<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/rss" /><link>https://www.ivanti.com/blog</link><item><guid isPermaLink="false">51324a8a-acee-422c-8cda-511917412ff7</guid><link>https://www.ivanti.com/blog/agentic-ai-itsm-system-of-record</link><atom:author><atom:name>Alka Malik</atom:name><atom:uri>https://www.ivanti.com/blog/authors/alka-malik</atom:uri></atom:author><category>Service Management</category><category>Artificial Intelligence</category><title>Ivanti Launches Agentic AI on the System of Record You Trust</title><description>&lt;p&gt;Investors and enterprises&amp;nbsp;are finally asking&amp;nbsp;the question&amp;nbsp;they'd&amp;nbsp;been avoiding: which software companies will survive the AI revolution, and which will be made obsolete by it? The answer is becoming clear. Companies that serve as the system of record, the authoritative source of truth that AI itself depends on,&amp;nbsp;are essential.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Today, Ivanti is&amp;nbsp;announcing&amp;nbsp;a controlled release of the&amp;nbsp;&lt;a href="https://www.ivanti.com/ai/agenticai"&gt;Ivanti Neurons&amp;nbsp;AI Self-Service Agent&lt;/a&gt;,&amp;nbsp;our first autonomous AI solution.&amp;nbsp;We're&amp;nbsp;building&amp;nbsp;from a position of strategic strength,&amp;nbsp;introducing&amp;nbsp;the new solution&amp;nbsp;initially within our&amp;nbsp;IT Service Management (ITSM)&amp;nbsp;framework, building on our long history of intelligent automation&amp;nbsp;through&amp;nbsp;built-in workflows, our Neurons bot infrastructure, generative AI tools&amp;nbsp;and now a fully conversational autonomous agent.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Building the foundation to scale AI&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;There's&amp;nbsp;no shortage of&amp;nbsp;talk&amp;nbsp;about what AI will eventually do,&amp;nbsp;but that potential means nothing&amp;nbsp;without&amp;nbsp;a strong&amp;nbsp;foundation&amp;nbsp;beneath it.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Operationalizing autonomous AI and scaling its impact across an entire organization requires five foundational capabilities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Knowing what exists:&amp;nbsp;&lt;/strong&gt;AI must&amp;nbsp;operate&amp;nbsp;on&amp;nbsp;accurate&amp;nbsp;discovery data, not assumptions. Without real-time visibility into devices, users, configurations&amp;nbsp;and dependencies, autonomous actions become dangerous.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Maintaining&amp;nbsp;institutional memory:&amp;nbsp;&lt;/strong&gt;AI needs&amp;nbsp;durable&amp;nbsp;context that survives organizational change. Relationships,&amp;nbsp;history&amp;nbsp;and dependencies&amp;nbsp;must be preserved in a system of record.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Owning accountability:&amp;nbsp;&lt;/strong&gt;Every autonomous action needs clear ownership and a decision&amp;nbsp;trail. When AI acts on behalf of the organization, someone must be accountable.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enforcing policy:&amp;nbsp;&lt;/strong&gt;AI must distinguish between&amp;nbsp;what's&amp;nbsp;technically possible and&amp;nbsp;what's&amp;nbsp;organizationally permissible. Optimization without governance creates compliance risk.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ensuring auditability:&amp;nbsp;&lt;/strong&gt;Every action or decision made&amp;nbsp;through AI&amp;nbsp;must be traceable,&amp;nbsp;explainable&amp;nbsp;and defensible in an audit.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That's&amp;nbsp;not a limitation of any&amp;nbsp;model,&amp;nbsp;but rather the nature of how AI works. AI is powerful, but it&amp;nbsp;operates&amp;nbsp;on data. And if that data is fragmented, inaccurate&amp;nbsp;or ungoverned, the AI built on top of it will be too.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is&amp;nbsp;what&amp;nbsp;the&amp;nbsp;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Ivanti Neurons Platform&lt;/a&gt;&amp;nbsp;was built to provide. Our Neurons Platform serves&amp;nbsp;as&amp;nbsp;a robust&amp;nbsp;system of record and control&amp;nbsp;panel&amp;nbsp;for IT and security operations. Our Discovery Engine&amp;nbsp;establishes&amp;nbsp;ground truth.&amp;nbsp;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;CMDB&lt;/a&gt;&amp;nbsp;preserves relationships, dependencies, and change history. Our&amp;nbsp;&lt;a href="https://www.ivanti.com/products/it-asset-management"&gt;IT Asset Management&amp;nbsp;(ITAM)&lt;/a&gt;&amp;nbsp;capabilities assign ownership, lifecycle, and accountability. Our Software Estate Management enforces&amp;nbsp;what's&amp;nbsp;allowed versus&amp;nbsp;what's&amp;nbsp;merely detected.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;is&amp;nbsp;more than&amp;nbsp;product&amp;nbsp;architecture.&amp;nbsp;It's&amp;nbsp;the foundation&amp;nbsp;your organization needs&amp;nbsp;to&amp;nbsp;operate&amp;nbsp;securely and intelligently.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;journey to&amp;nbsp;autonomous&amp;nbsp;service&amp;nbsp;delivery&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Agentic&amp;nbsp;AI&amp;nbsp;wasn’t&amp;nbsp;built overnight.&amp;nbsp;At Ivanti,&amp;nbsp;we’ve&amp;nbsp;been building toward this deliberately&amp;nbsp;with a consistent focus on trust, governance,&amp;nbsp;and repeatability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our path to autonomous service delivery was strategic and intentional.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Traditional automation:&amp;nbsp;Established&amp;nbsp;rule-based workflows executing predefined tasks in sequence.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Cognitive AI:&amp;nbsp;Added intelligence&amp;nbsp;through bots, machine&amp;nbsp;learning&amp;nbsp;and predictive analytics, moving IT from reactive to proactive.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Generative AI:&amp;nbsp;Introduced&amp;nbsp;large language models and natural language interaction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Conversational AI:&amp;nbsp;Deepened interactions by adding intent recognition, sentiment detection, and safety guardrails transforming AI from a tool into an interactive partner.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And now,&amp;nbsp;autonomous agents&amp;nbsp;that&amp;nbsp;don't&amp;nbsp;just respond but orchestrate actions across systems while&amp;nbsp;maintaining&amp;nbsp;governance at every step.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Each stage&amp;nbsp;was&amp;nbsp;built on the&amp;nbsp;prior one.&amp;nbsp;And each stage delivered real enterprise value&amp;nbsp;only&amp;nbsp;because it was grounded in&amp;nbsp;accurate&amp;nbsp;data,&amp;nbsp;governance&amp;nbsp;and accountability. That foundation is what makes today's announcement possible.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Introducing&amp;nbsp;Ivanti Neurons AI Self-Service Agent&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The problem is one every IT leader knows well&amp;nbsp;—&amp;nbsp;employees struggle to find answers scattered across disconnected knowledge systems. Basic tickets flood the service desk. Users abandon confusing portals in frustration.&amp;nbsp;IT teams get trapped on a ticket treadmill, doing repetitive work instead of the strategic projects that actually move the business forward.&amp;nbsp;Traditional self-service portals&amp;nbsp;haven't&amp;nbsp;solved this.&amp;nbsp;They're&amp;nbsp;rigid, frustrating, and often create more problems than they resolve.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti&amp;nbsp;Neurons AI Self-Service Agent&amp;nbsp;is different.&amp;nbsp;We’ve&amp;nbsp;all seen&amp;nbsp;chatbots, but this is something else.&amp;nbsp;It’s&amp;nbsp;a true conversational&amp;nbsp;AI agent.&amp;nbsp;It converses, investigates,&amp;nbsp;resolves&amp;nbsp;and escalates only when it needs to. The first release focuses on intelligent knowledge&amp;nbsp;search, incident&amp;nbsp;escalation&amp;nbsp;and&amp;nbsp;the ability to&amp;nbsp;request something from IT using natural language.&amp;nbsp;It feels as easy as texting a friend.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;initial&amp;nbsp;release&amp;nbsp;delivers&amp;nbsp;three&amp;nbsp;things done exceptionally well: intelligent knowledge&amp;nbsp;search, incident&amp;nbsp;escalation when knowledge&amp;nbsp;isn't&amp;nbsp;enough,&amp;nbsp;and the ability to&amp;nbsp;request from&amp;nbsp;a service catalog without the complexity of self-service portal&amp;nbsp;forms.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We understand&amp;nbsp;that time, speed,&amp;nbsp;and accuracy are non-negotiable in the digital era&amp;nbsp;and have&amp;nbsp;built&amp;nbsp;the capabilities with that in mind.&amp;nbsp;The AI&amp;nbsp;Self-Service Agent&amp;nbsp;engages in natural conversation, asks the right questions, queries across internal and approved external sources,&amp;nbsp;and surfaces verified answers. If this process alone&amp;nbsp;doesn't&amp;nbsp;resolve the issue,&amp;nbsp;the agent&amp;nbsp;escalates and captures a structured incident from the conversation&amp;nbsp;without&amp;nbsp;requiring the user to&amp;nbsp;repeat their&amp;nbsp;request, ensuring a frictionless user experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This solution is&amp;nbsp;built on an AI framework designed to grow with it&amp;nbsp;as we execute our full vision for autonomous endpoint management.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Driving&amp;nbsp;real, measurable&amp;nbsp;outcomes&amp;nbsp;that&amp;nbsp;matter&amp;nbsp;most&lt;/h2&gt;

&lt;p&gt;This launch directly advances strategic outcomes for our customers: improving IT productivity, improving digital employee experience,&amp;nbsp;and&amp;nbsp;bringing teams and business functions together across one unified platform.&amp;nbsp;Here’s&amp;nbsp;what that looks like:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For the business, that means measurable productivity gains, lower cost per ticket,&amp;nbsp;and IT operating as a driver of strategic outcomes rather than an operational bottleneck.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Autonomy&amp;nbsp;requires a&amp;nbsp;foundation&amp;nbsp;you&amp;nbsp;can&amp;nbsp;trust&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;What makes&amp;nbsp;our approach to autonomous AI trustworthy and attainable is that&amp;nbsp;the AI Self-Service Agent&amp;nbsp;is&amp;nbsp;built on&amp;nbsp;a system of record as part of the&amp;nbsp;Ivanti Neurons Platform.&amp;nbsp;This ensures that:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our agentic AI&amp;nbsp;doesn't&amp;nbsp;improvise&amp;nbsp;(that is, hallucinate.)&amp;nbsp;It&amp;nbsp;operates&amp;nbsp;from&amp;nbsp;accurate&amp;nbsp;discovery data, validated asset information,&amp;nbsp;and governed workflows.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;It knows what devices exist, who owns them, what software is&amp;nbsp;permitted&amp;nbsp;and what policies apply.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;It&amp;nbsp;maintains&amp;nbsp;durable&amp;nbsp;state and enforces accountability across every action it takes.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The&amp;nbsp;operating model&amp;nbsp;is simple,&amp;nbsp;but powerful:&amp;nbsp;Continuously&amp;nbsp;detect&amp;nbsp;issues before they&amp;nbsp;impact&amp;nbsp;users.&amp;nbsp;Decide&amp;nbsp;using trusted data from the system of record.&amp;nbsp;Act&amp;nbsp;through governed automation within defined boundaries.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is&amp;nbsp;the difference between AI that generates answers and AI that&amp;nbsp;organizations can trust&amp;nbsp;in production, at enterprise scale.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;future&amp;nbsp;we're&amp;nbsp;building&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;This launch is both a milestone and a&amp;nbsp;foundation for&amp;nbsp;what’s&amp;nbsp;next.&amp;nbsp;We're&amp;nbsp;building autonomous capabilities on the system of record that AI itself depends on. That makes our platform more resilient, our customer relationships more&amp;nbsp;durable&amp;nbsp;and the value we deliver stronger over time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The future of IT is anticipatory, self-driven&amp;nbsp;and strategic. IT leaders&amp;nbsp;aren't&amp;nbsp;reactive&amp;nbsp;ticket-takers.&amp;nbsp;They're&amp;nbsp;orchestrators of intelligent, self-healing infrastructure. Autonomous agents handle the routine, learn&amp;nbsp;continuously&amp;nbsp;and escalate the complex to human experts&amp;nbsp;—&amp;nbsp;all within governance guardrails that the system of record enforces.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We've&amp;nbsp;spent years building toward this moment.&amp;nbsp;I'm&amp;nbsp;proud of what our team has delivered,&amp;nbsp;and&amp;nbsp;I'm&amp;nbsp;even more excited about what comes next.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 20 Apr 2026 22:00:02 Z</pubDate></item><item><guid isPermaLink="false">b1263255-8700-4128-98cd-3091094f2a89</guid><link>https://www.ivanti.com/blog/sovereign-cloud-data-sovereignty-eu</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-destefano</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>Digital Sovereignty and Sovereign Cloud: Protecting EU Cloud Data for Operational Resilience</title><description>&lt;p&gt;Traditional data protection followed a straightforward principle: Data stored in country A is protected by the laws of country A; data stored in country B is protected by the laws of country B. But in today’s global economy, where your data physically resides no longer determines which governments can demand access to it.&lt;/p&gt;

&lt;p&gt;Cloud infrastructure brought new jurisdictional complexity. The physical location of data centers, the nationality of the cloud provider's headquarters, and the entity controlling operations can each create competing jurisdictional claims, potentially allowing multiple governments to demand access to the same data.&lt;/p&gt;

&lt;h2&gt;What is digital sovereignty?&lt;/h2&gt;

&lt;p&gt;This challenge has a name: digital sovereignty. Digital sovereignty is the principle that organizations maintain complete control over their data within their home jurisdiction's legal framework. This idea has become a necessity for organizational resilience as businesses work in a more fractured, less trusting geopolitical world. Private and public organizations need secure access to cloud-based platforms that are compliant with local regulatory requirements and shielded from the known or unknown geopolitical risks their region faces.&lt;/p&gt;

&lt;h2&gt;How the U.S. CLOUD act impacts EU data residency&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://www.justice.gov/criminal/cloud-act-resources" rel="noopener" target="_blank"&gt;2018 US CLOUD (Clarifying Lawful Overseas Use of Data) Act&lt;/a&gt; further cemented these concerns for EU organizations. This law empowers US law enforcement to compel any US-based cloud provider to produce data stored anywhere globally — regardless of the data's physical location or the customer's nationality.&lt;/p&gt;

&lt;p&gt;Both the US CLOUD act and the &lt;a href="https://www.congress.gov/crs-product/IF11451" rel="noopener" target="_blank"&gt;Foreign Intelligence Surveillance Act (FISA)&lt;/a&gt; have given firms in the European Union cause for concern. Through these two policies, US authorities could access data contained within cloud platforms of any US-headquartered organization, even when the cloud data center is stationed in another country.&lt;/p&gt;

&lt;p&gt;For EU‑based companies, using US‑based tools triggers specific &lt;a href="https://www.ivanti.com/blog/what-is-gdpr"&gt;GDPR obligations&lt;/a&gt; because personal data leaves the EU. And since the EU–US Privacy Shield was invalidated (known as “Schrems II”), EU companies need other protections. Standard Contractual Clauses (SCCs) remain valid but are conditional and complex as they require case-by-case review.&lt;/p&gt;

&lt;p&gt;A subsequent Data Privacy Framework has been introduced since, but underlying trust among the nations involved only goes so far. These dynamics increased pressure to ensure &lt;a href="https://www.ivanti.com/use-cases/data-protection-application-security"&gt;data protection&lt;/a&gt;, and so sovereign cloud solutions were needed to ensure operational resiliency.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons for MDM – Sovereign Edition: built for EU cloud sovereignty&lt;/h2&gt;

&lt;p&gt;For our partners and customers in the EU, Ivanti Neurons for MDM Sovereign Edition addresses these requirements through fundamentally different architecture and operations. Located in Germany and independently operated, this solution was designed to align with the Cloud Sovereignty Framework of the European Commission and has been evaluated by the highly reputable &lt;a href="https://cyberintelligence.institute/" rel="noopener" target="_blank"&gt;cyberintelligence.institute&lt;/a&gt;, where their expert assessment explained:&lt;/p&gt;

&lt;p&gt;“The Ivanti Sovereign Cloud demonstrates a high level of European control in the areas of data processing, security and compliance governance. In its current configuration, the Ivanti Sovereign Cloud achieves at least SEAL 2 certification, meaning that data sovereignty is ensured in all areas. Furthermore, the Ivanti Sovereign Cloud meets the requirements for SEAL 3 certification in many relevant areas, thus achieving digital resilience.”&lt;/p&gt;

&lt;p&gt;You can read the &lt;a href="https://www.ivanti.com/lp/aem/contact/sovereign-cloud-mdm"&gt;full technical assessment&lt;/a&gt; to learn more.&lt;/p&gt;

&lt;h2&gt;Achieving data sovereignty compliance with confidence&lt;/h2&gt;

&lt;p&gt;Neurons for MDM – Sovereign Edition – EU provides European firms with a strategic foundation for their IT and Security platform from a trusted leader, while maintaining local jurisdictional protections for risk management. This means public and private entities can continue their digital transformation with the confidence that their cloud data will remain secure while their operations gain resilience.&lt;/p&gt;

