<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Artificial Intelligence</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/artificial-intelligence/rss" /><link>https://www.ivanti.com/blog/topics/artificial-intelligence</link><item><guid isPermaLink="false">2407256b-094c-45de-a2b1-309ed2f901cf</guid><link>https://www.ivanti.com/blog/how-ai-automation-improve-endpoint-visibility</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><title>Inventory to Intelligence: How AI and Automation Improve Endpoint Visibility</title><description>&lt;p&gt;Endpoint visibility has always been foundational to IT and security. You&amp;nbsp;can’t&amp;nbsp;secure,&amp;nbsp;patch&amp;nbsp;or&amp;nbsp;support what you&amp;nbsp;can’t&amp;nbsp;see.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But as environments have become more distributed and complex, what visibility means has evolved. It’s no longer enough to know that a device exists — IT teams and organizations as a whole need to understand its health, its&amp;nbsp;risk&amp;nbsp;posture&amp;nbsp;and&amp;nbsp;its impact on both security and user experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;AI and endpoint automation&lt;/a&gt;&amp;nbsp;start to make a practical difference. By moving endpoint visibility from static inventory to continuous intelligence, organizations can shift from reactive discovery to proactive, even autonomous operations.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why traditional discovery practices fall short&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Traditional discovery practices were built for&amp;nbsp;a very different&amp;nbsp;IT reality. Their approach is designed for relatively static environments, clearly defined&amp;nbsp;perimeters&amp;nbsp;and&amp;nbsp;manual processes. That strategy&amp;nbsp;doesn’t&amp;nbsp;scale well in today’s hybrid, cloud-first world.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Manual discovery workflows often produce incomplete or outdated inventories. Ivanti’s 2026&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management Advantage Report&lt;/a&gt;&amp;nbsp;reinforces this reality:&amp;nbsp;Only&amp;nbsp;52% of organizations report using&amp;nbsp;an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;endpoint management solution&lt;/a&gt;&amp;nbsp;today, leaving many environments with limited centralized visibility and persistent blind spots across unmanaged or shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In practice, this fragmentation shows up in&amp;nbsp;very familiar&amp;nbsp;ways. Teams often juggle multiple inventories, one from an on-prem client management tool, another from an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;MDM platform&lt;/a&gt;&amp;nbsp;and&amp;nbsp;yet another from identity or access systems, leaving gaps that widen as environments grow more complex.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Common challenges&amp;nbsp;in manual device discovery&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Manual discovery relies heavily on human input, which introduces inconsistency and error. As environments grow more distributed, these processes struggle to evolve with them, making it difficult to keep inventories&amp;nbsp;accurate&amp;nbsp;as devices are added,&amp;nbsp;reassigned&amp;nbsp;or&amp;nbsp;accessed remotely. Reconciling changes across large estates becomes time-consuming and brittle, increasing the likelihood that devices fall out of view entirely.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these limitations compound.&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/best-practices-for-it-asset-discovery-and-inventory-management"&gt;Discovery&lt;/a&gt;&amp;nbsp;becomes episodic rather than continuous, and visibility&amp;nbsp;lags behind&amp;nbsp;reality. By the time inventories are reconciled, the environment has already changed.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Visibility gaps and security risks&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;These gaps&amp;nbsp;aren’t&amp;nbsp;theoretical. Ivanti’s research shows that many organizations still struggle with foundational&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;endpoint visibility&lt;/a&gt;&amp;nbsp;even after deploying multiple management tools. Endpoint data exists across scanners, MDM&amp;nbsp;platforms&amp;nbsp;and&amp;nbsp;access systems, but it is rarely centralized, continuously updated, or trusted across teams. As a result, shadow IT, unmanaged devices&amp;nbsp;and&amp;nbsp;unknown access paths&amp;nbsp;remain&amp;nbsp;persistent sources of security and compliance risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Blind spots create real risk. Many organizations struggle to&amp;nbsp;identify&amp;nbsp;which devices are vulnerable or even actively accessing their environments.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;When teams&amp;nbsp;can’t&amp;nbsp;reliably understand device exposure or access patterns, security decisions are made using incomplete or outdated data, increasing&amp;nbsp;risk&amp;nbsp;and delaying remediation. In fact, the above-mentioned Ivanti report highlights how common these blind spots are:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of organizations report challenges&amp;nbsp;identifying&amp;nbsp;shadow IT&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;41% struggle to&amp;nbsp;identify&amp;nbsp;vulnerabilities across devices&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% say data blind spots make it difficult to determine patch compliance.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Device discovery vs. device health monitoring&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Discovery is only the first step. Knowing that a device exists&amp;nbsp;doesn't&amp;nbsp;tell you whether&amp;nbsp;it's&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;or&amp;nbsp;even functioning properly.&amp;nbsp;That’s&amp;nbsp;where device health monitoring becomes critical.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Discovery tells you&amp;nbsp;what’s&amp;nbsp;present. Health monitoring adds the context that&amp;nbsp;actually matters, from performance and configuration&amp;nbsp;drift&amp;nbsp;to overall security posture. Research from&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Ivanti’s 2025 Securing the Borderless Digital Landscape report&lt;/a&gt;&amp;nbsp;underscores how significant these visibility gaps&amp;nbsp;remain:&amp;nbsp;Two&amp;nbsp;out of five (38%) of IT professionals say they lack sufficient data about devices accessing the network, and 45% report insufficient visibility into shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;BYOD and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;edge devices&lt;/a&gt;, especially, are a concern. These can be online and still pose significant risk. It may be missing critical patches, running outdated software,&amp;nbsp;drifting from&amp;nbsp;configuration&amp;nbsp;standards&amp;nbsp;or&amp;nbsp;suffering performance issues that impact users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Presence data answers the question, “Is it there?” Health data answers, “Is it safe, compliant, and usable?” Without health insights, organizations are effectively managing endpoints in the dark.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Key indicators of endpoint health&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;To manage endpoints proactively, organizations need continuous visibility into key health indicators.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This includes:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Operating&amp;nbsp;system and application versions&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch&amp;nbsp;and antivirus status&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Configuration&amp;nbsp;drift&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Overall&amp;nbsp;security posture&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;User experience signals such as crashes,&amp;nbsp;latency&amp;nbsp;and&amp;nbsp;performance degradation also provide early warning signs that something&amp;nbsp;isn’t&amp;nbsp;right.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern platforms unify these signals into a single view, allowing IT and security teams to understand not just what devices exist, but how&amp;nbsp;they're&amp;nbsp;performing and where risk is&amp;nbsp;emerging.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The risk of tracking only device presence&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When organizations focus&amp;nbsp;only&amp;nbsp;on device presence, they expose themselves to both security and operational risks. Visibility without context leads to delayed detection, missed compliance&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;reactive management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Negative impacts on security and compliance&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Tracking presence alone increases the likelihood that malware,&amp;nbsp;misconfigurations&amp;nbsp;or&amp;nbsp;policy violations go undetected. Devices that are not enrolled in management or out of compliance may still access sensitive resources, creating gaps in enforcement. When access decisions&amp;nbsp;aren’t&amp;nbsp;tied to device state, enforcement becomes inconsistent by default.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Strong endpoint visibility,&amp;nbsp;access&amp;nbsp;and&amp;nbsp;security ensure that only managed and compliant devices can reach sensitive systems and data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Tying access to management and compliance status is critical. Conditional access,&amp;nbsp;VPN&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust&lt;/a&gt;&amp;nbsp;controls are only effective when visibility and enrollment are enforced consistently across endpoints.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch management&amp;nbsp;is&amp;nbsp;one of the areas where limited visibility creates the most operational strain.&amp;nbsp;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;IT and security research&lt;/a&gt;&amp;nbsp;shows that many IT teams struggle to track patch status across their full endpoint estate and to stay compliant as environments become more distributed. For&amp;nbsp;example,&amp;nbsp;of those we surveyed,&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT and security professionals say they have difficulty tracking patch status and rollouts.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% of teams struggle to stay compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;These challenges&amp;nbsp;aren’t&amp;nbsp;about patch availability alone. They stem from gaps in visibility into device state,&amp;nbsp;ownership&amp;nbsp;and&amp;nbsp;real-world exposure, making it difficult to prioritize and verify remediation.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Operational inefficiencies&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;From an operational perspective, limited visibility leads to inefficiency. IT teams spend time troubleshooting issues that automation could resolve, chasing devices that should have been discovered automatically, and reacting to incidents rather than preventing them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Without health data, teams are forced into a firefighting mode, responding to problems after they&amp;nbsp;impact&amp;nbsp;users instead of addressing them proactively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is exactly where AI and automation can begin to change the equation.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How AI and endpoint automation improve endpoint visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation turn endpoint visibility from a one-time discovery exercise into a continuous, self-sustaining capability. They enable teams to unify data, detect&amp;nbsp;anomalies&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;accurate&amp;nbsp;inventories without manual effort.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Unified telemetry across multiple sources&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Modern endpoint management platforms with AI and automation capabilities&amp;nbsp;consolidate&amp;nbsp;telemetry from discovery, UEM, MDM, patching,&amp;nbsp;vulnerability&amp;nbsp;and&amp;nbsp;security tools into a unified, continuously updated view. This unified telemetry&amp;nbsp;eliminates&amp;nbsp;the need to reconcile siloed inventories and provides a shared, reliable view for both IT and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By normalizing data across desktop, mobile, server&amp;nbsp;and&amp;nbsp;IoT devices, organizations gain holistic visibility that&amp;nbsp;supports&amp;nbsp;faster, more confident decision-making.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;autonomous&amp;nbsp;endpoint management (AEM)&amp;nbsp;research&amp;nbsp;&lt;/a&gt;also shows that organizations make the most progress when endpoint visibility is treated as a shared&amp;nbsp;objective. Teams that track metrics such as time to discovery, percentage of fully managed endpoints&amp;nbsp;and&amp;nbsp;exposure duration through shared dashboards are better able to align IT and security around the same data. This shared visibility turns endpoint management from siloed reporting into a coordinated, data-driven process.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;AI-Powered&amp;nbsp;automation and&amp;nbsp;autonomous&amp;nbsp;bots&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Automation plays a critical role in keeping visibility current.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/bot-library"&gt;AI-powered bots&lt;/a&gt;&amp;nbsp;can automatically rediscover devices, reconcile duplicates, update ownership and&amp;nbsp;location&amp;nbsp;and&amp;nbsp;detect anomalies across the environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When agents stop reporting or profiles break, automated workflows can repair or reinstall them without human intervention. This ensures that visibility&amp;nbsp;doesn’t&amp;nbsp;degrade over time and reduces the operational burden on IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Self-healing&amp;nbsp;workflows for IT&amp;nbsp;productivity&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Self-healing workflows extend automation to the endpoint itself. Common issues such as failed updates, stopped services&amp;nbsp;or&amp;nbsp;configuration drift can be detected and resolved automatically, often before users notice a problem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Endpoint automation enables these self-healing workflows to&amp;nbsp;operate&amp;nbsp;continuously in the background, resolving common issues without waiting for human intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By resolving these issues without tickets, organizations reduce downtime, improve user&amp;nbsp;experience&amp;nbsp;and&amp;nbsp;free IT staff to focus on higher-value initiatives.&amp;nbsp;In fact,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;over two-thirds of IT teams&lt;/a&gt;&amp;nbsp;today believe that&amp;nbsp;AI and automation&amp;nbsp;in ITSM&amp;nbsp;will&amp;nbsp;allow them to deliver better service experiences&amp;nbsp;and&amp;nbsp;give them more time to support business objectives.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365781"&gt;&lt;/div&gt;

&lt;h2&gt;Broader&amp;nbsp;impact on&amp;nbsp;security,&amp;nbsp;productivity&amp;nbsp;and&amp;nbsp;user&amp;nbsp;experience&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When AI and automation are integrated into endpoint visibility, the benefits extend beyond IT operations. Security posture&amp;nbsp;improves&amp;nbsp;and users experience fewer disruptions — and productivity increases.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By combining endpoint visibility and control, organizations can reduce risk while still supporting productivity and flexible operating models.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Closing&amp;nbsp;visibility&amp;nbsp;gaps&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;AI-driven insights&amp;nbsp;eliminate&amp;nbsp;blind spots by continuously&amp;nbsp;monitoring&amp;nbsp;endpoint activity and health. Instead of relying on periodic scans or manual checks, organizations&amp;nbsp;maintain&amp;nbsp;real-time awareness of their endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;continuous visibility&lt;/a&gt;&amp;nbsp;transforms endpoint management from a static inventory project into a living, breathing capability that adapts as the environment changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improving&amp;nbsp;IT&amp;nbsp;operations and&amp;nbsp;end-user&amp;nbsp;satisfaction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/how-ai-alleviates-help-desk-workloads"&gt;Automation reduces ticket volume&lt;/a&gt;&amp;nbsp;and accelerates resolution times, while predictive analytics help prevent downtime before it&amp;nbsp;impacts&amp;nbsp;users. Ring deployments, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;self-service catalogs allow changes to be delivered with minimal disruption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When users experience faster support and fewer interruptions, resistance to endpoint management drops and adoption improves. Over time, this creates a healthier feedback loop where visibility,&amp;nbsp;automation&amp;nbsp;and&amp;nbsp;user experience reinforce each other instead of competing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;autonomous endpoint management&amp;nbsp;takes organizations next. Visibility becomes continuous instead of episodic. Automation keeps inventories&amp;nbsp;accurate, health signals&amp;nbsp;current&amp;nbsp;and&amp;nbsp;risk visible in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With shared data and clear ownership, IT and security teams stop reacting to issues after the fact and start managing endpoints proactively. That shift from inventory to intelligence is what enables autonomous endpoint management, and&amp;nbsp;it’s&amp;nbsp;quickly becoming the standard for modern IT operations.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 03 Apr 2026 13:00:09 Z</pubDate></item><item><guid isPermaLink="false">102f3f22-125a-4763-b596-62b424778efc</guid><link>https://www.ivanti.com/blog/autonomous-endpoint-management-eliminates-patch-silos</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Patch Management</category><title>How AI-Driven Automation Solves Patch Management Silos</title><description>&lt;p&gt;&lt;em&gt;"We see 10,000&amp;nbsp;critical vulnerabilities!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"We patched everything last week!"&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This conversation happens in enterprise IT departments every single day. Security teams present dashboards filled with red alerts. IT teams show deployment reports at 98% success. Both teams are looking at real data.&amp;nbsp;Both are absolutely correct.&amp;nbsp;And both are&amp;nbsp;totally&amp;nbsp;blind to what's actually happening across the endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn't&amp;nbsp;a&amp;nbsp;people&amp;nbsp;problem — your teams&amp;nbsp;aren't&amp;nbsp;incompetent.&amp;nbsp;It's&amp;nbsp;not a process problem — your workflows&amp;nbsp;aren't&amp;nbsp;broken.&amp;nbsp;It's&amp;nbsp;a technology problem:&amp;nbsp;you're&amp;nbsp;asking two teams to manage the same risk using systems that&amp;nbsp;show them different realities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Security teams are given one version of reality through vulnerability scanners and threat intelligence. Meanwhile, IT teams see things differently when looking at their device management and patch deployment reports.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tricky part is that both views can be&amp;nbsp;correct&amp;nbsp;in isolation and&amp;nbsp;still&amp;nbsp;be&amp;nbsp;misleading&amp;nbsp;in practice.&amp;nbsp;That's&amp;nbsp;how you end up in the familiar stalemate: security reports thousands of critical vulnerabilities; IT reports that patches are successfully deployed. The disconnect lives in the gap between those systems.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why&amp;nbsp;IT&amp;nbsp;and&amp;nbsp;security&amp;nbsp;are misaligned on patching&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Most organizations approach&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;patching misalignment between IT and security&lt;/a&gt;&amp;nbsp;by improving communication between IT and security. They schedule more meetings. They create escalation paths. They implement SLAs. And six months later,&amp;nbsp;they're&amp;nbsp;having the exact same argument with better PowerPoint slides.&lt;/p&gt;

&lt;p&gt;Here's&amp;nbsp;what nobody wants to admit:&amp;nbsp;you&amp;nbsp;can't&amp;nbsp;collaborate your way out of a data fragmentation problem. When IT and security are working from fundamentally different inventories of what exists,&amp;nbsp;what's&amp;nbsp;vulnerable&amp;nbsp;and&amp;nbsp;what's&amp;nbsp;been fixed, adding more coordination overhead just slows down an already broken process.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is why the same conversation plays out again and again inside many organizations.&amp;nbsp;Both teams are confident in their data, and both are “right” within the narrow context of the tools they rely on.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And&amp;nbsp;that’s&amp;nbsp;the problem. While both views are “right,” neither reflects the full lifecycle of risk. Vulnerability data&amp;nbsp;doesn’t&amp;nbsp;always reflect whether affected devices are managed or reachable. Patch reports&amp;nbsp;don’t&amp;nbsp;always account for unmanaged,&amp;nbsp;misclassified&amp;nbsp;or&amp;nbsp;newly discovered endpoints that still have access to corporate resources.&amp;nbsp;What’s missing is a reliable answer to the only question that actually matters: which endpoints are exposed right now?&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Technology silos create conflicting realities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Most enterprises manage endpoints through&amp;nbsp;a hodgepodge of&amp;nbsp;systems that&amp;nbsp;have evolved&amp;nbsp;independently over time, each capturing only a fragment of reality.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One system may surface critical exposure without knowing whether the device is&amp;nbsp;being managed. Another may confirm successful remediation without accounting for newly discovered or misclassified endpoints that still have access.&amp;nbsp;The result? No reliable way to trace risk from detection through deployment to actual exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consider this:&amp;nbsp;the&amp;nbsp;average organization manages only 60% of their edge devices, according to Ivanti's&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Securing the Borderless Digital Landscape Report&lt;/a&gt;. That means 40% of potential entry points exist outside IT's view and outside their patch workflows. Security sees them.&amp;nbsp;IT&amp;nbsp;doesn't. That's&amp;nbsp;your&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;vulnerability gap&lt;/a&gt;.&amp;nbsp;Without that continuity, teams are forced to reconcile partial views manually. Data gets debated instead of&amp;nbsp;acted&amp;nbsp;on.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic showing bar charts" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/04/02-unmanaged-edge-devices.png"&gt;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Different data views lead to friction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Imagine&amp;nbsp;it’s&amp;nbsp;Monday morning: Security discovers a critical zero-day in a widely used VPN client. They send an urgent alert to IT: "30,000 vulnerable endpoints detected — patch immediately."&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT checks their deployment console: &lt;em&gt;"VPN client already updated across 28,000 devices last Thursday."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Both statements are true. Security is scanning the entire network — including contractor laptops, BYOD devices&amp;nbsp;and&amp;nbsp;systems that&amp;nbsp;briefly&amp;nbsp;connected to the VPN but&amp;nbsp;aren't&amp;nbsp;under IT management. IT patched everything in their device inventory.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Meanwhile, 2,000 genuinely vulnerable endpoints&amp;nbsp;remain&amp;nbsp;exposed because they exist in Security's view but not IT's.&amp;nbsp;The patch that should have taken 24 hours now requires three days of manual reconciliation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT and security&amp;nbsp;operate&amp;nbsp;from different data sources, misaligned&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;vulnerability management priorities&lt;/a&gt;&amp;nbsp;are inevitable.&amp;nbsp;Security teams focus on vulnerability counts, severity&amp;nbsp;scores&amp;nbsp;and&amp;nbsp;exploit intelligence. IT teams prioritize deployment success, system&amp;nbsp;stability&amp;nbsp;and&amp;nbsp;user impact. Both perspectives are necessary, but without a shared frame of reference, they pull in different directions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;What follows&amp;nbsp;isn’t&amp;nbsp;just tension;&amp;nbsp;it’s&amp;nbsp;decision paralysis. Remediation slows while teams reconcile inventories,&amp;nbsp;validate&amp;nbsp;findings&amp;nbsp;and&amp;nbsp;argue about scope. Vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than they should, not because patches&amp;nbsp;aren’t&amp;nbsp;available, but because&amp;nbsp;there’s&amp;nbsp;no single view that connects detection,&amp;nbsp;deployment&amp;nbsp;and&amp;nbsp;exposure.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The&amp;nbsp;risk of misaligned patching priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Misalignment slows collaboration, but more so, it creates measurable risk that extends well beyond internal friction.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management research&lt;/a&gt;&amp;nbsp;reflects this challenge in practice:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals report difficulty tracking patch status.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% struggle to meet remediation timelines due to incomplete endpoint visibility.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When vulnerabilities&amp;nbsp;remain&amp;nbsp;open longer than necessary, the window of exposure grows. Attackers&amp;nbsp;don’t&amp;nbsp;wait.&amp;nbsp;The&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA KEV catalog&lt;/a&gt;&amp;nbsp;reveals the&amp;nbsp;difficult truth: 30% of vulnerabilities being actively exploited right now were originally&amp;nbsp;disclosed&amp;nbsp;more than five years ago.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That's&amp;nbsp;not a patching problem;&amp;nbsp;it’s&amp;nbsp;a&amp;nbsp;visibility problem. Organizations&amp;nbsp;aren't&amp;nbsp;ignoring available patches;&amp;nbsp;they're&amp;nbsp;missing the endpoints that still need them.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Prolonged&amp;nbsp;exposure&amp;nbsp;windows and&amp;nbsp;breach&amp;nbsp;risk&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Fragmentation stretches&amp;nbsp;exposure&amp;nbsp;windows in subtle ways. Devices that were never enrolled in management platforms, such as shadow BYOD, unsecured contractor&amp;nbsp;devices&amp;nbsp;or&amp;nbsp;remote endpoints outside the traditional perimeter, often go unnoticed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Research from Ivanti&lt;/a&gt;&amp;nbsp;shows&amp;nbsp;that only one in three employers&amp;nbsp;have&amp;nbsp;implemented zero trust network access for remote workers, leaving significant gaps in visibility across distributed environments.&amp;nbsp;Newly discovered endpoints appear after patch reports are generated. Systems drift out of compliance between scan cycles. Each delay compounds the risk, extending the time attackers&amp;nbsp;have to&amp;nbsp;weaponize known weaknesses.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/24843673"&gt;&lt;/div&gt;

