<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Endpoint Management</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/endpoint-management/rss" /><link>https://www.ivanti.com/blog/topics/endpoint-management</link><item><guid isPermaLink="false">b1263255-8700-4128-98cd-3091094f2a89</guid><link>https://www.ivanti.com/blog/sovereign-cloud-data-sovereignty-eu</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-destefano</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>Digital Sovereignty and Sovereign Cloud: Protecting EU Cloud Data for Operational Resilience</title><description>&lt;p&gt;Traditional data protection followed a straightforward principle: Data stored in is protected by the laws of country A; data stored in country B is protected by the laws of country B. But in today’s global economy, where your data physically resides no longer determines which governments can demand access to it.&lt;/p&gt;

&lt;p&gt;Cloud infrastructure brought new jurisdictional complexity. The physical location of data centers, the nationality of the cloud provider's headquarters, and the entity controlling operations can each create competing jurisdictional claims, potentially allowing multiple governments to demand access to the same data.&lt;/p&gt;

&lt;h2&gt;What is digital sovereignty?&lt;/h2&gt;

&lt;p&gt;This challenge has a name: digital sovereignty. Digital sovereignty is the principle that organizations maintain complete control over their data within their home jurisdiction's legal framework. This idea has become a necessity for organizational resilience as businesses work in a more fractured, less trusting geopolitical world. Private and public organizations need secure access to cloud-based platforms that are compliant with local regulatory requirements and shielded from the known or unknown geopolitical risks their region faces.&lt;/p&gt;

&lt;h2&gt;How the U.S. CLOUD act impacts EU data residency&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://www.justice.gov/criminal/cloud-act-resources" rel="noopener" target="_blank"&gt;2018 US CLOUD (Clarifying Lawful Overseas Use of Data) Act&lt;/a&gt; further cemented these concerns for EU organizations. This law empowers US law enforcement to compel any US-based cloud provider to produce data stored anywhere globally — regardless of the data's physical location or the customer's nationality.&lt;/p&gt;

&lt;p&gt;Both the US CLOUD act and the &lt;a href="https://www.congress.gov/crs-product/IF11451" rel="noopener" target="_blank"&gt;Foreign Intelligence Surveillance Act (FISA)&lt;/a&gt; have given firms in the European Union cause for concern. Through these two policies, US authorities could access data contained within cloud platforms of any US-headquartered organization, even when the cloud data center is stationed in another country.&lt;/p&gt;

&lt;p&gt;For EU‑based companies, using US‑based tools triggers specific &lt;a href="https://www.ivanti.com/blog/what-is-gdpr"&gt;GDPR obligations&lt;/a&gt; because personal data leaves the EU. And since the EU–US Privacy Shield was invalidated (known as “Schrems II”), EU companies need other protections. Standard Contractual Clauses (SCCs) remain valid but are conditional and complex as they require case-by-case review.&lt;/p&gt;

&lt;p&gt;A subsequent Data Privacy Framework has been introduced since, but underlying trust among the nations involved only goes so far. These dynamics increased pressure to ensure &lt;a href="https://www.ivanti.com/use-cases/data-protection-application-security"&gt;data protection&lt;/a&gt;, and so sovereign cloud solutions were needed to ensure operational resiliency.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons for MDM – Sovereign Edition: built for EU cloud sovereignty&lt;/h2&gt;

&lt;p&gt;For our partners and customers in the EU, Ivanti Neurons for MDM Sovereign Edition addresses these requirements through fundamentally different architecture and operations. Located in Germany and independently operated, this solution was designed to align with the Cloud Sovereignty Framework of the European Commission and has been evaluated by the highly reputable &lt;a href="https://cyberintelligence.institute/" rel="noopener" target="_blank"&gt;cyberintelligence.institute&lt;/a&gt;, where their expert assessment explained:&lt;/p&gt;

&lt;p&gt;“The Ivanti Sovereign Cloud demonstrates a high level of European control in the areas of data processing, security and compliance governance. In its current configuration, the Ivanti Sovereign Cloud achieves at least SEAL 2 certification, meaning that data sovereignty is ensured in all areas. Furthermore, the Ivanti Sovereign Cloud meets the requirements for SEAL 3 certification in many relevant areas, thus achieving digital resilience.”&lt;/p&gt;

&lt;p&gt;You can read the &lt;a href="https://www.ivanti.com/lp/aem/contact/sovereign-cloud-mdm"&gt;full technical assessment&lt;/a&gt; to learn more.&lt;/p&gt;

&lt;h2&gt;Achieving data sovereignty compliance with confidence&lt;/h2&gt;

&lt;p&gt;Neurons for MDM – Sovereign Edition – EU provides European firms with a strategic foundation for their IT and Security platform from a trusted leader, while maintaining local jurisdictional protections for risk management. This means public and private entities can continue their digital transformation with the confidence that their cloud data will remain secure while their operations gain resilience.&lt;/p&gt;

&lt;p&gt;Next steps? Read our whitepaper, &lt;a href="https://www.ivanti.com/resources/whitepapers/sovereign-cloud-strategy"&gt;Sovereign Cloud as a Strategic Necessity for European Organizations&lt;/a&gt;, to discover how Ivanti Neurons for MDM Sovereign Edition achieves and exceeds SEAL 2 certification and provides the sovereign cloud architecture European organizations need to maintain data sovereignty while enabling secure digital transformation.&lt;/p&gt;
</description><pubDate>Fri, 17 Apr 2026 12:30:01 Z</pubDate></item><item><guid isPermaLink="false">2407256b-094c-45de-a2b1-309ed2f901cf</guid><link>https://www.ivanti.com/blog/how-ai-automation-improve-endpoint-visibility</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Artificial Intelligence</category><category>Endpoint Management</category><title>Inventory to Intelligence: How AI and Automation Improve Endpoint Visibility</title><description>&lt;p&gt;Endpoint visibility has always been foundational to IT and security. You&amp;nbsp;can’t&amp;nbsp;secure,&amp;nbsp;patch&amp;nbsp;or&amp;nbsp;support what you&amp;nbsp;can’t&amp;nbsp;see.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But as environments have become more distributed and complex, what visibility means has evolved. It’s no longer enough to know that a device exists — IT teams and organizations as a whole need to understand its health, its&amp;nbsp;risk&amp;nbsp;posture&amp;nbsp;and&amp;nbsp;its impact on both security and user experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;&lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;AI and endpoint automation&lt;/a&gt;&amp;nbsp;start to make a practical difference. By moving endpoint visibility from static inventory to continuous intelligence, organizations can shift from reactive discovery to proactive, even autonomous operations.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why traditional discovery practices fall short&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Traditional discovery practices were built for&amp;nbsp;a very different&amp;nbsp;IT reality. Their approach is designed for relatively static environments, clearly defined&amp;nbsp;perimeters&amp;nbsp;and&amp;nbsp;manual processes. That strategy&amp;nbsp;doesn’t&amp;nbsp;scale well in today’s hybrid, cloud-first world.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Manual discovery workflows often produce incomplete or outdated inventories. Ivanti’s 2026&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;Autonomous Endpoint Management Advantage Report&lt;/a&gt;&amp;nbsp;reinforces this reality:&amp;nbsp;Only&amp;nbsp;52% of organizations report using&amp;nbsp;an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;endpoint management solution&lt;/a&gt;&amp;nbsp;today, leaving many environments with limited centralized visibility and persistent blind spots across unmanaged or shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In practice, this fragmentation shows up in&amp;nbsp;very familiar&amp;nbsp;ways. Teams often juggle multiple inventories, one from an on-prem client management tool, another from an&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;MDM platform&lt;/a&gt;&amp;nbsp;and&amp;nbsp;yet another from identity or access systems, leaving gaps that widen as environments grow more complex.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Common challenges&amp;nbsp;in manual device discovery&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Manual discovery relies heavily on human input, which introduces inconsistency and error. As environments grow more distributed, these processes struggle to evolve with them, making it difficult to keep inventories&amp;nbsp;accurate&amp;nbsp;as devices are added,&amp;nbsp;reassigned&amp;nbsp;or&amp;nbsp;accessed remotely. Reconciling changes across large estates becomes time-consuming and brittle, increasing the likelihood that devices fall out of view entirely.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Over time, these limitations compound.&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/best-practices-for-it-asset-discovery-and-inventory-management"&gt;Discovery&lt;/a&gt;&amp;nbsp;becomes episodic rather than continuous, and visibility&amp;nbsp;lags behind&amp;nbsp;reality. By the time inventories are reconciled, the environment has already changed.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Visibility gaps and security risks&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;These gaps&amp;nbsp;aren’t&amp;nbsp;theoretical. Ivanti’s research shows that many organizations still struggle with foundational&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance"&gt;endpoint visibility&lt;/a&gt;&amp;nbsp;even after deploying multiple management tools. Endpoint data exists across scanners, MDM&amp;nbsp;platforms&amp;nbsp;and&amp;nbsp;access systems, but it is rarely centralized, continuously updated, or trusted across teams. As a result, shadow IT, unmanaged devices&amp;nbsp;and&amp;nbsp;unknown access paths&amp;nbsp;remain&amp;nbsp;persistent sources of security and compliance risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Blind spots create real risk. Many organizations struggle to&amp;nbsp;identify&amp;nbsp;which devices are vulnerable or even actively accessing their environments.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;When teams&amp;nbsp;can’t&amp;nbsp;reliably understand device exposure or access patterns, security decisions are made using incomplete or outdated data, increasing&amp;nbsp;risk&amp;nbsp;and delaying remediation. In fact, the above-mentioned Ivanti report highlights how common these blind spots are:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of organizations report challenges&amp;nbsp;identifying&amp;nbsp;shadow IT&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;41% struggle to&amp;nbsp;identify&amp;nbsp;vulnerabilities across devices&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% say data blind spots make it difficult to determine patch compliance.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Device discovery vs. device health monitoring&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Discovery is only the first step. Knowing that a device exists&amp;nbsp;doesn't&amp;nbsp;tell you whether&amp;nbsp;it's&amp;nbsp;secure,&amp;nbsp;compliant&amp;nbsp;or&amp;nbsp;even functioning properly.&amp;nbsp;That’s&amp;nbsp;where device health monitoring becomes critical.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Discovery tells you&amp;nbsp;what’s&amp;nbsp;present. Health monitoring adds the context that&amp;nbsp;actually matters, from performance and configuration&amp;nbsp;drift&amp;nbsp;to overall security posture. Research from&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;Ivanti’s 2025 Securing the Borderless Digital Landscape report&lt;/a&gt;&amp;nbsp;underscores how significant these visibility gaps&amp;nbsp;remain:&amp;nbsp;Two&amp;nbsp;out of five (38%) of IT professionals say they lack sufficient data about devices accessing the network, and 45% report insufficient visibility into shadow IT.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;BYOD and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/borderless-security" target="_blank"&gt;edge devices&lt;/a&gt;, especially, are a concern. These can be online and still pose significant risk. It may be missing critical patches, running outdated software,&amp;nbsp;drifting from&amp;nbsp;configuration&amp;nbsp;standards&amp;nbsp;or&amp;nbsp;suffering performance issues that impact users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Presence data answers the question, “Is it there?” Health data answers, “Is it safe, compliant, and usable?” Without health insights, organizations are effectively managing endpoints in the dark.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Key indicators of endpoint health&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;To manage endpoints proactively, organizations need continuous visibility into key health indicators.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This includes:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Operating&amp;nbsp;system and application versions&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Patch&amp;nbsp;and antivirus status&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Configuration&amp;nbsp;drift&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Overall&amp;nbsp;security posture&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;User experience signals such as crashes,&amp;nbsp;latency&amp;nbsp;and&amp;nbsp;performance degradation also provide early warning signs that something&amp;nbsp;isn’t&amp;nbsp;right.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Modern platforms unify these signals into a single view, allowing IT and security teams to understand not just what devices exist, but how&amp;nbsp;they're&amp;nbsp;performing and where risk is&amp;nbsp;emerging.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The risk of tracking only device presence&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When organizations focus&amp;nbsp;only&amp;nbsp;on device presence, they expose themselves to both security and operational risks. Visibility without context leads to delayed detection, missed compliance&amp;nbsp;requirements&amp;nbsp;and&amp;nbsp;reactive management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Negative impacts on security and compliance&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Tracking presence alone increases the likelihood that malware,&amp;nbsp;misconfigurations&amp;nbsp;or&amp;nbsp;policy violations go undetected. Devices that are not enrolled in management or out of compliance may still access sensitive resources, creating gaps in enforcement. When access decisions&amp;nbsp;aren’t&amp;nbsp;tied to device state, enforcement becomes inconsistent by default.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Strong endpoint visibility,&amp;nbsp;access&amp;nbsp;and&amp;nbsp;security ensure that only managed and compliant devices can reach sensitive systems and data.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Tying access to management and compliance status is critical. Conditional access,&amp;nbsp;VPN&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;zero trust&lt;/a&gt;&amp;nbsp;controls are only effective when visibility and enrollment are enforced consistently across endpoints.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch management&amp;nbsp;is&amp;nbsp;one of the areas where limited visibility creates the most operational strain.&amp;nbsp;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;IT and security research&lt;/a&gt;&amp;nbsp;shows that many IT teams struggle to track patch status across their full endpoint estate and to stay compliant as environments become more distributed. For&amp;nbsp;example,&amp;nbsp;of those we surveyed,&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;38% of IT and security professionals say they have difficulty tracking patch status and rollouts.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;35% of teams struggle to stay compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;These challenges&amp;nbsp;aren’t&amp;nbsp;about patch availability alone. They stem from gaps in visibility into device state,&amp;nbsp;ownership&amp;nbsp;and&amp;nbsp;real-world exposure, making it difficult to prioritize and verify remediation.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Operational inefficiencies&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;From an operational perspective, limited visibility leads to inefficiency. IT teams spend time troubleshooting issues that automation could resolve, chasing devices that should have been discovered automatically, and reacting to incidents rather than preventing them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Without health data, teams are forced into a firefighting mode, responding to problems after they&amp;nbsp;impact&amp;nbsp;users instead of addressing them proactively.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is exactly where AI and automation can begin to change the equation.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How AI and endpoint automation improve endpoint visibility&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;AI and automation turn endpoint visibility from a one-time discovery exercise into a continuous, self-sustaining capability. They enable teams to unify data, detect&amp;nbsp;anomalies&amp;nbsp;and&amp;nbsp;maintain&amp;nbsp;accurate&amp;nbsp;inventories without manual effort.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Unified telemetry across multiple sources&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Modern endpoint management platforms with AI and automation capabilities&amp;nbsp;consolidate&amp;nbsp;telemetry from discovery, UEM, MDM, patching,&amp;nbsp;vulnerability&amp;nbsp;and&amp;nbsp;security tools into a unified, continuously updated view. This unified telemetry&amp;nbsp;eliminates&amp;nbsp;the need to reconcile siloed inventories and provides a shared, reliable view for both IT and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By normalizing data across desktop, mobile, server&amp;nbsp;and&amp;nbsp;IoT devices, organizations gain holistic visibility that&amp;nbsp;supports&amp;nbsp;faster, more confident decision-making.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;autonomous&amp;nbsp;endpoint management (AEM)&amp;nbsp;research&amp;nbsp;&lt;/a&gt;also shows that organizations make the most progress when endpoint visibility is treated as a shared&amp;nbsp;objective. Teams that track metrics such as time to discovery, percentage of fully managed endpoints&amp;nbsp;and&amp;nbsp;exposure duration through shared dashboards are better able to align IT and security around the same data. This shared visibility turns endpoint management from siloed reporting into a coordinated, data-driven process.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;AI-Powered&amp;nbsp;automation and&amp;nbsp;autonomous&amp;nbsp;bots&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Automation plays a critical role in keeping visibility current.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/bot-library"&gt;AI-powered bots&lt;/a&gt;&amp;nbsp;can automatically rediscover devices, reconcile duplicates, update ownership and&amp;nbsp;location&amp;nbsp;and&amp;nbsp;detect anomalies across the environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When agents stop reporting or profiles break, automated workflows can repair or reinstall them without human intervention. This ensures that visibility&amp;nbsp;doesn’t&amp;nbsp;degrade over time and reduces the operational burden on IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Self-healing&amp;nbsp;workflows for IT&amp;nbsp;productivity&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Self-healing workflows extend automation to the endpoint itself. Common issues such as failed updates, stopped services&amp;nbsp;or&amp;nbsp;configuration drift can be detected and resolved automatically, often before users notice a problem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Endpoint automation enables these self-healing workflows to&amp;nbsp;operate&amp;nbsp;continuously in the background, resolving common issues without waiting for human intervention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By resolving these issues without tickets, organizations reduce downtime, improve user&amp;nbsp;experience&amp;nbsp;and&amp;nbsp;free IT staff to focus on higher-value initiatives.&amp;nbsp;In fact,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/aem" target="_blank"&gt;over two-thirds of IT teams&lt;/a&gt;&amp;nbsp;today believe that&amp;nbsp;AI and automation&amp;nbsp;in ITSM&amp;nbsp;will&amp;nbsp;allow them to deliver better service experiences&amp;nbsp;and&amp;nbsp;give them more time to support business objectives.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365781"&gt;&lt;/div&gt;