&lt;p&gt;Next steps? Read our whitepaper, &lt;a href="https://www.ivanti.com/resources/whitepapers/sovereign-cloud-strategy"&gt;Sovereign Cloud as a Strategic Necessity for European Organizations&lt;/a&gt;, to discover how Ivanti Neurons for MDM Sovereign Edition achieves and exceeds SEAL 2 certification and provides the sovereign cloud architecture European organizations need to maintain data sovereignty while enabling secure digital transformation.&lt;/p&gt;
</description><pubDate>Fri, 17 Apr 2026 12:30:01 Z</pubDate></item><item><guid isPermaLink="false">1c8ff1fb-4b1f-4f6d-93a5-1e1eb9619ac2</guid><link>https://www.ivanti.com/blog/april-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>April 2026 Patch Tuesday</title><description>&lt;p&gt;The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day (CVE-2026-5281) that was patched on April 1, an Adobe Acrobat Reader zero-day (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) late in the day on Friday April 10, and several older CVEs that were added to the CISA KEV list yesterday (&lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;April 13&lt;/a&gt;). All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing" rel="noopener" target="_blank"&gt;Project Glasswing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;What is the correlation between these events and Project Glasswing you ask? Most of the discussions around Mythos have been focused on where it will be used and the ramifications.&lt;/p&gt;

&lt;p&gt;Finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released. However, it will also be used by researchers and threat actors to find flaws in code that is already released and that is where my speculation is directed.&lt;/p&gt;

&lt;p&gt;Consider the knock-on effects of a massive model like Mythos and what it will mean near term and longer term for the software that companies consume. Near term you will have the big players using a solution like this to release more secure code. As researchers and threat actors adopt more robust AI models to identify exploitable flaws this will result in more coordinated disclosures (good), zero-day exploits (bad) and n-day exploits (bad). All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;

&lt;p&gt;Many organizations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. I suspect most organizations were not aware of the Adobe Acrobat zero-day exploit until the CISA KEV update yesterday. This means that threat actors had another 2-3 days of free reign to exploit CVE-2026-34621 before most organizations became aware and many of those organizations will likely handle the update as part of their regular maintenance that is starting today on Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Browser security updates are a weekly occurrence. Many other applications that users are utilizing regularly release updates on a continuous cadence, not a set monthly release date. This means many of the user targeted exploits are going to occur in software that is releasing outside of the average organizations maintenance schedules and that frequency is about to increase. It is hard to say if that increase is going to be 1.5x or 5x, but rest assured that the increase will be noticeable and will exacerbate a challenge that most organizations already struggle with – timely patch management.&lt;/p&gt;

&lt;p&gt;Enter Exposure Management. This is really a mindset and maturity change as much as a technology evolution. The mindset change requires us to consider a world where we need to make the decisions up front and monitor those decisions. This is called defining your Risk Appetite and monitoring your Risk Posture. Doing this effectively matures an organizations’ response to risks and makes remediation activities much more clear cut.&lt;/p&gt;

&lt;p&gt;The technology evolution requires the traditional vulnerability assessment technologies to integrate into a broader ecosystem where asset visibility or system of record comes together with vulnerability assessment and vulnerability intelligence solutions to refine when risks require more immediate action vs waiting for your regular maintenance activities to occur. Most important is the need for this tech stack to be integrated with your AEM (Autonomous Endpoint Management) platform as this is where remediation predominantly (and automatically) occurs.&lt;/p&gt;

&lt;p&gt;Now, back to our regularly scheduled Patch Tuesday update. Microsoft has resolved 169 CVEs this month which is a massive patch Tuesday lineup. April Patch Tuesday is the second-largest Patch Tuesday on record behind the October 2025 Patch Tuesday which resolved 175 CVEs. The lineup includes one zero-day exploit (CVE-2026-3220) and one public disclosure (CVE-2026-33825) and breaks down into 8 Critical, 156 Important, 3 Moderate and 1 Low severity.&lt;/p&gt;

&lt;p&gt;The zero-day CVE is in Microsoft SharePoint and the public disclosure is in Microsoft Defender making those two updates the most urgent for this month in addition to the Adobe Acrobat and Google Chrome updates leading up to Patch Tuesday.&lt;/p&gt;

&lt;h2&gt;Microsoft’s known exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Server Spoofing Vulnerability in Microsoft SharePoint (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 6.5, but it has been confirmed to be exploited in the wild. An attacker who successfully exploits this vulnerability can view sensitive information and make changes to the disclosed information. The vulnerability affects SharePoint server Subscription Edition, SharePoint Server 2019 and SharePoint Server 2016. A risk-based prioritization methodology warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege Vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener" target="_blank"&gt;CVE-2026-33825&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but has been publicly disclosed. The CVE lists exploit code maturity as Proof-of-Concept which puts this at a higher risk of exploitation. An attacker could use this vulnerability to allow an authorized attacker to elevate their privileges to SYSTEM on the local machine.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for April. The update affects Ivanti Neurons for ITSM and resolves two CVEs. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/april-2026-security-update"&gt;April Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released twelve updates this month, eleven of which released on Patch Tuesday and the zero-day update for Acrobat that released on Friday, April 10. 54 CVEs were resolved with a breakdown of 39 Critical, 13 Important and 2 Moderate. APSB26-43 resolved the zero-day exploit (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;April update to-do list&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe Acrobat (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) and Google Chrome (CVE-2026-5281) each had zero-day exploits leading up to Patch Tuesday. Ensure that you are prioritizing remediation of these two products to the latest version.&lt;/li&gt;
	&lt;li&gt;Microsoft SharePoint includes a zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;) and should be investigated as a priority especially if you have known update challenges with your SharePoint environments.&lt;/li&gt;
	&lt;li&gt;The Microsoft Windows OS update this month resolves 133 CVEs (depending on edition) and includes 4 Critical CVEs. This update will resolve a significant number of findings across your environment.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Apr 2026 22:51:36 Z</pubDate></item><item><guid isPermaLink="false">bb18f48d-02e3-4447-ae10-01f3dd87efd8</guid><link>https://www.ivanti.com/blog/april-2026-security-update</link><category>Security Advisory</category><title>April 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Neurons for ITSM (on-premises and cloud).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;b&gt;It is important for customers to know:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of these vulnerabilities being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;These vulnerabilities do not impact any other Ivanti solutions.&lt;/li&gt;
	&lt;li&gt;Customers using the cloud version of Ivanti Neurons for ITSM do not need to take any action as the fix was applied on 12 December 2025 to all cloud environments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on these vulnerabilities and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Neurons-for-ITSM-CVE-2026-4913-CVE-2026-4914" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 14 Apr 2026 14:08:24 Z</pubDate></item><item><guid isPermaLink="false">8909ebf6-4f41-4388-8f2b-09732436f737</guid><link>https://www.ivanti.com/blog/agentic-ai-for-it-not-all-agents-are-created-equal</link><atom:author><atom:name>Meeta Dash</atom:name><atom:uri>https://www.ivanti.com/blog/authors/meeta-dash</atom:uri></atom:author><category>Service Management</category><title>Not All Agents Are Created Equal: Getting Agentic AI Right for IT</title><description>&lt;p&gt;Three months ago, a CIO told me her organization had “already deployed agents.” Her endpoint team assumed she meant the telemetry clients on every managed laptop. Her service desk thought she meant AI chatbots. Meanwhile, her security architect heard “autonomous decision-making.” They were all right and all talking past each other.&lt;/p&gt;

&lt;p&gt;This is the agent confusion problem. It sounds like a semantics issue, but it creates real misalignment when teams try to get serious about implementing agentic AI. So, let’s untangle it.&lt;/p&gt;

&lt;h2&gt;Three types of “agents” for IT — and how they fit together&lt;/h2&gt;

&lt;h4&gt;1. Endpoint agents&lt;/h4&gt;

&lt;p&gt;Endpoint agents are the lightweight clients that have run silently on managed devices for decades — collecting telemetry, executing policies, applying patches. If you run a modern &lt;a href="https://www.ivanti.com/blog/unified-endpoint-management-uem-service-management-itsm-critical-connections"&gt;endpoint management platform&lt;/a&gt;, they’re already across your fleet doing the quiet, continuous work. They're your infrastructure layer: always listening and reporting but &lt;i&gt;not &lt;/i&gt;making decisions.&lt;/p&gt;

&lt;h4&gt;2. Automation bots and workflows&lt;/h4&gt;

&lt;p&gt;Automation bots and workflows handle the repetitive, structured processes IT runs on: proactive issue identification, self-healing, password resets, account unlocks, software provisioning, approval chains. These aren’t legacy limitations to apologize for. A well-built password reset bot is fast, predictable and exactly right for that job. They're your execution layer: reliable, auditable and purpose-built.&lt;/p&gt;

&lt;h4&gt;3. AI agents&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-digital-assistant"&gt;AI agents&lt;/a&gt; are something genuinely different. Where endpoint agents collect data and automation bots execute tasks, AI agents coordinate both. Orchestrated by large language models (LLMs), they understand intent, reason across context from multiple systems, plan multi-step actions and decide when to escalate an issue that requires human expertise.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;But here’s the nuance that matters:&lt;/i&gt; a well-designed AI agent doesn’t replace the automation bot; it &lt;b&gt;&lt;i&gt;calls &lt;/i&gt;&lt;/b&gt;it. When an employee asks to reset their password through a conversational interface, the AI handles the dialogue, verifies identity, applies policy logic and then triggers the existing workflow to execute. Intelligence orchestrating automation. That’s the architecture worth building toward. Add endpoint telemetry, and the picture gets richer.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Here’s what this looks like in practice:&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;An employee messages: “&lt;i&gt;My laptop has been crawling since the last patch.&lt;/i&gt;”&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The AI agent:&lt;/b&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Interprets the intent, recognizes this as a performance issue potentially triggered by a recent change.&lt;/li&gt;
	&lt;li&gt;Pulls real-time CPU load, disk usage and startup process data from the endpoint layer.&lt;/li&gt;
	&lt;li&gt;Triggers a targeted remediation. Not a guess. A data-informed, auditable action.&lt;i&gt;&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;i&gt;That’s &lt;/i&gt;what self-healing IT looks like at the conversational layer.&lt;/p&gt;

&lt;h2&gt;What makes agentic AI for ITSM work&lt;/h2&gt;

&lt;p&gt;Getting agentic &lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation"&gt;AI for IT service management&lt;/a&gt; right comes down to a few critical foundations.&lt;/p&gt;

&lt;h4&gt;Start with clean, current knowledge&lt;/h4&gt;

&lt;p&gt;An AI agent is only as good as what it knows and what context it has. Before enabling any agentic capability, &lt;a href="https://www.ivanti.com/blog/the-importance-of-accurate-data-to-get-the-most-from-ai"&gt;audit your knowledge base&lt;/a&gt; and ask these key questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Is it current?&lt;/li&gt;
	&lt;li&gt;Is it tagged by use case?&lt;/li&gt;
	&lt;li&gt;Is it maintained after major changes?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Outdated knowledge leads to wrong outputs that quickly destroy employee trust. That said, these same AI agents can be used to accelerate knowledge creation, too. Every resolved ticket is a draft article. Every question the agent can't confidently answer is a knowledge gap it just surfaced for you. The agent becomes a contributor to your knowledge base, not just a consumer of it.&lt;/p&gt;

&lt;h4&gt;Provide context&lt;/h4&gt;

&lt;p&gt;Knowledge alone isn’t enough. Agents need real-time context across your entire IT environment. This includes device data from your CMDB, role and access information from HR systems and ticket history from ITSM. With this context layer, it’s possible to move from a smart-sounding bot to an agent that can close the loop.&lt;/p&gt;

&lt;h4&gt;Set governance guardrails&lt;/h4&gt;

&lt;p&gt;Having control and &lt;a href="https://www.ivanti.com/blog/ai-governance-framework-responsible-ai-guardrails"&gt;AI guardrails&lt;/a&gt; is not optional. Be deliberate about what the agent handles autonomously, what needs a human approval step and what always escalates. Having a human in the loop isn’t about being overly cautious. Rather, it’s a deliberate, intelligent design. For anything security-sensitive like MFA changes, privilege adjustments or data access requests, the agent should surface the decision, &lt;i&gt;not &lt;/i&gt;make it unilaterally. Companies must build those thresholds from the start, not try to retrofit them later.&lt;/p&gt;

&lt;h4&gt;Change management&lt;/h4&gt;

&lt;p&gt;Even with the perfect setup, deployment fails when companies don’t consider change management.&lt;/p&gt;

&lt;p&gt;Your service desk team needs a clear mental model of what the agent handles and where they take over. You might think of it like any other division of labor: you don't want overlap. You don't want humans burning cycles on tasks the agent can knock out instantly, and you definitely don't want the agent making calls where policy says a human needs to be in the loop. Clean boundaries keep both sides working at their highest value.&lt;/p&gt;

&lt;p&gt;Your employees need to trust that context won’t be lost mid-conversation when an issue is escalated from agent to human. Immediately letting agents do more than foundational support is how a promising pilot becomes a painful rollback. Start narrow and earn the right to expand.&lt;/p&gt;

&lt;h2&gt;Here’s what success looks like&lt;/h2&gt;

&lt;p&gt;To prove ROI with agentic AI, organizations should focus on operational metrics that reflect real impact and can be improved through better orchestration.&lt;/p&gt;

&lt;p&gt;Ticket deflection shows how effectively agents resolve common requests end to end without human involvement. Auto-remediation highlights when systems can diagnose issues and take approved corrective action, reducing manual effort and queue volume. Mean Time to Resolution (MTTR) reflects how much the system shortens the path from request to outcome by removing handoffs and tool switching.&lt;/p&gt;

&lt;p&gt;Together, these metrics indicate whether agentic AI is truly reducing work, not just shifting it. But the most important measure is end-user satisfaction (CSAT). Speed without satisfaction simply creates faster friction.&lt;/p&gt;

&lt;p&gt;The best agentic AI is invisible. Employees ask for help, get what they need, and move on without noticing the workflows, checks, or automated actions behind the scenes. Organizations that achieve success design agentic systems intentionally, with clear guardrails and a strong understanding of how autonomy reshapes operations.&lt;/p&gt;

&lt;h2&gt;Next steps&lt;/h2&gt;

&lt;p&gt;If you are evaluating the role of self‑service agentic AI in your IT ecosystem, a conversational entry point is often the most practical place to begin. Consolidating incident creation, service requests, knowledge access, and status checks into a single interface can reduce friction for employees while still respecting policies and existing workflows.&lt;/p&gt;

&lt;p&gt;This approach lays the groundwork for a broader agentic platform. For IT leaders under pressure to do more with less, this is the moment to deliberately define how AI should operate, where autonomy adds value, and where guardrails are required.&lt;/p&gt;

&lt;p&gt;Ready to take the next step in your agentic AI journey? Get our &lt;a href="https://www.ivanti.com/resources/whitepapers/navigating-the-shift-to-agentic-ai-in-it-service-management"&gt;whitepaper&lt;/a&gt; for the framework, maturity model and implementation roadmap you need to succeed.&lt;/p&gt;
</description><pubDate>Wed, 08 Apr 2026 13:00:06 Z</pubDate></item><item><guid isPermaLink="false">6eede267-7028-4468-86aa-dba7dabfca72</guid><link>https://www.ivanti.com/blog/it-visibility-see-it-all-or-risk-it-all</link><atom:author><atom:name>Cristiane Villar</atom:name><atom:uri>https://www.ivanti.com/blog/authors/cristiane-villar-ramos-da-silva</atom:uri></atom:author><category>Service Management</category><title>See It All or Risk It All: The Truth About IT Visibility</title><description>&lt;p&gt;In everyday life, ignoring what you cannot see may feel harmless. In IT, it creates a false sense of security and a costly illusion.&lt;/p&gt;

&lt;p&gt;Although many organizations use some form of &lt;a href="https://www.ivanti.com/products/discovery"&gt;asset discovery&lt;/a&gt;, 2026 security research from Ivanti reveals that more than 1 in 3 IT professionals (38%) report having insufficient data about devices accessing their networks, and 45% say they lack adequate information about &lt;a href="https://www.ivanti.com/blog/shadow-ai"&gt;shadow IT&lt;/a&gt;. This lack of visibility leaves critical assets at risk of going undetected and unmanaged.&lt;/p&gt;

&lt;p&gt;Yet hybrid environments now span offices, homes, clouds and data centers. As devices, identities, cloud workloads and SaaS tools move across these spaces, many of them fall outside the scope of traditional discovery methods. Unmanaged laptops linger on the network. SaaS tools are adopted without oversight. Cloud resources appear and disappear before the &lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;CMDB&lt;/a&gt; is updated. The result is an environment filled with assets that are present, influential and completely unseen.&lt;/p&gt;

&lt;p&gt;The cost of partial visibility is far greater than most organizations realize. Any asset that is not tracked or understood becomes a source of risk, unplanned spending and operational inefficiency.&lt;/p&gt;

