free event: interchange 2020We're here to support you and your organization during these uncertain times. Check out our helpful resources regarding how to navigate the IT environment with all the changes COVID-19 brings. We've written blogs related to remote work such as:

Our lives and businesses are changing daily in response to the current health climate. It is an uncertain and unprecedented time for everyone, and our concern is always first and foremost the health and safety of our employees, partners, and customers. 

We also take seriously the trust you have in us to help you operate your business every single day, in any environment.

Protect Your Remote Workforce

A user's home network is now the easiest access point for threat actors. Ivanti CISO Phil Richards and Security guru Chris Goettl go in-depth in this March Threat Thursday webinar on the five things you can do now to ensure good security hygiene. You can also read the blog here

Here is a quick look at what is covered in both the webinar and the blog:

1. Asset Management

Your network has just expanded. You have new devices and new networks. You need to be thinking in terms of these new assets, how to identify, track and manage them and how to make sure your users have access to what they need and nothing more.

Learn more about Ivanti IT Asset Management.

2. Good Security Hygiene

Cyber criminals have been working from home forever. Your team is new to it. An employee’s home network is now the easiest access point to your environment.

Your IT team needs to be leading the push to preserve good security hygiene now that users are at home. It may be tempting for users to visit sites they wouldn’t normally access at the office, but hackers are counting on this. A little education campaign may be in order to make sure users aren’t taking liberties and visiting sites that have been known to infect devices with malware.

3. Configuration Management

Your corporate VPN is your first line of defense. Use GPO policies and configuration settings to control the systems that attach to your network. Configure your VPN for allowed devices only. Ensure that vendors or customers accessing your network have the right security structure in place before connecting.

Learn more about Ivanti Configuration Management.

4. Patch, Even if it Isn’t Your Computer

Whether you have an Ivanti solution, are using SCCM, or another vendor’s endpoint management solution—Ivanti’s patching capabilities can help you secure your environment in less time with less effort.

Learn more about Ivanti Patch for Endpoint Manager.

5. Add AV on Your Remote Systems

We’ll start with a story. Recently Ivanti did an organization-wide deployment of Crowdstrike’s AV/AM solution. We deployed to more than 1,700 endpoints and only one person noticed. There was no disruption to business-critical systems, no unnecessary or unplanned downtime, it was as smooth as can be. The one person that noticed emailed IT only because they spotted a notification that Crowdstrike was now active on their machine.

Read the full blog of all the above points and more.

Ivanti Unified Endpoint Management

Do more than keep your business up and running. Consolidate your endpoint and workspace management to control assets, compliance, costs, and security. Ivanti UEM gives administrators the insights and visibility into their IT environment to discover, manage, and secure endpoints.

Ivanti IT Asset Management

Cypress Fairbanks, the largest independent school district in Texas, saves hundreds of days per year and manages more than 70,000 machines using Ivanti solutions. Read the case study.

UEM vs. ITAM: What's the Difference? 

Trying to achieve digital transformation? Implement Unified Endpoint Management along with IT Asset Management solutions. Even though both strategies are focused on IT assets, their objectives are not the same. We'll show you their key differences.