&lt;h2&gt;Broader&amp;nbsp;impact on&amp;nbsp;security,&amp;nbsp;productivity&amp;nbsp;and&amp;nbsp;user&amp;nbsp;experience&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When AI and automation are integrated into endpoint visibility, the benefits extend beyond IT operations. Security posture&amp;nbsp;improves&amp;nbsp;and users experience fewer disruptions — and productivity increases.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By combining endpoint visibility and control, organizations can reduce risk while still supporting productivity and flexible operating models.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Closing&amp;nbsp;visibility&amp;nbsp;gaps&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;AI-driven insights&amp;nbsp;eliminate&amp;nbsp;blind spots by continuously&amp;nbsp;monitoring&amp;nbsp;endpoint activity and health. Instead of relying on periodic scans or manual checks, organizations&amp;nbsp;maintain&amp;nbsp;real-time awareness of their endpoint environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;continuous visibility&lt;/a&gt;&amp;nbsp;transforms endpoint management from a static inventory project into a living, breathing capability that adapts as the environment changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Improving&amp;nbsp;IT&amp;nbsp;operations and&amp;nbsp;end-user&amp;nbsp;satisfaction&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/blog/how-ai-alleviates-help-desk-workloads"&gt;Automation reduces ticket volume&lt;/a&gt;&amp;nbsp;and accelerates resolution times, while predictive analytics help prevent downtime before it&amp;nbsp;impacts&amp;nbsp;users. Ring deployments, maintenance&amp;nbsp;windows&amp;nbsp;and&amp;nbsp;self-service catalogs allow changes to be delivered with minimal disruption.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When users experience faster support and fewer interruptions, resistance to endpoint management drops and adoption improves. Over time, this creates a healthier feedback loop where visibility,&amp;nbsp;automation&amp;nbsp;and&amp;nbsp;user experience reinforce each other instead of competing.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where&amp;nbsp;autonomous endpoint management&amp;nbsp;takes organizations next. Visibility becomes continuous instead of episodic. Automation keeps inventories&amp;nbsp;accurate, health signals&amp;nbsp;current&amp;nbsp;and&amp;nbsp;risk visible in real time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With shared data and clear ownership, IT and security teams stop reacting to issues after the fact and start managing endpoints proactively. That shift from inventory to intelligence is what enables autonomous endpoint management, and&amp;nbsp;it’s&amp;nbsp;quickly becoming the standard for modern IT operations.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 03 Apr 2026 13:00:09 Z</pubDate></item><item><guid isPermaLink="false">c6a5b580-8345-47fd-b9fe-58b19a5bc3cc</guid><link>https://www.ivanti.com/blog/endpoint-management-ownership-it-security-governance</link><atom:author><atom:name>Aruna Kureti</atom:name><atom:uri>https://www.ivanti.com/blog/authors/aruna-kureti</atom:uri></atom:author><category>Endpoint Management</category><title>Who Owns Endpoint Management? Defining Security and IT Governance</title><description>&lt;p&gt;Endpoint management is one of the most critical — and most contested — areas of enterprise governance. Every organization depends on endpoints, yet many still struggle to answer a fundamental question: who actually &lt;i&gt;owns &lt;/i&gt;these devices?&lt;/p&gt;

&lt;p&gt;In many environments, IT and security teams are both confident they’re doing the right thing, yet still talk past each other. Security looks at a scanner and sees 10,000 critical vulnerabilities; IT looks at a patch report and sees everything deployed. They're both right, but they're speaking different languages.&lt;/p&gt;

&lt;p&gt;The result is stalled risk remediation efforts, policy friction and growing frustration. Teams debate whose data is accurate instead of closing gaps. When &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/unified-endpoint-management"&gt;endpoint management&lt;/a&gt; is governed jointly, with shared visibility and accountability, teams can shift their focus from reconciling data to improving execution.&lt;/p&gt;

&lt;p&gt;As endpoint environments scale, governance also depends on automation. AI-powered capabilities can help normalize data across siloed tools, surface unmanaged devices, and highlight &lt;a href="https://www.ivanti.com/it-asset-visibility"&gt;asset visibility&lt;/a&gt; gaps, making shared ownership possible without relying on manual reconciliation.&lt;/p&gt;

&lt;h2&gt;Why endpoint management ownership matters&lt;/h2&gt;

&lt;p&gt;Endpoints are where users work, where data is accessed and where many security incidents begin. When ownership of endpoint management is unclear, fissures start to appear.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;Autonomous Endpoint Management Advantage&lt;/a&gt; report shows that these visibility gaps are widespread and consequential. Just over half of organizations report using endpoint management solutions that provide centralized visibility, meaning many teams still struggle to see their full device landscape. These blind spots extend beyond unmanaged IT devices.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;45% of security and IT professionals cite &lt;a href="https://www.ivanti.com/products/discovery"&gt;shadow IT&lt;/a&gt; as a key data gap.&lt;/li&gt;
	&lt;li&gt;41% report difficulty &lt;a href="https://www.ivanti.com/use-cases/manage-it-vulnerability-risk"&gt;identifying vulnerabilities&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;38% can’t reliably tell which devices are even accessing their network.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365764"&gt;&lt;/div&gt;

