, far less than the damages that come with increased mortality rates, ruined reputations and lost productivity.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 25 Aug 2022 18:18:18 Z</pubDate></item><item><guid isPermaLink="false">183f5940-5341-4cc5-a58d-ea6e4f063cf3</guid><link>https://www.ivanti.com/blog/5-new-aethon-tug-robot-vulnerabilities-expose-healthcare-facilities-to-iomt-hackers</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>5 New Aethon TUG Robot Vulnerabilities Expose Healthcare Facilities to IoMT Hackers</title><description>&lt;p&gt;Healthcare providers must be extremely vigilant in their cybersecurity defense posture. After all, &lt;a href="https://www.ivanti.com/blog/ransomware-cost-hospitals-nearly-21b-last-year-how-protected-are-you"&gt;vulnerabilities in the Internet of Medical Things (IoMT) cost hospitals nearly $21 billion in 2021&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;New security discoveries by Ivanti partner &lt;a href="https://marketplace.ivanticloud.com/partners/Cynerio" rel="noopener" target="_blank"&gt;Cynerio&lt;/a&gt; recently made that statistic personal for many providers. While working with an existing healthcare customer, Cynerio found five zero-day vulnerabilities in Aethon TUG autonomous robots – an IoMT device found in many healthcare facilities.&lt;/p&gt;

&lt;h2&gt;What are Aethon TUG robots?&lt;/h2&gt;

&lt;p&gt;Hundreds of hospitals around the world deploy &lt;a href="https://aethon.com/products/" rel="noopener" target="_blank"&gt;Aethon TUG smart mobile robots&lt;/a&gt; to deliver medicine and maintenance supplies. They can even perform simple tasks, such as emptying waste baskets.&lt;/p&gt;

&lt;p&gt;A diverse collection of sensors and cameras enable these robots to move around a hospital without bumping into anyone or anything.&lt;/p&gt;

&lt;p&gt;These robots are primarily used in nursing, pharmacy, labs, food service and waste removal organizations to increase efficiencies and decrease labor costs.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What IoMT vulnerabilities did Cynerio find in Aethon TUG robots?&lt;/h2&gt;

&lt;p&gt;Some of the IoMT vulnerabilities &lt;a href="https://marketplace.ivanticloud.com/partners/Cynerio" rel="noopener" target="_blank"&gt;Ivanti partner Cynerio&lt;/a&gt; found in their healthcare customer’s Aethon TUG robots could allow hackers to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Disrupt&lt;/strong&gt; or impede the timely delivery of patient medications and lab samples essential for optimal patient care.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Shut down &lt;/strong&gt;or obstruct hospital elevators and door-locking systems&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitor&lt;/strong&gt; or take videos and pictures of sensitive patient medical records, as well as vulnerable patients, staff and hospital interiors.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Access&lt;/strong&gt; restricted areas by controlling all physical capabilities and locations of the robots, along with unintended interaction with patients and even crashing into staff, visitors and equipment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hijack&lt;/strong&gt; legitimate administrative user sessions in the robots’ online portal and inject malware through the robots’ browser, further perpetuating cyber attacks on IT and security team members at related healthcare facilities.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The Aethon TUG vulnerabilities put patients and providers at risk of attack from cyber criminals if not immediately remediated.&lt;/p&gt;

&lt;h2&gt;How can healthcare providers address the Aethon TUG vulnerabilities?&lt;/h2&gt;