&lt;p&gt;The scope of this challenge is clearly illustrated in Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security"&gt;2025 Securing the Borderless Digital Landscape Report&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;3 in 4 IT workers say that personal device use, or BYOD, is a regular occurrence at their organization. However, just 52% of this same group say their organizations explicitly allow it.&lt;/li&gt;
	&lt;li&gt;At companies where BYOD is&lt;i&gt; not&lt;/i&gt; permitted, 78% of employees disregard the prohibition entirely.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;The issue of shadow technology is increasing even further with the exponential rise in AI use in the workplace. According to that same Ivanti study, nearly a third (32%) of people who use generative AI tools at work admit to keeping their use of AI a secret from their employer.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The good news&lt;/b&gt;&lt;b&gt;:&lt;/b&gt; complete, continuous visibility is possible, and organizations that achieve complete visibility reduce operational costs, eliminate blind‑spot-driven risks and strengthen compliance readiness. Modern discovery approaches now give IT the ability to see every asset, understand its context and manage it with confidence.&lt;/p&gt;

&lt;h2&gt;The hidden costs of partial IT visibility&lt;/h2&gt;

&lt;p&gt;&amp;nbsp;Many organizations assume that achieving visibility over “most” of their assets is good enough, yet when some assets are unseen and unmanaged, critical risks can be hiding right under your nose. Examples of common &lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;visibility blind spots&lt;/a&gt; include everything from undetected laptops that can appear intermittently on IT scanners, newly-acquired SaaS tools adopted without IT involvement, orphaned cloud workloads that never make it into the CMDB and over-provisioned identities that go unnoticed and unpremeditated.&lt;/p&gt;

&lt;p&gt;When even a small portion of your environment remains unaccounted for, four big problems surface immediately:&lt;/p&gt;

&lt;h4&gt;1. Security weakens&lt;/h4&gt;

&lt;p&gt;Unseen or intermittently visible assets miss patches, skip scans and create openings for attackers. Blind spots slow incident response and make aligning &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;patching priorities&lt;/a&gt; difficult. According to a &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;2026 global study from Ivanti&lt;/a&gt;, 38% of IT workers say inaccessible and siloed data causes difficulty tracking patch status and rollouts.&lt;/p&gt;

&lt;h4&gt;2. Compliance falters&lt;/h4&gt;

&lt;p&gt;Adding to these security challenges, that same &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;report&lt;/a&gt; finds that 35% of IT organizations feel that data visibility gaps make it much more challenging for them to maintain compliance.&lt;/p&gt;

&lt;p&gt;Audit evidence becomes fragmented across disconnected tools, spreadsheets and inboxes. Without the ability to confidently track where data lives, it becomes impossible to prove compliance.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;h4&gt;3. Software spend leaks value&lt;/h4&gt;

&lt;p&gt;Even with SaaS management or inventory tools in place, incomplete usage and entitlement data cause overspending. Companies lose roughly 25% of their SaaS budgets to unused entitlements, redundant tools and underutilized licenses, according to &lt;a href="https://zylo.com/reports/2025-saas-management-index/" rel="noopener" target="_blank"&gt;Zylo’s 2025 SaaS&amp;nbsp;Management Index&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;2025 Technology at Work&lt;/a&gt; research found that nearly one in three IT workers (31%) say their organizations do not track unused/underused software licenses, possibly because they may not have a complete inventory of the total. Moreover, 39% of IT teams say that outdated hardware drives wasteful IT budget spend.&lt;/p&gt;

&lt;p&gt;Every resource you &lt;i&gt;cannot&lt;/i&gt; see — or cannot verify — quietly drain your budget.&lt;/p&gt;

&lt;h4&gt;4. Operations lose efficiency&lt;/h4&gt;

&lt;p&gt;Conflicting or incomplete data forces teams to recheck device information, chase outdated records and remediate issues on the wrong assets. This slows service delivery and increases rework.&lt;/p&gt;

&lt;p&gt;Partial visibility doesn’t just obscure reality. It creates hidden risks, hidden costs and hidden delays.&lt;/p&gt;

&lt;h2&gt;Why IT visibility gaps continue to grow&lt;/h2&gt;

&lt;p&gt;Unfortunately, visibility gaps are widening for many companies. As headcounts, devices, identities and SaaS usage grow, it becomes increasingly difficult for IT teams to maintain complete visibility. Several factors contribute to growing visibility issues, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Shadow IT and SaaS sprawl accelerating faster than IT can keep up.&lt;/li&gt;
	&lt;li&gt;Cloud resources appearing and disappearing within minutes.&lt;/li&gt;
	&lt;li&gt;Remote and hybrid workers connecting to networks outside the corporate network. &amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Identity sprawl expanding across dozens of apps and platforms.&lt;/li&gt;
	&lt;li&gt;Legacy discovery tools capturing only a fraction of the environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These pressures compound quickly. Employees adopt convenient tools before IT can approve them. When devices, servers, or apps are created in Cloud environments and deleted in minutes, they can be missed by security checks and monitoring. As a result, these short-lived resources might not get patched or protected, creating blind spots that attackers could exploit before anyone notices. Remote workers may never even touch the corporate network. SaaS, identity and device ecosystems expand far faster than legacy discovery tools were designed to track. Without &lt;b&gt;continuous, multi-source visibility&lt;/b&gt;, organizations fall behind almost immediately.&lt;/p&gt;

&lt;p&gt;To close these widening gaps, organizations must shift from reactive, point‑in‑time inventories to a model built on continuous, contextual, real‑time visibility. This is where understanding and achieving true visibility over your entire IT estate becomes critical.&lt;/p&gt;

&lt;h2&gt;IT visibility is more than just an inventory&lt;/h2&gt;

&lt;p&gt;Real visibility is not a list of assets. It is complete, current and trusted intelligence that every team can act on. Total visibility requires identifying every device, SaaS app, identity, cloud workload, configuration and usage signal; no matter where it lives or how long it exists.&lt;/p&gt;

&lt;p&gt;It also means understanding relationships: who owns an asset, what data it touches, its risk level, its compliance impact and whether it is actually being used. This is the foundation that turns discovery from information into operational control.&lt;/p&gt;

&lt;h2&gt;How complete visibility transforms workflows&lt;/h2&gt;

&lt;p&gt;Once visibility becomes continuous and contextual, the entire environment transforms. Modern IT environments require more than passive observation. As threats, workloads and assets scale at unprecedented speed, organizations need intelligent, automated actions to turn visibility into real outcomes. &lt;a href="https://www.ivanti.com/ai"&gt;AI-driven insights&lt;/a&gt; and automated workflows empower teams to proactively address security threats, remediate issues and optimize operations without waiting for manual intervention.&lt;/p&gt;

&lt;p&gt;With the right approach, organizations can move beyond partial visibility and finally see:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;every device, application, identity and cloud workload.&lt;/li&gt;
	&lt;li&gt;normalized and reconciled data presented as a single source of truth.&lt;/li&gt;
	&lt;li&gt;vulnerabilities tied to the exact assets and owners affected.&lt;/li&gt;
	&lt;li&gt;automated workflows that trigger patching, quarantines, &lt;a href="https://www.ivanti.com/blog/the-critical-role-of-the-cmdb-in-security-and-vulnerability-management"&gt;CMDB updates&lt;/a&gt; and ticket closure with proof.&lt;/li&gt;
	&lt;li&gt;discovery that spans agent, agentless, active and passive methods to cover every corner of the hybrid environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How every team benefits from unified asset visibility&lt;/h2&gt;

&lt;p&gt;With unified, reliable asset data, every team benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;b&gt;Security &lt;/b&gt;can map exposures to real assets and respond faster.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;IT operations&lt;/b&gt; can close the loop from discovery to remediation to verification.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;Endpoint teams&lt;/b&gt; can enforce policies consistently.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/it-asset-management"&gt;&lt;b&gt;ITAM&lt;/b&gt;&lt;/a&gt;&lt;b&gt; employees &lt;/b&gt;can optimize spending using accurate usage and entitlement insights, eliminating waste.&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;Compliance teams&lt;/b&gt; can produce automated, audit-ready evidence without manual effort.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Achieving complete IT visibility today&lt;/h2&gt;

&lt;p&gt;This level of clarity is achievable today. By using modern discovery approaches that combine agent, agentless, active and passive methods, unified asset intelligence ensures that IT teams achieve complete visibility, even as environments become more complex and distributed.&lt;/p&gt;

&lt;p&gt;Unified asset intelligence ingests up-to-date data from every corner of the organization, including devices, identities, SaaS applications, cloud workloads and network signals. This data is normalized and consolidated into a single, trusted source of truth.&lt;/p&gt;

&lt;p&gt;Instead of managing partial or fragmented inventories from multiple tools, organizations gain a real-time, holistic view. Each asset is accurately represented with its key details and context, removing blind spots and allowing teams to confidently secure and manage the entire environment; eliminating guesswork, reducing risk and restoring control.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;See how &lt;/b&gt;&lt;a href="https://www.ivanti.com/products/discovery"&gt;&lt;b&gt;Ivanti Neurons for Discovery&lt;/b&gt;&lt;/a&gt;&lt;b&gt; can deliver complete visibility to your environment.&lt;/b&gt;&lt;/p&gt;
</description><pubDate>Mon, 06 Apr 2026 12:00:02 Z</pubDate></item><item><guid isPermaLink="false">2407256b-094c-45de-a2b1-309ed2f901cf</guid><link>https://www.ivanti.com/blog/how-ai-automation-improve-endpoint-visibility</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><title>Inventory to Intelligence: How AI and Automation Improve Endpoint Visibility</title><description>&lt;p&gt;Endpoint visibility has always been foundational to IT and security. You&amp;nbsp;can’t&amp;nbsp;secure,&amp;nbsp;patch&amp;nbsp;or&amp;nbsp;support what you&amp;nbsp;can’t&amp;nbsp;see.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But as environments have become more distributed and complex, what visibility means has evolved. It’s no longer enough to know that a device exists — IT teams and organizations as a whole need to understand its health, its&amp;nbsp;risk&amp;nbsp;posture&amp;nbsp;and&amp;nbsp;its impact on both security and user experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;AI and endpoint automation&lt;/a&gt;&amp;nbsp;start to make a practical difference. By moving endpoint visibility from static inventory to continuous intelligence, organizations can shift from reactive discovery to proactive, even autonomous operations.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why traditional discovery practices fall short&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Traditional discovery practices were built for&amp;nbsp;a very different&amp;nbsp;IT reality. Their approach is designed for relatively static environments, clearly defined&amp;nbsp;perimeters&amp;nbsp;and&amp;nbsp;manual processes. That strategy&amp;nbsp;doesn’t&amp;nbsp;scale well in today’s hybrid, cloud-first world.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Manual discovery workflows often produce incomplete or outdated inventories. Ivanti’s 2026&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management Advantage Report&lt;/a&gt;&amp;nbsp;reinforces this reality:&amp;nbsp;Only&amp;nbsp;52% of organizations report using&amp;nbsp;an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;endpoint management solution&lt;/a&gt;&amp;nbsp;today, leaving many environments with limited centralized visibility and persistent blind spots across unmanaged or shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In practice, this fragmentation shows up in&amp;nbsp;very familiar&amp;nbsp;ways. Teams often juggle multiple inventories, one from an on-prem client management tool, another from an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;MDM platform&lt;/a&gt;&amp;nbsp;and&amp;nbsp;yet another from identity or access systems, leaving gaps that widen as environments grow more complex.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Common challenges&amp;nbsp;in manual device discovery&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Manual discovery relies heavily on human input, which introduces inconsistency and error. As environments grow more distributed, these processes struggle to evolve with them, making it difficult to keep inventories&amp;nbsp;accurate&amp;nbsp;as devices are added,&amp;nbsp;reassigned&amp;nbsp;or&amp;nbsp;accessed remotely. Reconciling changes across large estates becomes time-consuming and brittle, increasing the likelihood that devices fall out of view entirely.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these limitations compound.&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/best-practices-for-it-asset-discovery-and-inventory-management"&gt;Discovery&lt;/a&gt;&amp;nbsp;becomes episodic rather than continuous, and visibility&amp;nbsp;lags behind&amp;nbsp;reality. By the time inventories are reconciled, the environment has already changed.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Visibility gaps and security risks&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;These gaps&amp;nbsp;aren’t&amp;nbsp;theoretical. Ivanti’s research shows that many organizations still struggle with foundational&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;endpoint visibility&lt;/a&gt;&amp;nbsp;even after deploying multiple management tools. Endpoint data exists across scanners, MDM&amp;nbsp;platforms&amp;nbsp;and&amp;nbsp;access systems, but it is rarely centralized, continuously updated, or trusted across teams. As a result, shadow IT, unmanaged devices&amp;nbsp;and&amp;nbsp;unknown access paths&amp;nbsp;remain&amp;nbsp;persistent sources of security and compliance risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Blind spots create real risk. Many organizations struggle to&amp;nbsp;identify&amp;nbsp;which devices are vulnerable or even actively accessing their environments.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;When teams&amp;nbsp;can’t&amp;nbsp;reliably understand device exposure or access patterns, security decisions are made using incomplete or outdated data, increasing&amp;nbsp;risk&amp;nbsp;and delaying remediation. In fact, the above-mentioned Ivanti report highlights how common these blind spots are:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of organizations report challenges&amp;nbsp;identifying&amp;nbsp;shadow IT&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;41% struggle to&amp;nbsp;identify&amp;nbsp;vulnerabilities across devices&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% say data blind spots make it difficult to determine patch compliance.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Device discovery vs. device health monitoring&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Discovery is only the first step. Knowing that a device exists&amp;nbsp;doesn't&amp;nbsp;tell you whether&amp;nbsp;it's&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;or&amp;nbsp;even functioning properly.&amp;nbsp;That’s&amp;nbsp;where device health monitoring becomes critical.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Discovery tells you&amp;nbsp;what’s&amp;nbsp;present. Health monitoring adds the context that&amp;nbsp;actually matters, from performance and configuration&amp;nbsp;drift&amp;nbsp;to overall security posture. Research from&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Ivanti’s 2025 Securing the Borderless Digital Landscape report&lt;/a&gt;&amp;nbsp;underscores how significant these visibility gaps&amp;nbsp;remain:&amp;nbsp;Two&amp;nbsp;out of five (38%) of IT professionals say they lack sufficient data about devices accessing the network, and 45% report insufficient visibility into shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;BYOD and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;edge devices&lt;/a&gt;, especially, are a concern. These can be online and still pose significant risk. It may be missing critical patches, running outdated software,&amp;nbsp;drifting from&amp;nbsp;configuration&amp;nbsp;standards&amp;nbsp;or&amp;nbsp;suffering performance issues that impact users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Presence data answers the question, “Is it there?” Health data answers, “Is it safe, compliant, and usable?” Without health insights, organizations are effectively managing endpoints in the dark.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Key indicators of endpoint health&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;To manage endpoints proactively, organizations need continuous visibility into key health indicators.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This includes:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Operating&amp;nbsp;system and application versions&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch&amp;nbsp;and antivirus status&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Configuration&amp;nbsp;drift&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Overall&amp;nbsp;security posture&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;User experience signals such as crashes,&amp;nbsp;latency&amp;nbsp;and&amp;nbsp;performance degradation also provide early warning signs that something&amp;nbsp;isn’t&amp;nbsp;right.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern platforms unify these signals into a single view, allowing IT and security teams to understand not just what devices exist, but how&amp;nbsp;they're&amp;nbsp;performing and where risk is&amp;nbsp;emerging.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The risk of tracking only device presence&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When organizations focus&amp;nbsp;only&amp;nbsp;on device presence, they expose themselves to both security and operational risks. Visibility without context leads to delayed detection, missed compliance&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;reactive management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Negative impacts on security and compliance&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Tracking presence alone increases the likelihood that malware,&amp;nbsp;misconfigurations&amp;nbsp;or&amp;nbsp;policy violations go undetected. Devices that are not enrolled in management or out of compliance may still access sensitive resources, creating gaps in enforcement. When access decisions&amp;nbsp;aren’t&amp;nbsp;tied to device state, enforcement becomes inconsistent by default.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Strong endpoint visibility,&amp;nbsp;access&amp;nbsp;and&amp;nbsp;security ensure that only managed and compliant devices can reach sensitive systems and data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Tying access to management and compliance status is critical. Conditional access,&amp;nbsp;VPN&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust&lt;/a&gt;&amp;nbsp;controls are only effective when visibility and enrollment are enforced consistently across endpoints.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch management&amp;nbsp;is&amp;nbsp;one of the areas where limited visibility creates the most operational strain.&amp;nbsp;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;IT and security research&lt;/a&gt;&amp;nbsp;shows that many IT teams struggle to track patch status across their full endpoint estate and to stay compliant as environments become more distributed. For&amp;nbsp;example,&amp;nbsp;of those we surveyed,&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT and security professionals say they have difficulty tracking patch status and rollouts.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% of teams struggle to stay compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;These challenges&amp;nbsp;aren’t&amp;nbsp;about patch availability alone. They stem from gaps in visibility into device state,&amp;nbsp;ownership&amp;nbsp;and&amp;nbsp;real-world exposure, making it difficult to prioritize and verify remediation.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Operational inefficiencies&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;From an operational perspective, limited visibility leads to inefficiency. IT teams spend time troubleshooting issues that automation could resolve, chasing devices that should have been discovered automatically, and reacting to incidents rather than preventing them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Without health data, teams are forced into a firefighting mode, responding to problems after they&amp;nbsp;impact&amp;nbsp;users instead of addressing them proactively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is exactly where AI and automation can begin to change the equation.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How AI and endpoint automation improve endpoint visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation turn endpoint visibility from a one-time discovery exercise into a continuous, self-sustaining capability. They enable teams to unify data, detect&amp;nbsp;anomalies&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;accurate&amp;nbsp;inventories without manual effort.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Unified telemetry across multiple sources&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Modern endpoint management platforms with AI and automation capabilities&amp;nbsp;consolidate&amp;nbsp;telemetry from discovery, UEM, MDM, patching,&amp;nbsp;vulnerability&amp;nbsp;and&amp;nbsp;security tools into a unified, continuously updated view. This unified telemetry&amp;nbsp;eliminates&amp;nbsp;the need to reconcile siloed inventories and provides a shared, reliable view for both IT and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By normalizing data across desktop, mobile, server&amp;nbsp;and&amp;nbsp;IoT devices, organizations gain holistic visibility that&amp;nbsp;supports&amp;nbsp;faster, more confident decision-making.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;autonomous&amp;nbsp;endpoint management (AEM)&amp;nbsp;research&amp;nbsp;&lt;/a&gt;also shows that organizations make the most progress when endpoint visibility is treated as a shared&amp;nbsp;objective. Teams that track metrics such as time to discovery, percentage of fully managed endpoints&amp;nbsp;and&amp;nbsp;exposure duration through shared dashboards are better able to align IT and security around the same data. This shared visibility turns endpoint management from siloed reporting into a coordinated, data-driven process.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;AI-Powered&amp;nbsp;automation and&amp;nbsp;autonomous&amp;nbsp;bots&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Automation plays a critical role in keeping visibility current.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/bot-library"&gt;AI-powered bots&lt;/a&gt;&amp;nbsp;can automatically rediscover devices, reconcile duplicates, update ownership and&amp;nbsp;location&amp;nbsp;and&amp;nbsp;detect anomalies across the environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When agents stop reporting or profiles break, automated workflows can repair or reinstall them without human intervention. This ensures that visibility&amp;nbsp;doesn’t&amp;nbsp;degrade over time and reduces the operational burden on IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Self-healing&amp;nbsp;workflows for IT&amp;nbsp;productivity&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Self-healing workflows extend automation to the endpoint itself. Common issues such as failed updates, stopped services&amp;nbsp;or&amp;nbsp;configuration drift can be detected and resolved automatically, often before users notice a problem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Endpoint automation enables these self-healing workflows to&amp;nbsp;operate&amp;nbsp;continuously in the background, resolving common issues without waiting for human intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By resolving these issues without tickets, organizations reduce downtime, improve user&amp;nbsp;experience&amp;nbsp;and&amp;nbsp;free IT staff to focus on higher-value initiatives.&amp;nbsp;In fact,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;over two-thirds of IT teams&lt;/a&gt;&amp;nbsp;today believe that&amp;nbsp;AI and automation&amp;nbsp;in ITSM&amp;nbsp;will&amp;nbsp;allow them to deliver better service experiences&amp;nbsp;and&amp;nbsp;give them more time to support business objectives.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365781"&gt;&lt;/div&gt;