&lt;p&gt;Most organizations believe they know what’s on their network, until they turn on proper discovery. The reality is that device lists are usually siloed: one from your MDM, another from on-prem tools and something else from the identity provider.&lt;/p&gt;

&lt;p&gt;As a result, basic questions become hard to answer: which devices are fully managed, which are compliant and which can access sensitive resources without controls.&lt;/p&gt;

&lt;p&gt;AI-powered automation can help continuously correlate endpoint data across management, identity and &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/endpoint-security"&gt;endpoint security solutions&lt;/a&gt;, reducing blind spots that manual processes routinely miss.&lt;/p&gt;

&lt;p&gt;But visibility is only valuable when it’s shared and governed. You can’t secure, patch or support what you can’t see. Without a shared, trusted view and clear governance of endpoints, well-intentioned efforts still lead to friction, delays and increased risk. That’s why endpoint management is ultimately a governance problem, not just a technical one.&lt;/p&gt;

&lt;p&gt;Security isn’t the only issue with these blind spots. Patching is slowed, support gets complicated and policy enforcement is undermined. When IT and security teams rely on different datasets, disagreements over risk and remediation are inevitable.&lt;/p&gt;

&lt;p&gt;Clear ownership changes that dynamic. When endpoint management is governed jointly, with shared visibility and accountability, organizations are better positioned to move from debating data to closing gaps. Endpoint management becomes a foundation for consistent policy enforcement, faster remediation and better collaboration across teams.&lt;/p&gt;

&lt;h2&gt;Common points of friction between IT and security teams&lt;/h2&gt;

&lt;p&gt;Most friction between IT and security doesn’t come from bad intent. It comes from misalignment.&lt;/p&gt;

&lt;p&gt;Our &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; also suggests this misalignment isn’t abstract; it’s measurable and costly. We found that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;56% of IT professionals say wasteful IT spend is a problem.&lt;/li&gt;
	&lt;li&gt;And 39% point to inefficient tech support as an area of waste.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365747"&gt;&lt;/div&gt;

&lt;p&gt;Nearly nine in ten respondents also report that siloed data negatively impacts IT operations, driving inefficient use of resources, reduced collaboration and elevated risk of non-compliance.&lt;/p&gt;

&lt;p&gt;In practice, this misalignment tends to surface in a few consistent and recurring friction points:&lt;/p&gt;

&lt;h4&gt;Fragmented tooling&lt;/h4&gt;

&lt;p&gt;Fragmented tooling is a major barrier. Many organizations juggle an older on-prem client tool, a separate MDM for mobile and a different solution for patches. The result is tech sprawl that makes the problem worse.&lt;/p&gt;

&lt;p&gt;As this disconnect plays out in practice, security and IT teams often rely on different tools and datasets to assess the same endpoints, leading to very different conclusions about risk and remediation status.&lt;/p&gt;

&lt;p&gt;AI-driven analysis can add context across these datasets, helping IT and security teams interpret exposure through a shared lens rather than competing reports.&lt;/p&gt;

&lt;h4&gt;User impact&lt;/h4&gt;

&lt;p&gt;User impact is another source of tension. Endpoint controls are often seen as restrictive, raising concerns about performance, downtime or privacy, especially on bring-your own (BYOD) devices. IT teams are left balancing enforcement with user experience, while security pushes for stricter controls.&lt;/p&gt;

&lt;h4&gt;Resource constraints&lt;/h4&gt;

&lt;p&gt;Resource constraints make this harder. Teams are wary of introducing new platforms or policies that appear complex or disruptive, especially when they’re already stretched thin.&lt;/p&gt;

&lt;p&gt;Without clear governance, these issues lead to inconsistent enforcement, stalled remediation and shadow policy decisions. Endpoint management stays reactive. But the good news is that this is solvable.&lt;/p&gt;

&lt;h2&gt;Balancing security requirements and business flexibility&lt;/h2&gt;

&lt;p&gt;One of the hardest challenges in endpoint management is balancing security with business flexibility. Security teams want consistent controls to reduce risk. Business leaders want minimal disruption and the freedom to work without friction. IT teams are often caught in the middle.&lt;/p&gt;

&lt;p&gt;When this balance isn’t clearly defined, endpoint policies become a source of conflict. Strict controls applied universally can slow productivity, frustrate users and encourage workarounds. Too much flexibility, on the other hand, increases exposure and makes enforcement inconsistent.&lt;/p&gt;

&lt;p&gt;The real issue is that organizations fail to agree upfront on what’s mandatory and where flexibility is acceptable. Without that clarity, organizations negotiate policy decisions ad hoc and react to incidents instead of managing risk proactively.&lt;/p&gt;

&lt;p&gt;Effective endpoint governance reframes the conversation. By defining baseline requirements upfront and aligning them to risk, organizations can protect critical assets while still supporting different user needs and operating models. This shift allows security and IT to move from constant trade-offs to structured decision-making. That's when the relationship fundamentally changes from friction to alignment.&lt;/p&gt;

&lt;h2&gt;Who should own endpoint governance?&lt;/h2&gt;

&lt;p&gt;Endpoint governance can't sit with a single team. It requires shared ownership across IT, security and the business.&lt;/p&gt;

&lt;p&gt;In successful organizations, endpoint governance is shaped by a group that includes IT operations, security and key business stakeholders. This group defines decision rights, agrees on priorities and establishes a common policy framework that everyone operates within.&lt;/p&gt;

&lt;p&gt;Security brings risk context and threat awareness. IT brings operational insight and user impact considerations. Business leaders provide perspective on workflows, productivity and acceptable levels of disruption. When these perspectives are aligned early, endpoint policies are easier to enforce and less likely to be bypassed.&lt;/p&gt;

&lt;p&gt;Governance clarifies accountability. It answers questions like who decides what's mandatory, how exceptions are handled and how conflicts are resolved. With that structure in place, endpoint management becomes a coordinated program rather than a series of isolated decisions.&lt;/p&gt;

&lt;h2&gt;Defining risk remediation priorities and timelines&lt;/h2&gt;

&lt;p&gt;Effective endpoint governance depends on clear agreement around &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;risk remediation priorities&lt;/a&gt; and timelines. Without that agreement, IT and security teams often talk past each other, prioritizing volume instead of focusing on what matters most.&lt;/p&gt;

&lt;p&gt;The problem with patching is prioritization, and Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/aem"&gt;autonomous endpoint management research&lt;/a&gt; confirms this isn't just a theoretical problem but a measurable operational challenge:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;39% of IT teams struggle to prioritize risk remediation and patch deployment.&lt;/li&gt;
	&lt;li&gt;38% have difficulty tracking patch status and rollouts.&lt;/li&gt;
	&lt;li&gt;And 35% struggle to stay compliant with patching.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are all outcomes that stem largely from visibility gaps and inconsistent tooling, making it harder to focus remediation efforts.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26365754"&gt;&lt;/div&gt;

&lt;p&gt;Traditional approaches rely on CVSS scores and long spreadsheets that don't reflect real-world risk at all. Context matters: whether a device is Internet-facing, who uses it, what data it touches and how likely exploitation is, with AI-powered analysis helping teams assess that context continuously at scale.&lt;/p&gt;

&lt;p&gt;Governance helps shift remediation from a volume-driven exercise to a risk-based one. By defining patching timelines, escalation paths and ownership upfront, organizations can align IT and security around shared priorities. Instead of debating which issues to address first, teams can focus on execution.&lt;/p&gt;

&lt;p&gt;Clear timelines reduce friction by making remediation predictable instead of reactive. This consistency improves accountability, shortens exposure windows and builds trust between teams.&lt;/p&gt;

&lt;h2&gt;Non-negotiables vs. flexibility zones&lt;/h2&gt;

&lt;p&gt;One of the most important outcomes of endpoint governance is clarity around what's required and where flexibility is allowed.&lt;/p&gt;

&lt;p&gt;Non-negotiables are the baseline. This includes disk encryption, specific &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; timelines and mandatory enrollment before a device can touch sensitive data. Defining these controls upfront removes ambiguity and ensures a consistent security posture.&lt;/p&gt;

&lt;p&gt;Flexibility zones acknowledge that not all endpoints are the same. Different teams, roles and operating models may require tailored policies, especially in environments with BYOD, contractors or frontline workers. Governance defines where exceptions are permitted, how they are approved and how risk is managed when flexibility is granted.&lt;/p&gt;

&lt;p&gt;Without this distinction, organizations either over-restrict users or allow uncontrolled exceptions. With it, endpoint management becomes both enforceable and adaptable.&lt;/p&gt;

&lt;p&gt;Security teams know which controls cannot be compromised, while IT and the business retain the flexibility needed to support productivity. This balance makes endpoint governance enforceable and practical.&lt;/p&gt;

&lt;h2&gt;Building trust through shared dashboards and transparency&lt;/h2&gt;

&lt;p&gt;Even the best endpoint governance framework breaks down without shared visibility. When IT and security teams operate from different dashboards and reports, trust erodes and shadow decisions take root.&lt;/p&gt;

&lt;p&gt;These disconnects are often rooted in fragmented data pipelines, where endpoint information is incomplete, outdated or inconsistently updated across tools and systems. Shared dashboards only change that dynamic when they are built on continuously updated, reconciled data. &lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;Autonomous endpoint management&lt;/a&gt;, powered by AI, helps make this possible by automatically correlating endpoint signals across discovery, compliance, &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process"&gt;vulnerability and remediation&lt;/a&gt; data sources.&lt;/p&gt;

&lt;p&gt;When both teams rely on the same data — covering device inventory, compliance status, vulnerability exposure and remediation progress — conversations become grounded in facts rather than assumptions. Disagreements shift from “Whose data is right?” to “What issue should we tackle next?”&lt;/p&gt;

&lt;p&gt;Data transparency changes the culture from finger-pointing to IT and security collaboration. Instead of security saying they’ve found more unmanaged laptops, the conversation becomes: “We have a visibility gap – how do we close it?”&lt;/p&gt;

&lt;p&gt;Joint IT and security metrics such as time to discovery, percentage of fully managed endpoints and exposure duration create a common language for decision-making. AI-driven automation helps keep those metrics accurate and current. Shared dashboards reinforce accountability.&lt;/p&gt;

&lt;p&gt;When progress and gaps are visible to all stakeholders, endpoint governance stops being an abstract policy discussion and becomes a measurable, collaborative effort. This visibility is what turns governance from intent into execution.&lt;/p&gt;

&lt;h2&gt;Measuring the effectiveness of endpoint governance&lt;/h2&gt;

&lt;p&gt;Endpoint governance only works if organizations can measure whether it’s actually reducing risk and improving operations. Without clear KPIs and accessible data, governance quickly becomes a policy exercise rather than a practical discipline.&lt;/p&gt;

&lt;p&gt;In practice, effective measurement spans visibility, risk and operational performance.&lt;/p&gt;

&lt;h4&gt;Visibility and coverage metrics&lt;/h4&gt;