&lt;h2&gt;Common&amp;nbsp;post-patch&amp;nbsp;issues and IT&amp;nbsp;ticket&amp;nbsp;overload&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Even when patches are deployed on schedule, manual patching often creates downstream issues. Failed updates, broken agents, performance&amp;nbsp;problems&amp;nbsp;and&amp;nbsp;unexpected reboots trigger support tickets and emergency fixes. What starts as a security task quickly becomes an operational drain.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT teams spend time resolving predictable failures instead of&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;improving endpoint posture&lt;/a&gt;. Security teams see delays as unresolved risk. Users associate patching with disruption. That friction persists across teams, even when their goals are aligned.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Transforming&amp;nbsp;patch management&amp;nbsp;with autonomous endpoint management&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation address the core disconnects in&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;&amp;nbsp;by unifying visibility and reducing manual coordination. When endpoint discovery, vulnerability data, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status are correlated into a unified view, IT and security teams can work from the same facts instead of reconciling partial data across tools.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&amp;nbsp;(AEM)&lt;/a&gt; brings clarity to the confusion by using AI intelligence and automation to give IT and security a single, continuously updated view of endpoints, their&amp;nbsp;health&amp;nbsp;and their exposure.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How&amp;nbsp;AI&amp;nbsp;improves patching decisions&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI improves patching decisions by prioritizing vulnerabilities based on real-world risk rather than severity scores alone. By factoring in exploit activity, asset criticality&amp;nbsp;and&amp;nbsp;exposure context, teams can align on what to patch first and focus effort where it will reduce risk fastest.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With autonomous endpoint management, that same Monday morning scenario plays out differently:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability is detected, and AI&amp;nbsp;immediately&amp;nbsp;cross-references it against a unified endpoint inventory. It&amp;nbsp;identifies&amp;nbsp;1,560 devices running the vulnerable version, including 217 devices that were previously unmanaged.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/automated-patch-management"&gt;Automated&amp;nbsp;patch&amp;nbsp;workflows&lt;/a&gt;&amp;nbsp;simultaneously: enroll the unmanaged devices, prioritize patching based on exposure risk and asset criticality. They then&amp;nbsp;schedule deployment during low-usage&amp;nbsp;windows, and&amp;nbsp;begin ring-based rollout.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the time the security team sends the alert, IT already has a real-time dashboard showing remediation in progress&amp;nbsp;—&amp;nbsp;with the same device count, the same exposure&amp;nbsp;data&amp;nbsp;and&amp;nbsp;the same prioritization logic. No reconciliation&amp;nbsp;necessary.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How automation accelerates remediation&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Automation then turns those decisions into action. Patch workflows can be orchestrated end to end:&amp;nbsp;identifying&amp;nbsp;affected devices, deploying&amp;nbsp;updates&amp;nbsp;and&amp;nbsp;validating&amp;nbsp;remediation without constant manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;AI-powered intelligent patch scheduling minimizes user impact by aligning deployments with device usage patterns, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;operational constraints. Ring-based rollouts allow patches to be&amp;nbsp;validated&amp;nbsp;on smaller groups before wider deployment, reducing disruption while accelerating remediation. The result is faster&amp;nbsp;patching, less&amp;nbsp;downtime&amp;nbsp;and&amp;nbsp;a more predictable process for both teams.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Self-healing workflows detect and resolve common issues automatically, such as restarting services, reinstalling&amp;nbsp;agents&amp;nbsp;or&amp;nbsp;correcting misconfigurations. These workflows prevent avoidable incidents before they turn into support tickets.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;From data debates to unified intelligence and shared visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;AI-driven platforms&lt;/a&gt;&amp;nbsp;unify endpoint visibility by correlating discovery data, vulnerability context, device&amp;nbsp;health&amp;nbsp;and&amp;nbsp;patch status into a single endpoint record, with enrollment and access controls ensuring that devices are continuously discovered and managed throughout their lifecycle. IT and security teams see the same devices, the same&amp;nbsp;exposure&amp;nbsp;and&amp;nbsp;the same remediation status in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This unified intelligence&amp;nbsp;eliminates&amp;nbsp;debates over whose data is correct and replaces them with agreement on which risks&amp;nbsp;to address&amp;nbsp;first.&amp;nbsp;By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale. By integrating remediation into broader endpoint workflows, teams reduce manual effort and&amp;nbsp;maintain&amp;nbsp;consistent patch outcomes at scale.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Shared patch ownership:&amp;nbsp;powering IT and security collaboration&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation only improve patch management when&amp;nbsp;they’re&amp;nbsp;paired with shared ownership. When IT and security teams&amp;nbsp;operate&amp;nbsp;from the same endpoint data and remediation workflows, accountability shifts from defending individual reports to jointly reducing exposure.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A data-driven patch process starts with mutual goals. Instead of tracking success in isolated tools, organizations align IT and security around common metrics that reflect real-world risk and operational impact. This shared measurement creates clarity on priorities and removes ambiguity around ownership.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Effective collaboration depends on metrics both teams trust and act on together. Common KPIs include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Mean Time to Remediate (MTTR):&amp;nbsp;How quickly critical vulnerabilities are resolved&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch compliance rates:&amp;nbsp;Across both managed and previously unmanaged endpoints&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Exposure duration:&amp;nbsp;How long high-risk vulnerabilities&amp;nbsp;remain&amp;nbsp;open&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Endpoint visibility:&amp;nbsp;Percentage of devices fully discovered and managed&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics shift conversations from patch volume to measured risk outcomes and help teams focus on outcomes instead of activity.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Joint ownership requires workflows that span the entire&amp;nbsp;patch&amp;nbsp;lifecycle. AI-driven platforms support this by automating routine tasks while surfacing exceptions that require human judgment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT and security leaders define guardrails for automation, including&amp;nbsp;approval&amp;nbsp;thresholds, testing&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;rollout constraints. Within those boundaries, automation executes remediation consistently and at scale, without constant manual coordination. Over time, trust in the process grows, coordination overhead decreases, and patching becomes a cooperative operational responsibility rather than a point of friction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Visit our solutions page to discover how&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Ivanti's autonomous endpoint management solutions&lt;/a&gt;&amp;nbsp;give IT and security teams the unified visibility they need to&amp;nbsp;eliminate&amp;nbsp;patching silos and close vulnerabilities faster.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 02 Apr 2026 15:37:11 Z</pubDate></item><item><guid isPermaLink="false">9e2cfeac-8bf5-4822-9d7e-64aac32964cb</guid><link>https://www.ivanti.com/blog/ai-governance-framework-responsible-ai-guardrails</link><atom:author><atom:name>Brooke Johnson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/brooke-johnson</atom:uri></atom:author><category>Artificial Intelligence</category><title>How to Implement an AI Governance Framework Using Safe, Ethical and Reliable AI Guardrails</title><description>&lt;p&gt;In my time at Ivanti, I've witnessed firsthand how AI &lt;a href="https://www.ivanti.com/company/artificial-intelligence"&gt;acts as a force multiplier across enterprise organizations&lt;/a&gt;. When deployed strategically, AI accelerates decision-making and operational execution at scale in a way that teams simply can't sustain manually. However, without clear and enforceable AI guardrails, implementing AI opens organizations up to serious new risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2026 State of Cybersecurity Report&lt;/a&gt; highlights a growing disconnect I’ve observed across the industry: optimism about AI is rising, yet governance and preparedness are not keeping pace. &lt;b&gt;Currently, just 50% of organizations say they have formal guardrails in place to guide the deployment and operation of AI systems and agents.&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;As adoption accelerates faster than governance, I'm seeing organizations face growing internal risks — shadow AI use, inconsistent data quality, biased outputs and uneven employee training to name a few.&lt;/p&gt;

&lt;p&gt;From where I sit — spanning legal, security and HR — I can tell you this: AI governance isn't an abstract compliance exercise. It's a core requirement for trust, accountability and control.&lt;/p&gt;

&lt;h2&gt;The state of enterprise AI: a risky Wild West&lt;/h2&gt;

&lt;p&gt;Responsible AI at scale requires deliberate governance with enforceable guardrails for all employees. Ignore that, and shadow AI use will continue to grow. Our &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;2025 Technology at Work research report&lt;/a&gt; revealed that 46% of office workers use AI that aren't employer-provided. Even more concerning, nearly a third of employees (32%) keep their use of AI tools at work a secret from their employers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/20628247"&gt;&lt;/div&gt;

&lt;p&gt;Too many organizations are deploying AI without an overarching governance, and the consequences of this approach are real. Organizations can expose sensitive data. They can violate regulatory obligations. It could potentially erode market trust. A team deploys an AI platform without proper guardrails, and suddenly you have biased outputs or degraded performance. Without human oversight, AI systems generate inaccurate recommendations or trigger inappropriate actions. That creates dangerous false confidence in AI-driven outcomes.&lt;/p&gt;

&lt;h2&gt;What is an AI governance framework?&lt;/h2&gt;

&lt;p&gt;An AI governance framework is the blueprint for how we design, deploy and oversee AI systems across their lifecycle. Its purpose is to align AI use with business objectives, legal obligations and enterprise risk tolerance — with transparency and accountability built in from day one.&lt;/p&gt;

&lt;p&gt;At Ivanti, our framework clarifies:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;b&gt;Who is accountable&lt;/b&gt; for AI decisions and outcomes&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;How risks are identified&lt;/b&gt;, assessed and mitigated&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;What guardrails must be in place&lt;/b&gt; before AI systems go live&lt;/li&gt;
	&lt;li&gt;&lt;b&gt;How AI performance, behavior and impact&lt;/b&gt; are monitored over time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In practice, governance enables scale. Clear frameworks let us move beyond fragmented pilots and operationalize AI across the enterprise. Without it, adoption stalls.&lt;/p&gt;

&lt;p&gt;Our position is simple: governance doesn't block innovation. It makes innovation sustainable.&lt;/p&gt;

&lt;h2&gt;3 layers of AI guardrails in an AI governance framework&lt;/h2&gt;

&lt;p&gt;As part of Ivanti’s AI Governance Council, I've learned that a comprehensive framework requires multiple layers of guardrails. Each addresses a different category of risk. Together, they form the foundation for safe, reliable AI use.&lt;/p&gt;

&lt;h4&gt;Technical Guardrails&lt;/h4&gt;

&lt;p&gt;Technical guardrails keep AI systems within predefined safety and operational parameters.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Data guardrails&lt;/b&gt;: Data guardrails protect &lt;a href="https://www.ivanti.com/use-cases/data-protection-application-security"&gt;data integrity&lt;/a&gt; and ensure AI systems are trained and operated on trusted inputs. These guardrails are typically owned by data and security teams, who establish standards for data sourcing, validation, &lt;a href="https://www.ivanti.com/products/network-access-control"&gt;access controls&lt;/a&gt; and ongoing quality monitoring. Poor data quality remains a major barrier to effective AI deployment, particularly in security, where incomplete, biased or unvalidated data can skew outcomes and degrade detection accuracy over time.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Model guardrails: &lt;/b&gt;Model guardrails address robustness, explainability, and bias detection to ensure AI systems behave as intended over time. These guardrails are typically designed by security, data science and platform teams, who define testing requirements for drift, bias and performance degradation before deployment and continuously thereafter, especially as models are retrained or exposed to changing operational data.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Application and output guardrails: &lt;/b&gt;application and output guardrails&lt;b&gt; &lt;/b&gt;validate AI-generated outputs, particularly in decision-support or automated response scenarios. These guardrails are typically implemented by security and operations teams, who define approval thresholds, escalation paths, and human-in-the-loop controls. Without them, systems may generate inaccurate recommendations or take inappropriate actions, reinforcing false confidence in automation.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Infrastructure guardrails:&lt;/b&gt; infrastructure guardrails protect the systems that host and support AI workloads and are typically owned by IT and security teams. These teams enforce secure deployment practices, access controls, logging and auditability across cloud and on-prem environments, while ensuring AI services are integrated into existing security monitoring and &lt;a href="https://www.ivanti.com/products/automation"&gt;incident response workflows&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;Ethical guardrails&lt;/h4&gt;

&lt;p&gt;Ethical guardrails align AI behavior with organizational standards and define accountability when AI affects people, customers or business outcomes.&lt;/p&gt;

&lt;p&gt;Ivanti’s AI Governance Council plays a central role here. We navigate the “gray areas” of autonomous agents. We bring together legal, security, HR, and business leaders to define acceptable use, escalation paths and accountability. When should humans intervene? How are decisions audited? Who ultimately owns the outcome when things go wrong?&lt;/p&gt;

&lt;p&gt;When that governance is missing, the consequences escalate quickly.&lt;/p&gt;

&lt;p&gt;Recent incidents show the cost of unclear ethical guardrails. For example, Grok, an AI chatbot developed by xAI, &lt;a href="https://www.thetimes.com/uk/technology-uk/article/grok-ai-x-holocaust-survivor-bikini-auschwitz-6kh5ddxh6" rel="noopener" target="_blank"&gt;drew widespread criticism&lt;/a&gt; after generating unconsented and inappropriate images of real individuals. The failure was not only technical — it was governance-related due to ethical boundaries that weren’t sufficiently defined.&lt;/p&gt;

&lt;p&gt;The same issue arises inside enterprises. When AI blocks a user account, flags an employee, or restricts customer access, we must know who owns the decision if it's wrong. Whether AI is used in security, HR or customer-facing systems, the ethical principles are consistent. Governance ensures accountability is defined before automation causes harm.&lt;/p&gt;

&lt;h4&gt;Regulatory and legal guardrails&lt;/h4&gt;

&lt;p&gt;Regulatory and legal guardrails ensure AI use complies with evolving global regulations, sector rules and data protection laws. Because these requirements change rapidly, teams can't operate in functional silos.&lt;/p&gt;

&lt;p&gt;Legal must lead AI governance early. At Ivanti, we work closely with security and IT to interpret obligations and translate them into enforceable controls. Success depends on aligning from the outset to ensure compliance requirements are embedded into AI design and deployment.&lt;/p&gt;

&lt;p&gt;Recent incidents show why regulatory guardrails cannot be an afterthought. European and UK regulators &lt;a href="https://privacyinternational.org/news-analysis/5692/tribunal-confirms-clearview-ai-bound-gdpr" rel="noopener" target="_blank"&gt;confirmed&lt;/a&gt; that Clearview AI’s facial recognition operations, built on scraping billions of images, were subject to privacy laws like GDPR and took enforcement actions based on violations, showing the legal risk organizations face when governance doesn’t align with regulatory expectations.&lt;/p&gt;

&lt;p&gt;The lesson is clear. Legal and product development teams must work together early to embed regulatory obligations into AI design, deployment and operations. Governance ensures compliance requirements are enforced by default, not retroactively after regulatory scrutiny begins.&lt;/p&gt;

&lt;h2&gt;AI governance vs. AI risk management risk&lt;/h2&gt;

&lt;p&gt;Governance and &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management"&gt;risk management&lt;/a&gt; are closely related but distinct. Here's my take: governance sets the rules and accountability structures. Risk management focuses on identifying and mitigating specific AI-related threats throughout the system lifecycle.&lt;/p&gt;

&lt;p&gt;Common AI risks include data leakage, bias, unreliable outputs, over-reliance on automated decisions and security weaknesses introduced through unmanaged tools or integrations. As AI systems become more autonomous, these risks compound.&lt;/p&gt;

&lt;p&gt;Integrating AI risk mitigation into governance ensures risks are not addressed in isolation. We evaluate them alongside business impact, operational resilience and organizational &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. This lets us prioritize controls where they matter most and avoid blanket restrictions that slow progress without reducing risk.&lt;/p&gt;

&lt;h2&gt;Challenges in scaling AI governance&lt;/h2&gt;

&lt;p&gt;Many organizations start with narrow AI pilots in individual teams. Scaling to enterprise-wide adoption introduces new challenges&lt;/p&gt;

&lt;p&gt;Silos are the fastest way to undermine governance. Security, IT, legal and business teams often operate on conflicting assumptions. We need shared ownership across teams. As my colleague Sterling Parker explains, a successful vision requires involving stakeholders across the business to prevent "AI sprawl."&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="GpoZdJeC3Bw"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;This transition demands a human-centric operating model. Our governance body clearly defines where AI can amplify existing roles, where additional training is required and where human oversight remains essential. Continuous feedback from employees helps ensure AI is applied where it delivers value without creating gaps in accountability or trust. We prioritize upskilling to replace fear with active adoption.&lt;/p&gt;

&lt;p&gt;Our &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cybersecurity research&lt;/a&gt; shows that mature organizations approach these challenges differently. Organizations that rank themselves as the most advanced in cybersecurity (Level 4s) are nearly 3x as likely to use comprehensive AI guardrails compared to organizations with an intermediate level of cybersecurity maturity (Level 2s).&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27433090"&gt;&lt;/div&gt;

&lt;p&gt;They invest early in governance, align leadership around shared frameworks and treat AI as a strategic capability rather than a collection of tools. These organizations are far more likely to operationalize AI across the enterprise while maintaining trust and control.&lt;/p&gt;

&lt;h2&gt;How to implement responsible AI&lt;/h2&gt;

&lt;p&gt;Building the framework is table stakes. Execution is where AI governance lives.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Start with clear policies&lt;/b&gt; on acceptable use and escalation. These must be practical and tied directly to your existing risk structures.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Governance must be accessible.&lt;/b&gt; Responsible AI is an enterprise-wide mandate, not a specialist silo. Targeted training ensures every user understands their role in upholding these guardrails.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Take a governed approach to AI enablement. “&lt;/b&gt;Governed enablement” assumes AI is already in use across the enterprise and defines where and how it can operate safely. It requires continuous monitoring and enforcement to ensure systems remain aligned with policy as usage and risks evolve. This is an ongoing discipline, not a one-time project.&lt;/p&gt;

&lt;p&gt;The future of responsible AI starts now&lt;/p&gt;

&lt;p&gt;AI is reshaping how organizations operate at a pace that cannot be ignored. The question is no longer whether to adopt it, but how to scale it safely. Organizations with strong governance scale without sacrificing trust. Those that delay widen the gap between threat and preparedness.&lt;/p&gt;

&lt;p&gt;At Ivanti, we're committed to building AI governance that enables innovation while protecting what matters most — our people, our customers, and our operations. This is critical work and the time to act is now.&lt;/p&gt;

&lt;p&gt;To learn more about the AI deployment gap and how leading organizations are closing it, explore &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti's 2026 State of Cybersecurity Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 24 Feb 2026 13:00:02 Z</pubDate></item><item><guid isPermaLink="false">26d3ce21-0f4e-46f5-9437-ab2aa24771be</guid><link>https://www.ivanti.com/blog/how-agentic-ai-for-itops-unlocks-value-at-scale</link><atom:author><atom:name>Sterling Parker</atom:name><atom:uri>https://www.ivanti.com/blog/authors/sterling-parker</atom:uri></atom:author><category>Artificial Intelligence</category><category>Service Management</category><title>How Agentic AI for ITOps Unlocks Value at Scale</title><description>&lt;p&gt;Here’s&amp;nbsp;a paradox for the AI era:&amp;nbsp;organizations&amp;nbsp;are obsessed with the promise of AI&amp;nbsp;as the key to unlocking productivity and&amp;nbsp;enterprise&amp;nbsp;transformation,&amp;nbsp;and IT teams are all-in&amp;nbsp;on the advantages&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank"&gt;AI and automation&lt;/a&gt;&amp;nbsp;offer — yet those same organizations are the&amp;nbsp;ones holding&amp;nbsp;that transformation back.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While&amp;nbsp;the majority of&amp;nbsp;IT&amp;nbsp;workers&amp;nbsp;advocate for&amp;nbsp;AI&amp;nbsp;adoption, operational,&amp;nbsp;cultural&amp;nbsp;and budgetary barriers&amp;nbsp;stand in the way of enterprises&amp;nbsp;implementing AI at&amp;nbsp;scale.&amp;nbsp;The result: most companies today have yet to operationalize&amp;nbsp;breakthrough&amp;nbsp;AI and automation&amp;nbsp;use&amp;nbsp;cases that&amp;nbsp;deliver&amp;nbsp;true business value.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s&amp;nbsp;not to&amp;nbsp;say;&amp;nbsp;most companies&amp;nbsp;aren’t&amp;nbsp;using AI — but&amp;nbsp;mainly for&amp;nbsp;completing&amp;nbsp;lower-level&amp;nbsp;tasks and boosting individual productivity. While&amp;nbsp;this is&amp;nbsp;an important step,&amp;nbsp;enterprises will need to think bigger and longer-term to&amp;nbsp;see significant ROI and&amp;nbsp;digital transformation&amp;nbsp;from&amp;nbsp;their&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist"&gt;AI investments&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Automation&amp;nbsp;and outputs&amp;nbsp;vs.&amp;nbsp;agentic AI&amp;nbsp;autonomy&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;IT teams are ahead of the curve when it comes to generative AI adoption.&amp;nbsp;84% of IT professionals use generative AI tools at work, according to&amp;nbsp;a&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank"&gt;2025 Ivanti research report.&lt;/a&gt;&amp;nbsp;That same research shows that IT professionals are&amp;nbsp;also overwhelmingly&amp;nbsp;positive&amp;nbsp;toward AI and automation:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;83% expect AI to boost productivity in the next year.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;70% say it will make their work more satisfying.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/25089836"&gt;&lt;/div&gt;