&lt;h2&gt;Broader&amp;nbsp;impact on&amp;nbsp;security,&amp;nbsp;productivity&amp;nbsp;and&amp;nbsp;user&amp;nbsp;experience&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When AI and automation are integrated into endpoint visibility, the benefits extend beyond IT operations. Security posture&amp;nbsp;improves&amp;nbsp;and users experience fewer disruptions — and productivity increases.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By combining endpoint visibility and control, organizations can reduce risk while still supporting productivity and flexible operating models.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Closing&amp;nbsp;visibility&amp;nbsp;gaps&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;AI-driven insights&amp;nbsp;eliminate&amp;nbsp;blind spots by continuously&amp;nbsp;monitoring&amp;nbsp;endpoint activity and health. Instead of relying on periodic scans or manual checks, organizations&amp;nbsp;maintain&amp;nbsp;real-time awareness of their endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;continuous visibility&lt;/a&gt;&amp;nbsp;transforms endpoint management from a static inventory project into a living, breathing capability that adapts as the environment changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improving&amp;nbsp;IT&amp;nbsp;operations and&amp;nbsp;end-user&amp;nbsp;satisfaction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/how-ai-alleviates-help-desk-workloads"&gt;Automation reduces ticket volume&lt;/a&gt;&amp;nbsp;and accelerates resolution times, while predictive analytics help prevent downtime before it&amp;nbsp;impacts&amp;nbsp;users. Ring deployments, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;self-service catalogs allow changes to be delivered with minimal disruption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When users experience faster support and fewer interruptions, resistance to endpoint management drops and adoption improves. Over time, this creates a healthier feedback loop where visibility,&amp;nbsp;automation&amp;nbsp;and&amp;nbsp;user experience reinforce each other instead of competing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;autonomous endpoint management&amp;nbsp;takes organizations next. Visibility becomes continuous instead of episodic. Automation keeps inventories&amp;nbsp;accurate, health signals&amp;nbsp;current&amp;nbsp;and&amp;nbsp;risk visible in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With shared data and clear ownership, IT and security teams stop reacting to issues after the fact and start managing endpoints proactively. That shift from inventory to intelligence is what enables autonomous endpoint management, and&amp;nbsp;it’s&amp;nbsp;quickly becoming the standard for modern IT operations.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 03 Apr 2026 13:00:09 Z</pubDate></item><item><guid isPermaLink="false">102f3f22-125a-4763-b596-62b424778efc</guid><link>https://www.ivanti.com/blog/autonomous-endpoint-management-eliminates-patch-silos</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Patch Management</category><title>How AI-Driven Automation Solves Patch Management Silos</title><description>&lt;p&gt;&lt;em&gt;"We see 10,000&amp;nbsp;critical vulnerabilities!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"We patched everything last week!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This conversation happens in enterprise IT departments every single day. Security teams present dashboards filled with red alerts. IT teams show deployment reports at 98% success. Both teams are looking at real data.&amp;nbsp;Both are absolutely correct.&amp;nbsp;And both are&amp;nbsp;totally&amp;nbsp;blind to what's actually happening across the endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn't&amp;nbsp;a&amp;nbsp;people&amp;nbsp;problem — your teams&amp;nbsp;aren't&amp;nbsp;incompetent.&amp;nbsp;It's&amp;nbsp;not a process problem — your workflows&amp;nbsp;aren't&amp;nbsp;broken.&amp;nbsp;It's&amp;nbsp;a technology problem:&amp;nbsp;you're&amp;nbsp;asking two teams to manage the same risk using systems that&amp;nbsp;show them different realities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Security teams are given one version of reality through vulnerability scanners and threat intelligence. Meanwhile, IT teams see things differently when looking at their device management and patch deployment reports.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tricky part is that both views can be&amp;nbsp;correct&amp;nbsp;in isolation and&amp;nbsp;still&amp;nbsp;be&amp;nbsp;misleading&amp;nbsp;in practice.&amp;nbsp;That's&amp;nbsp;how you end up in the familiar stalemate: security reports thousands of critical vulnerabilities; IT reports that patches are successfully deployed. The disconnect lives in the gap between those systems.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why&amp;nbsp;IT&amp;nbsp;and&amp;nbsp;security&amp;nbsp;are misaligned on patching&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Most organizations approach&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;patching misalignment between IT and security&lt;/a&gt;&amp;nbsp;by improving communication between IT and security. They schedule more meetings. They create escalation paths. They implement SLAs. And six months later,&amp;nbsp;they're&amp;nbsp;having the exact same argument with better PowerPoint slides.&lt;/p&gt;

&lt;p&gt;Here's&amp;nbsp;what nobody wants to admit:&amp;nbsp;you&amp;nbsp;can't&amp;nbsp;collaborate your way out of a data fragmentation problem. When IT and security are working from fundamentally different inventories of what exists,&amp;nbsp;what's&amp;nbsp;vulnerable&amp;nbsp;and&amp;nbsp;what's&amp;nbsp;been fixed, adding more coordination overhead just slows down an already broken process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is why the same conversation plays out again and again inside many organizations.&amp;nbsp;Both teams are confident in their data, and both are “right” within the narrow context of the tools they rely on.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And&amp;nbsp;that’s&amp;nbsp;the problem. While both views are “right,” neither reflects the full lifecycle of risk. Vulnerability data&amp;nbsp;doesn’t&amp;nbsp;always reflect whether affected devices are managed or reachable. Patch reports&amp;nbsp;don’t&amp;nbsp;always account for unmanaged,&amp;nbsp;misclassified&amp;nbsp;or&amp;nbsp;newly discovered endpoints that still have access to corporate resources.&amp;nbsp;What’s missing is a reliable answer to the only question that actually matters: which endpoints are exposed right now?&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Technology silos create conflicting realities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Most enterprises manage endpoints through&amp;nbsp;a hodgepodge of&amp;nbsp;systems that&amp;nbsp;have evolved&amp;nbsp;independently over time, each capturing only a fragment of reality.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One system may surface critical exposure without knowing whether the device is&amp;nbsp;being managed. Another may confirm successful remediation without accounting for newly discovered or misclassified endpoints that still have access.&amp;nbsp;The result? No reliable way to trace risk from detection through deployment to actual exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consider this:&amp;nbsp;the&amp;nbsp;average organization manages only 60% of their edge devices, according to Ivanti's&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Securing the Borderless Digital Landscape Report&lt;/a&gt;. That means 40% of potential entry points exist outside IT's view and outside their patch workflows. Security sees them.&amp;nbsp;IT&amp;nbsp;doesn't. That's&amp;nbsp;your&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;vulnerability gap&lt;/a&gt;.&amp;nbsp;Without that continuity, teams are forced to reconcile partial views manually. Data gets debated instead of&amp;nbsp;acted&amp;nbsp;on.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic showing bar charts" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/04/02-unmanaged-edge-devices.png"&gt;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Different data views lead to friction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Imagine&amp;nbsp;it’s&amp;nbsp;Monday morning: Security discovers a critical zero-day in a widely used VPN client. They send an urgent alert to IT: "30,000 vulnerable endpoints detected — patch immediately."&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT checks their deployment console: &lt;em&gt;"VPN client already updated across 28,000 devices last Thursday."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Both statements are true. Security is scanning the entire network — including contractor laptops, BYOD devices&amp;nbsp;and&amp;nbsp;systems that&amp;nbsp;briefly&amp;nbsp;connected to the VPN but&amp;nbsp;aren't&amp;nbsp;under IT management. IT patched everything in their device inventory.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Meanwhile, 2,000 genuinely vulnerable endpoints&amp;nbsp;remain&amp;nbsp;exposed because they exist in Security's view but not IT's.&amp;nbsp;The patch that should have taken 24 hours now requires three days of manual reconciliation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT and security&amp;nbsp;operate&amp;nbsp;from different data sources, misaligned&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;vulnerability management priorities&lt;/a&gt;&amp;nbsp;are inevitable.&amp;nbsp;Security teams focus on vulnerability counts, severity&amp;nbsp;scores&amp;nbsp;and&amp;nbsp;exploit intelligence. IT teams prioritize deployment success, system&amp;nbsp;stability&amp;nbsp;and&amp;nbsp;user impact. Both perspectives are necessary, but without a shared frame of reference, they pull in different directions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What follows&amp;nbsp;isn’t&amp;nbsp;just tension;&amp;nbsp;it’s&amp;nbsp;decision paralysis. Remediation slows while teams reconcile inventories,&amp;nbsp;validate&amp;nbsp;findings&amp;nbsp;and&amp;nbsp;argue about scope. Vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than they should, not because patches&amp;nbsp;aren’t&amp;nbsp;available, but because&amp;nbsp;there’s&amp;nbsp;no single view that connects detection,&amp;nbsp;deployment&amp;nbsp;and&amp;nbsp;exposure.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;risk of misaligned patching priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Misalignment slows collaboration, but more so, it creates measurable risk that extends well beyond internal friction.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management research&lt;/a&gt;&amp;nbsp;reflects this challenge in practice:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals report difficulty tracking patch status.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% struggle to meet remediation timelines due to incomplete endpoint visibility.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than necessary, the window of exposure grows. Attackers&amp;nbsp;don’t&amp;nbsp;wait.&amp;nbsp;The&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA KEV catalog&lt;/a&gt;&amp;nbsp;reveals the&amp;nbsp;difficult truth: 30% of vulnerabilities being actively exploited right now were originally&amp;nbsp;disclosed&amp;nbsp;more than five years ago.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's&amp;nbsp;not a patching problem;&amp;nbsp;it’s&amp;nbsp;a&amp;nbsp;visibility problem. Organizations&amp;nbsp;aren't&amp;nbsp;ignoring available patches;&amp;nbsp;they're&amp;nbsp;missing the endpoints that still need them.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Prolonged&amp;nbsp;exposure&amp;nbsp;windows and&amp;nbsp;breach&amp;nbsp;risk&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Fragmentation stretches&amp;nbsp;exposure&amp;nbsp;windows in subtle ways. Devices that were never enrolled in management platforms, such as shadow BYOD, unsecured contractor&amp;nbsp;devices&amp;nbsp;or&amp;nbsp;remote endpoints outside the traditional perimeter, often go unnoticed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Research from Ivanti&lt;/a&gt;&amp;nbsp;shows&amp;nbsp;that only one in three employers&amp;nbsp;have&amp;nbsp;implemented zero trust network access for remote workers, leaving significant gaps in visibility across distributed environments.&amp;nbsp;Newly discovered endpoints appear after patch reports are generated. Systems drift out of compliance between scan cycles. Each delay compounds the risk, extending the time attackers&amp;nbsp;have to&amp;nbsp;weaponize known weaknesses.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/24843673"&gt;&lt;/div&gt;

&lt;h2&gt;Common&amp;nbsp;post-patch&amp;nbsp;issues and IT&amp;nbsp;ticket&amp;nbsp;overload&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Even when patches are deployed on schedule, manual patching often creates downstream issues. Failed updates, broken agents, performance&amp;nbsp;problems&amp;nbsp;and&amp;nbsp;unexpected reboots trigger support tickets and emergency fixes. What starts as a security task quickly becomes an operational drain.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT teams spend time resolving predictable failures instead of&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;improving endpoint posture&lt;/a&gt;. Security teams see delays as unresolved risk. Users associate patching with disruption. That friction persists across teams, even when their goals are aligned.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Transforming&amp;nbsp;patch management&amp;nbsp;with autonomous endpoint management&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation address the core disconnects in&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;&amp;nbsp;by unifying visibility and reducing manual coordination. When endpoint discovery, vulnerability data, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status are correlated into a unified view, IT and security teams can work from the same facts instead of reconciling partial data across tools.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&amp;nbsp;(AEM)&lt;/a&gt; brings clarity to the confusion by using AI intelligence and automation to give IT and security a single, continuously updated view of endpoints, their&amp;nbsp;health&amp;nbsp;and their exposure.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How&amp;nbsp;AI&amp;nbsp;improves patching decisions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI improves patching decisions by prioritizing vulnerabilities based on real-world risk rather than severity scores alone. By factoring in exploit activity, asset criticality&amp;nbsp;and&amp;nbsp;exposure context, teams can align on what to patch first and focus effort where it will reduce risk fastest.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With autonomous endpoint management, that same Monday morning scenario plays out differently:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability is detected, and AI&amp;nbsp;immediately&amp;nbsp;cross-references it against a unified endpoint inventory. It&amp;nbsp;identifies&amp;nbsp;1,560 devices running the vulnerable version, including 217 devices that were previously unmanaged.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/automated-patch-management"&gt;Automated&amp;nbsp;patch&amp;nbsp;workflows&lt;/a&gt;&amp;nbsp;simultaneously: enroll the unmanaged devices, prioritize patching based on exposure risk and asset criticality. They then&amp;nbsp;schedule deployment during low-usage&amp;nbsp;windows, and&amp;nbsp;begin ring-based rollout.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the time the security team sends the alert, IT already has a real-time dashboard showing remediation in progress&amp;nbsp;—&amp;nbsp;with the same device count, the same exposure&amp;nbsp;data&amp;nbsp;and&amp;nbsp;the same prioritization logic. No reconciliation&amp;nbsp;necessary.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How automation accelerates remediation&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Automation then turns those decisions into action. Patch workflows can be orchestrated end to end:&amp;nbsp;identifying&amp;nbsp;affected devices, deploying&amp;nbsp;updates&amp;nbsp;and&amp;nbsp;validating&amp;nbsp;remediation without constant manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI-powered intelligent patch scheduling minimizes user impact by aligning deployments with device usage patterns, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;operational constraints. Ring-based rollouts allow patches to be&amp;nbsp;validated&amp;nbsp;on smaller groups before wider deployment, reducing disruption while accelerating remediation. The result is faster&amp;nbsp;patching, less&amp;nbsp;downtime&amp;nbsp;and&amp;nbsp;a more predictable process for both teams.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Self-healing workflows detect and resolve common issues automatically, such as restarting services, reinstalling&amp;nbsp;agents&amp;nbsp;or&amp;nbsp;correcting misconfigurations. These workflows prevent avoidable incidents before they turn into support tickets.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;From data debates to unified intelligence and shared visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;AI-driven platforms&lt;/a&gt;&amp;nbsp;unify endpoint visibility by correlating discovery data, vulnerability context, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status into a single endpoint record, with enrollment and access controls ensuring that devices are continuously discovered and managed throughout their lifecycle. IT and security teams see the same devices, the same&amp;nbsp;exposure&amp;nbsp;and&amp;nbsp;the same remediation status in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This unified intelligence&amp;nbsp;eliminates&amp;nbsp;debates over whose data is correct and replaces them with agreement on which risks&amp;nbsp;to address&amp;nbsp;first.&amp;nbsp;By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale. By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Shared patch ownership:&amp;nbsp;powering IT and security collaboration&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation only improve patch management when&amp;nbsp;they’re&amp;nbsp;paired with shared ownership. When IT and security teams&amp;nbsp;operate&amp;nbsp;from the same endpoint data and remediation workflows, accountability shifts from defending individual reports to jointly reducing exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A data-driven patch process starts with mutual goals. Instead of tracking success in isolated tools, organizations align IT and security around common metrics that reflect real-world risk and operational impact. This shared measurement creates clarity on priorities and removes ambiguity around ownership.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Effective collaboration depends on metrics both teams trust and act on together. Common KPIs include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Mean Time to Remediate (MTTR):&amp;nbsp;How quickly critical vulnerabilities are resolved&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch compliance rates:&amp;nbsp;Across both managed and previously unmanaged endpoints&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure duration:&amp;nbsp;How long high-risk vulnerabilities&amp;nbsp;remain&amp;nbsp;open&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Endpoint visibility:&amp;nbsp;Percentage of devices fully discovered and managed&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics shift conversations from patch volume to measured risk outcomes and help teams focus on outcomes instead of activity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Joint ownership requires workflows that span the entire&amp;nbsp;patch&amp;nbsp;lifecycle. AI-driven platforms support this by automating routine tasks while surfacing exceptions that require human judgment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT and security leaders define guardrails for automation, including&amp;nbsp;approval&amp;nbsp;thresholds, testing&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;rollout constraints. Within those boundaries, automation executes remediation consistently and at scale, without constant manual coordination. Over time, trust in the process grows, coordination overhead decreases, and patching becomes a cooperative operational responsibility rather than a point of friction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Visit our solutions page to discover how&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Ivanti's autonomous endpoint management solutions&lt;/a&gt;&amp;nbsp;give IT and security teams the unified visibility they need to&amp;nbsp;eliminate&amp;nbsp;patching silos and close vulnerabilities faster.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 02 Apr 2026 15:37:11 Z</pubDate></item><item><guid isPermaLink="false">251210e2-37bd-41f5-b387-25c1f7fc0d45</guid><link>https://www.ivanti.com/blog/stop-the-real-costs-of-paper-documentation</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-destefano</atom:uri></atom:author><category>Supply Chain</category><title>Stop The Real Costs of Paper Documentation</title><description>&lt;p&gt;Proof of condition — it’s been around for decades and serves to verify the integrity of everything from material goods to heavy equipment and myriad assets in between. A paper process from the beginning, it has been accompanied by photographs, rubber stamps, and signatures along the way.&lt;/p&gt;