&lt;p&gt;Effective measurement starts with visibility. These metrics show whether endpoints are governed in practice, not just on paper.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Percentage of endpoints that are fully managed&lt;/li&gt;
	&lt;li&gt;Time to discover new or previously unknown devices&lt;/li&gt;
	&lt;li&gt;Number and persistence of unmanaged or unknown endpoints&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AI-powered automation supports continuous measurement here by tracking trends in coverage and policy drift over time rather than relying on point-in-time reports.&lt;/p&gt;

&lt;h4&gt;Risk and exposure metrics&lt;/h4&gt;

&lt;p&gt;Risk-based metrics help teams move beyond volume and focus remediation on what matters most.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure time for critical vulnerabilities&lt;/li&gt;
	&lt;li&gt;Devices with the highest risk based on context and access&lt;/li&gt;
	&lt;li&gt;Alignment of remediation activity to real-world exploitability&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These metrics help IT and security teams prioritize actions that have clear business impact, rather than chasing patch counts or compliance percentages alone.&lt;/p&gt;

&lt;h4&gt;Operational performance metrics&lt;/h4&gt;

&lt;p&gt;Operational metrics indicate whether endpoint governance is improving day-to-day execution and user experience.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reductions in endpoint-related security incidents&lt;/li&gt;
	&lt;li&gt;Faster onboarding and offboarding of users and devices&lt;/li&gt;
	&lt;li&gt;Fewer support tickets tied to endpoint configuration or patching issues&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over time, improvements in these indicators show whether automation, self-healing and policy enforcement are delivering measurable value.&lt;/p&gt;

&lt;p&gt;Endpoint governance KPIs must be reviewed jointly, with IT and security looking at the same data and course-correcting as needed. This reinforces accountability and enables continuous improvement. As environments evolve, policies, priorities and controls should evolve with them. Endpoint governance isn’t static — it’s an ongoing process that adapts as risk, technology and business needs change.&lt;/p&gt;

&lt;h2&gt;Defining ownership to scale endpoint management&lt;/h2&gt;

&lt;p&gt;Endpoint management doesn’t fail for lack of technology. It fails when ownership is unclear and governance is fragmented.&lt;/p&gt;

&lt;p&gt;As endpoints continue to diversify and work becomes more distributed, the question of who owns endpoint management can no longer be left ambiguous. Security, IT and the business all have a stake, and effective governance brings those perspectives together under a shared framework.&lt;/p&gt;

&lt;p&gt;When organizations establish clear ownership, define non-negotiables and operate from a shared view of endpoints, AI-powered automation helps endpoint management shift from reactive firefighting to proactive risk reduction. Shared dashboards, agreed-upon remediation timelines and continuous measurement replace ad hoc decisions and shadow policies.&lt;/p&gt;

&lt;p&gt;Success comes from treating endpoint management as a unifying, automation-first program. In practice, the pattern is clear: when visibility, shared ownership and governance come together, endpoints shift from a friction point to a foundation for resilience and collaboration.&lt;/p&gt;
</description><pubDate>Thu, 05 Mar 2026 13:30:01 Z</pubDate></item><item><guid isPermaLink="false">cb685e9c-f71b-4942-b89d-9bdac94452dc</guid><link>https://www.ivanti.com/blog/crq-risk-appetite-for-digital-vulnerability</link><atom:author><atom:name>Rob Lesieur</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-lesieur</atom:uri></atom:author><category>Endpoint Management</category><title>Risk Appetite, CRQ and Exposure Management: Closing the Loop on Cyber Risk</title><description>&lt;p&gt;Executives today operate in a constant state of pressure. Regulatory demands grow faster than budgets, customers expect proof of resilience and every system outage becomes a business event. When each function manages risk in isolation, leaders spend more time reacting than advancing strategy.&lt;/p&gt;

&lt;p&gt;The real issue is coherence. Most organizations still rely on partial instruments: dashboards filled with red and amber, but no clarity on which risks matter or what an outage would actually cost. Anyone updating risks once a year in a spreadsheet is flying the enterprise through fog without instruments. &lt;a href="/resources/v/doc/ivi/2873/4eb345cbbd7a" target="_blank"&gt;Cyber risk quantification&lt;/a&gt; (CRQ) brings those instruments in the form of credible metrics, realistic scenarios and ROI-based priorities.&lt;/p&gt;

&lt;p&gt;But measurement alone isn’t enough. &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;Risk appetite&lt;/a&gt; defines how much uncertainty an organization is willing to accept; &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; operationalizes that boundary. When CRQ, risk appetite and exposure management operate together, risk becomes a controllable variable — a closed loop that ties monitoring to strategy and action.&lt;/p&gt;

&lt;p&gt;The result is a system that reduces noise, sharpens priorities and enables leaders to balance security, profitability and innovation. And while measurement by itself is insufficient, it is the crucial first step for IT leaders.&lt;/p&gt;

&lt;h2&gt;Why measurement is the first act of leadership&lt;/h2&gt;

&lt;p&gt;You cannot manage what you cannot measure. A single “critical” label might conceal a $50,000 nuisance or a $5.4 million disaster. Without quantification, leadership decisions rely on instinct dressed up as process.&lt;/p&gt;

&lt;p&gt;Measurement is the first act of control. When risk is expressed in financial terms (e.g., probability of loss, potential impact, return on mitigation) security becomes a business function rather than a technical debate. It re-enters the language of value, cost and return. Investors and boards increasingly judge resilience as an indicator of governance maturity. Quantified risk doesn’t just support better posture — it stabilizes valuation and reinforces confidence in executive judgment.&lt;/p&gt;

&lt;h2&gt;Cyber risk quantification (CRQ): Turning guesswork into dollars&lt;/h2&gt;

&lt;p&gt;Cyber risk quantification provides the translation layer that business leaders need. It models what a specific threat could cost in dollars, how likely it is to occur and which factors amplify or reduce exposure. Inputs include internal metrics (e.g., production revenue per hour, contractual penalties, data-handling costs) augmented by actuarial models, such as those from Munich Re.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Left box titled “Inputs” listing “Revenue/hour,” “Penalties,” and “Actuarial models”; arrows feed into “Cyber risk quantification” (magenta, calculator icon), then into “Constraint layer: Risk appetite” (red, slider icon); outputs box on the right lists “Expected loss vs. tolerance,” “Likelihood relative to controls,” and “Decision options.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_1_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;CRQ reframes risk through three primary business impact categories. Each category has its own drivers and timeline, and ignoring those distinctions leads to flawed prioritization.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Business interruption: When systems fail, the cost clock starts running as production outages, penalties and lost revenues accumulate by the hour.&lt;/li&gt;
	&lt;li&gt;Data breach: Where damage unfolds in waves and cleanup, fines, legal action and the erosion of customer trust linger for years.&lt;/li&gt;
	&lt;li&gt;Financial theft and fraud: Compromised accounts, tampered transfers or false payment orders that inflict immediate losses.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;CRQ also reverses the usual IT tunnel vision. Rather than starting with vulnerabilities, it begins at the business-model level. It asks: what would this cost us and which processes would cause the greatest financial impact if they failed?&lt;/p&gt;

&lt;p&gt;The analysis uses company-specific data, such as hourly production revenue and contract penalties, cross-referenced with Munich Re’s actuarial models. The result: credible, actionable numbers. Executives can compare cyber investments to any other capital decision. Instead of "&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch all vulnerabilities,&lt;/a&gt;" the question becomes: which action reduces the most financial risk per dollar spent?&lt;/p&gt;

&lt;p&gt;That shift marks the moment cybersecurity joins the CFO’s balance sheet. And, when CISOs talk in dollars instead of acronyms, cybersecurity becomes a language of enterprise value rather than fear management.&lt;/p&gt;

&lt;h2&gt;Risk appetite: Setting the boundary of ambition&lt;/h2&gt;

&lt;p&gt;Quantification alone is instrumentation — not leadership. Leadership requires defining how much risk your organization is willing to accept in pursuit of its goals. That definition (i.e., your organization’s risk appetite) is the hinge between measurement and management.&lt;/p&gt;

&lt;p&gt;Every company balances ambition against exposure. A high-growth startup accepts volatility for potential upside while a regulated utility prizes stability over experimentation. Risk appetite transforms those instincts into policy, linking goals to thresholds, such as maximum loss, acceptable downtime and tolerance for reputational impact.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A horizontal gray arrow from “More aggressive” (left) to “More conservative” (right); a bracketed magenta segment labeled “Risk appetite,” with a purple triangle above the right side labeled “Risk posture.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_2_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;Defining risk appetite is both a quantitative and moral exercise. It signals not only how much loss a company is willing to bear but what kind of company it intends to be. Metrics like maximum loss and ROI coexist with softer judgments about values, reputation and ethics.&lt;/p&gt;

&lt;p&gt;When a &lt;a href="https://www.ivanti.com/ty/security/downloads/risk-appetite-statement"&gt;risk appetite statement&lt;/a&gt; (RAS) codifies those boundaries (distinguishing between risk capacity, tolerance and hard limits), leaders gain a common language for decision-making. For example, many organizations distinguish high appetite for innovation, moderate appetite for operations, minimal for security and low for compliance. Each organization must make these tradeoffs explicit.&lt;/p&gt;

&lt;p&gt;A clear RAS ensures alignment. Without it, departments drift; marketing pushes for speed while legal demands caution. Well-defined risk appetite balances that friction. It also supports trust — investors and regulators can see that risk governance is intentional, transparent and measurable. Key risk indicators then track performance against these thresholds, providing early warning before conditions deteriorate.&lt;/p&gt;

&lt;h2&gt;Exposure management: Where visibility meets control&lt;/h2&gt;

&lt;p&gt;Until it meets daily operations, risk appetite is theoretical. Exposure management operationalizes that boundary by unifying three disciplines: &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;attack surface management&lt;/a&gt; (ASM), &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt; (RBVM) and validation and remediation. This aligns with Gartner’s Continuous Threat Exposure Management (CTEM) model of scope, discover, prioritize, validate and mobilize.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Attack surface management (ASM): Provides visibility into every asset that could be attacked, including shadow IT.&lt;/li&gt;
	&lt;li&gt;Risk-based vulnerability management (RBVM): Contextualizes vulnerabilities by exploitability and business impact.&lt;/li&gt;
	&lt;li&gt;Validation and remediation: Confirms which threats are truly exploitable and whether fixes are effective.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="A purple circular wheel divided into three sections pointing inward to a red center labeled “Exposure management”; the segments read “Attack surface management,” “Risk‑based vulnerability management,” and “Validation and remediation,” with red arrows indicating continuous flow." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_3_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;In practice, exposure management is a living feedback loop between visibility and governance. Data aggregation breaks down silos by correlating vulnerabilities with asset value, while validation ensures theoretical models match reality. Remediation closes the loop automatically (through &lt;a href="https://www.ivanti.com/products/ivanti-neurons-itsm"&gt;integrated ITSM workflows&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;An online retailer, for example, may choose to tolerate higher risk on Black Friday to maximize revenue, but does so with heightened visibility and rapid mitigation. Security thus becomes dynamic equilibrium rather than reactive crisis management.&lt;/p&gt;