&lt;p&gt;There are three primary methods to secure Aethon TUG robots against these latest vulnerabilities:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Download&lt;/strong&gt; the latest firmware updates from Aethon, included in its version 24 firmware release. &lt;em&gt;All TUG robots operating on earlier firmware versions will be susceptible to cyberattacks exploiting these vulnerabilities!&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Disable&lt;/strong&gt; external connectivity of all Aethon TUG robots.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Segment&lt;/strong&gt; the TUG robots’ network to minimize the exposure.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For additional protection, the Cybersecurity and Infrastructure Security Agency (CISA) &lt;a href="https://www.cisa.gov/news-events/ics-advisories/icsa-22-102-05" rel="noopener" target="_blank"&gt;recommends&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Not exposing control system devices and systems to the Internet.&lt;/li&gt;
	&lt;li&gt;Locating all control systems behind firewalls.&lt;/li&gt;
	&lt;li&gt;Isolating systems such as the TUG Home Base Server from business networks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To learn more about this latest IoMT vulnerability, we encourage you to review this &lt;a href="https://www.hipaajournal.com/jekyllbot5-vulnerabilities-allow-hackers-to-take-control-of-aethons-tug-hospital-robots/" rel="noopener" target="_blank"&gt;HIPAA Journal article&lt;/a&gt;. Aethon has also &lt;a href="https://aethon.com/aethon-statement-on-cyber-security-report/" rel="noopener" target="_blank"&gt;released a statement&lt;/a&gt; on the vulnerability.&lt;/p&gt;

&lt;p&gt;If your organization is ready for proactive remediation and security of all its IoMT devices, then you may be interested in &lt;a href="https://www.ivanti.com/products/medical-device-management"&gt;Ivanti’s Neurons for Healthcare&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 19 Apr 2022 11:35:56 Z</pubDate></item><item><guid isPermaLink="false">5b89444b-12be-4099-b867-a3639e88b609</guid><link>https://www.ivanti.com/blog/ransomware-cost-hospitals-nearly-21b-last-year-how-protected-are-you</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Security</category><title>Ransomware Cost Hospitals Nearly $21B Last Year. How Protected Are You?</title><description>&lt;p&gt;Today, as computing power and wireless capabilities improve, organizations are increasingly leveraging Internet of Medical Things (IoMT) technologies, such as&amp;nbsp; internet-connected blood pressure monitors, continuous glucose monitors and MRI scanners. These tools, with their ability to collect, analyze and transmit health data, improve efficiencies, lower care costs and drive better patient outcomes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However,&lt;a href="https://www.cynerio.com/landing-pages/the-state-of-healthcare-iot-device-security-2022" rel="noopener" target="_blank"&gt; according to a recent study on the state of healthcare IoT and IoMT devices&lt;/a&gt;, almost 80% of these devices are used so frequently that hospital security has little time to analyze them for risks and attacks, apply the latest patches and carry out segmentation to protect the devices on the network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s a major problem, adding up to nearly $21 billion in ransomware costs in 2021.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Cybersecurity IoT and IoMT challenges&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Hospital and healthcare organizations have been increasingly targeted for cybersecurity attacks, especially ransomware attacks that cripple networks and endanger patient safety. These attacks have gotten more sophisticated and have targeted older IoT devices, not just traditional devices like mobile devices and laptops, but things like older MRI machines and IV pumps.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IV pumps are the most common healthcare IoT device and possess the lion’s share of risk. The ubiquitous IV pump makes up 38% of a hospital’s typical healthcare IoMT footprint, and a whopping 73% of those IV pumps have a vulnerability that would jeopardize patient safety, data confidentiality or service availability if it were to be exploited by an adversary.&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="top connected devices in hospitals" src="https://static.ivanti.com/sites/marketing/media/images/blog/hospital-1.png"&gt;&lt;/p&gt;