&lt;p&gt;Yet, for all that progress, companies&amp;nbsp;aren’t&amp;nbsp;tapping&amp;nbsp;into the&amp;nbsp;deeper potential of AI-driven technology. Many teams have mastered task-level automation (ticket routing, password resets, log summarization), but few have embraced&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist"&gt;agentic AI&lt;/a&gt;,&amp;nbsp;which goes beyond execution to autonomous reasoning and optimization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That gap between automation and&amp;nbsp;transformation mirrors&amp;nbsp;a larger&amp;nbsp;problem&amp;nbsp;occurring&amp;nbsp;across industries. While most organizations are already using AI in some capacity, only a few have seen measurable business impact from&amp;nbsp;their AI tools.&amp;nbsp;&lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/seizing-the-agentic-ai-advantage" rel="noopener" target="_blank"&gt;McKinsey&lt;/a&gt;&amp;nbsp;has referred to&amp;nbsp;this&amp;nbsp;situation&amp;nbsp;as&amp;nbsp;“&lt;em&gt;the gen AI paradox&lt;/em&gt;.”&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;disconnect between AI&amp;nbsp;applications&amp;nbsp;and ROI&amp;nbsp;is further&amp;nbsp;validated&amp;nbsp;by an MIT report published in August 2025, which finds that&amp;nbsp;&lt;a href="https://www.axios.com/2025/08/21/ai-wall-street-big-tech" rel="noopener" target="_blank"&gt;a staggering 95% of organizations&lt;/a&gt;&amp;nbsp;found zero return on generative&amp;nbsp;AI despite $30-40 billion worth of investment in it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The reason&amp;nbsp;for the problem is&amp;nbsp;straightforward: generative AI&amp;nbsp;creates. It produces content, automates tasks, and accelerates workflows. However, it&amp;nbsp;doesn’t&amp;nbsp;learn, reason, or adapt on its own. The next phase of enterprise AI will be driven by systems that can interpret, predict&amp;nbsp;and act dynamically:&amp;nbsp;what’s&amp;nbsp;now being defined as&amp;nbsp;&lt;em&gt;agentic&amp;nbsp;AI&lt;/em&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti’s research&amp;nbsp;further underscores the fact that most companies today have yet to integrate more complex AI&amp;nbsp;use&amp;nbsp;cases into their IT workflows.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While 67% of organizations automate ticket routing, fewer than one-third apply AI to root-cause analysis or other predictive use cases. This signals&amp;nbsp;that most teams are still&amp;nbsp;prioritizing standard automation for tasks&amp;nbsp;rather than enabling systems to think and act autonomously&amp;nbsp;via&amp;nbsp;agentic&amp;nbsp;AI.&amp;nbsp;&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/25090256"&gt;&lt;/div&gt;

&lt;p&gt;Standard automation&amp;nbsp;and generative AI tools are&amp;nbsp;frequently&amp;nbsp;employed by IT teams to&amp;nbsp;improve individual productivity and handle low-level, repetitive tasks&amp;nbsp;at greater speeds&amp;nbsp;than human intervention alone.&amp;nbsp;The ability to boost efficiency with less time and resources is&amp;nbsp;a critical&amp;nbsp;advantage of AI — particularly for strained IT teams who are&amp;nbsp;always&amp;nbsp;being asked to&amp;nbsp;accomplish&amp;nbsp;more&amp;nbsp;with less. But efficiency gains are only one piece of the puzzle.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti data also reveals a deeper organizational issue:&amp;nbsp;nearly half&amp;nbsp;of IT teams say their organizations lack resilience — the ability to adapt quickly to change, recover from disruption&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;business continuity without excessive manual intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;True enterprise agility demands autonomous and adaptive&amp;nbsp;&lt;a href="https://www.ivanti.com/ai"&gt;AI&amp;nbsp;solutions&lt;/a&gt;&amp;nbsp;that can&amp;nbsp;anticipate&amp;nbsp;problems, reason through potential&amp;nbsp;solutions&amp;nbsp;and&amp;nbsp;continuously learn how to&amp;nbsp;deliver&amp;nbsp;the most&amp;nbsp;optimal&amp;nbsp;outcomes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where many leading organizations are&amp;nbsp;turning to&amp;nbsp;agentic AI.&amp;nbsp;Autonomous AI agents offer teams the opportunity to&amp;nbsp;reshape&amp;nbsp;traditional IT operations from reactive automation to proactive, goal-driven collaboration.&amp;nbsp;Realizing that&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2025/revolutionizing-it-service-management-ai-powered-transformation-with-ivanti-neurons"&gt;transforming&amp;nbsp;ITOps&amp;nbsp;with AI&lt;/a&gt;&amp;nbsp;means moving from isolated automation wins to system-wide intelligence.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;High-impact agentic AI use cases in ITSM and&amp;nbsp;ITOps&lt;/h2&gt;

&lt;p&gt;Agentic AI is already moving the needle&amp;nbsp;by reducing&amp;nbsp;downtime,&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/ai-it-cost-management"&gt;cutting&amp;nbsp;costs&lt;/a&gt;&amp;nbsp;and improving&amp;nbsp;organizational agility.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Five high-impact&amp;nbsp;&lt;a href="https://www.ivanti.com/ai/itsm"&gt;use cases for agentic AI in IT&lt;/a&gt;&amp;nbsp;follow:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Autonomous incident remediation&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/security-controls"&gt;Autonomous remediation&lt;/a&gt;&amp;nbsp;is where AI begins to move from support to strategy. In traditional IT operations,&amp;nbsp;identifying&amp;nbsp;and fixing an issue can take hours of human triage and escalation.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With agentic AI, those same incidents can be detected,&amp;nbsp;diagnosed&amp;nbsp;and resolved in real time&amp;nbsp;—&amp;nbsp;often before users notice any disruption.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agentic AI&amp;nbsp;doesn’t&amp;nbsp;not only&amp;nbsp;detect anomalies within that IT space and diagnose&amp;nbsp;the root&amp;nbsp;cause&amp;nbsp;— it&amp;nbsp;intelligently&amp;nbsp;devises&amp;nbsp;solutions and&amp;nbsp;then&amp;nbsp;executes&amp;nbsp;fixes without human intervention.&amp;nbsp;Moreover, machine learning&amp;nbsp;enables&amp;nbsp;the AI to learn&amp;nbsp;from&amp;nbsp;previous&amp;nbsp;incidents&amp;nbsp;and&amp;nbsp;use this experience to continually refine and improve response efforts going forward.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. Proactive problem prevention&lt;/h3&gt;

&lt;p&gt;Proactive problem prevention&amp;nbsp;happens when&amp;nbsp;AI&amp;nbsp;can&amp;nbsp;anticipate&amp;nbsp;rather than&amp;nbsp;just&amp;nbsp;react&amp;nbsp;to&amp;nbsp;potential tech problems.&amp;nbsp;Instead of&amp;nbsp;solving a known issue,&amp;nbsp;agentic AI continuously&amp;nbsp;monitors&amp;nbsp;data patterns and detects early warning signals in the form of small deviations that might evolve into service disruptions or security issues.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In other words, it moves&amp;nbsp;ITOps&amp;nbsp;toward proactive&amp;nbsp;prevention,&amp;nbsp;monitoring&amp;nbsp;leading&amp;nbsp;indicators&amp;nbsp;and addressing issues before they become significant.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. End-to-end lifecycle management&lt;/h3&gt;

&lt;p&gt;Autonomous AI agents will provide a more comprehensive and effective approach to asset lifecycle management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This lifecycle view of automation extends beyond individual tickets or incidents to touch every stage of IT operations.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;From onboarding new devices to &lt;a href="https://www.ivanti.com/blog/continuous-vulnerability-management"&gt;patching and decommissioning outdated infrastructure&lt;/a&gt;,&amp;nbsp;agentic&amp;nbsp;AI ensures systems&amp;nbsp;remain&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;and&amp;nbsp;cost-effective.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It not only fixes issues but also detects, diagnoses, and&amp;nbsp;optimizes&amp;nbsp;IT systems from provisioning to retirement. It acts as a continuous improvement engine, learning from patterns across the IT ecosystem to proactively&amp;nbsp;optimize&amp;nbsp;resources, streamline&amp;nbsp;updates&amp;nbsp;and reduce the long-term burden on IT staff.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Dynamic change and release management&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Dynamic&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/change-management"&gt;change and release management&lt;/a&gt;&amp;nbsp;is where agentic AI truly&amp;nbsp;shows&amp;nbsp;its orchestration capabilities. In most enterprises, change management remains a high-friction process, requiring coordination across multiple teams,&amp;nbsp;tools&amp;nbsp;and&amp;nbsp;environments.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agentic automation&amp;nbsp;transforms&amp;nbsp;this by allowing AI agents to collaborate on complex workflows including cybersecurity incident response and software deployment, working together with minimal human oversight to resolve incidents, provision resources&amp;nbsp;and ensure compliance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These agents act as intelligent coordinators:&amp;nbsp;synchronizing&amp;nbsp;updates across systems,&amp;nbsp;validating&amp;nbsp;configurations&amp;nbsp;and rolling back changes automatically when anomalies occur.&amp;nbsp;The result is faster,&amp;nbsp;safer&amp;nbsp;and more predictable change cycles that free IT teams to focus on innovation rather than resource-heavy firefighting.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Autonomous resource and capacity management&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/ai-it-cost-management"&gt;Resource and capacity management&lt;/a&gt;&amp;nbsp;are some&amp;nbsp;of the most critical&amp;nbsp;—&amp;nbsp;and often overlooked&amp;nbsp;—&amp;nbsp;dimensions of IT performance. Using AI, companies can&amp;nbsp;anticipate&amp;nbsp;future resource needs by analyzing historical usage trends, workload fluctuations, and demand surges. Agentic systems can automatically&amp;nbsp;allocate&amp;nbsp;compute power,&amp;nbsp;storage&amp;nbsp;and&amp;nbsp;bandwidth before bottlenecks appear,&amp;nbsp;maintaining&amp;nbsp;optimal&amp;nbsp;performance without constant human oversight.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these self-adjusting systems learn from operational data to continuously fine-tune capacity, reducing waste, minimizing&amp;nbsp;costs&amp;nbsp;and ensuring service continuity even during unexpected spikes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Research from IBM’s report,&amp;nbsp;&lt;a href="https://www.ibm.com/downloads/documents/us-en/1443d5c92ec02bcb" rel="noopener" target="_blank"&gt;Agentic AI’s strategic ascent&lt;/a&gt;, underscores this pace of change: by 2027, twice as many executives expect AI agents will make autonomous decisions in workflows. Today, only 24% of executives report that level of&amp;nbsp;autonomy;&amp;nbsp;within two&amp;nbsp;years; 67%&amp;nbsp;expect this to be the norm.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Overcoming barriers&amp;nbsp;and&amp;nbsp;delivering&amp;nbsp;enterprise impact&lt;/h2&gt;

&lt;p&gt;Yet progress often&amp;nbsp;stalls;&amp;nbsp;not for lack of intent, but because of structural barriers. IT leaders must first overcome the obstacles that stand in the way of their evolution to value-focused work. These barriers are multifold: technical,&amp;nbsp;cultural&amp;nbsp;and operational.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even AI-forward IT organizations can lack&amp;nbsp;the structural&amp;nbsp;readiness for deep automation. For&amp;nbsp;example, Ivanti’s “&lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work" target="_blank"&gt;2025 Technology at Work Report&lt;/a&gt;”&amp;nbsp;found that:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT professionals point to complex tech stacks as an issue in effective IT operations.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;And 72% say their IT and security data&amp;nbsp;is&amp;nbsp;siloed within their organization.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22342941"&gt;&lt;/div&gt;

&lt;p&gt;Building a sustainable AI strategy requires more than a positive attitude – it demands alignment between IT and the broader business. Successful organizations are the ones aligning technology goals with tangible outcomes, supported by clear data structures, unified processes and teams equipped to manage new AI-driven workflows.&amp;nbsp;Without that alignment, even the best tools struggle to&amp;nbsp;deliver&amp;nbsp;enterprise-wide impact.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/agentic-ai-operating-model" rel="noopener" target="_blank"&gt;IBM research&lt;/a&gt;&amp;nbsp;reveals another layer: 45% of executives cite a lack of visibility into AI decision-making as a major barrier.&amp;nbsp;This AI&amp;nbsp;“black box” problem&amp;nbsp;isn’t&amp;nbsp;just a technical one.&amp;nbsp;It’s&amp;nbsp;also about trust, clear&amp;nbsp;communications&amp;nbsp;and&amp;nbsp;AI guardrails. Scaling agentic AI requires governance frameworks where automated decisions can be understood,&amp;nbsp;audited&amp;nbsp;and explained.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Such transformation must keep humans in focus: design for&amp;nbsp;augmentation&amp;nbsp;— not&amp;nbsp;replacement.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The agentic AI operating model&lt;/h2&gt;

&lt;p&gt;Think of agentic&amp;nbsp;ITOps&amp;nbsp;as much more than an&amp;nbsp;efficiency&amp;nbsp;upgrade, but as a total reshaping of traditional IT workflows.&amp;nbsp;Organizations leading the next phase of transformation are the ones rethinking how their systems make decisions,&amp;nbsp;collaborate&amp;nbsp;and adapt autonomously across the enterprise.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That level of&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report" target="_blank"&gt;digital&amp;nbsp;transformation&lt;/a&gt;&amp;nbsp;requires leadership from the top. CIOs and executive stakeholders must pivot from experimentation to execution. They must look at embedding agentic AI not as a side project, but as a core operating model that aligns technology,&amp;nbsp;data&amp;nbsp;and people toward shared outcomes.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That pivot marks the real test ahead.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The future ROI of agentic AI initiatives&lt;/h2&gt;

&lt;p&gt;Even with the productivity boost enjoyed with generative AI tech, IT teams&amp;nbsp;don’t&amp;nbsp;need&amp;nbsp;more&amp;nbsp;tools. They need intelligence that delivers measurable outcomes. Teams should&amp;nbsp;establish&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/how-to-measure-the-business-impact-of-digital-employee-experience-dex"&gt;before-and-after metrics that resonate with IT and business leaders&lt;/a&gt;. Beyond efficiency gains (time saved, faster resolution, lower costs), measure labor savings, fewer resource-intensive outages&amp;nbsp;and&amp;nbsp;reduced tool sprawl.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Transformational organizations see greater impact across every business&amp;nbsp;metric,&amp;nbsp;including productivity, efficiency, revenue growth, brand&amp;nbsp;strength&amp;nbsp;and customer loyalty, than those that limit AI to incremental and even superficial gains.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In fact,&amp;nbsp;organizations that excel in three key AI adoption areas are 32 times more likely to achieve top-tier business performance, according to that same&amp;nbsp;&lt;a href="https://www.ibm.com/downloads/documents/us-en/1443d5c92ec02bcb" rel="noopener" target="_blank"&gt;IBM report&lt;/a&gt;&amp;nbsp;referenced earlier.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The bottom line&lt;/h2&gt;

&lt;p&gt;The next 12 to&amp;nbsp;24 months&amp;nbsp;will test IT leaders’ ability to translate experimentation into sustained value. Those who embrace agentic AI early will build organizations that learn faster, adapt continuously, preempt potential&amp;nbsp;issues&amp;nbsp;and&amp;nbsp;recover from disruption&amp;nbsp;instinctively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;IT has regularly shown that&amp;nbsp;they're&amp;nbsp;fully willing and committed to AI adoption. Now it must lead again, in depth. Agentic AI marks the next maturity stage: self-learning, self-healing&amp;nbsp;and&amp;nbsp;self-optimizing systems that enable greater agility and resilience across the enterprise.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;isn’t&amp;nbsp;“set and forget.” IT teams must build, train, monitor,&amp;nbsp;measure&amp;nbsp;and refine agentic AI to ensure value realization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To learn more about the role of AI as a transformative tool for IT operations and breakthrough use cases for agentic AI and automation&amp;nbsp;in IT, see Ivanti’s research report: “&lt;a href="https://www.ivanti.com/resources/research-reports/itsm-automation" target="_blank"&gt;AI: The Future of ITSM Automation&lt;/a&gt;.”&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 05 Jan 2026 17:00:02 Z</pubDate></item><item><guid isPermaLink="false">f70bb75f-2613-497f-8032-f67435b31e69</guid><link>https://www.ivanti.com/blog/ai-it-cost-management</link><atom:author><atom:name>Scott Hughes</atom:name><atom:uri>https://www.ivanti.com/blog/authors/scott-hughes</atom:uri></atom:author><category>Artificial Intelligence</category><category>Service Management</category><title>AI-Driven IT Cost Management: Aligning Spend with Strategic Value</title><description>&lt;p&gt;Optimizing IT costs is now the top priority for IT teams, according to Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;2025 Technology at Work Report&lt;/a&gt;. Our survey found that &lt;a href="https://www.ivanti.com/blog/it-cost-optimization-for-cios"&gt;cost optimization&lt;/a&gt; was cited as a critical strategic goal for 2025, outranking improving cybersecurity, investing in infrastructure and deploying AI / ML technology.&lt;/p&gt;

&lt;p&gt;However, despite many organizations viewing AI and automation in terms of short-term operational improvements, many organizations haven't yet tapped into AI’s full potential to transform how IT manages, predicts and optimizes costs.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22444035"&gt;&lt;/div&gt;

&lt;p&gt;It’s clear that IT teams are already bullish on AI's value in everyday operations. IT is currently leading the charge in AI &lt;em&gt;implementation&lt;/em&gt;, with &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai" rel="noopener" target="_blank"&gt;36% of IT teams using generative AI&lt;/a&gt;, according to McKinsey research from March 2025 — more than any other function.&lt;/p&gt;

&lt;p&gt;While IT teams regularly use AI for coding, support tickets and other day-to-day work, many organizations don’t see beyond these short-term efficiency gains. Too often IT leaders overlook AI's untapped potential for enterprise-wide optimization.&lt;/p&gt;

&lt;p&gt;This shift from incremental productivity gains to strategic cost optimization frees resources and grants IT leaders the flexibility to focus on innovation, long-term transformation and consistent alignment of operations with fast-evolving business strategy.&lt;/p&gt;

&lt;p&gt;With CIOs under mounting pressure to “do more with less,” AI-driven IT cost optimization has the power to reduce wasteful IT spending, justify investments and deliver strategic value across the entire organization.&lt;/p&gt;

&lt;p&gt;However, before this transformation can happen, companies must first understand the biggest sources of inefficient spending and identify the most valuable areas where they can use AI capabilities to better allocate resources and make the most of their IT budget.&lt;/p&gt;

&lt;h2&gt;Major barriers to IT cost optimization&lt;/h2&gt;

&lt;p&gt;Cost management challenges are systemic. Inefficient IT spending results from compounding breakdowns across systems, processes and leadership structures. More than half of IT professionals said that wasteful IT spending was a significant problem at their organization, according to 2025 Ivanti research.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22523269"&gt;&lt;/div&gt;

&lt;p&gt;Wasteful IT spend is especially egregious in high-complexity sectors like telecoms and government, where legacy systems and sprawling vendor relationships make it difficult to track and control spend. These sectors face greater pressure to cut costs, as unchecked waste limits their ability to fund strategic initiatives and modernize critical infrastructure.&lt;/p&gt;

&lt;p&gt;Monthly vendor reviews, quarterly budget reconciliations and annual contract negotiations struggle to keep pace with today's dynamic IT landscape. Organizational cloud spend can spike overnight, and tech complexity compounds rapidly due to decentralized procurement, shadow IT and &lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;poor asset visibility&lt;/a&gt;. For instance, &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;38% of IT professionals Ivanti surveyed&lt;/a&gt; pointed to “tech complexity” as a major barrier to effective IT operations.&lt;/p&gt;

&lt;p&gt;Looking toward the future of AI-powered ITOps, many IT professionals recognize AI's transformative potential to meet these challenges and eliminate unnecessary spending.&lt;/p&gt;

&lt;h2&gt;AI and machine learning for predictive cost management&lt;/h2&gt;

&lt;p&gt;Manual cost reviews alone are backward-looking, labor-intensive and prone to human error. Human oversight alone cannot recognize and analyze patterns that emerge through large-scale AI data analysis. AI-powered cost management flips the script. Instead of reporting overspending after it happens, &lt;a href="https://www.ivanti.com/ai"&gt;AI predictive analysis can detect potential anomalies&lt;/a&gt; and provide organizations with accurate budget forecasting to avoid redundant, unnecessary spending. AI can also surface redundant tools, highlight lifecycle costs and flag spending anomalies that human reviews would likely miss.&lt;/p&gt;

