We’re excited to announce our new quarterly release cadence. In addition to aligning the former AppSense product lines with the Ivanti Management Suite products, the new cadence means that you, our customers, will have access to new releases every three …Read more
Where are you right now? Are you at work? More specifically, where are you at work?
These days, we can be “at work” almost anywhere. At a desk at our office, sure. But also in a conference room. Or at …Read more
In today’s fast-paced, ever-changing IT landscape, the need for at-a-glance views has never been more important. Dashboards that contain random noise in place of actionable insight make the task of acting on analysis difficult.
But what do we do with …Read more
Security threats and breaches are regularly becoming front page news, and malware in its many guises is (quite rightly) front-of-stage as the villain of the hour.
But recently there was a reprise from a seemingly innocent source that can be …Read more
The Windows user profile is a record of personal, user-specific data associated with a named user’s identity and desktop environment. It contains many elements, such as settings, configuration items, connections and history. User profiles have gone from their original, fairly …Read more
Of course, we all want our colleagues (and ourselves) to be happy, or at least not unhappy, at work. Workers who are happy, or at least not unhappy, tend to be more productive and easier to get along with, after …Read more
I.T. can be a real ditch
if there’s a patching glitch.
Down in the trenches
amid all the stenches?
Time to make a switch.
Okay, I admit it. I love limericks. So much so that I’ve penned a few on …Read more
The problems of protecting endpoints are pretty well understood. You have private data and intellectual property that others want.
On the other hand, you have employees who need to do their jobs and who require access to that private data …Read more
When an operating system is at the end of its life and no longer receiving security updates, it is a sitting duck. Attackers have free rein to continue finding exploitable defects with no fear of patches to cramp their style.…Read more
Balancing user control and flexibility with the potential dangers of compromising security is no easy task.
Application control is a sure way to make sure malware isn’t unknowingly installed on a machine or network. But there are some features you …Read more