&lt;p&gt;As IoMT and IoT devices are everywhere, hospitals and healthcare organizations are prime targets because 1) they typically don’t have visibility into the risk of these devices, 2) they don’t know the number of IoT devices they have, and 3) they lack a comprehensive solution to address risk and protect IoT devices.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Protecting hospital IoT and IoMT devices&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The first step to protecting hospital IoT and IoMT devices is identifying and fixing vulnerable devices, as 53% of IoMT and IoT devices contain critical risks. For example, a third of bedside healthcare IoMT devices, the devices closest to patient care and vital to optimal health outcomes, have an identified critical risk.If any of these devices were attacked, patient safety, service availability or data confidentiality could be severely impacted, either directly or as part of an attack's collateral damage.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Second, it’s vital to ensure the alignment of stakeholders, as devices fall under different teams within hospital organizations. These teams need to cohesively identify and fix all the vulnerable endpoints within their environment, and not just a portion of them.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And third, you must work to increase the urgency level to secure these devices now to meet the cybersecurity goals of the company. Waiting until an asset inventory is completed is no longer an option, as it will most likely prove too late.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The solution: Ivanti Neurons for Healthcare&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The good news is there is a solution in the market that can address these challenges – Ivanti Neurons for Healthcare.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Healthcare delivers the complete picture of IT across healthcare facilities by discovering and intelligently profiling medical devices and the Internet of Medical Things (IoMT), assessing security risks, reporting threats and reconciling device information across multiple data sources. Most importantly, this solution can segment the entire device fleet to help with the troubleshooting process as well as not jeopardize patient safety, patient info, or clinical workflows.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you’re interested in learning more, &lt;a href="https://www.ivanti.com/products/medical-device-management"&gt;click here.&amp;nbsp; &lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;And if you’re in the Miami Beach area March 6-9th, come see a live demo/presentation in the AT&amp;amp;T Healthcare booth #902 at the VIVE Show. We will also have a live demo/presentation at the HIMSS Show on March 13-18th in Orlando, FL in the AT&amp;amp;T Healthcare booth #2659. We look forward to continuing the discussion.&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Mon, 28 Feb 2022 17:59:33 Z</pubDate></item><item><guid isPermaLink="false">cd39007a-6aac-435b-b0af-d143416c66e5</guid><link>https://www.ivanti.com/blog/ivanti-named-a-leader-in-latest-q4-21-forrester-wave-report-for-uem</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Endpoint Management</category><title>Ivanti Named a Leader in Latest (Q4’21) Forrester Wave Report for UEM</title><description>&lt;p&gt;Ivanti was recently named a leader in The Forrester Wave™: Unified Endpoint Management, Q4 2021 report.&amp;nbsp; Furthermore, Ivanti was noted as the &lt;u&gt;only&lt;/u&gt; vendor in the market that could provide a fully integrated UEM, ESM, and End-User Experience Management (EUEM) capability. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;The Everywhere Workplace&lt;/h2&gt;

&lt;p&gt;The report recognizes that in the current anywhere-work environment, &amp;nbsp;buyers are looking for – 1) better management of distributed devices, 2) security surrounding those devices, and 3) on-going enhancement of the user experience.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Additionally, Forrester predicts as we approach 2022, that 60% of organizations will pursue a hybrid working strategy in which employees divide their work time between home and office. This prediction further justifies that the Everywhere Workplace has become the norm on a global scale.&amp;nbsp; Key UEM capabilities to help set the foundation of the Anywhere Workplace, according to Forrester, include enabling a better digital employee experience, providing modern management designed for the distributed workforce, and offering native security capabilities to support a Zero Trust framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Customer Trends&lt;/h2&gt;

&lt;p&gt;From a customer trend perspective, the report also notes that enterprises are focused on delivering location-agnostic device management capabilities such ascloud-first OS delivery, peer-to-peer patch management, and remote support.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti believes it is currently one of the best UEM solutions in the market, with a powerful combination of portfolio, vision, and partner ecosystem that is unmatched in the industry.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Ivanti Case Study: Conair&lt;/h2&gt;

&lt;p&gt;One customer example of Ivanti’s UEM expertise is Conair. &amp;nbsp;Ivanti helped Conair’s distributed workforce around the world by migrating nearly 700 devices to the cloud that were a mix of company-owned and employee-owned iOS and Android devices.&amp;nbsp; Additionally, Ivanti helped Conair deploy Zero Sign-On to provide secure, conditional access to Microsoft Office 365 on any device. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Ivanti Resources&lt;/h2&gt;