&lt;p&gt;Still, hard to believe that a quarter way through the 21st century, with ubiquitous mobile device options, so many of these processes continue to reside on clipboards. And this paperwork can take hours, days or more to move from point of documentation to a recipient who can act on information reported within.&lt;/p&gt;

&lt;p&gt;Even in the best of cases, an inspection sheet walked from a loading dock to a warehouse managers office or a logistics dispatcher will take a few minutes – — minutes that could mean the subject of said documentation has changed custody or even left the facility for its next stop in the supply chain.&lt;/p&gt;

&lt;h4&gt;Discover the savings&lt;/h4&gt;

&lt;p&gt;With supply chain costs continuing to rise, where can operations teams find savings by moving away from these paper documents to digital forms?&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Proof of Condition:&lt;/i&gt; Time and money are lost when damaged goods arrive at the loading dock and given that over 10% of all unit loads have some degree of damage when they arrive at the DC, those real costs add up fast. The inverse is equally true, so avoiding chargebacks by documenting product/pallets were delivered in good condition protects shipper integrity and mitigates risk of fraudulent returns at each step along the chain.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Pre-trip Inspections:&lt;/i&gt; Performing a pre-trip inspection is not only prudent, but often required. However, it’s only as good any actions taken from the inspection. If that paper inspection is only reviewed after the vehicle has left the yard, costly breakdowns or roadside inspections could shut down deliveries – — and therefore revenue.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Safety Inspections:&lt;/i&gt; These come in a variety of flavors – — from the forklift or pallet jack inspection at the start of a work shift, to documenting injury incidents or near-misses, these are essential to worker safety, and also may be required documentation that needs to be readily available for audit.&lt;/p&gt;

&lt;h4&gt;Digitally transform the experience (and savings!)&lt;/h4&gt;

&lt;p&gt;Above are just a few common areas where operations teams benefit from moving to digital forms. Some, and I point to the Proof of Condition documentation as the example, offer an immediate opportunity to measure the value in financial terms. Avoiding chargebacks is a clear way to help the bottom line.&lt;/p&gt;

&lt;p&gt;In other cases, the savings are more cost-avoidance. When a pre-trip inspection identifies risk, and that risk is addressed before the vehicle leaves the dock, goods are delivered on time and fines (or worse) are avoided. The same can also be said about ensuring work equipment is in good operating condition before a worker is put in danger.&lt;/p&gt;

&lt;p&gt;Take a look at &lt;a href="/resources/v/doc/ivi/2919/d8c9d9af5ab7" target="_blank"&gt;this infographic&lt;/a&gt; (and share it with your team) for further proof of where digitizing documentation offers savings. Then, explore a process consultation with your Ivanti Wavelink supply chain partner to get started with digital forms. Within the Velocity platform, workflows can include Velocity Forms as a required step of the process – — such as forcing completion of a proof of condition statement, including photos, as part of the incoming inspection process when goods roll off the truck onto the loading dock.&lt;/p&gt;

&lt;p&gt;Closing the gap between documentation completion and document action is a key reason to trash paper and move to digital forms. Information is routed to the appropriate recipients for review in a timely, relevant and actionable manner – — essential to controlling costs in operations when every second counts.&lt;/p&gt;
</description><pubDate>Thu, 26 Mar 2026 12:00:06 Z</pubDate></item><item><guid isPermaLink="false">4438f929-aa59-4aee-a8d8-d16555dab909</guid><link>https://www.ivanti.com/blog/march-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>March 2026 Patch Tuesday</title><description>&lt;p&gt;March Patch Tuesday resolves 79 CVEs, of which three are Critical and 76 are Important. There are two publicly disclosed CVEs this month, but none exploited. Microsoft has also released an Edge update resolving nine Chrome CVEs. The public disclosures include a Denial-of-Service vulnerability in .Net and an Elevation of Privilege vulnerability in SQL Server. Both disclosures are listed as Unproven for Exploit Code Maturity indicating the disclosures did not include any code samples.&lt;/p&gt;

&lt;p&gt;Adobe and Mozilla have released updates as part of the March Patch Tuesday including eight updates from Adobe resolving a total of 80 CVEs, 21 of which are rated Critical. Mozilla Firefox 148.0.2 released resolving three high severity CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerability&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in SQL Server (CVE-2026-21262). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker who successfully exploited this vulnerability could gain SAL sysadmin privileges. The vulnerability affects SQL Server 2016 and later editions.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Denial of Service vulnerability in .NET (CVE-2026-26127). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.5, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker could cause an out-of-bounds read in .NET allowing an unauthorized attacker to deny service over a network. The vulnerability affects .NET 9 and 10 on Windows, Mac OS and Linux as well as NuGet 9 and 10 packages.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released eight updates this month resolving a total of 80 CVEs, 21 of which are rated Critical. Adobe Commerce is the highest priority this month with a Priority 2 rating. Other affected products include Adobe Illustrator, Substance 3D Painter, Acrobat and Acrobat Reader, Premier Pro, Experience Manager, Substance 3D Stager, and DNG SDK.&lt;/p&gt;

&lt;p&gt;Mozilla has released an update for Firefox 148.0.2 resolving three High severity vulnerabilities.&lt;/p&gt;

&lt;h2&gt;March update to-do list&lt;/h2&gt;

&lt;p&gt;The Microsoft OS and Office updates will resolve the majority of the CVEs resolved this month in two easy updates.&lt;/p&gt;

&lt;p&gt;Mozilla Firefox, Microsoft Edge and Google Chrome are all released frequently. Prioritize browser updates on a weekly or daily basis to reduce risks continuously with minimal risk of impact.&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 21:01:35 Z</pubDate></item><item><guid isPermaLink="false">1bc1b6b1-a480-4f6a-88b0-749da8241d7d</guid><link>https://www.ivanti.com/blog/march-2026-security-update</link><category>Security Advisory</category><title>March 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Desktop and Server Management (DSM).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span&gt;It is important for customers to know:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-DSM-CVE-2026-3483" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;Ivanti Innovators Hub&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 14:13:58 Z</pubDate></item><item><guid isPermaLink="false">c6a5b580-8345-47fd-b9fe-58b19a5bc3cc</guid><link>https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>Who Owns Endpoint Management? Defining Security and IT Governance</title><description>&lt;p&gt;Endpoint management is one of the most critical — and most contested — areas of enterprise governance. Every organization depends on endpoints, yet many still struggle to answer a fundamental question: who actually &lt;i&gt;owns &lt;/i&gt;these devices?&lt;/p&gt;

&lt;p&gt;In many environments, IT and security teams are both confident they’re doing the right thing, yet still talk past each other. Security looks at a scanner and sees 10,000 critical vulnerabilities; IT looks at a patch report and sees everything deployed. They're both right, but they're speaking different languages.&lt;/p&gt;

&lt;p&gt;The result is stalled risk remediation efforts, policy friction and growing frustration. Teams debate whose data is accurate instead of closing gaps. When &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management"&gt;endpoint management&lt;/a&gt; is governed jointly, with shared visibility and accountability, teams can shift their focus from reconciling data to improving execution.&lt;/p&gt;

&lt;p&gt;As endpoint environments scale, governance also depends on automation. AI-powered capabilities can help normalize data across siloed tools, surface unmanaged devices, and highlight &lt;a href="https://www.ivanti.com/it-asset-visibility"&gt;asset visibility&lt;/a&gt; gaps, making shared ownership possible without relying on manual reconciliation.&lt;/p&gt;

&lt;h2&gt;Why endpoint management ownership matters&lt;/h2&gt;

&lt;p&gt;Endpoints are where users work, where data is accessed and where many security incidents begin. When ownership of endpoint management is unclear, fissures start to appear.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;Autonomous Endpoint Management Advantage&lt;/a&gt; report shows that these visibility gaps are widespread and consequential. Just over half of organizations report using endpoint management solutions that provide centralized visibility, meaning many teams still struggle to see their full device landscape. These blind spots extend beyond unmanaged IT devices.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of security and IT professionals cite &lt;a href="https://www.ivanti.com/products/discovery"&gt;shadow IT&lt;/a&gt; as a key data gap.&lt;/li&gt;
	&lt;li&gt;41% report difficulty &lt;a href="https://www.ivanti.com/use-cases/manage-it-vulnerability-risk"&gt;identifying vulnerabilities&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;38% can’t reliably tell which devices are even accessing their network.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;Most organizations believe they know what’s on their network, until they turn on proper discovery. The reality is that device lists are usually siloed: one from your MDM, another from on-prem tools and something else from the identity provider.&lt;/p&gt;

&lt;p&gt;As a result, basic questions become hard to answer: which devices are fully managed, which are compliant and which can access sensitive resources without controls.&lt;/p&gt;

&lt;p&gt;AI-powered automation can help continuously correlate endpoint data across management, identity and &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security"&gt;endpoint security solutions&lt;/a&gt;, reducing blind spots that manual processes routinely miss.&lt;/p&gt;

&lt;p&gt;But visibility is only valuable when it’s shared and governed. You can’t secure, patch or support what you can’t see. Without a shared, trusted view and clear governance of endpoints, well-intentioned efforts still lead to friction, delays and increased risk. That’s why endpoint management is ultimately a governance problem, not just a technical one.&lt;/p&gt;

&lt;p&gt;Security isn’t the only issue with these blind spots. Patching is slowed, support gets complicated and policy enforcement is undermined. When IT and security teams rely on different datasets, disagreements over risk and remediation are inevitable.&lt;/p&gt;

&lt;p&gt;Clear ownership changes that dynamic. When endpoint management is governed jointly, with shared visibility and accountability, organizations are better positioned to move from debating data to closing gaps. Endpoint management becomes a foundation for consistent policy enforcement, faster remediation and better collaboration across teams.&lt;/p&gt;

&lt;h2&gt;Common points of friction between IT and security teams&lt;/h2&gt;

&lt;p&gt;Most friction between IT and security doesn’t come from bad intent. It comes from misalignment.&lt;/p&gt;

&lt;p&gt;Our &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; also suggests this misalignment isn’t abstract; it’s measurable and costly. We found that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;56% of IT professionals say wasteful IT spend is a problem.&lt;/li&gt;
	&lt;li&gt;And 39% point to inefficient tech support as an area of waste.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365747"&gt;&lt;/div&gt;

&lt;p&gt;Nearly nine in ten respondents also report that siloed data negatively impacts IT operations, driving inefficient use of resources, reduced collaboration and elevated risk of non-compliance.&lt;/p&gt;

&lt;p&gt;In practice, this misalignment tends to surface in a few consistent and recurring friction points:&lt;/p&gt;

&lt;h4&gt;Fragmented tooling&lt;/h4&gt;

&lt;p&gt;Fragmented tooling is a major barrier. Many organizations juggle an older on-prem client tool, a separate MDM for mobile and a different solution for patches. The result is tech sprawl that makes the problem worse.&lt;/p&gt;

&lt;p&gt;As this disconnect plays out in practice, security and IT teams often rely on different tools and datasets to assess the same endpoints, leading to very different conclusions about risk and remediation status.&lt;/p&gt;

&lt;p&gt;AI-driven analysis can add context across these datasets, helping IT and security teams interpret exposure through a shared lens rather than competing reports.&lt;/p&gt;

&lt;h4&gt;User impact&lt;/h4&gt;

&lt;p&gt;User impact is another source of tension. Endpoint controls are often seen as restrictive, raising concerns about performance, downtime or privacy, especially on bring-your own (BYOD) devices. IT teams are left balancing enforcement with user experience, while security pushes for stricter controls.&lt;/p&gt;

&lt;h4&gt;Resource constraints&lt;/h4&gt;

&lt;p&gt;Resource constraints make this harder. Teams are wary of introducing new platforms or policies that appear complex or disruptive, especially when they’re already stretched thin.&lt;/p&gt;

&lt;p&gt;Without clear governance, these issues lead to inconsistent enforcement, stalled remediation and shadow policy decisions. Endpoint management stays reactive. But the good news is that this is solvable.&lt;/p&gt;

&lt;h2&gt;Balancing security requirements and business flexibility&lt;/h2&gt;

&lt;p&gt;One of the hardest challenges in endpoint management is balancing security with business flexibility. Security teams want consistent controls to reduce risk. Business leaders want minimal disruption and the freedom to work without friction. IT teams are often caught in the middle.&lt;/p&gt;

&lt;p&gt;When this balance isn’t clearly defined, endpoint policies become a source of conflict. Strict controls applied universally can slow productivity, frustrate users and encourage workarounds. Too much flexibility, on the other hand, increases exposure and makes enforcement inconsistent.&lt;/p&gt;

&lt;p&gt;The real issue is that organizations fail to agree upfront on what’s mandatory and where flexibility is acceptable. Without that clarity, organizations negotiate policy decisions ad hoc and react to incidents instead of managing risk proactively.&lt;/p&gt;

&lt;p&gt;Effective endpoint governance reframes the conversation. By defining baseline requirements upfront and aligning them to risk, organizations can protect critical assets while still supporting different user needs and operating models. This shift allows security and IT to move from constant trade-offs to structured decision-making. That's when the relationship fundamentally changes from friction to alignment.&lt;/p&gt;

&lt;h2&gt;Who should own endpoint governance?&lt;/h2&gt;

&lt;p&gt;Endpoint governance can't sit with a single team. It requires shared ownership across IT, security and the business.&lt;/p&gt;

&lt;p&gt;In successful organizations, endpoint governance is shaped by a group that includes IT operations, security and key business stakeholders. This group defines decision rights, agrees on priorities and establishes a common policy framework that everyone operates within.&lt;/p&gt;

&lt;p&gt;Security brings risk context and threat awareness. IT brings operational insight and user impact considerations. Business leaders provide perspective on workflows, productivity and acceptable levels of disruption. When these perspectives are aligned early, endpoint policies are easier to enforce and less likely to be bypassed.&lt;/p&gt;

&lt;p&gt;Governance clarifies accountability. It answers questions like who decides what's mandatory, how exceptions are handled and how conflicts are resolved. With that structure in place, endpoint management becomes a coordinated program rather than a series of isolated decisions.&lt;/p&gt;

&lt;h2&gt;Defining risk remediation priorities and timelines&lt;/h2&gt;

&lt;p&gt;Effective endpoint governance depends on clear agreement around &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;risk remediation priorities&lt;/a&gt; and timelines. Without that agreement, IT and security teams often talk past each other, prioritizing volume instead of focusing on what matters most.&lt;/p&gt;

