Friday, April 27, 2018
The Leading IT Management Blog | Ivanti

The Leading IT Management Blog | Ivanti

  • Security
  • Patch Tuesday
  • ITSM
  • ITAM
  • GDPR
  • Endpoint Mgmt
  • Workspace Mgmt
  • Supply Chain
  • Product Updates

HT Posts

At Ivanti we like to stay in the know of all interesting and vital industry news. Explore the different security articles that are important to the IT and tech industry and give us your opinion. Let’s share ideas and learn from each other.

HT Posts 

State of Enterprise Security Still Shaky Says New Survey

March 2, 2016June 26, 2017 Russ Ernst 334 Views

Today, we’re announcing the results of a survey recently commissioned on the state of enterprise security. Conducted by Ultimate Windows Security, the report provides visibility into the uses, concerns and challenges that IT departments face in respect to endpoint security, patching, cloud applications and mobile management.…

Read more
HT Posts ITSM 

2016: Looking Ahead at ITSM—Want to Place Any Bets?

January 15, 2016January 5, 2018 Dennis Drogseth 355 Views

I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM). 

…
Read more
HT Posts ITSM 

Why Analytics and Automation Are Central to ITSM

November 18, 2015April 2, 2018 Dennis Drogseth 731 Views

In research done earlier this year, we looked at changing patterns of IT service management (ITSM) adoption across a population of 270 respondents in North America and Europe.…

Read more
HT Posts 

Secure Alternatives to Android

September 9, 2015June 21, 2017 Derek Leung 877 Views

In my previous post I discussed the flurry of Android vulnerabilities which have come to light over the last year or so.…

Read more
HT Posts 

Change Management: The Big Picture

July 27, 2015June 21, 2017 Dennis Drogseth 837 Views

This is the first of a three-part series on change management. In this blog, I’ll try to answer the question, “What is change management?” from both a process and a benefits (or use-case) perspective.…

Read more
HT Posts 

How to Bypass PayPal Two Factor Authentication

June 25, 2015March 8, 2018 Graham Cluley 2877 Views

One of PayPal’s primary mechanisms to protect accounts from being hacked may have been fundamentally flawed for years.

That’s the concern raised by security researchers who uncovered a method of bypassing PayPal’s two-factor authentication (2FA), the technology that is supposed to protect your account should your username and password fall into the wrong hands.

…
Read more
HT Posts 

Office 365: To Cloud or Not to Cloud—That IS the Question!

June 19, 2015June 19, 2017 Steve Brasen 818 Views

It’s time to take a serious look at Office 365. The cloud edition of Microsoft’s broadly adopted business productivity suite – which bundles such popular packages as Microsoft Word, Microsoft Excel, Microsoft PowerPoint, and Microsoft Outlook – has been both heavily praised and heavily criticized since its introduction in 2011.…

Read more
HT Posts 

Is Your Organization Ready for Windows 10?

June 5, 2015June 21, 2017 Steve Brasen 422 Views

Here we go again. New releases of Microsoft’s flagship operating system are typically greeted with a combination of angst, curiosity, confusion, and dread in equal measure.…

Read more
HT Posts 

Is Your Graphics Card Hiding a Rootkit or Keylogger?

May 12, 2015June 21, 2017 Graham Cluley 1182 Views

Question: With hundreds of thousands of new malware samples being analysed every day, and anti-virus software being constantly updated to combat the threat, where might a cybercriminal want to hide their trojan horse from detection?…

Read more
HT Posts 

The Benefits of Service Automation for Employee Onboarding

February 27, 2015March 8, 2018 Jim Blayney 638 Views

All companies strive to integrate new employees as quickly and seamlessly as possible, as a smooth onboarding process allows for greater productivity and overall cost efficiency.…

Read more
  • ← Previous
  • Next →

Search

Recent Posts

  • Ivanti at Cyber UK 2018: Trying to Run Before You Can Walk
  • State Sponsored Hacking out of the Shadows & Into a Business Near You
  • Wham! Bam! Fight Off SamSam Ransomware Attacks with Patching
  • The ICYMI Weekly Round-Up: April 17–April 23, 2018
  • Product Newsletter Blog for April 2018

Archives

Categories

  • Apple
  • AppSense Posts
  • Concorde
  • Endpoint Mgmt
  • Events
  • Expert Interviews
  • GDPR
  • HT Posts
  • ICYMI
  • Interchange
  • International
  • IT Stories
  • ITAM
  • ITSM
  • Ivanti News
  • Ivanti Rebrand
  • LD Posts
  • Patch Tuesday
  • Product Updates
  • Ransomware
  • RES
  • Security
  • SH Posts
  • STEM
  • Supply Chain
  • Tech & IT Podcasts
  • Threat Thursday
  • User Workspace Management
  • Windows 10 Migration
  • WL Posts
  • Women In Tech
Copyright © 2018 Ivanti. All rights reserved.  |  PRIVACY & LEGAL