&lt;p&gt;For additional information about the Conair case study, click &lt;a href="https://www.ivanti.com/customers/conair"&gt;here&lt;/a&gt; and if you’re interested in reading the full Forrester Wave report, click &lt;a href="https://www.ivanti.com/resources/library"&gt;here&lt;/a&gt;.&amp;nbsp; There’s also The Future of UEM webinar (link is &lt;a href="https://www.ivanti.com/webinars"&gt;here&lt;/a&gt;) or contact Ivanti &lt;a href="https://www.ivanti.com/company/contacts"&gt;Sales&lt;/a&gt; to learn more on how we can help your organization with a best-in-class UEM strategy.&amp;nbsp; &amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 07 Dec 2021 21:31:19 Z</pubDate></item><item><guid isPermaLink="false">03551365-c487-45f5-affa-c04d478abf81</guid><link>https://www.ivanti.com/blog/new-endpoint-manager-release-enhances-experiences-functionality-and-security</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/blog/authors/steve-feldstein</atom:uri></atom:author><category>Endpoint Management</category><title>New Endpoint Manager Release Enhances Experiences, Functionality, and Security</title><description>&lt;p&gt;As more organizations continue moving to hybrid work environments, endpoint security and management has never been more critical to both IT staff and employees. IT and line of business teams have too many systems to work across, forcing IT departments to spend resources and budget on fixing assets that are out of warranty/out of support. Additionally, employees are unsatisfied with their onboarding experience. The good news is with Ivanti’s new Endpoint Manager Release SU1, you can have peace of mind knowing that Ivanti continues to help manage modern devices in the Anywhere Workplace.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Enhanced Microsoft Autopilot Support&lt;/h2&gt;

&lt;p&gt;So, what are the key enhancements in this new release and why should you care? The first important enhancement surrounds Microsoft's Autopilot support. This support allows customers to seamlessly deploy Microsoft devices (auto enrollment) to end users, regardless of where they are located and without infrastructure changes. Improvements include supporting additional modes of Windows Autopilot (e.g., user driven mode, user driven hybrid AAD, and pre-provisioning).&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Support for the Latest OS Platforms&lt;/h2&gt;

&lt;p&gt;The second key improvement focuses on support for the latest OS platforms. Customers can utilize Windows 11, macOS 12, iOS 15, and Android 12 devices without any loss of management functionality or downtime, and with Day Zero support. Additionally, with enhanced inventory data, IT admins will now be able to collect data specific to the newest ARM processors that are running most of the latest hardware in the market.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Improved Remote Control&lt;/h2&gt;

&lt;p&gt;The third key improvement involves improving remote control. Remote Control is a feature of Endpoint Manager that allows the IT team to access devices that are outside of their physical location while enabling admins to quickly access, service, and resolve user software and hardware related issues. Specific improvements include significant reduction in time required to establish a session, optimization of code, persistent process, strengthening of security, and smart card support. The reduced connection times result in significant saved hours, improved productivity, and providing an overall better experience for users. Additional information can be found&amp;nbsp;at&amp;nbsp;&amp;nbsp;&lt;a href="https://www.ivanti.com/use-cases/remote-control-all-of-my-devices-worldwide"&gt;https://www.ivanti.com/solutions/needs/remote-control-all-of-my-devices-worldwide&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Smart Patching&lt;/h2&gt;

&lt;p&gt;The last key improvement area focuses on smart patching. IT admins spend a lot of time trying to identify the root cause of an issue. Return codes in certain situations are generic and do not provide clear insights. With this latest update, Ivanti has updated the return codes in certain scenarios to make it clear what is happening as well as enhancing the patch log data and bringing more patch information on the core. This will facilitate quicker issue resolution by eliminating the need to check each endpoint and identify the root cause as well as realize improvements in productivity, bringing information closer to the user and reduce possible log “hunting.” Furthermore, possible cost savings may be realized as this new release optimizes bandwidth management by setting a minimum disk space property on the agent settings. If the endpoint is below this threshold, Ivanti’s Endpoint Manager will not download the patch. Thus, saving critical bandwidth. Lastly, Ivanti has expanded the patch API catalog with new APIs for third party tools, enhancing the user experience as well as enabling the organization to repurpose third party tools.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In closing, Ivanti continues to provide our customers with great experiences, leading functionality, and secure Unified Endpoint Management solutions. For further information, &lt;a href="https://forums.ivanti.com/s/contactsupport?language=en_US" target="_blank"&gt;please contact Ivanti Support&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 27 Oct 2021 16:53:44 Z</pubDate></item></channel></rss>