&lt;p&gt;Consider this scenario: you can use AI to analyze your &lt;a href="https://www.ivanti.com/glossary/itam"&gt;IT asset management&lt;/a&gt; data to uncover shelfware and unused software licenses, or to mine support tickets for patterns showing when certain device types typically begin to fail. Those insights can inform smarter replacement cycles, reduce downtime and ensure you only pay for what you actually use.&lt;/p&gt;

&lt;p&gt;The speed difference is dramatic. Organizations using AI-driven cost optimization are &lt;a href="https://isg-one.com/articles/ai-powered-cost-optimization--how-smart-companies-are-slashing-expenses-and-boosting-efficiency-in-2025" rel="noopener" target="_blank"&gt;seeing measurable reductions in operational expenses&lt;/a&gt;, while others are still compiling last quarter's reports on spreadsheets.&lt;/p&gt;

&lt;p&gt;Real-time visibility consistently outperforms reactive reviews. When you can predict and prevent waste instead of just documenting it, that's when IT shifts from expense management to strategic value creation.&lt;/p&gt;

&lt;h2&gt;AI cloud cost management and resource management&lt;/h2&gt;

&lt;p&gt;Cloud environments are the single largest source of budget variance and waste. &lt;a href="https://www.cloudzero.com/state-of-cloud-cost/" rel="noopener" target="_blank"&gt;Nearly nine in 10 (88%) of organizations&lt;/a&gt; see significant variance between actual spend and forecasted spend, and only 30% know where their cloud budget is going, according to CloudZero’s State of Cloud Costs in 2024.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;own findings&lt;/a&gt; expand on these IT resource management challenges:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;39% of IT professionals cited outdated hardware as a considerable source of wasteful spend.&lt;/li&gt;
	&lt;li&gt;Outdated, unused and expired software is also a major factor, with nearly one in three (31%) IT professionals reporting their organizations don't track unused or underused software licenses.&lt;/li&gt;
	&lt;li&gt;Even more concerning, 48% of IT teams reported that their companies use software that’s reached end of life (EOL).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The combination of multi-cloud environments, unpredictable usage over time, complex and multilateral pricing within the same services and drastically varied costs makes the need for AI and automation clear.&lt;/p&gt;

&lt;p&gt;AI-enabled technology can help cut through this complexity. AI solutions can proactively identify underutilized software licenses, over-provisioned cloud resources and redundant applications across environments that'd take human analysts weeks to map.&lt;/p&gt;

&lt;p&gt;What’s more, AI combined with &lt;a href="https://www.ivanti.com/products/automation"&gt;ITSM automation&lt;/a&gt; can suggest resolutions to inefficient IT spending through intelligent recommendations for rightsizing and deprovisioning. Leading CIOs use strategic IT cost management to fund high-impact initiatives, and AI automation makes this achievable at scale.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/provide-applications-to-users"&gt;Software license optimization&lt;/a&gt; delivers significant returns. AI tracks actual software usage against entitlements, identifies downgrade opportunities and predicts future needs based on growth patterns. Organizations pay for what they use, not what they purchased months ago.&lt;/p&gt;

&lt;h2&gt;AI’s impact on streamlining IT processes&lt;/h2&gt;

&lt;p&gt;While AI adoption increases among IT teams, its cost optimization impacts aren't yet as widespread as basic use cases like predictive maintenance and automating routine self-service tasks — both popular, according to Ivanti research.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22344392"&gt;&lt;/div&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/itsm-agentic-ai-readiness-checklist"&gt;Delayed widespread AI adoption&lt;/a&gt; in ITOps prevents organizations from reaping the long-term financial benefits and opportunities for strategic business growth. IT automation solutions can &lt;a href="https://www.bcg.com/publications/2025/amplifying-benefits-of-cost-optimization" rel="noopener" target="_blank"&gt;reduce operational costs by up to 90%&lt;/a&gt;. The technology handles ticket triage and automates incident response while predicting system failures and managing routine maintenance.&lt;/p&gt;

&lt;p&gt;AI elevates IT operations, and the impacts are felt across the entire business. Asset performance monitoring becomes intelligent and proactive. Instead of static thresholds and scheduled checks, AI systems continuously analyze performance data, predict hardware failures and optimize maintenance schedules.&lt;/p&gt;

&lt;p&gt;This prevents both downtime costs and unnecessary replacement spending. Process automation also frees IT time, reducing costs from human error: manual misconfigurations, missed patches and delayed responses caused by limited resources.&lt;/p&gt;

&lt;h2&gt;How AI empowers IT to deliver strategic value&lt;/h2&gt;

&lt;p&gt;IT cost management isn't the endgame. It's the starting point for strategic transformation. &lt;a href="https://www.bcg.com/publications/2025/how-four-companies-use-ai-for-cost-transformation" rel="noopener" target="_blank"&gt;AI enables companies to optimize costs at scale&lt;/a&gt; while freeing up budgets for growth investments.&lt;/p&gt;

&lt;p&gt;Organizations embracing AI for cost management are repositioning how their businesses view and leverage technology. When every investment must justify its existence, AI enables IT leaders to become architects of value, not just managers of expense by cutting costs and creating value. AI promotes agile resource allocation. When wasteful costs are eliminated proactively, IT executives gain flexibility to fund emerging opportunities and respond to changing business priorities.&lt;/p&gt;

&lt;p&gt;Visibility is equally important in transforming IT into a strategic business driver. AI provides the data and insights needed to quantify IT's business value. When investments are tracked and tied to business outcomes, CIOs can demonstrate the true ROI of the IT department and secure strategic support.&lt;/p&gt;

&lt;p&gt;The real transformation happens when IT moves from reactive expense control to proactive value creation. AI-optimized IT operations have become the foundation for innovation, enabling teams to experiment and deliver competitive advantages.&lt;/p&gt;

&lt;p&gt;To learn more about the major challenges contributing to wasteful IT spending and how AI and automation can help IT teams boost efficiency, improve asset visibility and optimize IT cost management, see &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;Ivanti’s 2025 Technology at Work Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 22 Oct 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">00dbd20d-1776-464f-88df-370eaabb24b8</guid><link>https://www.ivanti.com/blog/ai-cybersecurity-threats</link><category>Artificial Intelligence</category><category>Security</category><title>AI threat hype: why chasing ghosts leaves real vulnerabilities exposed</title><description>&lt;p&gt;With AI at the center of media and industry focus, cybersecurity teams are increasingly putting pressure on themselves to prepare for AI-fueled cyber attacks.&lt;/p&gt;

&lt;p&gt;According to &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2025 State of Cybersecurity research&lt;/a&gt;, half of IT security professionals ranked “yet unknown weaknesses” as a high or critical threat – the same as or higher than compromised credentials, &lt;a href="https://www.ivanti.com/blog/software-supply-chain-attack-risk"&gt;supply chain risks&lt;/a&gt;, DDoS attacks and other real-world threats.&lt;/p&gt;

&lt;p&gt;These “unknown” concerns remain more hype than substance for the moment. In fact, the &lt;a href="https://picussecurity.com/hubfs/red-report-2025/Picus-RedReport-2025.pdf?utm_campaign=7149959-Red%20Report%202025&amp;amp;utm_medium=email&amp;amp;_hsenc=p2ANqtz-_-SYSHkr_749ctQItWQ0HqXKdRHeEeyjv-KbINbgs6RNe4OjnJn7RPLPV7DCjyU7uxbJLV6O2Ngo7bu35dhlpG4Vb7DQ&amp;amp;_hsmi=345615333&amp;amp;utm_content=345615333&amp;amp;utm_source=hs_automation" rel="noopener" target="_blank"&gt;Picus 2025 Red Report&lt;/a&gt; found no notable uptick in the use of AI-driven malware techniques in 2024. The report goes on to state that “AI enhances productivity but doesn't yet redefine malware.”&lt;/p&gt;

&lt;p&gt;In other words, adversaries are &lt;em&gt;leveraging&lt;/em&gt; AI in their attacks – automating phishing content, debugging malicious code, accelerating reconnaissance – but they’re not creating fundamentally new attack classes. Traditional attack techniques still dominate the cyber landscape, yet many teams remain fixated on speculative threats.&lt;/p&gt;

&lt;p&gt;The big takeaway? Stop worrying about hypothetical AI-powered launches from beyond the front lines and focus on defending against the threats that are putting your organization most at risk today.&lt;/p&gt;

&lt;h2&gt;Real threats vs. AI hype: misaligned risk prioritization&lt;/h2&gt;

&lt;p&gt;Ever since ChatGPT started capturing headlines in November 2022, the world has been saturated with anticipation of the potential impact of AI. Analysts are projecting AI will &lt;a href="https://www.pwc.com/gx/en/issues/artificial-intelligence/publications/artificial-intelligence-study.html" rel="noopener" target="_blank"&gt;inject $15.7 trillion into the global economy&lt;/a&gt; by 2030, and &lt;a href="https://hai.stanford.edu/ai-index/2025-ai-index-report" rel="noopener" target="_blank"&gt;the tech is also increasingly shaping daily workflows&lt;/a&gt; across industries.&lt;/p&gt;

&lt;p&gt;So, it’s no surprise that AI is dominating boardroom talk. Since CISOs and security leaders are tasked with preparing for worst-case scenarios, they’re understandably alert to what AI &lt;em&gt;could&lt;/em&gt; do in the wrong hands. However, an issue arises when much of this attention is focused on novel AI-generated threats. Less focus is being paid to the main way that we’re already seeing attackers use AI — as a tool to amplify familiar existing threats.&lt;/p&gt;

&lt;p&gt;AI synthetic digital content — such as manipulated media and deepfakes — and AI-based spoofing attacks — such as using gen AI to mimic someone’s voice and tone — were both top-ranked predicted AI-related threats for 2025, with 53% of security professionals rating their threat levels as “high / critical.”&lt;/p&gt;

&lt;p&gt;Yet in practice, these AI-generated threat types are not yet as commonplace as traditional phishing techniques and ransomware attacks where we see AI speed up attackers’ efforts to an unprecedented rate. The result is a risk prioritization model that skews toward theoretical rather than real-life considerations.&lt;/p&gt;

&lt;h2&gt;Critical gaps in threat preparedness persist&lt;/h2&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795381"&gt;&lt;/div&gt;

&lt;p&gt;Ivanti’s report also paints a troubling picture: real-world threats are outpacing organizational preparedness across multiple critical categories.&lt;/p&gt;

&lt;p&gt;The problem isn’t a lack of awareness; rather, it’s that security hygiene is inconsistent. The gaps are still there: weak credential management, patch delays, untested incident plans and API / third-party blind spots. In short, new risks coming from AI aren’t the issue – it’s more that AI is strengthening existing threats.&lt;/p&gt;

&lt;p&gt;Consider the top five areas in which our research found defenders are falling behind – not because security teams lack awareness, but rather, the fundamentals are being inconsistently enforced, and AI is helping adversaries exploit them more efficiently:&lt;/p&gt;

&lt;h3&gt;1. Ransomware attacks&lt;/h3&gt;

&lt;p&gt;Ransomware remains a top threat with 58% of security professionals ranking it as high/critical. Yet only 29% say their teams are prepared to defend themselves against ransomware attacks. Despite this, many organizations still lack tested backup and recovery protocols, haven’t segmented their networks effectively and run outdated IR plans.&lt;/p&gt;

&lt;p&gt;When it comes to &lt;a href="https://cetas.turing.ac.uk/publications/generative-ai-cybersecurity" rel="noopener" target="_blank"&gt;gen AI’s ability to ramp up ransomware threats&lt;/a&gt;, security teams may face even quicker code iteration, more automated vulnerability chaining and adaptive payload construction that can circumvent defenses. Attackers are also using AI to create virtual simulations for testing ahead of deployment – and adjusting their strategies accordingly.&lt;/p&gt;

&lt;h3&gt;2. API-related exposures&lt;/h3&gt;

&lt;p&gt;The increasing use of API-supported software has also increased the risk of API exposures. API-related vulnerabilities was the second highest ranked threat type by the security professionals Ivanti surveyed with 52% rating it a “high / critical” threat. Yet just 31% of security teams said they felt “very prepared” to defend against API attacks — a 21% preparedness gap.&lt;/p&gt;

&lt;p&gt;Threat actors can now automate the discovery of endpoints through traffic analysis, reverse engineering poorly documented APIs and generating fuzzing inputs to identify logic flaws. Once they’re inside, they exploit permission creep, unvalidated input or weak auth mechanisms.&lt;/p&gt;

&lt;p&gt;Still on the cybersecurity front, AI can also be a useful tool to analyze large amounts of API traffic data in real-time to identify issues and patterns that may indicate an attack.&lt;/p&gt;

&lt;h3&gt;3. Software vulnerabilities&lt;/h3&gt;

&lt;p&gt;Overall software vulnerabilities had a worrying 19-point gap between “high / critical” threat level and preparedness. Security teams still struggle with critical issues around departmental silos, inaccessible data and tech debt that make managing their expanding attack surface challenging. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s report&lt;/a&gt; found that 45% of security teams said they lacked data to confidently identify specific vulnerabilities.&lt;/p&gt;

&lt;p&gt;Furthermore, more than half of organizations surveyed — 51% — admitted to using software that has reached end-of- life and therefore would not be regularly updated and patched to ensure security compliance.&lt;/p&gt;

&lt;p&gt;Security and IT teams are &lt;a href="https://www.ivanti.com/company/press-releases/2021/71-of-it-security-pros-find-patching-to-be-overly-complex-and-time-consuming-ivanti-study-confirms"&gt;struggling to maintain patch hygiene&lt;/a&gt;, especially across legacy systems and shadow IT environments. This isn’t only a tooling problem. Patching cycles and security response times are slowed by security and IT having misaligned priorities – and AI is widening the gap between those who patch quickly and those who wait.&lt;/p&gt;

&lt;h3&gt;4. Compromised credentials&lt;/h3&gt;

&lt;p&gt;Like software vulnerabilities, the preparedness gap for compromised credentials also sits at 19%. Stolen credentials are an easy way in for attackers, even more so when paired with AI’s capabilities to scale credential stuffing attacks, simulate human-like login behavior and adapt to multi-step authentication flows.&lt;/p&gt;

&lt;p&gt;Gen AI is also utilized to analyze leaked datasets and identify reused passwords or credential patterns across platforms. What was once a manual grind is now becoming a fully automated infiltration process. And yet, &lt;a href="https://www.securityweek.com/mfa-isnt-failing-but-its-not-succeeding-why-a-trusted-security-tool-still-falls-short/" rel="noopener" target="_blank"&gt;MFA coverage remains patchy&lt;/a&gt;, and identity governance is often an afterthought. AI is simply exposing how poorly it’s implemented.&lt;/p&gt;

&lt;h3&gt;5. Phishing&lt;/h3&gt;

&lt;p&gt;Phishing has long been a mainstay method for attackers to breach an organization’s defenses. Yet even now, only 37% of cybersecurity teams say they’re readily prepared to defend against phishing threats.&lt;/p&gt;

&lt;p&gt;This lag has never been more of a concern as we’ve seen how phishing methods evolve with AI and attackers have the capabilities to create convincing deepfake content and personalize attacks using scraped public data.&lt;/p&gt;

&lt;p&gt;Organizations clearly have a lot of work to do to bridge the gaps in their defenses and combat prominent threats because we know that these threats are not going away but continuing to evolve and develop. However, there is some positive news behind the AI threat hype which is that AI and automation can also serve as powerful tools to bolster cybersecurity teams' efforts as well.&lt;/p&gt;

&lt;h2&gt;AI cybersecurity tools: foe or friend?&lt;/h2&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/19930150"&gt;&lt;/div&gt;

&lt;p&gt;Exploring the other side of the AI conversation, cybersecurity leaders have begun to view AI as an asset in bolstering defenses. Ivanti’s 2024 report “&lt;a href="https://www.ivanti.com/resources/research-reports/gen-ai-cybersecurity"&gt;Gen AI and Cybersecurity: Risk and Reward&lt;/a&gt;” found that 90% of security professionals believe that gen AI benefits security teams as much or more than threat actors.&lt;/p&gt;

&lt;p&gt;Some ways organizations today use AI tools include automating threat detection and triage, accelerating log analysis, increasing anomaly spotting and simulating different attack methods. Gen AI does not need to be only a looming threat but should be seen as another tool to help security teams more effectively identify weaknesses in their defenses and proactively address vulnerabilities.&lt;/p&gt;

&lt;h2&gt;Recommendations to refocus on cybersecurity fundamentals&lt;/h2&gt;

&lt;p&gt;AI threats are of course real threats, and cybersecurity teams shouldn’t disregard the growing use of AI in cyber attacks. However, with cybersecurity and IT teams dealing with a lack of talent / skills and battling burnout, they need to prioritize security resources on the most prominent and impactful types of threats.&lt;/p&gt;

&lt;p&gt;Rather than spend time, budget and personnel crafting a security strategy around speculative AI threats, defenders should be doubling down on security best practices and fundamentals such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Identifying &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;attack surface gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Remediating existing exposures&lt;/li&gt;
	&lt;li&gt;Ensuring rigorous credential protection and access controls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your vulnerability and threat management strategy needs to focus primarily on proactively identifying and managing the most pressing threats to your organization rather than on trying to guard against speculated future threats, especially when unknown.&lt;/p&gt;

&lt;p&gt;Security teams can’t know the threat level of abstract unidentified threats and thus can’t act on them. It’s more beneficial to gain a comprehensive, real-time view of your attack surface and use that to understand your organization’s current risk posture.&lt;/p&gt;

&lt;p&gt;Real cybersecurity leadership isn’t about chasing hypotheticals. Rather, it’s about systematically reducing exposure through full visibility, quick validation and &lt;a href="https://www.ivanti.com/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits"&gt;risk-based prioritization&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Here’s what today’s leading security leaders are doing, and what you should do to stay ahead:&lt;/p&gt;

&lt;h3&gt;1. Continuously monitor your complete attack surface&lt;/h3&gt;

&lt;p&gt;Teams can’t protect what they’re not able to see. As such, ensure a real-time, continuously updating view of every exposure point to have visibility into the entire landscape. With limited resources, you cannot prepare for every unknown potential threat. Instead, teams need a framework for &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;assessing their attack surface&lt;/a&gt; and classifying known and unknown vulnerabilities.&lt;/p&gt;

&lt;h3&gt;2. Prioritize threat response based on overall impact threat and risk to business&lt;/h3&gt;

&lt;p&gt;Go beyond scanning for existing gaps and opportunities – run simulations, use red teams and adopt behavior-based analytics to validate which exposures are actually exploitable. Leverage frameworks like &lt;a href="https://attack.mitre.org/" rel="noopener" target="_blank"&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;, threat intelligence and your own readings to identify exposures and prioritize remediation efforts based on an established risk framework that considers critical factors such as exploitability and overall impact to your organization’s wider business objectives.&lt;/p&gt;

&lt;h3&gt;3. Leverage AI to accelerate defenses&lt;/h3&gt;

&lt;p&gt;AI is a threat vector, but it’s also a force multiplier for cybersecurity teams. Use &lt;a href="https://www.ivanti.com/blog/ai-cybersecurity-best-practices-meeting-a-double-edged-challenge"&gt;AI in cybersecurity&lt;/a&gt; to its fullest potential, surfacing anomalies in real time, automating log analyses, generating simulations and reducing manual obligation. The hype is real, but especially in the way you apply it in such a way that it speeds up and tightens response.&lt;/p&gt;

&lt;p&gt;Real cybersecurity leadership is forged in present-day focus and near-future developments. This means making surgical decisions under pressure, identifying actual risk and driving measurable reduction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Forget the future unknowns – focus on what’s known&lt;/h2&gt;

&lt;p&gt;Research reveals that many security teams are overestimating the predicted risks of AI-powered threats, and they’re underprepared to defend against the actual threats targeting them today. Cybersecurity teams need to realign cyber defense strategies to reflect reality or risk unnecessary damages.&lt;/p&gt;

&lt;p&gt;The truth is, AI may redefine the scale and speed of cyber attacks, but even with new AI capabilities, today’s attackers are still using the same old tricks. The winning cybersecurity strategies won’t put all of their time and resources into building AI-resistant walls – they’ll be the ones proactively readying defenses to fend off the threats right in front of them.&lt;/p&gt;

&lt;p&gt;Check out &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2025 Cybersecurity Report&lt;/a&gt; to benchmark your readiness and close the preparedness gap.&lt;/p&gt;
</description><pubDate>Mon, 02 Jun 2025 13:00:03 Z</pubDate></item><item><guid isPermaLink="false">df0eabfd-fa6d-4ee5-aa07-8f09e2717296</guid><link>https://www.ivanti.com/blog/ai-cybersecurity-best-practices-meeting-a-double-edged-challenge</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><atom:author><atom:name>Mike Lloyd</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-lloyd</atom:uri></atom:author><category>Security</category><category>Artificial Intelligence</category><title>AI Cybersecurity Best Practices: Meeting a Double-Edged Challenge</title><description>&lt;p&gt;Artificial intelligence is already showing its potential to reshape nearly every aspect of cybersecurity – for good and bad.&lt;/p&gt;