&lt;p&gt;Where traditional vulnerability management is reactive and incomplete, modern exposure management spans assets, endpoints, applications and clouds, adapting continuously to the organization’s defined risk appetite. Automation, escalation and real-time reporting ensure that leadership always knows where your organization stands, what an outage would cost and which actions deliver the greatest reduction in financial exposure.&lt;/p&gt;

&lt;h2&gt;The closed loop: Turning cyber risk into a controllable system&lt;/h2&gt;

&lt;p&gt;When cyber risk quantification, risk appetite and exposure management operate together, risk becomes a controllable variable — a closed economic and operational feedback loop.&lt;/p&gt;

&lt;p&gt;CRQ shows how much financial damage a vulnerability could cause. Risk appetite defines how much of that risk the organization is willing to accept. Exposure management ensures that the company’s attack surface aligns precisely with this threshold. Together, these three form a system of measurement, direction and control.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Without CRQ, the foundation is missing.&lt;/li&gt;
	&lt;li&gt;Without risk appetite, there is no strategy.&lt;/li&gt;
	&lt;li&gt;Without exposure management, there is no enforcement.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Three overlapping circles labeled “CRQ—Measurement” (top, purple with calculator icon), “Exposure management—Control” (left, orange with shield icon), and “Risk appetite—Direction” (right, magenta with slider icon); the intersections illustrate how measurement, control, and direction connect." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/194951_diagram_4_1200.png"&gt;&lt;/p&gt;

&lt;p&gt;This closed loop converts cybersecurity from a compliance obligation into a performance discipline. It gives executives the same levers they use everywhere else (metrics, thresholds and continuous feedback). Imagine board meetings where risk variance is discussed with the same fluency as margin variance, where resilience becomes a competitive KPI.&lt;/p&gt;

&lt;p&gt;For years, cybersecurity was the department of “no,” blocking ideas to prevent incidents. Quantification and exposure management transform it into the department of “how.” Leadership can now take calculated risks, prove the ROI of resilience and communicate in a language investors and regulators share: impact, probability and value at risk.&lt;/p&gt;

&lt;p&gt;Measured risk becomes managed value — and leadership finally regains forward momentum. Cybersecurity, once a brake on innovation, becomes the steering system for strategic confidence — the new language of foresight. Anything less is gambling and, in the end, only the attacker wins.&lt;/p&gt;
</description><pubDate>Tue, 13 Jan 2026 13:54:57 Z</pubDate></item><item><guid isPermaLink="false">fc33ed2b-c5b5-40e8-9203-f0e06e986278</guid><link>https://www.ivanti.com/blog/dll-hijacking-prevention</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint Management</category><category>Patch Management</category><category>Security</category><title>DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks</title><description>&lt;p&gt;There’s been buzz around &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-56383" rel="noopener" target="_blank"&gt;CVE-2025-56383&lt;/a&gt; (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code.&lt;/p&gt;

&lt;p&gt;The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organization. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.&lt;/p&gt;

&lt;h2&gt;What DLL hijacking is and how it happens&lt;/h2&gt;

&lt;p&gt;DLL hijacking (also known as a DLL preloading attack) is a security vulnerability where a legitimate and trusted Dynamic Link Library (DLL) file in a Windows application is replaced with a malicious one.&lt;/p&gt;

&lt;p&gt;This method exploits the way applications load DLL files, which contain code and data used by multiple programs. By loading a malicious DLL, a threat actor can execute their own code with the same privileges as the legitimate application, leading to privilege escalation, persistence and defense evasion.&lt;/p&gt;

&lt;p&gt;When a program starts, it often needs to load various DLLs to perform specific functions, typically from trusted system directories. However, if an application is not careful about where it looks for these DLLs, it might load a malicious DLL from an insecure or predictable location (i.e., the current working directory or a network share). This can happen if the application does not specify the full path to the DLL or if it searches for the DLL in a directory that can be accessed or modified by an attacker.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart showing DLL loading sequence. A purple box labeled “Application starts and requests DLL” connects to three folders: “Current Working Directory,” “Network Share,” and “System32.” The Current Working Directory points to a red box labeled “Malicious DLL” with a warning icon, while Network Share and System32 point to orange boxes labeled “Legitimate DLL” with checkmark icons." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;p&gt;While this type of attack is not new, it remains effective due to its simplicity. And although this specific issue pertains to Windows applications, it's important to call out that similar vulnerabilities can affect other operating systems (like Linux and macOS, which use dynamic loading for shared libraries).&lt;/p&gt;

&lt;p&gt;DLL hijacking introduces multiple security risks, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Data theft:&lt;/strong&gt; The malicious DLL can intercept and steal sensitive data, such as passwords or personal information.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Compromised systems:&lt;/strong&gt; The attacker can gain control over the system, potentially leading to further attacks or the installation of additional malware.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Malware:&lt;/strong&gt; The malicious DLL can act as a conduit for spreading malware, infecting other parts of the system or network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A DLL can be hijacked in several different ways; here are some of the most common techniques:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Insecure DLL search order:&lt;/strong&gt; Attackers place malicious DLLs in directories searched before the legitimate DLL's location.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Relative path manipulation:&lt;/strong&gt; Malicious DLLs are loaded when applications use relative paths.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DLL redirection:&lt;/strong&gt; Techniques like path manipulation redirect the DLL loading process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Weak permissions:&lt;/strong&gt; Attackers replace legitimate DLLs with malicious ones in directories with weak permissions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Phantom DLL hijacking:&lt;/strong&gt; Attackers exploit applications loading non-existent DLLs by placing malicious DLLs with the same name in searched directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Circular diagram divided into six colored segments around a center labeled “DLL Hijacking Techniques.” Segments include “Phantom DLL Hijacking,” “Insecure DLL Search Order,” “Relative Path Manipulation,” “DLL Redirection,” “Weak Permissions,” each with a small icon representing the concept." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-dll-hijackcing.png"&gt;These potential vulnerabilities highlight the importance of secure coding practices and directory permission management when it comes to preventing this form of attack.&lt;/p&gt;

&lt;h2&gt;How to prevent DLL hijacking and keep your DLLs safe and secure&lt;/h2&gt;

&lt;p&gt;Although DLL hijacking remains a threat, there are best practices you can follow and implement to reduce your risk for a safer, more secure IT environment.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Five concentric circles in gradient colors from orange to purple, representing security layers. The innermost circle reads “Secure DLL Loading,” followed by “Integrity Checks,” “User Permissions,” “App Control and Security Software,” and the outermost circle labeled “Patch Management.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram3-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;h3&gt;Secure DLL loading:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Use full paths:&lt;/strong&gt; Always specify the full path to the DLL when loading it. This ensures that the application loads the DLL from a trusted location (and not from an insecure directory).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Set the safe search path:&lt;/strong&gt; Use the SetDllDirectory function in Windows to add trusted directories to the search path and exclude insecure ones. This can help prevent the application from loading DLLs from unexpected locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;File integrity checks:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Digital signatures:&lt;/strong&gt; Ensure that DLLs are signed with a digital signature and verify the signature before loading the DLL. This can help confirm that the DLL has not been tampered with.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hash verification:&lt;/strong&gt; Use cryptographic hash functions to verify the integrity of DLL files. If the hash of the DLL does not match the expected value, the file may have been modified.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;User permissions:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Least privilege principle:&lt;/strong&gt; Run applications with the least privilege necessary. This limits the potential damage of a DLL hijacking, as the malicious code will have fewer permissions to execute harmful actions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;User Account Control (UAC):&lt;/strong&gt; Enable UAC on Windows systems to prompt users for permission before running applications with elevated privileges. This can help prevent unauthorized changes to system files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Application control and privilege management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Known and trusted applications:&lt;/strong&gt; Application control ensures that only known and trusted applications are launchable, removing the risk of unauthorized applications being introduced.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege control:&lt;/strong&gt; Effective privilege management is crucial in preventing DLL hijacking. By ensuring that applications have the correct rights and privileges to launch, you limit the ability of unauthorized users to introduce malicious files. This control acts as a key barrier, restricting the access an attacker needs to exploit the DLL search mechanism and thereby enhancing the security of your environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security software:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Antivirus and anti-Malware:&lt;/strong&gt; Use reputable antivirus and anti-malware software to detect and prevent the loading of malicious DLLs. These tools can scan for known malicious files and behaviors.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intrusion Detection Systems (IDS):&lt;/strong&gt; Implement IDS to monitor for unusual activity, such as unexpected changes to DLL files or attempts to load DLLs from insecure locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Patch management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Keep software updated:&lt;/strong&gt; Regularly update applications and operating systems with the latest security patches. Many DLL hijacking vulnerabilities are fixed via updates, so stay current to help protect against known threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated patching:&lt;/strong&gt; Use an &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;automated patch management tool&lt;/a&gt; to ensure that all systems are kept up to date without manual intervention. This reduces the window of opportunity for attackers to exploit known vulnerabilities, including those that could be used for DLL hijacking. This proactive approach helps maintain the integrity of your applications and operating systems, making it much harder for attackers to inject malicious DLLs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these best practices, you can significantly reduce the risk of DLL hijacking and enhance the overall security of your applications and systems.&lt;/p&gt;

&lt;h2&gt;Combine the right tools and tactics to prevent DLL hijackings&lt;/h2&gt;

&lt;p&gt;DLL hijacking has been a persistent form of attack for years, proving that it’s still effective and will therefore continue to be an issue for organizations.&lt;/p&gt;

&lt;p&gt;Future-proof your organization using the best practices mentioned above combined with proven solutions like &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Neurons for App Control&lt;/a&gt; to help keep your DLLs secure. Capabilities like Trusted Ownership catch and deny a hijacked DLL from being executed by ensuring that ownership of the items matches your approved list of trusted owners.&lt;/p&gt;

&lt;p&gt;And, keep your apps up to date to limit exposure to known vulnerabilities. Remove the risk of human error by automating patching with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt;, ensuring that systems are automatically updated and secured.&lt;/p&gt;
</description><pubDate>Wed, 17 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">75e30b1e-7956-4311-ae29-a5ea2a2f0539</guid><link>https://www.ivanti.com/blog/android-16-ios-26-stigs-mobile-threat-defense</link><atom:author><atom:name>Farhan Saifudin</atom:name><atom:uri>https://www.ivanti.com/blog/authors/farhan-saifudin</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Secure the Mobile Edge: Android 16 &amp; iOS 26 STIGs Require MTD</title><description>&lt;p&gt;Whether it’s Warfighters deployed in the field or remote analysts supporting missions across the globe, mobile devices make these operations possible. But, these endpoints (and your data) need serious protection.&lt;/p&gt;

&lt;p&gt;That’s where the Defense Information Systems Agency’s Security Technical Implementation Guides (STIG) come in, setting the baseline for hardened endpoint and application security.&lt;/p&gt;

&lt;p&gt;DISA has released new Android 16 and iOS 26 STIGs, and with each major operating system release, these STIGs are updated to ensure mobile security keeps pace with modern threats and capabilities. One of the most significant requirement changes this cycle is that all managed mobile devices must have a &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense (MTD) solution&lt;/a&gt; deployed to remain compliant.&lt;/p&gt;