&lt;p&gt;The problem with patching is prioritization, and Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; confirms this isn't just a theoretical problem but a measurable operational challenge:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;39% of IT teams struggle to prioritize risk remediation and patch deployment.&lt;/li&gt;
	&lt;li&gt;38% have difficulty tracking patch status and rollouts.&lt;/li&gt;
	&lt;li&gt;And 35% struggle to stay compliant with patching.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are all outcomes that stem largely from visibility gaps and inconsistent tooling, making it harder to focus remediation efforts.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Traditional approaches rely on CVSS scores and long spreadsheets that don't reflect real-world risk at all. Context matters: whether a device is Internet-facing, who uses it, what data it touches and how likely exploitation is, with AI-powered analysis helping teams assess that context continuously at scale.&lt;/p&gt;

&lt;p&gt;Governance helps shift remediation from a volume-driven exercise to a risk-based one. By defining patching timelines, escalation paths and ownership upfront, organizations can align IT and security around shared priorities. Instead of debating which issues to address first, teams can focus on execution.&lt;/p&gt;

&lt;p&gt;Clear timelines reduce friction by making remediation predictable instead of reactive. This consistency improves accountability, shortens exposure windows and builds trust between teams.&lt;/p&gt;

&lt;h2&gt;Non-negotiables vs. flexibility zones&lt;/h2&gt;

&lt;p&gt;One of the most important outcomes of endpoint governance is clarity around what's required and where flexibility is allowed.&lt;/p&gt;

&lt;p&gt;Non-negotiables are the baseline. This includes disk encryption, specific &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; timelines and mandatory enrollment before a device can touch sensitive data. Defining these controls upfront removes ambiguity and ensures a consistent security posture.&lt;/p&gt;

&lt;p&gt;Flexibility zones acknowledge that not all endpoints are the same. Different teams, roles and operating models may require tailored policies, especially in environments with BYOD, contractors or frontline workers. Governance defines where exceptions are permitted, how they are approved and how risk is managed when flexibility is granted.&lt;/p&gt;

&lt;p&gt;Without this distinction, organizations either over-restrict users or allow uncontrolled exceptions. With it, endpoint management becomes both enforceable and adaptable.&lt;/p&gt;

&lt;p&gt;Security teams know which controls cannot be compromised, while IT and the business retain the flexibility needed to support productivity. This balance makes endpoint governance enforceable and practical.&lt;/p&gt;

&lt;h2&gt;Building trust through shared dashboards and transparency&lt;/h2&gt;

&lt;p&gt;Even the best endpoint governance framework breaks down without shared visibility. When IT and security teams operate from different dashboards and reports, trust erodes and shadow decisions take root.&lt;/p&gt;

&lt;p&gt;These disconnects are often rooted in fragmented data pipelines, where endpoint information is incomplete, outdated or inconsistently updated across tools and systems. Shared dashboards only change that dynamic when they are built on continuously updated, reconciled data. &lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&lt;/a&gt;, powered by AI, helps make this possible by automatically correlating endpoint signals across discovery, compliance, &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process"&gt;vulnerability and remediation&lt;/a&gt; data sources.&lt;/p&gt;

&lt;p&gt;When both teams rely on the same data — covering device inventory, compliance status, vulnerability exposure and remediation progress — conversations become grounded in facts rather than assumptions. Disagreements shift from “Whose data is right?” to “What issue should we tackle next?”&lt;/p&gt;

&lt;p&gt;Data transparency changes the culture from finger-pointing to IT and security collaboration. Instead of security saying they’ve found more unmanaged laptops, the conversation becomes: “We have a visibility gap – how do we close it?”&lt;/p&gt;

&lt;p&gt;Joint IT and security metrics such as time to discovery, percentage of fully managed endpoints and exposure duration create a common language for decision-making. AI-driven automation helps keep those metrics accurate and current. Shared dashboards reinforce accountability.&lt;/p&gt;

&lt;p&gt;When progress and gaps are visible to all stakeholders, endpoint governance stops being an abstract policy discussion and becomes a measurable, collaborative effort. This visibility is what turns governance from intent into execution.&lt;/p&gt;

&lt;h2&gt;Measuring the effectiveness of endpoint governance&lt;/h2&gt;

&lt;p&gt;Endpoint governance only works if organizations can measure whether it’s actually reducing risk and improving operations. Without clear KPIs and accessible data, governance quickly becomes a policy exercise rather than a practical discipline.&lt;/p&gt;

&lt;p&gt;In practice, effective measurement spans visibility, risk and operational performance.&lt;/p&gt;

&lt;h4&gt;Visibility and coverage metrics&lt;/h4&gt;

&lt;p&gt;Effective measurement starts with visibility. These metrics show whether endpoints are governed in practice, not just on paper.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Percentage of endpoints that are fully managed&lt;/li&gt;
	&lt;li&gt;Time to discover new or previously unknown devices&lt;/li&gt;
	&lt;li&gt;Number and persistence of unmanaged or unknown endpoints&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AI-powered automation supports continuous measurement here by tracking trends in coverage and policy drift over time rather than relying on point-in-time reports.&lt;/p&gt;

&lt;h4&gt;Risk and exposure metrics&lt;/h4&gt;

&lt;p&gt;Risk-based metrics help teams move beyond volume and focus remediation on what matters most.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure time for critical vulnerabilities&lt;/li&gt;
	&lt;li&gt;Devices with the highest risk based on context and access&lt;/li&gt;
	&lt;li&gt;Alignment of remediation activity to real-world exploitability&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics help IT and security teams prioritize actions that have clear business impact, rather than chasing patch counts or compliance percentages alone.&lt;/p&gt;

&lt;h4&gt;Operational performance metrics&lt;/h4&gt;

&lt;p&gt;Operational metrics indicate whether endpoint governance is improving day-to-day execution and user experience.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reductions in endpoint-related security incidents&lt;/li&gt;
	&lt;li&gt;Faster onboarding and offboarding of users and devices&lt;/li&gt;
	&lt;li&gt;Fewer support tickets tied to endpoint configuration or patching issues&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over time, improvements in these indicators show whether automation, self-healing and policy enforcement are delivering measurable value.&lt;/p&gt;

&lt;p&gt;Endpoint governance KPIs must be reviewed jointly, with IT and security looking at the same data and course-correcting as needed. This reinforces accountability and enables continuous improvement. As environments evolve, policies, priorities and controls should evolve with them. Endpoint governance isn’t static — it’s an ongoing process that adapts as risk, technology and business needs change.&lt;/p&gt;

&lt;h2&gt;Defining ownership to scale endpoint management&lt;/h2&gt;

&lt;p&gt;Endpoint management doesn’t fail for lack of technology. It fails when ownership is unclear and governance is fragmented.&lt;/p&gt;

&lt;p&gt;As endpoints continue to diversify and work becomes more distributed, the question of who owns endpoint management can no longer be left ambiguous. Security, IT and the business all have a stake, and effective governance brings those perspectives together under a shared framework.&lt;/p&gt;

&lt;p&gt;When organizations establish clear ownership, define non-negotiables and operate from a shared view of endpoints, AI-powered automation helps endpoint management shift from reactive firefighting to proactive risk reduction. Shared dashboards, agreed-upon remediation timelines and continuous measurement replace ad hoc decisions and shadow policies.&lt;/p&gt;

&lt;p&gt;Success comes from treating endpoint management as a unifying, automation-first program. In practice, the pattern is clear: when visibility, shared ownership and governance come together, endpoints shift from a friction point to a foundation for resilience and collaboration.&lt;/p&gt;
</description><pubDate>Thu, 05 Mar 2026 13:30:01 Z</pubDate></item><item><guid isPermaLink="false">59c8d40d-128f-4f12-a8a8-845aa4734fca</guid><link>https://www.ivanti.com/blog/modern-application-control-trusted-ownership-vs-allowlisting</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Trusted Ownership: How Ivanti Application Control scales beyond allowlisting</title><description>&lt;p&gt;Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on &lt;i&gt;legitimate, signed tools &lt;/i&gt;— used in the wrong context — to bypass list-based controls entirely.&lt;/p&gt;

&lt;p&gt;So when organizations evaluate &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; or &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; and encounter Trusted Ownership, it may initially resemble blocklisting because explicit blocks are possible. In reality, Trusted Ownership is a far broader and far lighter operationally inspired‑ enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;Instead of managing expanding lists, it enforces security on who has placed software on the system, aligning cleanly with modern software distribution practices and zero trust principles. It’s best understood not as another list mechanism, but as a provenance inspired enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;That shift in thinking leads to a better question for modern application control: not only what a file &lt;i&gt;is&lt;/i&gt;, but &lt;i&gt;how it got there.&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;Beyond lists: why provenance control now matters&lt;/h2&gt;

&lt;p&gt;The question of how a file arrived on the system is at the core of provenance control. Instead of trusting files based on publisher, path or hash alone, provenance control evaluates the &lt;i&gt;origin and process&lt;/i&gt; that introduced them. &lt;i&gt;Who wrote the file to disk? Through which mechanism? Did the installation follow a controlled IT workflow?&lt;/i&gt; This evaluation shifts application control from object trust to process trust, creating a far stronger security boundary.&lt;/p&gt;

&lt;p&gt;In Ivanti Application Control, provenance control is implemented as &lt;a href="https://help.ivanti.com/ap/help/en_US/am/2025/Content/Application_Manager/Trusted_Owners.htm" target="_blank"&gt;Trusted Ownership&lt;/a&gt;. Any file placed by a trusted owner is allowed; anything introduced by a user is denied by default. This applies consistently across executables, DLLs, installers and scripts. Because identities like SYSTEM, TrustedInstaller and Administrators are trusted by default, software delivered through standard deployment channels such as MS Intune, MECM, Ivanti Endpoint Manager (EPM)or other enterprise tools runs immediately without rule maintenance or exceptions.&lt;/p&gt;

&lt;p&gt;This marks a fundamental break from classic allowlisting. AppLocker rules live or die based on exact publisher, path or hash definitions. It doesn't evaluate installation origin and doesn't automatically trust your deployment mechanisms. Software delivered by Intune still requires a preexisting allow rule, often relying on broad defaults that permit the Program Files or Windows directories.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A flowchart illustrates an app provenance engine that allows trusted origins and blocks untrusted ones. On the left, a trusted IT admin provides a company app, which is allowed by the provenance engine and marked with a green check. On the right, a user tries to introduce an unknown executable (EXE), which is blocked by the provenance engine, marked with a red X. The blocked executable is shown again at the bottom with a cross mark. The diagram visually separates trusted, allowed content from untrusted, blocked content." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image1.jpg"&gt;&lt;/p&gt;

&lt;p&gt;That distinction matters because modern attacks increasingly weaponize legitimate tools in improper contexts. Provenance control neutralizes much of that risk by enforcing trust in &lt;i&gt;how&lt;/i&gt; software arrives, not just &lt;i&gt;what&lt;/i&gt; it is. It aligns with zero trust principles, reduces supply chain exposure, and dramatically narrows opportunities for Living off the Land (LotL) abuse by default.&lt;/p&gt;

&lt;p&gt;Once you understand the importance of origin, the next question becomes: how do you enforce it at scale?&lt;/p&gt;

&lt;p&gt;The answer: apply provenance consistently across all the ways software executes and all the ways it is delivered.&lt;/p&gt;

&lt;h2&gt;Beyond Blocklists: Broad coverage built for modern software deployment&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application security away from managing endless lists and toward validating the process by which software arrives on the system. Once you adopt this perspective, it becomes clear that Trusted Ownership is not a blocklist approach. It's an origin-based trust boundary that behaves very differently from traditional allowlisting.&lt;/p&gt;

&lt;p&gt;A common misconception is that Trusted Ownership resembles blocklisting because administrators sometimes add targeted deny rules for well-known Windows tools. In practice, these deny rules are defensive hardening measures against Living off the Land techniques. Every serious application control method uses such targeted restrictions. The core of Trusted Ownership is the opposite of blocklisting. Software delivered through a controlled and trusted process is permitted by default, while user-introduced content is denied by default.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="cMWocpzF3Uo"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;A more important differentiator is coverage. Many organizations that rely on classic allowlists end up focusing almost entirely on executable files. They often avoid applying the same enforcement to DLLs, scripts and MSI packages because these file types make rule maintenance far more complex. This creates gaps that modern attackers frequently exploit.&lt;/p&gt;

&lt;p&gt;Trusted Ownership avoids these gaps by applying the same origin-based enforcement to the full execution chain. Executables, DLLs, scripts, MSI installers and related components are evaluated through the same trust model. Because trust is determined by who introduced the file, you do not need separate policies for each file type. A script in the Downloads folder, a DLL created in a temporary build directory or an EXE executed from a user profile all receive the same default deny treatment when they originate outside a controlled installation process.&lt;/p&gt;

&lt;p&gt;This trust model also aligns naturally with how modern endpoint management platforms deliver software. Solutions such as Intune, MECM, Ivanti Neurons for MDM, &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti Endpoint Manager&lt;/a&gt; and similar systems typically install applications using the SYSTEM identity or another trusted service account.&lt;/p&gt;

&lt;p&gt;Since these identities are already Trusted Owners, software deployed through these channels runs immediately without creating allow rules, maintaining file paths or updating policies. Only when you intentionally use alternative installation accounts, such as custom DevOps agents or scripted installations in user context, do you need to identify that identity as a Trusted Owner.&lt;/p&gt;

&lt;p&gt;The result is a model with broad and consistent coverage across all relevant file types. It works seamlessly with modern software distributions and avoids the operational overhead associated with classic allowlists that focus mainly on executable files.&lt;/p&gt;

&lt;p&gt;Trusted Ownership places trust not in individual objects but in the controlled processes through which software is delivered, creating a more scalable and more secure approach to application control.&lt;/p&gt;

&lt;h2&gt;Where WDAC (App Control for Business) fits in&lt;/h2&gt;

&lt;p&gt;Microsoft maintains two application control technologies: AppLocker and App Control for Business (formerly WDAC). Although both still exist, Microsoft is clear about their roles. AppLocker helps prevent users from running unapproved applications, but it does not meet the servicing criteria for modern security features and is therefore categorized as a &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/applocker/applocker-overview" rel="noopener" target="_blank"&gt;defense-in-depth mechanism rather than a strategic security control&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft’s forward path for application control is App Control for Business and explicitly states that AppLocker is feature-complete and no longer under active development, beyond essential security updates. This means all new capabilities are delivered only in WDAC and not in AppLocker.&lt;/p&gt;

&lt;p&gt;App Control for Business introduces the &lt;i&gt;Managed Installer&lt;/i&gt; concept. This allows Windows to automatically trust applications installed through designated deployment platforms such as Intune or MECM. Trust is derived from the distribution channel rather than individual files, reducing rule maintenance significantly.&lt;/p&gt;

&lt;p&gt;This aligns closely with Ivanti Application Control’s Trusted Ownership model. Both approaches trust software based on the controlled process that installed it rather than on discrete file attributes. However, Trusted Ownership applies this concept in a simpler and more operationally accessible way. Ivanti trusts identities such as SYSTEM and designated service accounts without requiring complex policy layers, XML definitions or deep WDAC expertise.&lt;/p&gt;

&lt;p&gt;Ivanti hears from many organizations that they struggle to operationalize WDAC. WDAC policies require careful design, lengthy testing in audit mode, driver and kernel exception management and ongoing maintenance of multiple policy sets. &lt;a href="https://www.reddit.com/r/Intune/comments/16oov9d/is_anyone_actually_successfully_deploying_wdac_as/" rel="noopener" target="_blank"&gt;This often leads organizations to combine WDAC with AppLocker&lt;/a&gt; to cover both low-level enforcement and day-to-day user space control and end up with administrative overhead.&lt;/p&gt;

&lt;p&gt;Ivanti Application Control offers a unified alternative. Through Trusted Ownership, Trusted Vendors and digital signature validation, it delivers a provenance-based default deny model with consistent coverage across executables, DLLs, scripts and MSI packages.&lt;/p&gt;

&lt;p&gt;Instead of maintaining two MS control planes with different scopes, organizations manage a single, streamlined policy that enforces trust based on how software is introduced into the system. This provides many of the practical goals customers attempt to achieve with a combined WDAC and AppLocker deployment, but with lower operational complexity and one cohesive trust model.&lt;/p&gt;

&lt;h2&gt;LOLBins and argument-level control&lt;/h2&gt;

&lt;p&gt;With broad coverage established, the issue then becomes how to handle the legitimate tools already on every machine that attackers like to abuse.&lt;/p&gt;

&lt;p&gt;Modern attackers often avoid using traditional malware and instead rely on the tools already present on every Windows device. These Living off the Land tools (LOLBins) are legitimate and necessary for normal operations, which makes them difficult to block without affecting productivity. Traditional allowlisting struggles here because broad blocking breaks workflows, while broad allowing leaves dangerous gaps.&lt;/p&gt;

&lt;p&gt;A provenance-based model such as Trusted Ownership changes this dynamic. Even if an attacker attempts to use a built-in tool, the content they try to run usually does not come from a trusted installation process. Since Ivanti evaluates the origin of that content, most misuse attempts fail automatically. The tool may be legitimate, but the content it is asked to run is not, and Trusted Ownership stops it before it executes.&lt;/p&gt;