&lt;p&gt;If anything represents the proverbial double-edged sword, it might be AI: It can act as a formidable tool in creating robust cybersecurity defenses or can dangerously compromise them if weaponized.&lt;/p&gt;

&lt;h2&gt;Why is AI security important?&lt;/h2&gt;

&lt;p&gt;It’s incumbent upon organizations to understand both the promise and problems associated with AI cybersecurity because of the ubiquity of all iterations of AI in global business. Its use by bad actors is already a source of concern.&lt;/p&gt;

&lt;p&gt;According to McKinsey, &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai" rel="noopener" target="_blank"&gt;AI adoption by organizations surged to 72% in 2024, up from about 50% in prior years&lt;/a&gt; across multiple regions and industries. But the intricate nature and vast data requirements of AI systems also make them prime targets for cyber-attacks. For instance, input data for AI systems can be slyly manipulated in adversarial attacks to produce incorrect or damaging outputs.&lt;/p&gt;

&lt;p&gt;A compromised AI can lead to catastrophic consequences, including data breaches, financial loss, reputational damage and even physical harm. The prospect for misuse is immense, underscoring the critical need for robust AI security measures.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Research by the &lt;a href="https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2024.pdf" rel="noopener" target="_blank"&gt;World Economic Forum&lt;/a&gt; found that almost half of executives worry most about how AI will raise the risk level from threats like phishing. Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;2024 cybersecurity report&lt;/a&gt; confirmed those concerns.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/16336537"&gt;&lt;/div&gt;

&lt;p&gt;Despite the risks, the same Ivanti report found that IT and Security professionals are largely optimistic about the impact of AI cybersecurity. Almost half (46%) feel it’s a net positive, while 44% think its impact will be neither positive nor negative.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read more: &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;2024 State of Cybersecurity Report - Inflection Point&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Potential AI cyber threats&lt;/h2&gt;

&lt;p&gt;AI introduces new attack vectors that require specific defenses. Examples include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Site hacking:&lt;/strong&gt; Researchers have &lt;a href="https://www.newscientist.com/article/2418201-gpt-4-developer-tool-can-hack-websites-without-human-help/" rel="noopener" target="_blank"&gt;found&lt;/a&gt; OpenAI’s large language model can be repurposed as an AI hacking agent capable of autonomously attacking websites. Cyber crooks don’t need hacking skills, only the ability to properly prompt the AI into doing their dirty work.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Data poisoning:&lt;/strong&gt; Attackers can manipulate the data used to train AI models, so they malfunction. This could involve injecting fake data points that influence the model to learn incorrect patterns or prioritizing non-existent threats, or subtly modifying existing data points to bias the AI model toward outcomes that benefit the attacker.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evasion techniques:&lt;/strong&gt; AI could be used to develop techniques that evade detection by security systems, such as creating emails or malware that don't look suspicious to humans but trigger vulnerabilities or bypass security filters.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Advanced social engineering:&lt;/strong&gt; Since it can analyze large datasets, an AI can identify targets based on certain criteria, such as vulnerable past behaviors or susceptibility to certain scams. Then, it can automate and personalize an attack using relevant information scraped from social media profiles or prior interactions so it’s more believable and likely to fool the recipient. Plus, generative AI can draft phishing messages without grammar or usage mistakes to look legitimate.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Denial-of-service (DoS) attacks:&lt;/strong&gt; AI can be used to orchestrate large-scale DoS attacks that are more difficult to defend against. By analyzing network configurations, it can detect vulnerabilities then manage botnets more effectively as it tries to overwhelm a system with traffic.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Deepfakes:&lt;/strong&gt; AI can generate convincing visual or sonic imitations of people for impersonation attacks. For example, it could mimic the voice of a high-level executive to trick employees into wiring money to fraudulent accounts, sharing sensitive information like passwords or access codes or approving unauthorized invoices or transactions. If a company uses voice recognition in its security systems, a well-crafted deepfake might fool these safeguards and access secure areas or data. One Hong Kong company was &lt;a href="https://www.voanews.com/a/deepfake-scam-video-cost-company-26million-hong-kong-police-says/7470542.html" rel="noopener" target="_blank"&gt;robbed of $26 million&lt;/a&gt; via a deepfake scam.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A “soft” threat presented by AI is complacency. There's always a risk of over-reliance on AI systems, which might lead to laxity in monitoring and updating them. One of the most important measures for protecting an enterprise from AI issues is through continuous training and monitoring, whether AI is being deployed in cybersecurity or other operations. Ensuring that AI operates with the organization's best interests in mind demands ongoing vigilance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Watch: &lt;a href="https://www.ivanti.com/webinars/2023/generative-ai-for-infosec-hackers-what-security-teams-need-to-know"&gt;Generative AI for InfoSec &amp;amp; Hackers: What Security Teams Need to Know&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;AI cybersecurity benefits&lt;/h2&gt;

&lt;p&gt;AI cybersecurity solutions deliver the most significant value to an organization in the following ways:&lt;/p&gt;

&lt;h3&gt;Enhanced threat detection&lt;/h3&gt;

&lt;p&gt;AI excels at identifying patterns in vast datasets to detect anomalies indicative of cyber-attacks with unprecedented accuracy. While human analysts would be overwhelmed by the volume of data or alerts, AI improves early detection and response.&lt;/p&gt;

&lt;h3&gt;Improved incident response&lt;/h3&gt;

&lt;p&gt;AI can automate routine incident response tasks, accelerating response times and minimizing human error. By analyzing past incidents, AI can also predict potential attack vectors so organizations can strengthen defenses.&lt;/p&gt;

&lt;h3&gt;Risk assessment and prioritization&lt;/h3&gt;

&lt;p&gt;AI can evaluate an organization's security posture, identifying vulnerabilities and prioritizing remediation efforts based on risk levels. This helps optimize resource allocation and focus on critical areas.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Security considerations for different types of AI&lt;/h2&gt;

&lt;p&gt;Security challenges associated with AI vary depending on the type being deployed.&lt;/p&gt;

&lt;p&gt;If a company is using generative AI, the focus should be on protecting training data, preventing model poisoning and safeguarding intellectual property.&lt;/p&gt;

&lt;p&gt;In the case of weak (or “narrow”) AI such as customer support chatbots, recommendation systems (like Netflix), image-recognition software, assembly line and surgical robots, the organization should prioritize data security, adversarial robustness and explainability.&lt;/p&gt;

&lt;p&gt;Autonomous “strong” AI (aka Artificial General Intelligence) is a work in progress that doesn’t yet exist. But if it arrives, companies should focus on defending control mechanisms and addressing existential risks and ethical implications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Watch: &lt;a href="https://www.ivanti.com/webinars/2023/sci-fi-or-reality-how-to-transform-it-service-management-with-generative-ai"&gt;How to Transform IT Service Management with Generative AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Latest developments in AI cybersecurity&lt;/h2&gt;

&lt;p&gt;The rapid evolution of AI is driving corresponding advances in AI cybersecurity that include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Generative AI threat modeling:&lt;/strong&gt; AI cybersecurity tools can simulate attack scenarios to help organizations find and fix vulnerabilities proactively.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;AI-powered threat hunting:&lt;/strong&gt; AI can analyze network traffic and system logs to detect malicious activity and potential threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated incident response:&lt;/strong&gt; AI cybersecurity solutions can automate routine incident response tasks like isolating compromised systems and containing threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;AI for vulnerability assessment:&lt;/strong&gt; Can analyze software code to find possible vulnerabilities so developers can build more secure applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;AI cybersecurity courses&lt;/h2&gt;

&lt;p&gt;Investing in AI cybersecurity education is crucial for building a workforce that understands how to use these tools. Numerous online platforms and universities offer courses covering various aspects of AI security, from foundational knowledge to advanced topics.&lt;/p&gt;

&lt;p&gt;Top cybersecurity solution providers will offer &lt;a href="https://advantagelearning.ivanti.com/" target="_blank"&gt;a wide range of courses and training&lt;/a&gt; to give your team the skills it needs to get the most out of your platform.&lt;/p&gt;

&lt;h2&gt;AI cybersecurity best practices&lt;/h2&gt;

&lt;p&gt;Implementing a comprehensive strategy for putting AI into action for cybersecurity is essential.&lt;/p&gt;

&lt;h3&gt;1. Set out data governance and privacy policies&lt;/h3&gt;

&lt;p&gt;Early in the adoption process, establish robust data governance policies that cover data anonymization, encryption and more. Include all relevant stakeholders in this process.&lt;/p&gt;

&lt;h3&gt;2. Mandate AI transparency&lt;/h3&gt;

&lt;p&gt;Develop or license AI models that can provide clear explanations for their decisions, rather than using “black box” models. &amp;nbsp;This is so security professionals can understand how the AI arrives at its conclusions and identify potential biases or errors. These "glass box” models are provided by Fiddler AI, DarwinAI, H2O.ai and IBM Watson tools such as AI Fairness 360 and AI Explainability 360.&lt;/p&gt;

&lt;h3&gt;3. Stress strong data management&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;AI models rely on the quality of data used for training. Ensure you're using diverse, accurate and up-to-date data so your AI can learn and identify threats effectively.&lt;/li&gt;
	&lt;li&gt;Impose robust security measures to protect the data used in training and operating an AI model, as some may be sensitive. Any breaches could expose it, compromise AI effectiveness or introduce vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Be mindful of potential biases in your training data. Biases can lead the AI to prioritize certain types of threats or overlook others. Regularly monitor and mitigate bias to ensure your AI is making objective decisions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Learn about: &lt;a href="https://www.ivanti.com/blog/the-importance-of-accurate-data-to-get-the-most-from-ai"&gt;The Importance of Accurate Data to Get the Most From AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;4. Give AI models adversarial training&lt;/h3&gt;

&lt;p&gt;Expose AI models to malicious inputs during the training phase so they’re able to recognize and counteract adversarial attacks like data poisoning.&lt;/p&gt;

&lt;h3&gt;5. Implement continuous monitoring&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Conduct continuous monitoring and threat detection systems to identify bias and performance degradation.&lt;/li&gt;
	&lt;li&gt;Use anomaly detection systems to identify unusual behavior in your AI models or network traffic patterns to detect potential AI attacks that try to manipulate data or exploit vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Regularly retrain your AI cybersecurity models with fresh data and update algorithms to ensure they stay effective against evolving threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;6. Keep humans in the loop&lt;/h3&gt;

&lt;p&gt;AI is not infallible. Maintain human oversight, with security professionals reviewing and validating AI outputs to catch potential AI biases, false positives or manipulated results the AI might generate.&lt;/p&gt;

&lt;h3&gt;7. Conduct regular testing and auditing&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Routinely assess your AI models for vulnerabilities. Like any software, AI cybersecurity products can have weaknesses attackers might exploit. Patching them promptly is crucial.&lt;/li&gt;
	&lt;li&gt;AI models can generate false positives, identifying non-existent threats. Adopt strategies to minimize false positives and avoid overwhelming security teams with irrelevant alerts.&lt;/li&gt;
	&lt;li&gt;Conduct frequent security testing of your AI models to identify weaknesses that attackers might exploit. Penetration testing expressly designed for AI systems can be very valuable.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;8. Have an incident response plan&lt;/h3&gt;

&lt;p&gt;Create a comprehensive incident response plan to effectively address AI-related security incidents.&lt;/p&gt;

&lt;h3&gt;9. Emphasize employee training&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Educate employees about the risks associated with AI and how social engineering tactics might be used to manipulate them into compromising AI systems or data security.&lt;/li&gt;
	&lt;li&gt;Conduct red-teaming exercises that simulate AI-powered attacks, which help test your security posture and spot weaknesses attackers might exploit.&lt;/li&gt;
	&lt;li&gt;Collaborate with industry experts and security researchers to stay abreast of the latest AI threats and best practices for countering them.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;10. Institute third-party AI risk management&lt;/h3&gt;

&lt;p&gt;Carefully evaluate the security practices of third-party AI providers. Do they share data with other parties or use public datasets? Do they follow &lt;a href="https://www.ivanti.com/blog/secure-by-design-principles-are-more-important-than-ever"&gt;Secure by Design&lt;/a&gt; principles?&lt;/p&gt;

&lt;h3&gt;11. Other best practices&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Integrate your AI solution with threat intelligence feeds so it can incorporate real-time threat data and stay ahead of new attack vectors.&lt;/li&gt;
	&lt;li&gt;Ensure your AI solution complies with relevant industry standards and regulations. This is mandatory in certain sectors. For instance, in the automotive and manufacturing sectors, an AI must comply with ISO 26262 for automotive functional safety, General Data Protection Regulation (GDPR) for data privacy and National Institute of Standards and Technology guidance. AI in healthcare must comply with the Health Insurance Portability and Accountability Act in the U.S., GDPR in Europe and FDA regulations for AI-based medical devices.&lt;/li&gt;
	&lt;li&gt;Track metrics like threat detection rates, false positives and response times. This way, you’ll know the effectiveness of your AI and areas for improvement.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Win by being balanced&lt;/h2&gt;

&lt;p&gt;For any organization venturing into this bold new AI cybersecurity frontier, the way forward is a balanced approach. Leverage the copious strengths of AI – but remain vigilant as to its limitations and potential vulnerabilities.&lt;/p&gt;

&lt;p&gt;Like any technology, AI is not inherently good or bad; it is used by both good and bad actors. Always remember to treat AI like any other tool: Respect it for what it can do to help but stay wary of what it can do to harm.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read: &lt;a href="https://www.ivanti.com/company/artificial-intelligence"&gt;Ivanti’s Position on Artificial Intelligence&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
</description><pubDate>Thu, 17 Oct 2024 12:28:03 Z</pubDate></item><item><guid isPermaLink="false">be54eff4-0d7f-48cf-82ac-694e30a715f3</guid><link>https://www.ivanti.com/blog/the-importance-of-accurate-data-to-get-the-most-from-ai</link><atom:author><atom:name>Daren Goeson</atom:name><atom:uri>https://www.ivanti.com/blog/authors/daren-goeson</atom:uri></atom:author><category>Artificial Intelligence</category><title>The Importance of Accurate Data to Get the Most From AI</title><description>&lt;p&gt;The IT service community is rightly buzzing about the wealth of possibilities AI offers to automate service management operations and better assist customers — especially in this age of expanding Everywhere Work. But without sound data, the path to leveraging AI for IT service management becomes quite daunting.&lt;/p&gt;

&lt;p&gt;With so many more people working outside a traditional office setting, more end users than ever are logging in more often to access employee services. According to Ivanti research, all this complexity affects IT significantly: 39% of IT professionals report too many logins, 47% report too many digital notifications and 42% report using too many tools/platforms.&lt;/p&gt;

&lt;p&gt;So AI-driven service management is a welcome tool to help IT personnel serve their end users. Sound data for AI is the bedrock of such a solution.&lt;/p&gt;

&lt;p&gt;Organizations thrive on accurate data for AI. Without it, your service teams can only be reactive. That means you have manual processes in the organization — and they are taking a ton of time away from people who should be focusing on outcomes within that organization.&lt;/p&gt;

&lt;p&gt;Not only that, but poor data means your service resolutions are inaccurate because the information you have doesn’t match up to the right resolution. The result? Users are unable to get back to work because of slower ticket resolution. Mismatched data is also a hazard when information is transferred from one specialist to another within an organization.&lt;/p&gt;

&lt;h2&gt;Good data, bad data, no data&lt;/h2&gt;

&lt;p&gt;Data is the fuel on which AI runs. A data-savvy organization uses data to define a problem and ensure that it goes to the right process and speeds your resolution.&lt;br&gt;
Conversely, an organization without well-managed data for AI has tons of blind spots. Not only does that increase that organization’s security risk, but it also drives up the cost of the service desk. Manual processes are costly; they require human input, and you have no way to control you spend. That type of organization also probably doesn’t know what software or hardware it has and is likely going to overspend there as well.&lt;/p&gt;

&lt;p&gt;In IT operations especially, accurate and complete data for AI is critical, because AI requires significant training. If you don't have the right data, your AI is not going to give you the right answers. And those data needs are continuous as well. It's not enough to have a single data source feeding your AI. You constantly have to feed it with the right data so it can detect changes over time and react appropriately and differently.&lt;/p&gt;

&lt;p&gt;Conflicting data within some data sources is another challenge you must resolve. As you bring data into a single data pool that you can learn from, you have to ensure that that data is reconciled.&lt;/p&gt;

&lt;p&gt;Ultimately, all these hurdles slow digital transformation within the organization. Visibility into and accuracy of the data is vital to the success of any AI investment. AI needs to be trusted. If it's making recommendations and predictions — even suggestions about how you resolve issues — trust in those outputs is vital. If you leave this unaddressed — if the accuracy of your data for AI is not correct and the predictions are not correct — it's really going to impact your return on investment and hinder digital transformation in your organization.&lt;/p&gt;

&lt;h2&gt;The first 4 steps to implementing AI&lt;/h2&gt;

&lt;p&gt;If you are considering how to leverage &lt;a href="https://www.ivanti.com/blog/artificial-intelligence-ai-will-impact-service-management"&gt;AI for service management&lt;/a&gt;&amp;nbsp;in your organization, you must address some critical initial steps:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Eliminate blind spots:&lt;/strong&gt; Remove the data gaps within your company by getting better visibility into your data assets, then monitoring those assets. Collecting and understanding the data that drives AI is a continual process — this isn’t a one-time deal. You have to continually ensure that you have the necessary data feeds coming into your AI solutions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Remove data silos:&lt;/strong&gt; To achieve more powerful outcomes from the data you acquire, you should not have just a single view of an asset. For a fuller, more rounded view of an asset, you must combine your data silos. Those include your asset inventory, asset management software inventory, data center inventory service maps, tickets, information, knowledge bases and monitoring logs. Commonality exists among all these types of data — which is one of the reasons organizations are turning to the power of platforms that provide data seamlessly across different applications.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Protect privacy:&lt;/strong&gt; Ensure that your data doesn't include sensitive or personal information in it, as that can be baked into the predictions and outcomes your AI delivers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create data governance:&lt;/strong&gt; Many organizations are crafting governance frameworks, policies and processes to set a standard and guidelines for how they use data — and they’re including AI data governance in that process.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;

&lt;p&gt;Read our interactive report “&lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;How AI is redefining IT service desk automation&lt;/a&gt;”&lt;/p&gt;
</description><pubDate>Wed, 19 Jun 2024 13:00:00 Z</pubDate></item><item><guid isPermaLink="false">378c5bbd-8700-4d9c-bfc4-53ffce949fde</guid><link>https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-pickering</atom:uri></atom:author><category>Artificial Intelligence</category><title>AI Knowledge Management: How to Use Generative AI for Knowledge Bases</title><description>&lt;p&gt;Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy.&lt;/p&gt;

&lt;p&gt;Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.&lt;/p&gt;

&lt;p&gt;One area in which gains can be immediate: &lt;a href="https://www.ivanti.com/glossary/knowledge-management"&gt;Knowledge management&lt;/a&gt;, which has traditionally been challenging for many organizations. However, AI-based knowledge management can deliver outstanding benefits – especially for IT teams mired in manually maintaining knowledge bases.&lt;/p&gt;

&lt;h2&gt;How generative AI and knowledge management intersect&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Generative AI&lt;/strong&gt; refers to a type of artificial intelligence that can create new content, such as images, video, text or music, based on existing data. It uses machine learning algorithms to analyze and learn from large datasets, then uses that to generate new content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Knowledge management&lt;/strong&gt; is the process of capturing, organizing and sharing knowledge within an organization. It involves collecting information from various sources, storing it in a centralized database and making it easily accessible to employees as needed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Many organizations carry out knowledge management manually, resulting in out-of-date or poorly written content. By automating knowledge management processes, generative AI can improve their efficiency and effectiveness.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Generative AI knowledge management benefits&lt;/h2&gt;

&lt;p&gt;Here are some of the specific ways generative AI can achieve these ends:&lt;/p&gt;

&lt;h3&gt;Automate creation of knowledge articles&lt;/h3&gt;

&lt;p&gt;Generative AI can automatically draft knowledge articles from existing data sources like product documentation, customer support tickets and employee training materials. This frees IT professionals for more strategic tasks, such as developing new knowledge management initiatives and improving existing articles.&lt;/p&gt;

&lt;p&gt;With &lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;56% of IT workers&lt;/a&gt; saying that helpdesk ticket volume is up, and 78% blaming hybrid/remote work for the jump, enhancing a knowledge base can enable quicker and more effective issue resolution and free teams to address more strategic tasks.&lt;/p&gt;

&lt;h3&gt;Create more personalized and engaging content&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI can personalize content for each user to improve his or her experience. Knowledge articles, particularly for HR, can be personalized by region or language. Being able to generate content unique to an employee persona will enhance that employee’s usage and experience.&lt;/p&gt;

&lt;h3&gt;Improve the quality of knowledge&lt;/h3&gt;

&lt;p&gt;Generative AI can identify and correct errors, add context and additional information to knowledge articles and archive outdated information. So, employees will only access accurate and up-to-date information.&lt;/p&gt;

&lt;h3&gt;Generate new ideas and insights&lt;/h3&gt;