&lt;p&gt;In this post I’ll&amp;nbsp;walk you through the importance of STIGs,&amp;nbsp;why MTD is critical to safeguarding sensitive data and how an MTD solution simplifies compliance across the mobile edge.&lt;/p&gt;

&lt;h2&gt;STIGs: The gold standard for device security&lt;/h2&gt;

&lt;p&gt;Think of STIGs as detailed guidelines that tell you exactly how to configure and lock down technology, software, hardware or entire systems to meet Department of War (DoW) security standards.&lt;/p&gt;

&lt;p&gt;STIGs ultimately help organizations protect Controlled User Information (CUI) and higher levels of data. Each STIG contains specific requirements (or “controls”) that make up the security baseline.&lt;/p&gt;

&lt;p&gt;They (and associated security requirements guides) are linked to security controls defined by &lt;a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final" rel="noopener" target="_blank"&gt;National Institute of Standards and Technology (NIST) Special Publication 800-53&lt;/a&gt;, breaking them down into actionable, measurable items.&lt;/p&gt;

&lt;p&gt;For example, a mobile device STIG might stipulate that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device passcodes must be complex, with at least X characters.&lt;/li&gt;
	&lt;li&gt;The device must encrypt all data.&lt;/li&gt;
	&lt;li&gt;USB debugging must be disabled.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;A mobile threat defense app must be installed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;U.S. military and government agencies rely on STIGs to harden systems that support mission-critical operations. While they’re mandatory for DoW&amp;nbsp;and federal agencies, many defense contractors, healthcare and finance organizations adopt STIGs because they represent proven security best practices.&lt;/p&gt;

&lt;p&gt;STIGs provide a baseline to help these organizations maintain compliance with a variety of requirements and policy mandates, such as Cybersecurity Maturity Model Certification (CMMC), NIST, CIS, HIPAA, etc.&lt;/p&gt;

&lt;h2&gt;Your new mandate: iOS 26 &amp;amp; Android 16 STIGs now require MTD&lt;/h2&gt;

&lt;p&gt;On the Apple side, the iOS 26/iPadOS 26 STIG added an explicit requirement: to remain compliant, an MTD app must be installed and managed on all DoW&amp;nbsp;iPhones and iPads.&lt;/p&gt;

&lt;p&gt;The latest Android 16 STIGs (i.e., Google Android 16 STIG and Samsung Android 16 STIG) introduce a clear mandate as well: a mobile threat defense (MTD) application must be deployed on every managed device. Failure to do so is flagged as a finding during compliance review.&lt;/p&gt;

&lt;p&gt;These controls underscore a pivotal shift: Mobile endpoint risk management is no longer just about configuration and lockdown settings. It now includes actively enforcing real-time mobile threat defense to prevent device, network, application and phishing attack vectors on modern devices.&lt;/p&gt;

&lt;p&gt;Here's the exact language on MTD from the Android 16 STIG:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"In the mobile device management (MDM) console, verify an MTD app is listed as a managed app being deployed to site-managed devices. If an MTD app is not installed on the device, this is a finding."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Translation: No MTD means you're out of compliance. It's that simple. However, deploying an MTD solution and ensuring it’s actively protecting against mobile threat vectors is more complex.&lt;/p&gt;

&lt;h2&gt;Integrating an MDM/MTD approach&lt;/h2&gt;

&lt;p&gt;Having worked with countless federal and enterprise organizations, I’ve seen firsthand what truly works in the field. Installing and managing an MTD agent is not enough to ensure active protection on mobile endpoints.&lt;/p&gt;

&lt;p&gt;Standalone MTD agents often require manual activation after installation and application programming interface (API) integrations with MDM solutions to take action.&amp;nbsp;The most effective approach requires &lt;a href="https://www.ivanti.com/blog/combining-mdm-and-mtd-for-strategic-security"&gt;tight integration between your MTD and MDM platforms&lt;/a&gt;, and an integrated MDM/MTD agent to ensure seamless activation and protection from mobile threats.&lt;/p&gt;

&lt;p&gt;A unified single-agent architecture enables continuous mobile threat protection while automatically enforcing MDM compliance controls, eliminating the complexity and gaps that come with managing separate solutions.&lt;/p&gt;

&lt;p&gt;That's where&amp;nbsp;Ivanti Neurons for Mobile Threat Defense comes into play. With Ivanti Neurons for Mobile Threat Defense integrated in both the SaaS-based Ivanti Neurons for MDM and on-prem-based Ivanti Endpoint Manager for Mobile (EPMM), you get a single-agent architecture that's seamless to users but gives administrators complete control and security visibility.&lt;/p&gt;

&lt;p&gt;This is what it looks like in practice:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automatic and scalable STIG baseline enforcement for Android and iOS.&lt;/li&gt;
	&lt;li&gt;Users experience a seamless workflow with no additional apps or agents to manage.&lt;/li&gt;
	&lt;li&gt;Risk visibility and policy management live in one unified console.&lt;/li&gt;
	&lt;li&gt;On-device threat protection works even in disconnected, deployed scenarios to protect against device, network, application and phishing attacks.&lt;/li&gt;
	&lt;li&gt;An integrated MDM that manages any modern operating system including iOS, Android, Windows, macOS or ChromeOS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;MDM &amp;amp; MTD for holistic mobile security&lt;/h2&gt;

&lt;p&gt;Deploying an MTD app is no longer optional. With the Android 16 and iOS 26 STIG both calling for MTD on managed devices via explicit controls, you can’t rely solely on MDM configuration baselines. You need active MTD that gives you holistic security.&lt;/p&gt;

&lt;p&gt;With mobile threat vectors like operating system vulnerabilities, malicious mobile apps, phishing via SMS/MMS and network man-in-the-middle attacks, rising rapidly, you need protection that lives on the device itself — not just in the cloud.&lt;/p&gt;

&lt;p&gt;Compliance, mission assurance and mobile edge security are top priorities for every modern organization. &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; delivers on all three. Providing STIG-aligned protection across Android and iOS devices, integrating seamlessly into your broader device management platform and defending against device, network, application and phishing attacks to keep your organization resilient and compliant.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/lp/security/demos/ivanti-mobile-threat-defense"&gt;Schedule a demo&lt;/a&gt; today to see how Ivanti Mobile Threat Defense can keep your agency’s data safe and your mobile fleet audit-ready. For full STIG references and downloads, consult the &lt;a href="https://www.cyber.mil/stigs/downloads/" rel="noopener" target="_blank"&gt;Defense Information System Agency’s (DISA) STIG library&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 03 Dec 2025 20:06:11 Z</pubDate></item><item><guid isPermaLink="false">ce8d12d4-669e-4bab-be1f-3bdffdcbdeda</guid><link>https://www.ivanti.com/blog/apple-business-manager-device-migration-what-you-need-to-know</link><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><category>Endpoint Management</category><title>Apple Business Manager Device Migration: What You Need to Know</title><description>&lt;p&gt;With Apple’s OS 26 release, IT admins using Apple Business Manager (ABM) or Apple School Manager (ASM) have a great new tool in their toolbelt: device migration. This makes switching devices between MDM platforms much easier, with minimal disruption for end users.&lt;/p&gt;

&lt;p&gt;Here, we’ll unpack what you need to know, and how &lt;a href="https://www.ivanti.com/blog/apple-wwdc25-announcements"&gt;ABM device migration&lt;/a&gt; makes it incredibly easy to switch to &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for MDM&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Key ABM device migration features&lt;/h2&gt;

&lt;p&gt;Apple’s new ABM device migration features make it easier to move devices between different &lt;a href="https://www.ivanti.com/use-cases/ensure-mobile-device-management"&gt;MDM solutions&lt;/a&gt;, without manual steps or interrupting users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;No manual re-enrollment.&lt;/strong&gt; You can transfer devices from one MDM server to another, or from one vendor’s MDM to another (including Ivanti Neurons for MDM), without erasing or manually re-enrolling devices. All existing user data and device configurations will automatically be applied during migration. The end user will be able to complete the re-enrollment with two guided clicks: one for restarting the device and one for re-enrollment into the new MDM.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enrollment deadlines.&lt;/strong&gt; This is the newest feature introduced by Apple in ABM and ASM. You can set and enforce deadlines for moving devices to the new MDM instance. If a device isn’t enrolled in time, it will be locked and the user will be asked to finish enrollment. With this deadline you will be able to trigger the automated process for re-enrollment in the new MDM. It will prompt the end user with screens to complete the re-enrollment seamlessly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;End user experience.&lt;/strong&gt; The end user experience won't notice any changes during migration, except if the enrollment deadline has passed. Once the migration is complete, the user will get a prompt to restart the device. After the device restarts, the end user will get a prompt to re-enroll the device in the new management solution, which takes one click.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API-driven.&lt;/strong&gt; The process can also be managed through the ABM or ASM portal using Apple’s new APIs (which you need to activate). This means that customers that use an API infrastructure can &lt;a href="https://developer.apple.com/documentation/applebusinessmanagerapi/create-an-orgdeviceactivity" rel="noopener" target="_blank"&gt;bulk assign or unassign devices&lt;/a&gt; with the new Apple ABM APIs without having to access the ABM console.&lt;/p&gt;

&lt;h2&gt;ABM device migration use cases&lt;/h2&gt;

&lt;p&gt;When would you use this feature? Here are a few key use cases.&lt;/p&gt;

&lt;h3&gt;Cloud migration&lt;/h3&gt;

&lt;p&gt;ABM device migration allows you to move from on-premises MDM to cloud-based MDM without re-enrolling devices. For Ivanti customers, this feature makes it easy to move to Ivanti Neurons for MDM from Ivanti Endpoint Manager (for MacOS) or Ivanti Endpoint Manager Mobile (for all Apple devices).&lt;/p&gt;

&lt;h3&gt;Switching MDM providers&lt;/h3&gt;

&lt;p&gt;ABM device migration simplifies switching from another MDM provider to Ivanti Neurons for MDM, or consolidating all type of devices (Android, Windows, Apple,) on a single platform from MDMs that only manage Apple devices, such as Jamf or Kandji.&lt;/p&gt;

&lt;h3&gt;School district device realignment&lt;/h3&gt;

&lt;p&gt;Educational institutions can realign devices between departments or campuses while maintaining all Apple management and assignment settings.&lt;/p&gt;

&lt;h3&gt;Mergers, acquisitions or reorganizations&lt;/h3&gt;

&lt;p&gt;If you’re combining or separating IT infrastructure due to M&amp;amp;A or reorganization, you can move devices to new MDM environments with minimal user disruption.&lt;/p&gt;

&lt;h2&gt;Setting up ABM device migration: a step-by-step guide&lt;/h2&gt;

&lt;h3&gt;Before you begin&lt;/h3&gt;

&lt;p&gt;There are two important considerations before you begin:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device migration &lt;em&gt;only&lt;/em&gt; works on devices running iOS 26, iPadOS 26 or macOS26 (or later). Make sure your devices are updated first.&lt;/li&gt;
	&lt;li&gt;You don’t need to make any changes on the MDM server side to support device migration, but target MDM servers should be prepared to receive new device assignments and enrollment requests.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Device Migration via the ABM console&lt;/h3&gt;