&lt;p&gt;It is also important to understand not only which tools run but what they are being asked to do. Many interpreters and runtimes, such as PowerShell, Python, or Java, can be perfectly safe in one context and risky in another. A business application may rely on Java to start a specific, approved process, while a user downloaded JAR file is an entirely different scenario.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A diagram explains how PowerShell scripts are evaluated in two security layers: Ownership and Intent. The first layer uses a trusted ownership check to block malicious scripts, while allowing approved commands using argument-level control. The second layer, focused on intent, uses policy enforcement to block malicious activity while allowing legitimate processes to run. Icons represent scripts, commands, and shield checks, with arrows showing allowed and blocked paths." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image2.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Ivanti handles this through a layered approach. A JAR file is first evaluated using Trusted Ownership, which blocks it immediately if it was introduced by a user rather than through a controlled deployment process. Beyond that, administrators can create simple allow rules that specify exactly which Java commands are permitted, ensuring that only legitimate Java based applications run while attempts to launch unapproved JAR files are quietly denied.&lt;/p&gt;

&lt;p&gt;The same principle applies across other tools as well. Policies can approve the exact behavior your organization needs while blocking activities that fall outside those boundaries. This avoids broad, brittle rules and keeps daily work running smoothly.&lt;/p&gt;

&lt;p&gt;The result is a balanced and modern approach. Trusted Ownership stops untrusted content by default. Focused hardening aligns with government and community best practices for reducing living off the land abuse and intent aware controls ensure that legitimate processes continue to function without opening doors for attackers.&lt;/p&gt;

&lt;p&gt;This approach closely aligns with current community and government guidance on mitigating living off the land techniques. Agencies such as CISA, NSA, FBI and the &lt;a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques#best-practice-recommendations" rel="noopener" target="_blank"&gt;Australian Cyber Security Centre&lt;/a&gt; emphasize reducing opportunities for attackers to use built-in tools by controlling how they are used and restricting the untrusted content they act upon. Their joint guidance highlights that LOTL attacks depend on abusing native tools and stresses the need for controls that limit this misuse without blocking legitimate system processes.&lt;/p&gt;

&lt;p&gt;Ivanti’s model reflects this guidance. Trusted Ownership automatically blocks the untrusted content that attackers rely on, while a small number of focused restrictions address the small set of tools that require extra care.&lt;/p&gt;

&lt;h2&gt;Trusted Ownership in action: Real-world scenarios&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Here are a few operational examples of how Ivanti Application Control and Trusted Ownership work in practice.&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;A portable application is copied into the user profile. Ivanti blocks it because it is user-owned. AppLocker only blocks if there are matching rules. Without the right path or publisher rules, the behavior can differ.&lt;/li&gt;
	&lt;li&gt;An email attachment launches a PowerShell script from Downloads. Ivanti denies it because of user ownership. AppLocker depends on script rules and, on block events, forces PowerShell into Constrained Language Mode, which will still run the script.&lt;/li&gt;
	&lt;li&gt;Abuse of OS tools such as rundll32 or mshta. Both models need targeted deny hardening. Ivanti combines this with provenance control which generally reduces the number of exceptions you need. AppLocker relies on curated deny sets and requires periodic tuning.&lt;/li&gt;
	&lt;li&gt;A vendor update ships new signed files. Ivanti allows the update when it arrives via the trusted deployment channel due to Trusted Ownership. AppLocker can accommodate this with publisher rules, but signature reuse across multiple products or unusual install paths often leads to extra maintenance and broader trust than intended.&lt;/li&gt;
	&lt;li&gt;A user downloads a JAR and tries to run it with Java. Ivanti blocks the attempt because the JAR is user-introduced and fails Trusted Ownership. If needed, admins can allow only the exact approved invocation by matching the full command line. AppLocker cannot match arguments and relies on publisher, path or hash rules.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application control from a management problem to a trust model. Instead of trusting individual files, it trusts the process by which software arrives on a system, making security both scalable and workable.&lt;/p&gt;

&lt;p&gt;Trusted Ownership fits squarely into this approach. It is neither a blocklist nor a classic allowlist, but a model where software that arrives through a controlled IT process is allowed by default, while everything outside that process is denied by default. By enforcing on origin and ownership rather than on ad hoc files, &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; align far better with modern attack techniques and today’s software distribution.&lt;/p&gt;

&lt;p&gt;If you keep treating application control as a list management exercise, you will feel the administrative burden. If you treat it as a trust boundary, you gain scalability, security, and operational workability.&lt;/p&gt;
</description><pubDate>Wed, 25 Feb 2026 14:25:15 Z</pubDate></item><item><guid isPermaLink="false">9e2cfeac-8bf5-4822-9d7e-64aac32964cb</guid><link>https://www.ivanti.com/blog/ai-governance-framework-responsible-ai-guardrails</link><atom:author><atom:name>Brooke Johnson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brooke-johnson</atom:uri></atom:author><category>Artificial Intelligence</category><title>How to Implement an AI Governance Framework Using Safe, Ethical and Reliable AI Guardrails</title><description>&lt;p&gt;In my time at Ivanti, I've witnessed firsthand how AI &lt;a href="https://www.ivanti.com/company/artificial-intelligence"&gt;acts as a force multiplier across enterprise organizations&lt;/a&gt;. When deployed strategically, AI accelerates decision-making and operational execution at scale in a way that teams simply can't sustain manually. However, without clear and enforceable AI guardrails, implementing AI opens organizations up to serious new risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2026 State of Cybersecurity Report&lt;/a&gt; highlights a growing disconnect I’ve observed across the industry: optimism about AI is rising, yet governance and preparedness are not keeping pace. &lt;b&gt;Currently, just 50% of organizations say they have formal guardrails in place to guide the deployment and operation of AI systems and agents.&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;As adoption accelerates faster than governance, I'm seeing organizations face growing internal risks — shadow AI use, inconsistent data quality, biased outputs and uneven employee training to name a few.&lt;/p&gt;

&lt;p&gt;From where I sit — spanning legal, security and HR — I can tell you this: AI governance isn't an abstract compliance exercise. It's a core requirement for trust, accountability and control.&lt;/p&gt;

&lt;h2&gt;The state of enterprise AI: a risky Wild West&lt;/h2&gt;

&lt;p&gt;Responsible AI at scale requires deliberate governance with enforceable guardrails for all employees. Ignore that, and shadow AI use will continue to grow. Our &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;2025 Technology at Work research report&lt;/a&gt; revealed that 46% of office workers use AI that aren't employer-provided. Even more concerning, nearly a third of employees (32%) keep their use of AI tools at work a secret from their employers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/20628247"&gt;&lt;/div&gt;

&lt;p&gt;Too many organizations are deploying AI without an overarching governance, and the consequences of this approach are real. Organizations can expose sensitive data. They can violate regulatory obligations. It could potentially erode market trust. A team deploys an AI platform without proper guardrails, and suddenly you have biased outputs or degraded performance. Without human oversight, AI systems generate inaccurate recommendations or trigger inappropriate actions. That creates dangerous false confidence in AI-driven outcomes.&lt;/p&gt;

&lt;h2&gt;What is an AI governance framework?&lt;/h2&gt;

&lt;p&gt;An AI governance framework is the blueprint for how we design, deploy and oversee AI systems across their lifecycle. Its purpose is to align AI use with business objectives, legal obligations and enterprise risk tolerance — with transparency and accountability built in from day one.&lt;/p&gt;

&lt;p&gt;At Ivanti, our framework clarifies:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;b&gt;Who is accountable&lt;/b&gt; for AI decisions and outcomes&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;How risks are identified&lt;/b&gt;, assessed and mitigated&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;What guardrails must be in place&lt;/b&gt; before AI systems go live&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;How AI performance, behavior and impact&lt;/b&gt; are monitored over time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In practice, governance enables scale. Clear frameworks let us move beyond fragmented pilots and operationalize AI across the enterprise. Without it, adoption stalls.&lt;/p&gt;

&lt;p&gt;Our position is simple: governance doesn't block innovation. It makes innovation sustainable.&lt;/p&gt;

&lt;h2&gt;3 layers of AI guardrails in an AI governance framework&lt;/h2&gt;

&lt;p&gt;As part of Ivanti’s AI Governance Council, I've learned that a comprehensive framework requires multiple layers of guardrails. Each addresses a different category of risk. Together, they form the foundation for safe, reliable AI use.&lt;/p&gt;

&lt;h4&gt;Technical Guardrails&lt;/h4&gt;

&lt;p&gt;Technical guardrails keep AI systems within predefined safety and operational parameters.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Data guardrails&lt;/b&gt;: Data guardrails protect &lt;a href="https://www.ivanti.com/use-cases/data-protection-application-security"&gt;data integrity&lt;/a&gt; and ensure AI systems are trained and operated on trusted inputs. These guardrails are typically owned by data and security teams, who establish standards for data sourcing, validation, &lt;a href="https://www.ivanti.com/products/network-access-control"&gt;access controls&lt;/a&gt; and ongoing quality monitoring. Poor data quality remains a major barrier to effective AI deployment, particularly in security, where incomplete, biased or unvalidated data can skew outcomes and degrade detection accuracy over time.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Model guardrails: &lt;/b&gt;Model guardrails address robustness, explainability, and bias detection to ensure AI systems behave as intended over time. These guardrails are typically designed by security, data science and platform teams, who define testing requirements for drift, bias and performance degradation before deployment and continuously thereafter, especially as models are retrained or exposed to changing operational data.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Application and output guardrails: &lt;/b&gt;application and output guardrails&lt;b&gt; &lt;/b&gt;validate AI-generated outputs, particularly in decision-support or automated response scenarios. These guardrails are typically implemented by security and operations teams, who define approval thresholds, escalation paths, and human-in-the-loop controls. Without them, systems may generate inaccurate recommendations or take inappropriate actions, reinforcing false confidence in automation.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Infrastructure guardrails:&lt;/b&gt; infrastructure guardrails protect the systems that host and support AI workloads and are typically owned by IT and security teams. These teams enforce secure deployment practices, access controls, logging and auditability across cloud and on-prem environments, while ensuring AI services are integrated into existing security monitoring and &lt;a href="https://www.ivanti.com/products/automation"&gt;incident response workflows&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;Ethical guardrails&lt;/h4&gt;

&lt;p&gt;Ethical guardrails align AI behavior with organizational standards and define accountability when AI affects people, customers or business outcomes.&lt;/p&gt;

&lt;p&gt;Ivanti’s AI Governance Council plays a central role here. We navigate the “gray areas” of autonomous agents. We bring together legal, security, HR, and business leaders to define acceptable use, escalation paths and accountability. When should humans intervene? How are decisions audited? Who ultimately owns the outcome when things go wrong?&lt;/p&gt;

&lt;p&gt;When that governance is missing, the consequences escalate quickly.&lt;/p&gt;

&lt;p&gt;Recent incidents show the cost of unclear ethical guardrails. For example, Grok, an AI chatbot developed by xAI, &lt;a href="https://www.thetimes.com/uk/technology-uk/article/grok-ai-x-holocaust-survivor-bikini-auschwitz-6kh5ddxh6" rel="noopener" target="_blank"&gt;drew widespread criticism&lt;/a&gt; after generating unconsented and inappropriate images of real individuals. The failure was not only technical — it was governance-related due to ethical boundaries that weren’t sufficiently defined.&lt;/p&gt;

&lt;p&gt;The same issue arises inside enterprises. When AI blocks a user account, flags an employee, or restricts customer access, we must know who owns the decision if it's wrong. Whether AI is used in security, HR or customer-facing systems, the ethical principles are consistent. Governance ensures accountability is defined before automation causes harm.&lt;/p&gt;

&lt;h4&gt;Regulatory and legal guardrails&lt;/h4&gt;

&lt;p&gt;Regulatory and legal guardrails ensure AI use complies with evolving global regulations, sector rules and data protection laws. Because these requirements change rapidly, teams can't operate in functional silos.&lt;/p&gt;

&lt;p&gt;Legal must lead AI governance early. At Ivanti, we work closely with security and IT to interpret obligations and translate them into enforceable controls. Success depends on aligning from the outset to ensure compliance requirements are embedded into AI design and deployment.&lt;/p&gt;

&lt;p&gt;Recent incidents show why regulatory guardrails cannot be an afterthought. European and UK regulators &lt;a href="https://privacyinternational.org/news-analysis/5692/tribunal-confirms-clearview-ai-bound-gdpr" rel="noopener" target="_blank"&gt;confirmed&lt;/a&gt; that Clearview AI’s facial recognition operations, built on scraping billions of images, were subject to privacy laws like GDPR and took enforcement actions based on violations, showing the legal risk organizations face when governance doesn’t align with regulatory expectations.&lt;/p&gt;

&lt;p&gt;The lesson is clear. Legal and product development teams must work together early to embed regulatory obligations into AI design, deployment and operations. Governance ensures compliance requirements are enforced by default, not retroactively after regulatory scrutiny begins.&lt;/p&gt;

&lt;h2&gt;AI governance vs. AI risk management risk&lt;/h2&gt;

&lt;p&gt;Governance and &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management"&gt;risk management&lt;/a&gt; are closely related but distinct. Here's my take: governance sets the rules and accountability structures. Risk management focuses on identifying and mitigating specific AI-related threats throughout the system lifecycle.&lt;/p&gt;

&lt;p&gt;Common AI risks include data leakage, bias, unreliable outputs, over-reliance on automated decisions and security weaknesses introduced through unmanaged tools or integrations. As AI systems become more autonomous, these risks compound.&lt;/p&gt;

&lt;p&gt;Integrating AI risk mitigation into governance ensures risks are not addressed in isolation. We evaluate them alongside business impact, operational resilience and organizational &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. This lets us prioritize controls where they matter most and avoid blanket restrictions that slow progress without reducing risk.&lt;/p&gt;

&lt;h2&gt;Challenges in scaling AI governance&lt;/h2&gt;

&lt;p&gt;Many organizations start with narrow AI pilots in individual teams. Scaling to enterprise-wide adoption introduces new challenges&lt;/p&gt;

&lt;p&gt;Silos are the fastest way to undermine governance. Security, IT, legal and business teams often operate on conflicting assumptions. We need shared ownership across teams. As my colleague Sterling Parker explains, a successful vision requires involving stakeholders across the business to prevent "AI sprawl."&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="GpoZdJeC3Bw"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;This transition demands a human-centric operating model. Our governance body clearly defines where AI can amplify existing roles, where additional training is required and where human oversight remains essential. Continuous feedback from employees helps ensure AI is applied where it delivers value without creating gaps in accountability or trust. We prioritize upskilling to replace fear with active adoption.&lt;/p&gt;

&lt;p&gt;Our &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cybersecurity research&lt;/a&gt; shows that mature organizations approach these challenges differently. Organizations that rank themselves as the most advanced in cybersecurity (Level 4s) are nearly 3x as likely to use comprehensive AI guardrails compared to organizations with an intermediate level of cybersecurity maturity (Level 2s).&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27433090"&gt;&lt;/div&gt;

&lt;p&gt;They invest early in governance, align leadership around shared frameworks and treat AI as a strategic capability rather than a collection of tools. These organizations are far more likely to operationalize AI across the enterprise while maintaining trust and control.&lt;/p&gt;

&lt;h2&gt;How to implement responsible AI&lt;/h2&gt;

&lt;p&gt;Building the framework is table stakes. Execution is where AI governance lives.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Start with clear policies&lt;/b&gt; on acceptable use and escalation. These must be practical and tied directly to your existing risk structures.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Governance must be accessible.&lt;/b&gt; Responsible AI is an enterprise-wide mandate, not a specialist silo. Targeted training ensures every user understands their role in upholding these guardrails.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Take a governed approach to AI enablement. “&lt;/b&gt;Governed enablement” assumes AI is already in use across the enterprise and defines where and how it can operate safely. It requires continuous monitoring and enforcement to ensure systems remain aligned with policy as usage and risks evolve. This is an ongoing discipline, not a one-time project.&lt;/p&gt;

&lt;p&gt;The future of responsible AI starts now&lt;/p&gt;

&lt;p&gt;AI is reshaping how organizations operate at a pace that cannot be ignored. The question is no longer whether to adopt it, but how to scale it safely. Organizations with strong governance scale without sacrificing trust. Those that delay widen the gap between threat and preparedness.&lt;/p&gt;

&lt;p&gt;At Ivanti, we're committed to building AI governance that enables innovation while protecting what matters most — our people, our customers, and our operations. This is critical work and the time to act is now.&lt;/p&gt;

&lt;p&gt;To learn more about the AI deployment gap and how leading organizations are closing it, explore &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti's 2026 State of Cybersecurity Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 24 Feb 2026 13:00:02 Z</pubDate></item><item><guid isPermaLink="false">a10c1186-6756-4d5f-ab47-cc5f78f1ed4d</guid><link>https://www.ivanti.com/blog/how-to-communicate-cyber-risk-strategy-to-ceos</link><atom:author><atom:name>Dennis Kozak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/dennis-kozak</atom:uri></atom:author><category>Security</category><title>How CEOs Want CISOs to Communicate Cybersecurity Risk Management Strategy</title><description>&lt;p&gt;Most CEOs can recite their quarterly benchmarks and revenue down to the decimal point, but ask them about their organization's cyber risk exposure, and the answers become more vague. It's not that today’s CEOs don’t care about security — &lt;a href="https://www.ivanti.com/network-security"&gt;cybersecurity&lt;/a&gt; ranks among the top concerns for boards and executive teams. The problem runs deeper: a fundamental breakdown in how security risks are explained to business leaders that overlooks the impacts on their business outcomes.&lt;/p&gt;