&lt;p&gt;Generative AI can combine existing knowledge in new ways. For example, HR, Facilities and IT might all have articles about onboarding and offboarding employees. Generative AI can use these to produce a merged knowledge article that covers all three departments, so an employee won’t have to search through multiple articles.&lt;/p&gt;

&lt;h3&gt;Solve problems quicker&lt;/h3&gt;

&lt;p&gt;Generative AI can rapidly solve problems by identifying data patterns to help improve decision-making and performance. For instance, it might examine IT incidents over a given period and identify a common resolution for similar issues. It can then generate a knowledge article for service desk agents on how to expedite resolutions, or for employees on how to do so via self-service.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improve search accuracy&lt;/h3&gt;

&lt;p&gt;Generative AI can improve search accuracy by personalizing knowledge delivery based on each employee’s needs and preferences. Since an average worker spends &lt;a href="https://venturebeat.com/business/report-employees-spend-3-6-hours-each-day-searching-for-info-increasing-burnout/#:~:text=Special%20Issues%20Jobs-,Report%3A%20Employees%20spend%203.6%20hours%20each,searching%20for%20info%2C%20increasing%20burnout" rel="noopener" target="_blank"&gt;3.6 hours a day&lt;/a&gt; searching for information, any time savings here is a win that enhances their digital experience.&lt;/p&gt;

&lt;h3&gt;Enhance automation&lt;/h3&gt;

&lt;p&gt;Generative AI can help automate routine tasks, even those not directly related to creating knowledge management articles. Spiraling workloads are why &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;92% of IT workers&lt;/a&gt; see automation as “necessary” or “very necessary,” so identifying new ways of streamlining processes can free them from routine tasks to tackle other work while cutting costs.&lt;/p&gt;

&lt;h2&gt;Generative AI knowledge management drawbacks&lt;/h2&gt;

&lt;p&gt;Generative AI for knowledge management has the potential to revolutionize many industries and fields – but it’s not without issues that are important to address in implementation.&lt;/p&gt;

&lt;h3&gt;Security and privacy&lt;/h3&gt;

&lt;p&gt;AI knowledge management systems might contain sensitive or confidential information, so it's crucial to ensure they’re secured against cyberthreats. Also, there may be privacy concerns if the AI is generating content using personal or identifying information.&lt;/p&gt;

&lt;h3&gt;Quality and accuracy&lt;/h3&gt;

&lt;p&gt;While generative AI models can produce impressive outputs, quality and accuracy can vary widely depending on the quality of input data and task complexity.&lt;/p&gt;

&lt;h3&gt;Risk of misinformation&lt;/h3&gt;

&lt;p&gt;Generative AI can potentially produce incorrect or misleading information, leading to serious consequences for IT – for example, by introducing malware or incorrectly recommending turning off functionality used to secure the IT environment against malicious actors. Say a user is trying to install a printer driver and asks AI for help. Among its instructions, AI might tell the user to disable antivirus software or a firewall, providing a window for malware to be installed.&lt;/p&gt;

&lt;h3&gt;Dependence on AI-generated content&lt;/h3&gt;

&lt;p&gt;Companies that are too reliant on this may not prioritize human-generated content or critical thinking skills, potentially leading to lost expertise. Human oversight is still essential in validating and approving AI-generated outputs.&lt;/p&gt;

&lt;h3&gt;Data bias&lt;/h3&gt;

&lt;p&gt;Generative AI models can inadvertently reflect biases present in their training data, leading to skewed or inaccurate results. This can be an issue in knowledge management, where accuracy is critical. If an AI knowledge management model is trained on data predominantly from the United States, for instance, it may generate outputs less relevant to people in other countries.&lt;/p&gt;

&lt;h3&gt;Ethical concerns&lt;/h3&gt;

&lt;p&gt;These include potential bias in AI knowledge management training data, perpetuating existing inequalities.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Get the Interactive Report: &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;AITSM: How AI is Redefining IT Service Desk Automation&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Making AI knowledge management work&lt;/h2&gt;

&lt;p&gt;Despite the concerns, generative AI knowledge management can be a powerful tool. By carefully considering potential drawbacks and taking steps to mitigate them, organizations can make good use of generative AI in knowledge management.&lt;/p&gt;

&lt;p&gt;Here are five things to consider when deploying AI knowledge management:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identify data types used to train the generative AI model&lt;/strong&gt;: Identification of data types will help to ensure that the data used is accurate and reliable. Are you going to use existing knowledge articles, incident data, problem data or a combination of types?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ensure identified data is accurate, complete and up to date&lt;/strong&gt;: Generative AI is only as good as the data it's trained on; “garbage in, garbage out” still applies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monitor the output of your generative AI knowledge management model&lt;/strong&gt;: Check it for bias, misinformation, completeness and accuracy to ensure the information being generated is reliable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Develop policies and procedures to manage risks&lt;/strong&gt;: This is crucial to address issues such as data security, privacy, and ethical considerations in using generative AI for knowledge management.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Put an approval process in place&lt;/strong&gt;: Review and authorization must happen before any generated outputs are shared publicly.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Implementation tips for generative AI knowledge management&lt;/h2&gt;

&lt;p&gt;There’s no doubt that generative AI knowledge management can be a valuable tool – or that there’s still much to be learned about both its benefits and possible pitfalls.&lt;/p&gt;

&lt;p&gt;An organization must evaluate the potential impacts and pick an AI knowledge management solution that satisfies its distinct needs for privacy, accuracy, and security.&lt;/p&gt;

&lt;p&gt;That said, there are a few more best practices to support successful adoption:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Start small and scale up&lt;/strong&gt;: It's best to start with a small generative AI knowledge management pilot project, then scale up as you gain experience.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get buy-in from stakeholders&lt;/strong&gt;: It's important to get stakeholder buy-in before deploying generative AI to assure it's used effectively and its outputs are trusted.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Continuously improve the model&lt;/strong&gt;: It's vital to continuously enhance your AI knowledge management model by retraining it on new data and addressing any potential problems that might crop up.&lt;/p&gt;
</description><pubDate>Mon, 10 Jun 2024 20:33:57 Z</pubDate></item><item><guid isPermaLink="false">f1ee54f9-5ed1-4954-a7b6-2103ecc12a2a</guid><link>https://www.ivanti.com/blog/create-personalized-knowledge-articles-faster-and-smarter-with-gen-ai</link><atom:author><atom:name>Sirjad Parakkat</atom:name><atom:uri>https://www.ivanti.com/blog/authors/sirjad-parakkat</atom:uri></atom:author><category>Artificial Intelligence</category><title>Create Personalized Knowledge Articles Faster and Smarter with Gen AI</title><description>&lt;p&gt;Maintaining a deep catalog of knowledge articles to inform end users is an essential — yet often tedious — requirement for IT teams. But generative AI is offering a big assist.&amp;nbsp;&lt;br&gt;
&amp;nbsp;&lt;br&gt;
By using AI in knowledge bases, service desk agents who used to spend two or three hours creating each knowledge article from scratch can create drafts in minutes. And not only is today’s AI faster, but it also lets you personalize the knowledge you share — including translating your articles for a global workforce.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Now, you can tailor the knowledge you share based on context — on the persona the system is interacting with — to serve unique needs and preferences.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Why is this more important than ever? Because according to Ivanti research, more than three in four IT professionals say &lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;work stress is affecting their physical or mental health&lt;/a&gt;, and 68% say they feel burned out by their work. These mental stressors can drive up turnover and put pressure on productivity.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Removing some of the manual tasks previously required to manage your knowledge materials relieves a great burden from IT support personnel — while also improving the overall employee experience. A purpose-built knowledge management AI can automatically update an organization's knowledge base using existing helpdesk data, then turn the knowledge base into a helpful copilot for IT analysts, arming them with relevant information to handle higher-order tasks.&lt;/p&gt;

&lt;h2&gt;Multimodal models change the game&lt;/h2&gt;

&lt;p&gt;Early large language models (LLMs) were focused more on processing, meaning they were confined to solving linguistic tasks. New multimodal models can process much more — including audio and video.&lt;/p&gt;

&lt;p&gt;Gen AI can keenly analyze user behavior to provide personalized support and smart suggestions, for instance:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Multiple responses can be generated from a single document to personalize messages for diverse audiences and channels.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;By training gen AI with data from use cases across your company, it can then apply LLM to interpret queries from your end users, establish the best knowledge base match and retrieve the most relevant information.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Users expect everything they need to be available at their fingertips on their channel of choice. For instance, users might rely on a mobile communication application like Teams or Slack. However your users communicate, they expect the information to be presented on their channel of choice in a way they can quickly absorb.&lt;/p&gt;

&lt;p&gt;Say an IT team must troubleshoot an issue flagged by a digital assistant, a chatbot or a copilot. AI can support an intelligent ticket routing solution so the IT helpdesk can respond faster. And, when the ticket progresses to the next level, the AI solution can help automatically triage the ticket for resolution.&lt;/p&gt;

&lt;h2&gt;The three R’s guide AI for knowledge management&lt;/h2&gt;

&lt;p&gt;Guiding the lifecycle &lt;a href="https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices"&gt;management of knowledge articles using AI&lt;/a&gt; can be achieved easily by following these three principles, which I call the three R’s: relevance, revision, and retirement.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Relevance&lt;/strong&gt;: AI helps serve articles to users based on preference and usage and can recommend articles based on what is relevant for the user.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Revision&lt;/strong&gt;: AI can provide information about articles that are not being used much but could become more useful if the content is tweaked — and then be used to revise those articles.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Retirement&lt;/strong&gt;: AI can be used to indicate which articles simply need to be removed from circulation.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Five steps to writing knowledge articles with AI&lt;/h2&gt;

&lt;p&gt;Now that you know how AI can help your IT service desk automate the creation of knowledge articles, here's how I would approach creating a workflow to implement that capability.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Identify specific challenges and opportunities you want to address. Focus on your key pain points. You can start with a data-gathering brainstorming session that involves multiple departments in your organization all looking at your existing system.&lt;/li&gt;
	&lt;li&gt;Define clear goals and expectations for integrating AI into your knowledge management, such as increasing adoption of knowledge articles and improving productivity. Are you, for instance, trying to increase the number of knowledge articles in your database, or refresh a set number of knowledge articles while removing a specific number of outdated articles?&lt;/li&gt;
	&lt;li&gt;Choose the right AI technology for your knowledge system. For instance, you might introduce natural language processing, the semantic search vector DB, machine learning for predictive analytics, automatic recommendations or a chatbot that integrates well with your knowledge article solution.&lt;/li&gt;
	&lt;li&gt;Data security and access control. Make sure the data you provide is the most relevant and the most accurate and is presented in a well-structured manner to the AI. At the same time — since it is gathering data from different sources — it is vital to protect sensitive information and ensure you are complying with data privacy and other regulations. Ensure you put proper entitlement in place so users access only the information that they are allowed to view.&lt;/li&gt;
	&lt;li&gt;Finally, it comes down to execution. Start small by looking to solve a minimum sellable use case — a pressing pain point. Then, try that with your initial set of users in a phased rollout. Try to fail fast. If something doesn’t work, iterate through it. Gradually, you will be able to expand your user base to all parts of the business, then apply continuous monitoring.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Once you’re running comfortably, that’s when you’ll start seeking feedback from users. As you start seeing improvements in user experience and productivity, you’ll know you’re on the right track. Just keep iterating through that process, and you will see your efficiency take off.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read more in our report&lt;/strong&gt; “&lt;a href="https://www.ivanti.com/resources/research-reports/aitsm-redefining-it-service-desk-automation"&gt;How AI is redefining IT service desk automation&lt;/a&gt;”&lt;/p&gt;
</description><pubDate>Wed, 29 May 2024 13:00:00 Z</pubDate></item><item><guid isPermaLink="false">539e804f-ab26-4109-88c2-62ca2911782a</guid><link>https://www.ivanti.com/blog/covid-19-s-lasting-effect-on-cybersecurity-and-what-to-expect-in-the-new-year</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><category>Service Management</category><category>Security</category><title>COVID-19's lasting effect on cybersecurity and what to expect in the new year</title><description>&lt;p&gt;As 2020 comes to an end, it’s normal to reflect upon the year’s challenges, innovations, and achievements. When we look back on 2020, the hardships we all endured collectively across the globe seem to stack higher than other recent years. A pandemic swept across the world, rapidly shifting the ways we communicate, work, and connect with others. And hacks, scams, and ransomware attacks were at an all-time high.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Although this past year presented many challenges, there were some silver linings. At Ivanti,&amp;nbsp;&lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-acquires-mobileiron-and-pulse-secure" target="_blank"&gt;we recently acquired MobileIron and Pulse Secure&lt;/a&gt;, solidifying our position as a market leader in in Unified Endpoint Management, Zero Trust Security, and IT Service Management.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Here's a roundup from our experts on what to expect in 2021. With employees increasing working from anywhere – driving an explosive growth of endpoints, edge devices and data – and cybersecurity threats reaching catastrophic new heights, organizations must prepare for another busy year.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Everywhere Enterprise is here to stay&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“The enterprise is now everywhere - data resides everywhere, work takes place everywhere, and employees communicate with customers everywhere. People will continue working remotely from anywhere, not necessarily the office. We won't see 100% of companies go back to the office in 2021, and we also won't see 100% stay remote. Employees will have the autonomy to decide where they want to work — and enterprises will need to take the security measures needed to make it happen. The 2021 working persona will be someone who works on the go using a range of mobile devices, such as tablets and phones. The stagnant desktop employee will no longer be a reality.” – Bill Harrod,&amp;nbsp;VP of Public Sector&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“A hybrid work environment will be considered the gold standard and we will continue to see hybrid work environments leverage remote workers with on-site sessions to help drive innovation and employee mental health” -&amp;nbsp;Rex McMillan, Senior Director, Product Management&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“The world has been permanently changed by the COVID breakout in 2020 and the ripples will continue throughout 2021.&amp;nbsp; Lockdowns, working from home and remote learning for school will continue well into next year until a vaccine is largely distributed and immunity grows.&amp;nbsp; Activity in this highly disbursed/distributed computing environment will continue to grow for both good and bad. Productivity and social media software will flourish, filling the gap to keep people connected; the explosion of Zoom, WebEx, Chime and others were just the tip of the iceberg from 2020.&amp;nbsp; IT and security operations have been slowly adjusting their tools and processes but will rapidly accelerate in both areas in 2021.” - Todd Schell, Senior Product Manager&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hybrid cloud environments will be a prime target for hackers&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“The world has been shifting away from traditional networks to hybrid cloud-prem and device agnostic, an existing trend that was accelerated by COVID-19. Since COVID, perimeters have changed more drastically. Threat actors will continue to target remote workers. Remote Desktop Protocol (RDP) and Virtual Private Network (VPN) technologies alone will leave companies exposed. To regain control and provide more fluid perimeters to securely control who has access to applications and data, companies will turn to Zero Trust Access Control.” - Chris Goettl, Senior Director Product Management&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“The growing adoption of cloud services combined with the&amp;nbsp;&lt;a href="https://www.insiderintelligence.com/content/internet-users-spending-more-time-on-smartphones-laptops-amid-pandemic" target="_blank" rel="noopener"&gt;increased use of mobile devices and laptops&lt;/a&gt;&amp;nbsp;amid COVID-19 will make unsecured cloud users a prime target. Many companies use identity access management to combat potential security breaches, but the data part often goes unencrypted. We should expect to see hackers put a lot more emphasis on attacking web applications sitting on the cloud and applications that are distributed in nature. These actions will put a lot of pressure on information security groups, making it even more critical for companies to ensure there are no gaps or silos in their security strategy.” - Mike Riemer,&amp;nbsp;Global CTO&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;“In the new WFH era, we're constantly working on the go using a range of mobile devices, such as tablets and phones, relying on public Wi-Fi networks, remote collaboration tools, and cloud suites for work. As we settle into a new year of this reality, mobile workers will be the biggest security risk as they view IT security as a hindrance to productivity and believe that IT security compromises personal privacy.”&amp;nbsp;Bill Harrod,&amp;nbsp;VP of Public Sector&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Health institutions will be the most targeted group for ransomware attacks&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“Generally, as a vertical becomes more important, prominent attackers leverage it as their greatest opportunity — so it is no secret that hospitals will be a huge target for ransomware attacks in 2021. With increasing use of tele-medicine, sensitive patient data is flowing throughout modern mobile endpoints and legacy infrastructures 24/7, health institutions will be a hacker's dream.”&amp;nbsp;Bill Harrod,&amp;nbsp;VP of Public Sector&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“2020 saw the early threat actor forays with the expansion of ransomware riding on the desire of people to learn more about COVID. 2021 will have at least one major security breach with worldwide impact and will make the news across the globe.” - Todd Schell, Senior Product Manager&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“Security will become a priority in crisis management. Cyberattacks against healthcare organizations spiked during the pandemic. As organizations (not just in healthcare) assess lessons learned in the aftermath, disaster recovery and crisis management plans will elevate security measures that could compromise systems in future crises.” - Rob DeStefano, Senior Product Marketing Manager&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Automation will be the key to a successful cybersecurity program&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“Amid the growing cybersecurity skills gap, the broader theme in 2021 will be the increased adoption of technology that capitalizes on artificial intelligence and machine learning to automate key security functions. COVID-19 resulted in a massive, global shift to a remote workforce. However, next year we will enter a completely new normal when we start to see more workers return to the office while others, who are not yet able or willing to make the transition, remain home. This will result in a split that forces IT departments to handle the demands of both full-scale&amp;nbsp;on-premise&amp;nbsp;and full-scale remote access. The only way to be efficient in the new world of work will be to utilize solutions with automation capabilities instead of relying solely on in-house security teams. Companies will turn to newer technologies such as Zero Trust Network Access and Artificial Intelligence Markup Language (AIML) techniques to work smarter in leveraging their workforce.” -&amp;nbsp;Mike Riemer,&amp;nbsp;Global CTO&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“The needed move to modern management has been slow and cautious, but adoption of&amp;nbsp;InTune, Workspace One, Ivanti Neurons and similar tools will pick up pace to handle all the remote devices.&amp;nbsp; With the introduction of new software players and evolving security management processes, the door has opened wider for exploitation.” - Todd Schell, Senior Product Manager&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Delivering contextualized, personalized, consumer-like experiences in the enterprise will be crucial&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“Experience-centric service management will become a priority. Monitoring of employee productivity and IT ‘experience’ will increase in importance. The days of ‘IT Satisfaction Surveys’ are numbered, as the technology itself can help IT understand the real individual effectiveness of IT.” -&amp;nbsp;Simon Geddes,&amp;nbsp;Senior Director, Product Management&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;“In 2021, advances in AI and machine learning will allow devices to self-heal and self-secure by as much as 80%, allowing IT to set policies and know their devices and data are secure. Not only will this mean that IT can focus on transforming their business to be more competitive in their market,&amp;nbsp;users can&amp;nbsp;expect to receive a more ambient, personalized device experience where they can remain productive regardless of where they are working or the device they use.” - Alan Braithwaite, Senior Director, Product Management&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;2021 is the year when Ivanti, MobileIron, and Pulse Secure become better together as Ivanti. It’s the year that we enable organizations to proactively and autonomously self-heal, self-secure, and self-service devices in the everywhere enterprise. Security will become a priority in crisis management. Most importantly, our customers will collaborate and innovate more freely, while reducing the risk of data breaches and enhancing employee experiences. We look forward to helping our customers achieve bigger goals next year because we are committed, and We Are Ivanti.&amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 29 Dec 2020 16:52:02 Z</pubDate></item><item><guid isPermaLink="false">2a4493da-9a42-4ab9-8aff-3445eaca0d1d</guid><link>https://www.ivanti.com/blog/ivanti-neurons-get-more-synapses-sparking</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-destefano</atom:uri></atom:author><category>Artificial Intelligence</category><title>Ivanti Neurons Get More Synapses Sparking</title><description>&lt;p&gt;I&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;t’s been a whirlwind of excitement since our Ivanti Neurons announcement last month. We’ve been delighted by the responses received from customers, partners, and industry press. Among the many thoughts shared back, the ideas organizations have for solving operational challenges are getting creative. And why not? Imagine the possibilities with a platform that offers so much power to discover, manage, secure and service endpoints from the cloud to the edge.&lt;/p&gt;

&lt;h3&gt;Hyper for Automation&lt;/h3&gt;

&lt;p&gt;Sure, automation has been around a while – workflow automation has been helping various areas in organizations for years. But hyper-automation is different. It’s bringing the collaborative robot, or “cobot” experience into the realm of IT service in a way previously dependent on manual human intervention. These automation-powered bots have the ability to anticipate and respond to users’ requests within the context of a dialogue. IT staff are equally hyped about &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-healing" target="_blank"&gt;Ivanti Neurons for Healing&lt;/a&gt; because hyper-automation opens up career growth – replacing routine, reactive tasks with more dynamic projects that keep each day different from the last.&lt;/p&gt;

&lt;h3&gt;Forward-Thinking Insights&lt;/h3&gt;

&lt;p&gt;The potential for technological expansion is only limited by boundaries set in the mind. The accelerated migration to remote work has added proof to boundless connectivity and a future where work is done anytime, from anywhere. So, how do you keep end users productive, today and tomorrow? &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-edge-intelligence" target="_blank"&gt;Ivanti Neurons for Edge Intelligence&lt;/a&gt; keeps a real-time focus on the performance of users’ devices, providing the details necessary for IT analysts to keep systems optimized. And when there is an incident, the aggregated insights help determine whether an outage is isolated to a user, or a situation affecting a larger population, and speed the time to resolution. This kind of more flexible, responsive (even predictive) support is the opportunity to change the relationship between end users and IT.&lt;/p&gt;