&lt;p&gt;Sign in to Apple Business Manager and navigate to &lt;strong&gt;Devices&lt;/strong&gt;. From here, use the search bar to find the target devices by serial number, order number or other identifiers. Then, select the devices you wish to set a migration deadline for.&lt;/p&gt;

&lt;p&gt;Next, review the device details: Click on the device to open its detailed view and confirm that it is assigned to the correct MDM server. You can now set the migration deadline.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture1.png"&gt;&lt;/p&gt;

&lt;p&gt;From here, click on &lt;strong&gt;Assign Device Management&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture2.png"&gt;&lt;/p&gt;

&lt;p&gt;In the pop-up, you can choose the new MDM organization that the device needs to be assigned to.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture3.png"&gt;&lt;/p&gt;

&lt;p&gt;Next, choose the deadline.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture4.png"&gt;&lt;/p&gt;

&lt;p&gt;Select the desired date and time for the deadline. This is the final date users have to migrate their device to the assigned MDM server. If users don’t follow the prompts they’ll be locked out the device. Then, click &lt;strong&gt;Continue&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture5.png"&gt;&lt;/p&gt;

&lt;p&gt;On the device the user will receive a notification to restart their device.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture6.png"&gt;&lt;/p&gt;

&lt;p&gt;After restarting, the device will request the user to enroll in the new management service.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Device Migration via the ABM console screenshot" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/picture7.png"&gt;&lt;/p&gt;

&lt;h3&gt;Device migration via APIs&lt;/h3&gt;

&lt;p&gt;Setting up ABM device migration via APIs is simple, and it’s done completely in ABM (or ASM), no matter which MDM you are switching to or from.&lt;/p&gt;

&lt;p&gt;First, log in to your Apple Business Manager or Apple School Manager account and navigate to &lt;strong&gt;Settings &amp;gt; Device Manager Settings&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Then, review and enable the required APIs to allow device migration. (If you’re not sure how, check the Apple admin guide for step-by-step help.)&lt;/p&gt;

&lt;p&gt;Once the APIs are enabled, you can simply follow Apple’s migration workflow to select devices and designate the new target MDM server. Optionally, you can set an enrollment deadline for migrated devices.&lt;/p&gt;

&lt;h2&gt;Additional ABM device migration resources&lt;/h2&gt;

&lt;p&gt;If you need more detailed information, you can refer to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/guide/deployment/welcome/web" rel="noopener" target="_blank"&gt;Apple Platform Deployment Guide&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/guide/apple-business-manager/welcome/web" rel="noopener" target="_blank"&gt;Apple Business Manager User Guide&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/guide/apple-school-manager/welcome/web" rel="noopener" target="_blank"&gt;Apple School Manager User Guide&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://success.ivanti.com/" target="_blank"&gt;Ivanti Success Portal&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Fri, 12 Sep 2025 17:27:33 Z</pubDate></item><item><guid isPermaLink="false">bdf44488-7004-4674-8533-cbf9b9dd3258</guid><link>https://www.ivanti.com/blog/what-is-badusb</link><atom:author><atom:name>Subhojit Roy</atom:name><atom:uri>https://www.ivanti.com/blog/authors/subhojit-roy</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>What Is a BadUSB? Understand the Threat and How to Prevent It</title><description>&lt;p&gt;Lurking beneath the convenience and everyday nature of USB devices is a sophisticated cybersecurity threat known as BadUSB.&lt;/p&gt;

&lt;p&gt;BadUSB is a type of attack that leverages the reprogrammable firmware in USB devices (e.g., flash drives, keyboards, charging cables) to carry out malicious actions. Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer.&lt;/p&gt;

&lt;p&gt;Here’s why security professionals consider BadUSB attacks a growing threat:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Plug-and-play nature — Users often trust USB devices implicitly, plugging in unknown or giveaway drives without a second thought.&lt;/li&gt;
	&lt;li&gt;Mass exploitation potential — Cybercriminals can distribute compromised USBs at events, in mail or even leave them in public places for victims to find and use.&lt;/li&gt;
	&lt;li&gt;Difficult to detect — Since the malware is embedded in the USB’s firmware, it bypasses most traditional antivirus and endpoint protection tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once connected to a computer, a BadUSB device can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Emulate a keyboard to type malicious commands.&lt;/li&gt;
	&lt;li&gt;Install back doors or keyloggers.&lt;/li&gt;
	&lt;li&gt;Redirect internet traffic.&lt;/li&gt;
	&lt;li&gt;Exfiltrate sensitive data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;&lt;img alt="examples of bad types of USB" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/169370-inline_devices_a.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;How BadUSB attacks work&lt;/h2&gt;

&lt;p&gt;BadUSB gained public attention in 2014 when researchers Karsten Nohl and Jakob Lell demonstrated at Black Hat USA that USB firmware could be reprogrammed for malicious use — undetectable by operating systems. They also revealed that most USB controllers lacked firmware authenticity checks, a vulnerability likely exploited by intelligence agencies like the NSA long before the public disclosure.&lt;/p&gt;

&lt;p&gt;Since BadUSB attacks manipulate a USB device’s firmware (the low-level code that controls how the device communicates with your system), understanding how a BadUSB attack unfolds is key to recognizing its severity and enacting safeguards.&lt;/p&gt;

&lt;p&gt;Below are three crucial aspects of BadUSB attacks to familiarize yourself with so you can eliminate this potential vulnerability:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reprogramming USB firmware&lt;/li&gt;
	&lt;li&gt;Masquerading as trusted devices&lt;/li&gt;
	&lt;li&gt;The timeline of a BadUSB attack&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Reprogramming firmware to turn USB devices into cyber weapons&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The ability to reprogram the firmware on USB devices (such as flash drives, keyboards, mice or network adapters) is at the heart of a BadUSB attack. Many USB controllers, especially older or inexpensive ones, allow people to rewrite their firmware without any authentication or digital signature checks.&lt;/p&gt;

&lt;p&gt;Once compromised, the USB device no longer behaves as its label suggests. Instead, it becomes a covert cyber weapon. Because firmware operates below the operating system level, traditional security tools cannot scan or detect these alterations.&lt;/p&gt;

&lt;h3&gt;Masquerading as trusted devices to avoid detection&lt;/h3&gt;

&lt;p&gt;One of the most dangerous aspects of BadUSB is device impersonation. Here are two of the most common disguises:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Keyboard emulation — A USB flash drive can be used as a keyboard (a trusted device type), then inject keystrokes that launch PowerShell or Command Prompt to download and execute malware — just as if a user were typing the commands manually.&lt;/li&gt;
	&lt;li&gt;Network adapter spoofing — The USB can pretend to be a network interface controller (NIC). Once connected, it can reroute your internet traffic through a malicious server, perform man-in-the-middle (MITM) attacks or intercept sensitive data, like login credentials.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Timeline of a BadUSB attack: From plug-in to payload&lt;/h3&gt;

&lt;p&gt;Here’s a simplified timeline of how a BadUSB attack can unfold:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Device insertion (0 seconds) — The user inserts the malicious USB device into their computer, expecting it to be a harmless flash drive, charging cable, etc.&lt;/li&gt;
	&lt;li&gt;Enumeration (0–2 seconds) — The device introduces itself to the operating system; not as a flash drive, but as a keyboard or network card.&lt;/li&gt;
	&lt;li&gt;Payload Execution (2–5 seconds) — When emulating a keyboard, the device begins typing commands silently in the background. When emulating a network adapter, it reconfigures the system’s DNS or routes traffic through a malicious proxy.&lt;/li&gt;
	&lt;li&gt;Post-Exploitation (5 seconds and beyond) — Depending on the attack goal, the device may:
	&lt;ul&gt;
		&lt;li&gt;Download and install back doors.&lt;/li&gt;
		&lt;li&gt;Steal files or login credentials.&lt;/li&gt;
		&lt;li&gt;Grant remote access to an attacker.&lt;/li&gt;
		&lt;li&gt;Spread across the internal network.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because this all happens within seconds, and without any antivirus alert or user prompt, a BadUSB attack can compromise a system before the user even realizes what happened.&lt;/p&gt;

&lt;h2&gt;Real-World BadUSB attack techniques&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;From Pavement to Breach: How a Forgotten USB Could Cripple a Government Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;u&gt;What happened&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Researchers conducted experiments by deliberately dropping USB drives in public areas, such as parking lots, university campuses and conference rooms to observe user behavior. According to &lt;a href="https://www.gdatasoftware.com/blog/2021/11/usb-drives-still-a-danger" rel="noopener" target="_blank"&gt;G DATA&lt;/a&gt;, an overwhelming 98% of these abandoned drives were picked up and at least 45% were plugged into computers to inspect their contents.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Similarly, a study by &lt;a href="https://elie.net/blog/security/concerns-about-usb-security-are-real-48-percent-of-people-do-plug-in-usb-drives-found-in-parking-lots" rel="noopener" target="_blank"&gt;Elie Bursztein&lt;/a&gt; and his team found that 48% of people who discovered a USB drive — regardless of the location — went on to plug it in. These findings highlight the significant risk posed by seemingly innocuous USB devices, driven largely by human curiosity or helpful intent.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;What made it a BadUSB scenario&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The USBs were crafted as malicious HID (Human Interface Device) implants (i.e., they weren’t carrying malware files but emulated keyboards that auto-typed attack commands once connected). They exploit user trust: no scanning by antivirus or clicking was required—the act of plugging the device in was enough to trigger the attack.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Key industry lessons from the study&lt;/u&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Social engineering is still incredibly effective&lt;/strong&gt;