&lt;p&gt;Lack of competence is not the cause of most communication issues between CISOs and CEOs. They stem from a familiar problem: the curse of knowledge. The curse of knowledge is a common challenge where experts — in this case security leaders — might assume that everyone in the room has a baseline understanding of technical information and terminology, so they fail to break down complex risks into plain language and elaborate on real-world context.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;2026 State of Cybersecurity Report&lt;/a&gt; underscores this disconnect. Nearly six in 10 security professionals say their teams are only moderately effective at communicating risk exposure to executive leadership.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229530"&gt;&lt;/div&gt;

&lt;p&gt;When CEOs and CISOs don’t speak the same language, critical business vulnerabilities can be obscured by technical jargon. When communication breaks down, organizations waste time and money on misdirected investments while gaps in protection go unnoticed until a breach forces the conversation.&lt;/p&gt;

&lt;p&gt;With threat levels rising, AI-enabled attacks are becoming more sophisticated, and data breaches make headlines weekly. The stakes for clear communication between CISOs and executive leadership have never been higher.&lt;/p&gt;

&lt;p&gt;To understand why this communication gap persists, we need to examine both the fundamental challenges and the metrics being used to measure success.&lt;/p&gt;

&lt;h2&gt;Why cyber risk communication fails: the curse of knowledge&lt;/h2&gt;

&lt;p&gt;That disconnect between CEOs and CISOs isn’t caused by a lack of data. If anything, it’s the opposite. From the CEO's seat, the challenge isn’t attention or intent. Rather, it’s seeing dashboards, metrics, acronyms and severity scores without understanding the impact of these results on the whole business.&lt;/p&gt;

&lt;p&gt;Security leaders need to assume that many in the room don’t understand the implications of terms like CVSS scores, &lt;a href="https://www.ivanti.com/blog/understanding-external-attack-surface-management"&gt;attack surfaces&lt;/a&gt; and zero-day vulnerabilities. CEOs want more than dashboards filled with metrics, acronyms and severity scores.&lt;/p&gt;

&lt;p&gt;Cybersecurity briefings need to go a step further and demonstrate the financial, legal, and reputational implications of these results for the business. A CISO might report "587 critical vulnerabilities detected this month" when what the CEO actually needs to know is: "Which of these threaten our ability to serve customers and what's our plan to address them?"&lt;/p&gt;

&lt;h2&gt;Cybersecurity KPIs that matter to CEOs&lt;i&gt;&lt;/i&gt;&lt;/h2&gt;

&lt;p&gt;Useful KPIs clearly connect vulnerability management efforts to business risk. However, our &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cybersecurity research&lt;/a&gt; finds that the most used KPIs used by security teams fail to reflect risk context.&lt;/p&gt;

&lt;p&gt;Currently, only half of companies (51%) track cybersecurity exposure scores or other risk-based indexes. Many security teams still rely on process metrics such as mean time to remediate (47%) or percentage of exposures remediated (41%).&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26288727"&gt;&lt;/div&gt;

&lt;p&gt;Metrics like MTTR, patch velocity and percentage remediated matter to security teams, but they measure operational efficiency, not business exposure or potential financial impact. In isolation, they can look reassuring while obscuring the real question: &lt;i&gt;are we managing our risk effectively?&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;These metrics, which focus on speed and coverage, may look positive on their own, but don’t do much to show whether current remediation efforts actually improve risk posture. It matters less how quickly vulnerabilities are remediated and how many are addressed. What matters more is whether the &lt;i&gt;right&lt;/i&gt; problems are being addressed.&lt;/p&gt;

&lt;p&gt;Shared understanding between security teams and the board and C-Suite requires grounding inscrutable metrics in real-life stakes. For CEOs, this means aligning with your CISO on the most important risks to your specific organization — &lt;i&gt;are you a financial institution that frequently faces sophisticated fraud schemes, strict compliance requirements like PCI-DSS and SOX and the constant threat of ransomware targeting customer financial data?&lt;/i&gt; &lt;i&gt;Are you a healthcare organization grappling with securing an expanding network of connected medical devices while maintaining rigorous compliance standards to protect sensitive patient data?&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;Let’s illustrate the difference between an executive security briefing that relies only on technical metrics vs. one that adds context and business impact.&lt;/p&gt;

&lt;h4&gt;What the CISO says:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;"We discovered 11,000 vulnerabilities.”&lt;/li&gt;
	&lt;li&gt;"MTTR is down to 15 days from 25 days."&lt;/li&gt;
	&lt;li&gt;"We achieved an 88% remediation rate on critical CVEs."&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;What the CEO actually needs to know:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;"We’ve identified ten critical vulnerabilities that could impact revenue-generating systems."&lt;/li&gt;
	&lt;li&gt;"If attacked today, we can restore critical operations in six hours compared to 48 hours last year."&lt;/li&gt;
	&lt;li&gt;"This protection enables us to pursue EU expansion without additional compliance risk."&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Building an executive-level risk appetite framework&lt;/h2&gt;

&lt;p&gt;Executive communication depends on shared frameworks and a common point of reference for how risk is defined, measured and discussed. To eliminate inconsistencies and confusion, all stakeholders should be involved in creating and enforcing a&lt;i&gt; &lt;/i&gt;&lt;a href="https://www.ivanti.com/resources/whitepapers/how-to-define-and-implement-risk-appetite"&gt;&lt;i&gt;risk appetite framework&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;A major goal of these conversations is helping business leaders understand that the goal of the cybersecurity program isn't to be completely “risk free” — it’s impossible for any modern organization to become completely risk free. In other words, CEOs must be able to distinguish between their &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt; and risk posture.&lt;/p&gt;

&lt;p&gt;1. &lt;b&gt;Risk appetite: &lt;/b&gt;how much risk their business is currently willing to tolerate in pursuit of its overarching goals.&lt;/p&gt;

&lt;p&gt;2. &lt;b&gt;Risk posture: &lt;/b&gt;the reality of the organization’s current risk exposure.&lt;/p&gt;

&lt;p&gt;Most organizations now recognize the need to formalize how much cyber risk they’re willing to accept. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s research&lt;/a&gt; shows more than 80% of organizations have a documented risk appetite framework.&lt;/p&gt;

&lt;p&gt;However, fewer than half of the organizations say these frameworks are closely followed in day-to-day operations. When frameworks exist on paper but don't guide actual decisions, it is highly likely that your organization’s risk appetite and risk posture are not aligned.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229780"&gt;&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229775"&gt;&lt;/div&gt;

&lt;h2&gt;How exposure management bridges the communication gap&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/exposure-management"&gt;Exposure management&lt;/a&gt; is a risk-based approach that continuously identifies, prioritizes and validates the scope of potential threats across the entire attack surface. Practicing exposure management helps unite security and executive leaders around a single, comprehensive strategy that reorients cybersecurity around business-critical risk.&lt;/p&gt;

&lt;p&gt;Instead of treating all vulnerabilities as equal, exposure management focuses on identifying and &lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;prioritizing the organization's highest risks&lt;/a&gt; by asking:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Which current exposures are threat actors exploiting in the wild?&lt;/li&gt;
	&lt;li&gt;Which assets need to be prioritized based on current business operations?&lt;/li&gt;
	&lt;li&gt;Which assets, if compromised, would have the greatest impact in terms of reputational, customer, or legal damages?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ivanti’s research report shows that nearly two-thirds of organizations now invest in exposure management, and leadership understanding has increased year over-year. But execution still lags: Only about a quarter of organizations rate their ability to &lt;a href="https://www.ivanti.com/blog/how-to-implement-quantitative-risk-assessment"&gt;assess risk exposure&lt;/a&gt; as excellent.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27230019"&gt;&lt;/div&gt;

&lt;p&gt;To close that gap and operationalize exposure management effectively, CISOs should anchor executive communication around three principles&lt;/p&gt;

&lt;p&gt;&lt;b&gt;1. Translate technical signals into business context. &lt;/b&gt;Instead of reporting vulnerability counts, explain which exposures affect revenue-generating systems, customer data or regulated environments.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;2. Prioritize emerging threats by impact, not volume. &lt;/b&gt;Executives don’t need to track every new attack technique. They need to understand which situations could materially disrupt the business and how prepared the organization is to respond.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;3. Use scenarios, not spreadsheets.&lt;/b&gt; Narratives that connect cause, impact and outcome, backed by data, help leaders internalize risk and make faster decisions.&lt;/p&gt;

&lt;p&gt;This approach shifts your risk mitigation strategy from reactive defense to proactive decision-making.&lt;/p&gt;

&lt;h2&gt;The path forward&lt;/h2&gt;

&lt;p&gt;When executives and security leaders speak the same language, the curse of knowledge can be broken and cybersecurity becomes a strategic enabler that protects business value, enables growth and turns security strength into competitive advantage.&lt;/p&gt;

&lt;p&gt;The curse of knowledge can be broken — one translated metric, one business-focused conversation, and one clear decision at a time.&lt;/p&gt;
</description><pubDate>Tue, 17 Feb 2026 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">613c7534-d87d-411a-8d02-57955ea3c5e1</guid><link>https://www.ivanti.com/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly install the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">0cda8b94-e9d7-478c-9f58-afc9c44664fe</guid><link>https://www.ivanti.com/blog/february-2026-security-update</link><category>Security Advisory</category><title>February 2026 Security Update</title><description>&lt;p&gt;Ivanti releases standard security patches on the second Tuesday of every month. &amp;nbsp;Our vulnerability management program is central to our commitment to maintaining secure products. Our philosophy is simple: discovering and communicating vulnerabilities, and sharing that information with defenders, is not an indication of weakness; rather it is evidence of rigorous scrutiny and a proactive vulnerability management program. By aggressively seeking to identify and address vulnerabilities, our aim is to get ahead of threat actors to ensure our customers can take the steps needed to protect their environments.&lt;/p&gt;

&lt;p&gt;We believe that responsible transparency helps protect our customers, and that CVE disclosures are an essential and effective tool to communicate software vulnerabilities. The purpose of assigning a CVE is to provide a beacon to security teams and signal the need for urgent updates.&lt;/p&gt;

&lt;p&gt;To that end, today Ivanti is disclosing vulnerabilities in Ivanti Endpoint Manager (EPM).&lt;/p&gt;

&lt;p&gt;&lt;span&gt;&lt;b&gt;It is important for customers to know:&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have no evidence of this vulnerability being exploited in the wild.&lt;/li&gt;
	&lt;li&gt;This vulnerability does not impact any other Ivanti solutions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;More information on this vulnerability and detailed instructions on how to remediate the issues can be found in this &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024" target="_blank"&gt;Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;Ivanti Innovators Hub&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 15:05:16 Z</pubDate></item><item><guid isPermaLink="false">18178632-228a-44a8-8cde-25659f09be78</guid><link>https://www.ivanti.com/blog/your-new-hub-for-success-is-here-explore-innovators-hub-today</link><atom:author><atom:name>Sterling Parker</atom:name><atom:uri>https://www.ivanti.com/blog/authors/sterling-parker</atom:uri></atom:author><category>Ivanti News</category><title>Your New Hub for Success Is Here: Explore Innovators Hub Today</title><description>&lt;p&gt;Today marks an important milestone in our journey to make your Ivanti support experience effortless, intuitive and all in one place: &lt;strong&gt;Ivanti Innovators Hub is now live!&lt;/strong&gt; This isn’t just a refresh; it’s a major step forward — delivering a smarter, unified destination where support, resources and community meet your needs, your way.&lt;/p&gt;

&lt;h2&gt;One destination, everything you need&lt;/h2&gt;

&lt;p&gt;With this launch, the &lt;strong&gt;Ivanti Success Portal and the Ivanti Community are now consolidated into the new Ivanti Innovators Hub&lt;/strong&gt;. No more switching between sites. Now, all your resources, case management tools and knowledge content are unified within one streamlined experience at &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;hub.ivanti.com&lt;/a&gt;. You’ll have full access to the user and account management, resource libraries and case submission capabilities you’ve relied on. User registration and login will remain at &lt;a href="https://success.ivanti.com/" target="_blank"&gt;&lt;strong&gt;success.ivanti.com&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Smarter support with the Innovators Hub chatbot&lt;/h2&gt;

&lt;p&gt;We’re pleased to bring you a streamlined chatbot experience within the Innovators Hub. When you need help, the chatbot will first prompt you to select a product and describe your question or issue. It then searches our forums, knowledge articles and technical documentation to generate a relevant answer — helping you find a solution instantly, right within the chat.&lt;/p&gt;

&lt;p&gt;If the suggested answer solves your problem, you can simply move on — no need to create a support case. If not, the chatbot gives you the option to ask another question or continue to case creation. If you proceed, the chatbot automatically carries over the details you’ve provided (like product and query) into the case form, so you only need to fill in the remaining required fields before submitting.&lt;/p&gt;

&lt;p&gt;This workflow helps ensure every user gets fast, self-service support when possible, while still making it simple to escalate unresolved issues to our team. The chatbot is prompt-based and guides you step-by-step, so you can resolve issues quickly and spend less time searching for answers.&lt;/p&gt;

&lt;h2&gt;A modern home and a fresh start&lt;/h2&gt;

&lt;p&gt;With this launch, you’ll also notice we’ve refreshed our web address: visit &lt;a href="https://hub.ivanti.com/" target="_blank"&gt;&lt;strong&gt;hub.ivanti.com&lt;/strong&gt;&lt;/a&gt; (instead of forums.ivanti.com). This reflects the new, unified vision for Ivanti support, community and knowledge —clearly signaling that a new, modern experience awaits you.&lt;/p&gt;

&lt;h2&gt;What’s next&lt;/h2&gt;

&lt;p&gt;Looking ahead to March, we’re preparing to further enhance your Innovators Hub experience. Expect new features focused on personalization, engagement, and intuitive tools — all designed with your feedback in mind to make every support interaction effortless and simple.&lt;/p&gt;

&lt;p&gt;Thank you for your partnership and advocacy as we launch this new chapter. The goal of the Ivanti Innovators Hub is simple: to give you one trusted home for support, learning and community — because your success is our mission. I encourage you to explore the new Hub today and share your feedback as we continue to build together.&lt;/p&gt;
</description><pubDate>Fri, 06 Feb 2026 05:00:03 Z</pubDate></item><item><guid isPermaLink="false">43dda94c-f09c-472c-a7a4-ab75944d5b69</guid><link>https://www.ivanti.com/blog/january-2026-epmm-security-update</link><category>Security Advisory</category><title>January 2026 EPMM Security Update</title><description>&lt;p&gt;At Ivanti, responsible transparency is a cornerstone of our commitment to customer security and trust. We have a long-standing commitment to provide information that allows our customers and the broader security ecosystem to take proactive measures to safeguard their environments, while mitigating the risks of a rapidly evolving and highly sophisticated threat landscape.&lt;/p&gt;

&lt;p&gt;To this end, we are issuing an important security update addressing vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM). More information can be found in the Security Advisory. At the time of disclosure, we are aware of a very limited number of customers whose solution has been exploited.&lt;/p&gt;

&lt;p&gt;The issue affects only the on-prem EPMM product. It is not present in Ivanti Neurons for MDM, Ivanti’s cloud-based unified endpoint management solution, Ivanti EPM (a similarly named, but different product), Ivanti Sentry, or any other Ivanti products.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;We urge all customers using the on-prem EPMM product to promptly install the Security Update. &lt;/u&gt;&lt;/p&gt;

&lt;p&gt;As we respond to this situation, we are making the following information available to defenders now:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our &lt;a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" target="_blank"&gt;Security Advisory&lt;/a&gt;, which describes the nature of the vulnerabilities and detailed remediation instructions for customers.&lt;/li&gt;
	&lt;li&gt;A &lt;a href="https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" target="_blank"&gt;Technical Analysis&lt;/a&gt; that includes affected endpoint specifics and log analysis guidance to support investigation and forensics.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We have a longstanding commitment to responsibly share information through Ivanti channels, as well as through coordination with government agencies and trusted security partners, to help defenders assess risk, prioritize remediation, and deploy defenses effectively. In this case, we determined that early proactive release of technical details concurrent with the patch aligns with responsible disclosure and arms defenders to best mitigate potential exploitation.&lt;/p&gt;

&lt;p&gt;Our Support team is always available to help customers and partners should they have any questions. Cases can be logged via the &lt;a href="https://success.ivanti.com/" target="_blank"&gt;Success portal&lt;/a&gt; (login credentials required).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Want to stay up to date on Ivanti Security Advisories? Paste &lt;a href="https://www.ivanti.com/blog/topics/security-advisory"&gt;https://www.ivanti.com/blog/topics/security-advisory/rss&lt;/a&gt; into your preferred RSS reader / functionality in your email program.&lt;/em&gt;&lt;/p&gt;
</description><pubDate>Thu, 29 Jan 2026 19:05:22 Z</pubDate></item></channel></rss>