&lt;h3&gt;Intelligence and Awareness&lt;/h3&gt;

&lt;p&gt;Most of us can appreciate the experience of bringing a car to the repair shop, only for the auto mechanic to tell us “I ran some diagnostics, but couldn’t get the car to do what you described”. Many of us have experienced the same with our office tech – the slow login, the app that crashes (but only sometimes), the infamous blue screen. In the past, we have opened IT tickets, and maybe the problem is able to be reproduced by the support analyst. The &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-workspace" target="_blank"&gt;Ivanti Neurons Workspace&lt;/a&gt; disrupts the historical pattern of diagnostics. It is designed with operational awareness to collect real-time data equipping first line analysts with the information to resolve more issues, faster. Think not only of the time savings for both IT and the end user, but the cost savings that comes from reducing the escalations previously sent up to specialists.&lt;/p&gt;

&lt;h3&gt;“A-ha!” Moments&lt;/h3&gt;

&lt;p&gt;Discovering new devices is a cornerstone of endpoint management – not to mention security. Preventing a rogue device from introducing threats to the enterprise go back to even before infamous security breaches from the mid-2000’s. Now, with &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-discovery" target="_blank"&gt;Ivanti Neurons for Discovery&lt;/a&gt;, there are really unique new ways to use this same detection capability. The easy discovery example is the employee who has bought a new device. The device easily becomes associated with its users at first connection – IT then recognizes and knows it belongs. More unique use cases incorporate nuances resulting from the pandemic and incorporating them with security. Consider the vendor arriving onsite at an office location. As the visitor’s vehicle is shifted into Park, the driver’s mobile device receives an alert from the office’s facilities management department asking them some COVID-19 clearance questions. That device is not only discovered, but now has been tethered to an authorized site guest, identifying him/her as being on the corporate campus and confirmed healthy for building entry.&lt;/p&gt;

&lt;p&gt;By now, the wheels of imagination are spinning in your own mind. You know you need to keep pace with the explosive growth of data and devices we’re witnessing. What cool, new ways will you address an increasingly remote work environment? How can you entice Gen-Z talent with a more consumer-like experience? Let’s keep brainstorming. We’re excited to build these ideas together!&lt;/p&gt;
</description><pubDate>Fri, 21 Aug 2020 15:11:28 Z</pubDate></item><item><guid isPermaLink="false">87006412-3b2b-4811-a90e-0b0c799c3cc7</guid><link>https://www.ivanti.com/blog/ivanti-neurons-recap-summer-2020-s-greatest-hits</link><atom:author><atom:name>Ashtyn Creel</atom:name><atom:uri>https://www.ivanti.com/blog/authors/ashtyn-creel</atom:uri></atom:author><category>Artificial Intelligence</category><title>Ivanti Neurons Recap: This Summer's Greatest Hits</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;It's been an eventful few months at Ivanti! If you need a refresher, we've got the ICYMI&amp;nbsp;version below.&lt;/p&gt;

&lt;h3&gt;July 21: Ivanti Neurons Launch&lt;/h3&gt;

&lt;p&gt;The sizzle began with the&amp;nbsp;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;Ivanti Neurons&lt;/a&gt; launch in July. Maybe you didn't hear about Ivanti Neurons, in which case we'll&amp;nbsp;just assume you had no Internet access... or were in a coma.&amp;nbsp;Because even someone in&amp;nbsp;the remote vicinity of a laptop or smartphone was&amp;nbsp;picking up on&amp;nbsp;the buzz of Ivanti Neurons.&amp;nbsp;See all of the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog" target="_blank"&gt;Ivanti Neurons blogs here,&lt;/a&gt;&amp;nbsp;or check out some of our favorites below:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-big-changes" target="_blank"&gt;Introducing the Ivanti Neurons Platform to Self‑Heal, Self‑Secure, and Self‑Service&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/ashtyn-creel" target="_blank"&gt;Ashtyn Creel&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/hyper-automation-competitive-advantage" target="_blank"&gt;Hyper-Automation is Your Next Competitive Advantage&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/daren-goeson" target="_blank"&gt;Daren Goeson&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-healing" target="_blank"&gt;Ivanti Neurons for Healing: Shift All the Way Left to Self-Healing&lt;/a&gt;&amp;nbsp;by &lt;a href="https://www.ivanti.com/blog/authors/alan-braithwaite" target="_blank"&gt;Alan Braithwaite&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-self-securing" target="_blank"&gt;Evolving Your Security Strategy Toward Self-Securing With Ivanti Neurons&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/chris-goettl" target="_blank"&gt;Chris Goettl&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-self-servicing" target="_blank"&gt;Ivanti Neurons: Beyond Self Service, Beyond Omnichannel to Self-Servicing&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/ian-aitchison" target="_blank"&gt;Ian Aitchison&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-discovery" target="_blank"&gt;Ivanti Neurons for Discovery: The Single Source of Truth in Minutes, Not Days&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="http://Mareike Fondufe" target="_blank" rel="noopener"&gt;Mareike Fondufe&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-edge-intelligence" target="_blank"&gt;Ivanti Neurons for Edge Intelligence for Our Fast-Changing Future&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog" target="_blank"&gt;Mike Mosley&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/workspace-control-ivanti-neurons" target="_blank"&gt;Workspace Control Now With Ivanti Neurons for Edge Intelligence&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/david-murray" target="_blank"&gt;David Murray&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/cybersecurity-ivanti-neurons" target="_blank"&gt;Adapting Your Cybersecurity Habits With Ivanti Neurons&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog" target="_blank"&gt;Margie Callard&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/ivanti-neurons-workspace" target="_blank"&gt;Ivanti Neurons Workspace: Deliver Faster Resolutions Without Disrupting Your Customers&lt;/a&gt;&amp;nbsp;by&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/authors/david-martinez" target="_blank"&gt;David Martinez&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;July 23: Strategic Partnership with Intel vPro&lt;/h3&gt;

&lt;p&gt;On the heels of the Ivanti Neurons launch, we announced a&amp;nbsp;new&amp;nbsp;strategic partnership with Intel.&amp;nbsp;Intel&amp;nbsp;Endpoint Management Assistant (Intel&amp;nbsp;EMA) now integrates with the Ivanti Neurons hyper-automation platform in a partnership that&amp;nbsp;enables IT organizations to self-heal and self-secure with Intel vPro&amp;nbsp;platform-based devices—both inside and outside of the corporate firewall. Read more in the &lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-and-intel-strategic-partnership" target="_blank"&gt;press release&lt;/a&gt; or the &lt;a href="https://www.ivanti.com/blog/intel-ivanti-strategic-partnership" target="_blank"&gt;blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;July 30:&amp;nbsp;Extended Partnership with Qualys VMDR Platform&lt;/h3&gt;

&lt;p&gt;On July 30&amp;nbsp;we announced&amp;nbsp;the integration of Ivanti&amp;nbsp;Patch Management technology within the Qualys VMDR&amp;nbsp;(Vulnerability Management Detection Response) platform. As a result, customers will be able to quickly detect vulnerabilities—from endpoint to datacenter—and automatically deploy expertly pre-tested Mac patches across dozens of third-party applications.&amp;nbsp;Read more in the &lt;a href="https://www.ivanti.com/company/press-releases/2020/qualys-ivanti-extended-partnership" target="_blank"&gt;press release&lt;/a&gt; or the &lt;a href="https://www.ivanti.com/blog/qualys-ivanti" target="_blank"&gt;blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;August 4: Ivanti Neurons Integrates with Splunk Security Operations Suite&lt;/h3&gt;

&lt;p&gt;It was just a week later that we announced the integration of the Ivanti Neurons platform with Security Operations Suite solution enabled by Ivanti’s integrations with Splunk Enterprise Security (SIEM) and Splunk Phantom (SOAR), two core components of the Splunk suite. Read more in the &lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-integrates-ivanti-neurons-platform-with-spl" target="_blank"&gt;press release&lt;/a&gt; or the &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-splunk" target="_blank"&gt;blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;August 11:&amp;nbsp;Ivanti Launches Biometric Authentication, Self‑Service Automation Bots and Automated Asset Discovery&lt;/h3&gt;

&lt;p&gt;Using the power of Ivanti Neurons, we recently released enhanced capabilities for the &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm" target="_blank"&gt;Ivanti Enterprise Service Management&lt;/a&gt; portfolio. The new releases give service desks greater visibility to actionable information across their device estate to improve the accuracy, speed, and efficiency of services delivered. Read more in the &lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-esm-ivanti-neurons-enhanced-capabilities" target="_blank"&gt;press release&lt;/a&gt; or the &lt;a href="https://www.ivanti.com/blog/ivanti-service-asset-management-enhancements" target="_blank"&gt;blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;August 13: Clearlake Capital‑backed Ivanti Announces Strategic Investment from TA Associates&lt;/h3&gt;

&lt;p&gt;On August 13 we announced&amp;nbsp;that TA Associates, a leading global growth private equity firm,&amp;nbsp;signed a definitive agreement to make a strategic growth investment. The funding will provide additional capital that will enable Ivanti to increase its investment in innovation, accelerate its global growth, and continue its acquisition strategy. Read more in the &lt;a href="https://www.ivanti.com/company/press-releases/2020/clearlake-capital-backed-ivanti-announces-strategic-investment-from-ta-associates-to-accelerate-company-s-growth" target="_blank"&gt;press release&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 21 Aug 2020 02:43:52 Z</pubDate></item><item><guid isPermaLink="false">63b8e4cc-a4af-4bed-92e2-9d34edc4d215</guid><link>https://www.ivanti.com/blog/ivanti-neurons-workspace</link><atom:author><atom:name>David Martinez</atom:name><atom:uri>https://www.ivanti.com/blog/authors/david-martinez</atom:uri></atom:author><category>Endpoint Management</category><category>Artificial Intelligence</category><category>Service Management</category><category>Security</category><title>Ivanti Neurons Workspace: Deliver Faster Resolutions Without Disrupting Your Customers</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;When was the last time an IT conversation reminded you of the movie “Casablanca”? That happened to me recently when I was talking with another IT professional about Ivanti Neurons. We discussed how Ivanti Neurons will make life easier for IT by delivering more &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-self-servicing" target="_blank"&gt;self-servicing&lt;/a&gt;, &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-healing" target="_blank"&gt;self-healing&lt;/a&gt;&amp;nbsp;and &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-self-securing" target="_blank"&gt;self-securing&lt;/a&gt;&amp;nbsp;experiences. He agreed &lt;a href="https://www.ivanti.com/blog/ivanti-big-changes" target="_blank"&gt;Ivanti Neurons&lt;/a&gt; would be a big help reducing incidents but then said, “We’ll always have tickets.” Ok, maybe this isn’t on the same level as “We’ll always have Paris” but cue the Casablanca flashback.&lt;/p&gt;

&lt;p&gt;He was correct, of course. End users will still have issues IT will need to resolve. But add rising expectations for better customer-service experiences, ideally resolving incidents without any disruption or escalation delays, and the demands on the first-line team keeps growing.&lt;/p&gt;

&lt;p&gt;Helping the first-line team do more on their own is one outcome &lt;a href="https://www.ivanti.com/products/ivanti-neurons-workspace" target="_blank"&gt;Ivanti Neurons Workspace&lt;/a&gt; delivers. IT teams using Ivanti Neurons Workspace are finding it’s helping them become more efficient and effective, and greatly reduce escalations by safely providing first-line teams with the required tools for more first-call resolutions, using automated tasks pre-defined by specialists, so they can resolve incidents faster and easier, and deliver great experiences to end users.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons Workspace augments IT teams by providing—in a ‘single pane of glass’—the real-time device and end-user insights provided by &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-for-edge-intelligence" target="_blank"&gt;Ivanti Neurons for Edge Intelligence&lt;/a&gt;, with automation-powered bots for pre-defined actions, and also full remote control functionality for those times when IT just needs to reach out and take control.&lt;/p&gt;

&lt;p&gt;Offering examples always helps me understand a new solution. Let me share a few where Ivanti Neurons Workspace has delivered better IT outcomes and end-user experiences.&lt;/p&gt;

&lt;h3&gt;“I was misinformed”&lt;/h3&gt;

&lt;p&gt;How often does your team start working an incident by asking the end user a bunch of questions to figure out what’s going on? Often the end user may not know the answers, or your analyst must guide them through the steps, especially now since ‘just stopping by’ isn’t an option these days. Or your analyst needs to use several tools to discover what’s going on, and you have a recipe for an engagement that may take a while before the end user is back to work and the analyst can move onto other tasks.&lt;/p&gt;

&lt;p&gt;The ‘After’ picture with Ivanti Neurons Workspace is much easier. First-line analysts have immediate access to key IT information on users and their devices, such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;All associated devices for the user&lt;/li&gt;
	&lt;li&gt;Device state, including running processes and services&lt;/li&gt;
	&lt;li&gt;Active Directory status&lt;/li&gt;
	&lt;li&gt;Group memberships&lt;/li&gt;
	&lt;li&gt;Incident history by user or device&lt;/li&gt;
	&lt;li&gt;Installed software, applications, and patches&lt;/li&gt;
	&lt;li&gt;Network status&lt;/li&gt;
	&lt;li&gt;Application connectivity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All this information and more is presented to an analyst in one screen, sometimes faster than if the analyst had the device in front of them. Add in the ability to ‘drill down’ into specific attributes, all without bothering or asking the end user to do anything. Your analysts will be a big step ahead in figuring out what’s going on and understanding the end user’s experience.&lt;/p&gt;

&lt;h3&gt;“Round up the usual suspects”&lt;/h3&gt;

&lt;p&gt;Quick insight is the first step to resolving incidents. Most incidents aren’t unique, so there are likely common actions a specialist could take to resolve incidents and requests. Ivanti Neurons Workspace safely provides many of these specialist-level actions to the first-line analyst within the context of an incident without providing full access. Such actions include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Resetting passwords&lt;/li&gt;
	&lt;li&gt;Unlocking accounts&lt;/li&gt;
	&lt;li&gt;Changing or assigning group memberships&lt;/li&gt;
	&lt;li&gt;Flushing the DNS&lt;/li&gt;
	&lt;li&gt;Updating drivers&lt;/li&gt;
	&lt;li&gt;Stopping processes and services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These actions employ the same automation engine as used with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-healing" target="_blank"&gt;Ivanti Neurons for Healing&lt;/a&gt; so the underlying workflows can likewise be updated, extended, or created anew to provide more automated actions to augment first-line analysts. If an incident isn’t one the first-line analyst can resolve, it can be escalated to a specialist with all the actions and diagnostic information logged.&lt;/p&gt;

&lt;p&gt;One example is repairing a device encountering too many crashes or BSOD (Blue Screen of Death). Okay, one crash may be too many, but several is obviously too many. Either way, having the BSOD dump files helps IT diagnose the cause. A workflow in Ivanti Neurons Workspace could reach out to the device, get the needed files, compress them, and send them in an email to IT, all without bothering the end user or doing a remote session. The end user keeps on working while IT analyzes the dump files.&lt;/p&gt;

&lt;h3&gt;“Play it, Sam”&lt;/h3&gt;

&lt;p&gt;The extensibility of Ivanti Neurons Workspace means IT teams will be able to automate more and more diagnostic and remediation activities and make them more easily and safely available to first-line analysts. Your specialists can develop the automated actions the first-line team needs to resolve more issues on their own, turning escalations into first-call resolutions.&lt;/p&gt;

&lt;p&gt;And with fewer escalations, specialists will have more time to conduct other investigations and innovations. Take the earlier BSOD example. Specialists could use Ivanti Neurons to see if other similar devices are having too many BSODs, identify those devices, analyze their dump files (again, without bothering end users), and see if there’s a common cause, like a device driver that needs updating. &amp;nbsp;Oh, and that driver update? That can be automated with Ivanti Neurons Workspace as well.&lt;/p&gt;

&lt;h3&gt;“I think this is the beginning of a beautiful friendship”&lt;/h3&gt;

&lt;p&gt;Ivanti Neurons Workspace, along with the rest of the Ivanti Neurons solutions, promises to make IT more efficient and effective. Some IT teams are already seeing results such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Deeper device and user insight in real time&lt;/li&gt;
	&lt;li&gt;Faster issue resolutions&lt;/li&gt;
	&lt;li&gt;Fewer escalations&lt;/li&gt;
	&lt;li&gt;Quicker identification of problem trends&lt;/li&gt;
	&lt;li&gt;Greater security compliance&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And delivering more “Shift Left” outcomes and exceptional user experiences.&lt;/p&gt;

&lt;p&gt;Learn more and see Ivanti Neurons Workspace in action&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-workspace" target="_blank"&gt;here.&lt;/a&gt; Hopefully it’ll be the beginning of a beautiful friendship.&lt;/p&gt;
</description><pubDate>Tue, 18 Aug 2020 10:44:04 Z</pubDate></item><item><guid isPermaLink="false">78ae6626-0361-4c7c-ace6-9dddacae24cd</guid><link>https://www.ivanti.com/blog/cybersecurity-ivanti-neurons</link><atom:author><atom:name>Ivanti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/ivanti</atom:uri></atom:author><category>Security</category><category>Artificial Intelligence</category><title>Adapting Your Cybersecurity Habits With Ivanti Neurons</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;Tuesday morning you roll out of bed, turn off your alarm, tiptoe down the stairs, retrieve your paper, flip the hallway lights on, feed the dog, and start making coffee—in five minutes. Performing this series of early-morning tasks is called &lt;a href="https://www.medicalnewstoday.com/articles/320874#Bookending-neural-signals" target="_blank" rel="noopener"&gt;chunking&lt;/a&gt;. Certain neurons in the brain “bookend” the habit for you, signaling the routine has started (the alarm) and ended (coffee). This chunking helps you perform habits each day almost unconsciously, giving your brain more time to learn and potentially create new habits.&lt;/p&gt;

&lt;h3&gt;Survey Says: Adapt&lt;/h3&gt;

&lt;p&gt;Have you formed any new habits recently to help your security program advance? &amp;nbsp;&lt;/p&gt;

&lt;p&gt;A recent Ivanti &lt;a href="https://www.ivanti.com/blog/survey-remote-work" target="_blank"&gt;remote work survey&lt;/a&gt; cited 66% of IT professionals experienced a rise in security issues this year since the workforce became mostly remote. In another study, more than &lt;a href="https://threatpost.com/half-iot-devices-vulnerable-severe-attacks/153609/" target="_blank" rel="noopener"&gt;half of IoT devices&lt;/a&gt; were found vulnerable to either medium- or severe-rated attacks. And earlier this year, a hacker published a list of credentials for more than &lt;a href="https://www.zdnet.com/article/hacker-leaks-passwords-for-more-than-500000-servers-routers-and-iot-devices/" target="_blank" rel="noopener"&gt;500,000 home routers, servers, and IoT devices&lt;/a&gt;. What is clear: threat actors have adapted to the recent climate and are pursuing your unsecured endpoints, old routers, and unencrypted VPNs. You must adapt as well.&lt;/p&gt;

&lt;h3&gt;Forming New Habits: Self-Secure&lt;/h3&gt;

&lt;p&gt;Intelligent organizations understand security should not be a reactive pursuit, but an adaptive, ever-changing function. You&amp;nbsp;cannot predict&amp;nbsp;every&amp;nbsp;cybersecurity&amp;nbsp;attack, but&amp;nbsp;you can prepare. Enterprises should adapt&amp;nbsp;to&amp;nbsp;respond to&amp;nbsp;threats they&amp;nbsp;face&amp;nbsp;as well as&amp;nbsp;anticipate&amp;nbsp;future ones.&amp;nbsp;One&amp;nbsp;way&amp;nbsp;to&amp;nbsp;prepare is to follow&amp;nbsp;the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/security-better-together" target="_blank"&gt;CIS Critical Security Controls&amp;nbsp;best practices&lt;/a&gt;. The&amp;nbsp;top five&amp;nbsp;controls are the most important:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;inventory and control your hardware assets&lt;/li&gt;
	&lt;li&gt;inventory and control your software&amp;nbsp;assets&lt;/li&gt;
	&lt;li&gt;apply continuous vulnerability management practices&lt;/li&gt;
	&lt;li&gt;control the use of administrative privileges&lt;/li&gt;
	&lt;li&gt;implement and manage the security configurations of your devices&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The other smart thing to do is respond sooner. Most threat actors exploit vulnerabilities within&amp;nbsp;a&amp;nbsp;median of&amp;nbsp;22 days&amp;nbsp;and most exploits have a seven-year shelf life according to a research study from &lt;a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1751/RAND_RR1751.pdf" target="_blank" rel="noopener"&gt;RAND&lt;/a&gt;. The longer you take to patch, the more vulnerable&amp;nbsp;you become.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In order to adapt, take steps to also become self-secure. At Ivanti we help our customers adapt into a self-securing stance to better understand threats. We break down our self-securing offering into three parts: sensing, prioritization, and remediation.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Sensing &lt;/strong&gt;what’s in your environment includes discovering and detecting items such as software and devices. This stage analyzes vulnerabilities, and continuously monitors for change.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Prioritization&lt;/strong&gt; involves seeing what is actively being exploited and responding to risk in the right order. Algorithms using predictive methodologies help anticipate changes and give guidance on the best strategies to resolve challenges.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Remediation&lt;/strong&gt; determines what actions will fix the problem based on prioritized risk. Assessment of threats need to adapt to environments and circumstances. The more automated responses become, the easier it is to combat threat actors.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For more information on these steps, Ivanti’s patch management expert Chris Goettl reviews these steps in more &lt;a href="https://www.ivanti.com/blog/ivanti-neurons-self-securing" target="_blank"&gt;detail&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Applying Security Habits&lt;/h3&gt;

&lt;p&gt;Our self-secure adaptive design is part of Ivanti’s overall hyper-automation platform, Ivanti Neurons. Security plays a role throughout each component of this offering:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;Ivanti Neurons for Discovery&lt;/a&gt; finds and inventories all IT assets in real time to improve clients’ security posture.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-edge-intelligence" target="_blank"&gt;Ivanti Neurons for Edge Intelligence&lt;/a&gt; helps with endpoint encryption and device queries to obtain real-time operational awareness.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-healing" target="_blank"&gt;Ivanti Neurons for Healing&lt;/a&gt; detects if endpoints and edge devices have potential security vulnerabilities so they can be remediated automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here’s an example of security in action from one of our manufacturing customers of Ivanti Neurons for Healing. This customer had challenges receiving laptops back from former employees. In one case a former employee was 3,000 miles away. Typically, 30% of assets are “ghost” assets that are lost or unaccounted for. These types of “ghost assets” cause data and security risks. The Ivanti team helped our customer disable the accounts in question by locking laptops and rebooting the machines remotely. Within hours, our customer received notifications indicating laptops were shipping back to corporate. As a result, Ivanti improved the customer’s overall security posture.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Conclusion&lt;/h3&gt;

&lt;p&gt;Cybersecurity threats will remain challenging as remote working extends and data from endpoints and edge devices grows. Ivanti can help you adapt your habits into a self-securing stance. For assistance,&amp;nbsp;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;request your free Ivanti Neurons trial&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 12 Aug 2020 20:46:29 Z</pubDate></item><item><guid isPermaLink="false">991ff0a8-c9e4-4177-9b24-6db21d7d4ed4</guid><link>https://www.ivanti.com/blog/ivanti-neurons-for-edge-intelligence</link><atom:author><atom:name>Ivanti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/ivanti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><title>Ivanti Neurons for Edge Intelligence for Our Fast-Changing Future</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;The demands on enterprise IT are set to grow exponentially.&lt;/p&gt;

&lt;h3&gt;The Edge Comes into View&lt;/h3&gt;

&lt;p&gt;Edges. Many times, they represent an unknown—like the edge of space or a horizon for sea captains and pilots. And they give us mixed feelings—fear, anxiousness, direction, a sense of adventure. Most often, they represent a future state or location we are moving towards.&lt;/p&gt;

&lt;p&gt;For IT there is a new edge. The Edge of computing. The place where things and people are connecting with our networked digital world. Devices of all kinds, the next generation of workers, automated bot assistants! And as IT professionals, that future place or state is rapidly coming into view. &lt;a href="https://infohub.delltechnologies.com/l/edge-to-core-and-the-internet-of-things-2/internet-of-things-and-data-placement/#:~:text=A%20forecast%20by%20International%20Data,never%20have%20heard%20of%20IoT." rel="noopener" target="_blank"&gt;It’s predicted that 41.6 billion connected devices&lt;/a&gt;, or “things,” will be generating 79.4 zettabytes (ZB) of data by 2025 .&lt;/p&gt;

&lt;p&gt;This rapid growth creates IT complexities in the forms of ongoing management and integration challenges, which not only affect devices but IT staff and end-user experiences. You might be asking how your IT team will adapt. What could you do if you were connected at the Edge?&lt;/p&gt;

&lt;h3&gt;Life on the Edge&lt;/h3&gt;

&lt;p&gt;Ivanti’s solution to these questions? One way is to help organizations mature from basic automation to a fusion of hyper-automation and deep learning capabilities. With this, organizations can self-heal and self-secure devices, and self-service end-users proactively, predictably, and continuously.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Edge Intelligence leverages our hyper-automation platform approach, making it easy for today’s IT Analyst to query all devices, in seconds, to get real-time insights, connecting them with users and devices from cloud to edge. And smart dashboards provide quick operational awareness to provide real-time insights that can lead to immediate action.&lt;/p&gt;

&lt;h3&gt;A Case for Edge Intelligence&lt;/h3&gt;

&lt;p&gt;Consider the following example. If company employees were experiencing excessive logon times to their devices, which hurts productivity, how would you know unless they submitted a ticket? Would you be able to determine whether this is an isolated event, or a larger systematic issue without a surge in help desk requests? With Edge Intelligence, you’d receive logon-time breakdowns across all on-prem, cloud, and edge devices. You’d see if the incident was singular or happening company-wide and be able to take the proper actions quickly to remediate.&lt;/p&gt;

&lt;p&gt;In this actual enterprise example, the cause of excessive logon times was identified as single-threaded logon scripts and many Group Policies being used for desktop configuration. Quickly identifying and fixing the issue improved logon times to just seconds instead of minutes.&lt;/p&gt;

&lt;h3&gt;Wrapping Up&lt;/h3&gt;

&lt;p&gt;As it seems with emerging technologies, we’ve heard a lot about the future of the Edge over the years. Well, the Edge is now in sight.&lt;/p&gt;

&lt;p&gt;Organizations can benefit greatly from Edge Intelligence and the power of hyper-automation. Accurately and quickly identifying the issues and moving to swift remediation reduces costs and improves IT teams and end-user experiences. In short, it’s a competitive advantage by limiting loss of productivity within your organization.&lt;/p&gt;

&lt;p&gt;I asked myself the other day—do I have any IoT Edge devices at home? I had never given much thought to it, and I surprised myself by identifying four such devices, which was 25% of all my connected devices in my home. All connected to the same network I connect to every day while working from home. The growth is real.&lt;/p&gt;

&lt;h3&gt;Next Steps&lt;/h3&gt;

&lt;p&gt;Learn more and see Ivanti Neurons for Edge Intelligence in action &lt;a href="https://www.ivanti.com/products/ivanti-neurons-edge-intelligence"&gt;here.&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Thu, 06 Aug 2020 22:00:04 Z</pubDate></item><item><guid isPermaLink="false">c5e24062-3d35-4942-a7a0-75388f1398bb</guid><link>https://www.ivanti.com/blog/ivanti-neurons-splunk</link><atom:author><atom:name>Ashtyn Creel</atom:name><atom:uri>https://www.ivanti.com/blog/authors/ashtyn-creel</atom:uri></atom:author><category>Artificial Intelligence</category><category>Service Management</category><category>Security</category><title>Ivanti Integrates Ivanti Neurons Platform with Splunk Security Operations Suite</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;We have unveiled several exciting announcements recently, from the&amp;nbsp;launch of&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/ivanti-big-changes" target="_blank"&gt;Ivanti Neurons&lt;/a&gt;&amp;nbsp;to all of our strategic partnerships and integrations (see the details on&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/intel-ivanti-strategic-partnership" target="_blank"&gt;Intel&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/qualys-ivanti" target="_blank"&gt;Qualys&lt;/a&gt;). In fact, we have had so much content to announce that we've needed to create a whole &lt;a href="https://www.ivanti.com/blog" target="_blank"&gt;new blog&amp;nbsp;category&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;But this train is not slowing down any time soon.&lt;/p&gt;

&lt;h3&gt;Ivanti Integrates Ivanti Neurons Platform with Splunk Security Operations Suite&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-integrates-ivanti-neurons-platform-with-spl" target="_blank"&gt;Today we announced&lt;/a&gt; that&amp;nbsp;the Ivanti Neurons&amp;nbsp;platform now integrates with the&amp;nbsp;&lt;a href="https://www.splunk.com/" target="_blank" rel="noopener"&gt;Splunk&amp;nbsp;Security Operations Suite&lt;/a&gt;.&amp;nbsp;Together, the solution enables organizations to realize an autonomous edge, which offers hyper-automated self-healing, self-securing and self-service capabilities. The solution is enabled by Ivanti’s integrations with Splunk Enterprise Security (SIEM) and Splunk Phantom (SOAR), two core components of the Splunk suite.&lt;/p&gt;

&lt;p&gt;From&amp;nbsp;Nayaki Nayyar, executive vice president and chief product officer, Ivanti:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“With the explosive growth of endpoints, edge devices and remote workers, IT operations and security teams need to apply advanced automation to improve workflow, auto-remediate security issues and enhance the remote user experience. By integrating the hyper-automated Ivanti Neurons platform with Splunk Security Operations Suite, we are taking a big step towards enabling truly self-healing autonomous edge so that enterprises can increase speed and accuracy of services delivered to end users.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Ivanti Neurons integration with the Splunk Security Operations Suite automates the discovery, management, and security of broadly heterogeneous endpoint environments. Triggered alerts for endpoint events are analyzed, correlated with other security data and visualized in Splunk Enterprise Security. Prioritized endpoint events are automatically passed on to Splunk Phantom for enhancement and the automated generation of enriched remediation tickets in Ivanti Service Manager. This enables teams to fully automate the discovery, monitoring and servicing of a broad array of traditional and modern endpoints.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This Ivanti Neurons integration with the Splunk Security Operations Suite is available now for customers licensed on both solutions.&amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 04 Aug 2020 20:15:39 Z</pubDate></item><item><guid isPermaLink="false">3d4fdbe9-5afb-4b33-b9c2-60777e32c002</guid><link>https://www.ivanti.com/blog/ivanti-neurons-for-discovery</link><atom:author><atom:name>Mareike Fondufe</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mareike-fondufe</atom:uri></atom:author><category>Artificial Intelligence</category><category>Service Management</category><category>Security</category><category>Endpoint Management</category><title>Ivanti Neurons for Discovery: The Single Source of Truth in Minutes, Not Days</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;Who doesn’t like a good ole’ game of “Guess how many M&amp;amp;Ms or marbles are in that jar”? Are you off by 20, 50, or by a couple hundred? Or maybe you’re fairly close estimating the number of spheres in a confined space. Now think about your IT assets in your organization. Are all of them accounted for? Where are they located? Take a guess. Guess again. A miss is as good as a mile.&lt;/p&gt;

&lt;p&gt;Keeping track of all your IT assets, understanding what hardware and software is used, and keeping them protected is not an easy feat. Now add on the next layer of complexity with more remote devices and edge devices accessing your network. Employees working anytime, connecting from anywhere, requiring contextual awareness to provide better overall experiences.&lt;/p&gt;

&lt;p&gt;There’s no way to manually keep up with the device proliferation and real-time changes. You need a way of quickly scanning and tracking what’s connecting to your network to keep your environment secure, compliant, and cost efficient.&lt;/p&gt;

&lt;p&gt;What if you could have accurate and actionable visibility of all your IT assets in minutes? Well, let me introduce you to &lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;Ivanti Neurons for Discovery&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;1. Ivanti Neurons for Discovery: Find Everything&lt;/h3&gt;

&lt;p&gt;An IT staffing company once told me about an asset that was stuck in a cabinet behind a box of Oreo cookies. Right, not sure how Oreo cookies can last that long. Definitely not in my household. Or another example, an organization was still accounting for assets that were no longer with the company—decommissioned, lost, or never returned. Would you be OK with former employees still holding onto your hardware and accessing corporate information? Wouldn’t you want to know when new or unknown devices join your network?&lt;/p&gt;

&lt;p&gt;With Ivanti Neurons for Discovery, you can say goodbye to your tracking spreadsheets once and for all, and to those ghost cookies…I mean ghost assets. It discovers devices quickly in real time on any network segment.&lt;/p&gt;

&lt;p&gt;You might say you already have multiple discovery solutions in your organization. How is this one different? Ivanti Neurons for Discovery uses passive and active discovery to find all managed or unmanaged devices. It detects network-connected devices in real time, even if they’re behind a firewall. Ivanti Neurons for Discovery scans your network without requiring you to install agents on all devices on your network. Think of it as your neighborhood watch program with an assigned representative and not consuming your bandwidth. Always on, always working for you. If something is there, even for a moment, you'll catch it and inventory what's on it.&lt;/p&gt;

&lt;h3&gt;2. Ivanti Neurons for Discovery: Aggregate Information&lt;/h3&gt;

&lt;p&gt;A transportation company was sure they captured everything they had. When we then conducted a discovery scan, we found 30% more devices than their endpoint solution and Active Directory showed them. They were sure their environment was properly protected, but how do you secure devices you don’t even know about?&lt;/p&gt;

&lt;p&gt;With Ivanti Neurons for Discovery, once a device is discovered, the in-depth inventory service interrogates each IP-connected device or service to learn everything it can, including information about the network connection, hardware details, manufacturer, and what software is running on the device. When under management, inventory will also provide software-usage information to help you manage your software assets efficiently. Ivanti Neurons for Discovery “connects the dots” and aggregates accurate asset information from multiple data sources. Ongoing discovery scans ensure you are aware of any new or unknown devices that join your network.&lt;/p&gt;

&lt;h3&gt;3. Ivanti Neurons for Discovery: Augment Data&lt;/h3&gt;

&lt;p&gt;A university was tracking their IT assets with spreadsheets and another department managed their contracts repository. They didn’t proactively manage end-of-life dates or warranties and often spent time fixing devices that were still under warranty. In our “&lt;a href="https://www.ivanti.com/blog/how-it-professionals-are-managing-assets" target="_blank"&gt;Aligning ITSM and ITAM Processes Survey&lt;/a&gt;”, we found that half of the respondents admitted to sometimes fixing devices that later were discovered to still be under warranty, resulting in time and money lost.&lt;/p&gt;

&lt;p&gt;In this same study, 20% of respondents admitted not having the insights into which assets were out of date, and 28% reported spending hours per week supporting out-of-warranty and out-of-support-policy assets. With Ivanti Neurons for Discovery, you can augment your data from third-party systems using connectors to B2B data like hardware warranty information, vendor licensing rules, or purchasing information from resellers. With this enriched asset data, you can optimize purchases, warranties, contract data, and end-of-life cycles as needed so your service and IT teams have everything they need to log an issue against an asset and get it resolved quickly and accurately.&lt;/p&gt;

&lt;h3&gt;4. Ivanti Neurons for Discovery: Make Sense of Data&lt;/h3&gt;

&lt;p&gt;Analyst firm &lt;a href="https://www.enterprisemanagement.com/research/asset.php/3311" rel="noopener" target="_blank"&gt;Enterprise Management Associates&lt;/a&gt; found that on average, IT spends 10 hours per week&amp;nbsp;resolving data-accuracy issues. That’s a quarter of a person year at minimum that I’m sure you can find other use for. For many, it’s taking a lot of time as data can be in so many different places—in their procurement system, in IT endpoint and network management systems, in contract repositories, in spreadsheets, and more.&lt;/p&gt;

&lt;p&gt;It’s tough to normalize the data, reconcile it, and make sure you understand the delta, and where the data is coming from. Good tools can automate this process for you, to give you robust data you can work with.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Discovery fully automates normalization and reconciliation processes to clean up your data and reduce the number of names used to describe the same thing. Convert all your asset data to have a standard name, mapping structure, and classification.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Discovery helps you reduce the time spent on aggregating and harmonizing asset data from weeks down to minutes. No more cross-referencing and manual reconciliation activity among devices that interact with every system in your IT estate. The output helps you identify devices that are missing and unaccounted for, and that pose significant security risks. Ivanti Neurons for Discovery provides accurate asset information leading to improved cost efficiency through better utilization of existing assets and improves your security posture.&lt;/p&gt;

&lt;h3&gt;5. Ivanti Neurons for Discovery:&amp;nbsp;Provide Actionable Insights&lt;/h3&gt;

&lt;p&gt;Asset Discovery and inventory capabilities are foundational to effective endpoint, asset, service, and security management. To efficiently assist your end users and remediate issues quickly, you need to have all the necessary asset data in context at your fingertips. We asked 1,600 survey respondents if service management processes and request workflows have automatic visibility into asset information and relationships. According to the findings, 43% reported “sometimes,” but more than one third of respondents don’t have any visibility into this information.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for Discovery provides turnkey discovery functionality to easily populate configuration management (CMDB) and asset management databases. Our customers report that it only takes them minutes to populate the CMDB with insightful data that helps them provide service in context with asset information to make informed decisions. When service and asset processes and data are closely aligned with accurate data in the CMDB, many activities and processes become more automated, efficient, and responsive, leading to better outcomes and better service experiences.&lt;/p&gt;

&lt;h3&gt;Try It Out Today&lt;/h3&gt;

&lt;p&gt;With Ivanti Neurons for Discovery, you have complete asset visibility and are equipped to optimize your asset value and improve your security posture. No more tracking spreadsheets and no more ghost assets. Ivanti Neurons for Discovery provides you with that single source of truth in minutes not days, for accurate and actionable insights. So, stop guessing, eat your M&amp;amp;Ms, and let Ivanti Neurons for Discovery take care of your asset-discovery needs.&lt;/p&gt;
</description><pubDate>Mon, 03 Aug 2020 22:28:53 Z</pubDate></item><item><guid isPermaLink="false">42678026-4c5a-488f-9cd0-c4415f388e74</guid><link>https://www.ivanti.com/blog/qualys-ivanti</link><atom:author><atom:name>Ashtyn Creel</atom:name><atom:uri>https://www.ivanti.com/blog/authors/ashtyn-creel</atom:uri></atom:author><category>Ivanti News</category><category>Artificial Intelligence</category><category>Security</category><title>Qualys Integrates Ivanti Patch Management Into Qualys VMDR Platform</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;&lt;img alt="Learn More about  Ivanti Neurons" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/07/blog-cta-banner-160x600.png"&gt;&lt;/a&gt;Our &lt;a href="https://www.ivanti.com/company/press-releases/2020/qualys-ivanti-extended-partnership" target="_blank"&gt;latest announcement&lt;/a&gt; comes in the form of another exciting partnership, this time with &lt;a href="https://www.qualys.com/" target="_blank" rel="noopener"&gt;Qualys&lt;/a&gt;!&amp;nbsp;A leading provider of disruptive cloud-based IT, security, and compliance solutions, Qualys&amp;nbsp;has integrated&amp;nbsp;Ivanti&amp;nbsp;Patch Management technology into their &lt;a href="https://www.qualys.com/apps/vulnerability-management-detection-response/" target="_blank" rel="noopener"&gt;Qualys VMDR&amp;nbsp;(Vulnerability Management Detection Response) &lt;/a&gt;platform.&lt;/p&gt;

&lt;p&gt;Qualys President and Chief Product Officer, Sumedh Thakarsaid, said the following:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"The seamless integration of Ivanti and Qualys technologies in VMDR takes endpoint security to the next level. By extending Ivanti’s leading patch management technology from Windows to Mac, Qualys VMDR now orchestrates the entire process of discovery, prioritization and patching of critical vulnerabilities in real time across hybrid IT environments including macOS devices. Furthermore, it allows us to bridge IT and SecOps workflows to more efficiently secure and manage today’s explosion of remote workers."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Ivanti and Qualys partnership provides for tight integration of Ivanti Patch Management into Qualys VMDR to automate and simplify the patch remediation process. As a result, customers will be able to quickly detect vulnerabilities, from endpoint to datacenter, and automatically deploy expertly pre-tested Mac patches across dozens of third-party applications. Current Microsoft patch coverage includes both security and non-security content for all supported products, operating systems, and applications, including Microsoft Office. The Ivanti patch catalog is one of the industry’s most comprehensive catalogs currently securing over 180 million endpoints globally.&lt;/p&gt;

&lt;p&gt;The next phase of the integration will allow Qualys customers to patch MacOS systems, as well as over 70 third-party Mac applications, directly through Qualys VMDR.&lt;/p&gt;

&lt;p&gt;Nayaki Nayyar, EVP and Chief Product Officer, Ivanti, had this to say about the expanded partnership:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Ivanti’s expanded partnership with Qualys further underscores our mission to help deliver end-to-end security solutions. Our recently announced &lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;Ivanti Neurons platform&lt;/a&gt; powers security teams with advanced automation capabilities to discover, prioritize, remediate vulnerabilities and self-heal endpoints and edge devices.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;As mentioned in a&amp;nbsp;&lt;a href="https://www.ivanti.com/company/press-releases/2020/ivanti-announces-ivanti-neurons" target="_blank"&gt;recent press release&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.ivanti.com/ivanti-neurons" target="_blank"&gt;Ivanti Neurons&lt;/a&gt;&amp;nbsp;transforms the way IT gets work done. Powered with hyper-automation capabilities, it delivers:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/discovery" target="_blank"&gt;Ivanti Neurons for Discovery&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-edge-intelligence" target="_blank"&gt;Ivanti Neurons for Edge Intelligence&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-healing" target="_blank"&gt;Ivanti Neurons for Healing&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-workspace" target="_blank"&gt;Ivanti Neurons Workspace&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more in the interview below:&lt;/p&gt;

&lt;p class="video-wrapper"&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="Up6xPxEsLWI"&gt;&lt;/object&gt;&lt;/p&gt;
</description><pubDate>Thu, 30 Jul 2020 12:07:27 Z</pubDate></item></channel></rss>