	&lt;ul&gt;
		&lt;li&gt;The studies confirmed that attackers don’t need advanced zero-day exploits when they can rely on human psychology. Curiosity, helpfulness, or even the assumption of lost property can be weaponized.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Traditional security measures aren’t enough&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;Most endpoint protection tools scan for malware, but BadUSB attacks use keyboard emulation, bypassing antivirus and software-based defenses entirely. This showed a critical blind spot in endpoint security.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Air-gapped systems are not immune&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The fact that some USBs were plugged into secure or air-gapped environments was especially concerning. It shattered the illusion that physically isolated systems are inherently safe, and highlighted the importance of physical security and insider awareness.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Need for stronger device control policies&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;These results pushed many organizations to re-evaluate their USB and removable media policies. Tools like Ivanti Device Control became more relevant, offering the ability to allow, block, or restrict specific device classes.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Emphasis on user awareness and training&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The studies reinforced the necessity of employee education. Users must be trained to treat unknown devices as potential threats and understand that “plugging in to help” could lead to catastrophic outcomes.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Policy meets technology&lt;/strong&gt;
	&lt;ul&gt;
		&lt;li&gt;The takeaway wasn’t just technological. It prompted organizations to develop clear security policies around removable media, improve logging, and enforce stricter controls for physical access.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Rubber ducky attacks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ijert.org/unveiling-the-power-of-usb-rubber-ducky-an-analysis-of-its-hardware-capabilities" rel="noopener" target="_blank"&gt;Rubber ducky attacks&lt;/a&gt; refer to a type of cyberattack where an attacker uses a malicious USB device, often disguised as a harmless USB flash drive (called a rubber ducky), to compromise a computer system.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;Key points about rubber ducky attacks&lt;/u&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Device type&lt;/strong&gt; – Looks like a standard USB drive but functions as a Human Interface Device (HID), like a keyboard.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Working principle&lt;/strong&gt; – When plugged in, the Rubber Ducky emulates a keyboard and rapidly types pre-programmed keystrokes to execute commands on the target system.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Payloads&lt;/strong&gt; – These could include:
	&lt;ul&gt;
		&lt;li&gt;Opening a command prompt and downloading malware&lt;/li&gt;
		&lt;li&gt;Creating new user accounts&lt;/li&gt;
		&lt;li&gt;Disabling security features&lt;/li&gt;
		&lt;li&gt;Exfiltrating data&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Speed&lt;/strong&gt; – Executes commands far faster than a human could type, usually completing an attack in seconds.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;No authentication required&lt;/strong&gt; – Most systems automatically trust HID devices without user authorization.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;u&gt;Common mitigation measures&lt;/u&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Implement workstation lock policies when unattended.&lt;/li&gt;
	&lt;li&gt;Apply the principle of least privilege—prevent users from having local admin rights.&lt;/li&gt;
	&lt;li&gt;Educate employees on not leaving workstations unlocked and the risks of unknown USB devices.&lt;/li&gt;
	&lt;li&gt;Physical security (USB port locks, CCTV, and awareness).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Why traditional security solutions don’t detect BadUSB attacks&lt;/h2&gt;

&lt;p&gt;Despite the &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;ever-evolving cybersecurity landscape&lt;/a&gt;, BadUSB remains a stealthy and largely undetectable threat. Most traditional security solutions are simply not designed to monitor what happens at the firmware level of USB devices.&lt;/p&gt;

&lt;h3&gt;USB whitelisting limitations&lt;/h3&gt;

&lt;p&gt;Some organizations implement USB whitelisting, allowing only approved devices to connect to corporate systems. While this is a solid first step, it doesn’t protect against devices that masquerade as something they’re not doing.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A whitelisted USB flash drive could be reprogrammed to behave like a keyboard.&lt;/li&gt;
	&lt;li&gt;USB devices with dynamic identities can bypass static whitelists by switching their declared class mid-connection.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Since the operating system identifies devices based on what they say they are — not what they contain — a malicious device can trick even well-maintained whitelists.&lt;/p&gt;

&lt;h3&gt;Firmware-level reprogramming vs. traditional malware&lt;/h3&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Feature&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Firmware-Level Reprogramming (e.g., BadUSB)&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Traditional Malware&lt;/h4&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Operating level&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Operates at the firmware level (below the OS). Modifies device firmware (e.g., USB controller firmware).&lt;/td&gt;
			&lt;td&gt;Operates at the software level within the OS.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Location&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Lives outside the file system.&lt;/td&gt;
			&lt;td&gt;Resides within files, processes, or other OS components.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Detection&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Cannot be detected by software-based scanners (antivirus, EDR). Rarely (if ever) validated by traditional monitoring systems.&lt;/td&gt;
			&lt;td&gt;Detectable by antivirus programs and EDR tools (scanning files, processes, network traffic, known signatures/behaviors).&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Payload requirement&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Does not require a stored payload.&lt;/td&gt;
			&lt;td&gt;Typically relies on stored payloads (malicious files).&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Digital footprint&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Performs attacks without leaving a digital footprint in traditional monitoring systems.&lt;/td&gt;
			&lt;td&gt;Often leaves a digital footprint that can be traced by security tools.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Trust exploited&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Exploits the fundamental trust computers place in hardware devices (e.g., USB devices).&lt;/td&gt;
			&lt;td&gt;Exploits software vulnerabilities, user actions, or misconfigurations.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;th scope="row"&gt;
			&lt;h4&gt;Defense&lt;/h4&gt;
			&lt;/th&gt;
			&lt;td&gt;Requires hardware-aware policies, physical port control, and user education.&lt;/td&gt;
			&lt;td&gt;Relies on software defenses like antivirus, EDR, firewalls, and patching.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2&gt;BadUSB attack prevention: Best practices&lt;/h2&gt;

&lt;p&gt;As BadUSB attacks continue to bypass traditional security tools, organizations must shift toward proactive, layered defense strategies. Fortunately, there are effective prevention methods that can minimize or eliminate risks, including:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Policy-based USB access control&lt;/li&gt;
	&lt;li&gt;Blocking unused USB ports&lt;/li&gt;
	&lt;li&gt;Keystroke behavior monitoring&lt;/li&gt;
	&lt;li&gt;Restricting access to elevated command prompt or PowerShell&lt;/li&gt;
	&lt;li&gt;Application control&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;1. Policy-based USB access control&lt;/h3&gt;

&lt;p&gt;The first line of defense is to establish strict, policy-driven USB access across your organization. This means defining exactly which devices can connect to which systems and blocking all others.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Key strategies include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Blocking USB device classes that should never be used, such as HID (keyboard/mouse) on servers or point-of-sale systems.&lt;/li&gt;
	&lt;li&gt;Applying role-based restrictions to ensure that only authorized employees can use removable media.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these policies through centralized management, organizations can effectively prevent unknown threats. For businesses that require scalable, enterprise-level protection, device control solutions such as Ivanti Endpoint Manager (EPM) and Ivanti Device and Application Control (IDAC) offer robust security and management capabilities.&lt;/p&gt;

&lt;h3&gt;2. Block unused USB ports to eliminate attack entry points&lt;/h3&gt;

&lt;p&gt;One of the simplest yet most effective strategies to prevent BadUSB attacks is to &lt;strong&gt;physically or logically disable unused USB ports&lt;/strong&gt;. If a port isn’t needed for business-critical functions, you should deactivate it to: Reduces the attack surface by limiting opportunities for unauthorized devices to connect.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Prevents users from accidentally (or intentionally) plugging in malicious USB devices.&lt;/li&gt;
	&lt;li&gt;Supports compliance with security frameworks that require strict endpoint control.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To implement this security protocol:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Use BIOS/UEFI settings to disable USB ports at the hardware level.&lt;/li&gt;
	&lt;li&gt;Leverage endpoint management tools (like &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti EPM&lt;/a&gt;) to block USB ports through policy.&lt;/li&gt;
	&lt;li&gt;Apply physical port blockers for high-security environments where tamper-proofing is essential.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By eliminating open and unmonitored USB ports, you can dramatically reduce the risk of drive-by BadUSB infections and maintain tighter control over endpoint security for your entire organization.&lt;/p&gt;

&lt;h3&gt;3. Detecting BadUSB with keystroke behavior&lt;/h3&gt;

&lt;p&gt;BadUSB attacks often use HID (Human Interface Device) spoofing to inject commands via simulated keyboard inputs. These keystrokes happen at inhuman speeds — far beyond what any human user could produce.&lt;/p&gt;

&lt;p&gt;For example, a malicious USB might type a full PowerShell command in less than a second after being plugged in. By monitoring typing speed, timing patterns and command structures, security software can flag and respond to suspicious input activity before damage occurs.&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Even so, one of the major disadvantages of keystroke behavior monitoring is that skilled attackers can slow down payload delivery to mimic human typing speeds and potentially evade detection.&lt;/p&gt;

&lt;h3&gt;4. Restrict access to elevated command prompt or PowerShell&lt;/h3&gt;

&lt;p&gt;BadUSB devices are dangerous not just because they connect to a system, but because they execute high-privilege commands almost instantly. One of the most common tactics is launching an elevated command prompt or PowerShell window to run malicious scripts, download payloads, or modify system settings.&lt;/p&gt;

&lt;p&gt;By restricting access to administrative command-line tools, you can effectively neutralize the payload execution stage of many BadUSB attacks — even if the device successfully connects.&lt;br&gt;
&amp;nbsp;&lt;br&gt;
Implementing Just-in-Time (JIT) Privileged Access for command prompt and PowerShell is an excellent way to minimize attack windows while still allowing necessary administrative activity.&lt;/p&gt;

&lt;h3&gt;5. Deploy application control to mitigate BadUSB risks&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/application-control"&gt;Application control&lt;/a&gt; is a security approach that only allows approved and verified applications to be executed within a system or network. Instead of trying to identify and block bad behavior, it whitelists only known good behavior.&lt;/p&gt;

&lt;p&gt;More specifically, application control helps you:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Block unauthorized executables — BadUSB attacks often try to launch scripts or applications upon connection. Application control ensures that only whitelisted executables are allowed to run, immediately halting the attack before it can escalate.&lt;/li&gt;
	&lt;li&gt;Prevent unauthorized code execution — If a BadUSB device tries to emulate a keyboard and inject keystrokes to open PowerShell or command prompt, application control can prevent these programs from executing (unless they are specifically allowed).&lt;/li&gt;
	&lt;li&gt;Implement hardware-aware policies — Some advanced application control solutions can implement device-specific policies (e.g., blocking all keyboard-like inputs from unknown USB vendors, restricting USB ports to charge-only functionality).&lt;/li&gt;
	&lt;li&gt;Reduce attack surfaces — By strictly controlling what software is allowed, even if a Bad USB bypasses physical protections, its ability to interact with the system is extremely limited.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How Ivanti Endpoint Management and Ivanti Device Application Control help prevent BadUSB attacks&lt;/h2&gt;

&lt;p&gt;Grant temporary (just-in-time) access to the USB devices only when necessary. Initially, a complete block — such as targeting tools like the flipper device — was considered. However, after evaluating feasibility and business impact, this approach was determined to be too restrictive.&lt;/p&gt;

&lt;p&gt;Instead, &lt;a href="https://www.ivanti.com/use-cases/endpoint-application-control"&gt;Ivanti Endpoint Management and Device Application Control&lt;/a&gt; provide a more flexible solution. They help mitigate BadUSB threats by allowing controlled device access and applying the right security policies. This approach balances protection with productivity, reducing risk without hindering legitimate use.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/169370-inline_devices_b.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Conclusion: Why BadUSB Awareness Matters&lt;/h2&gt;

&lt;p&gt;As cyber threats continue to get more sophisticated, awareness is your strongest first line of defense. BadUSB attacks represent a unique and underestimated vulnerability — one that bypasses traditional defenses by exploiting the inherent trust most people place in USB devices. Without awareness and proactive control, even the most secure networks can fall victim to a single compromised USB device.&lt;/p&gt;

&lt;p&gt;Unfortunately, most organizations don’t fully monitor or control how these devices are used, leaving a massive blind spot in their security infrastructure. Implementing a clear USB security policy — along with the right tools to enforce it — is no longer optional. It’s essential.&lt;/p&gt;

&lt;h3&gt;Trust Ivanti for BadUSB attack prevention and superior device control&lt;/h3&gt;

&lt;p&gt;Organizations serious about mitigating USB-based threats should consider leveraging comprehensive device control solutions like &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti Endpoint Manager (EPM)&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/device-control"&gt;Ivanti Device Application Control (IDAC)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Ivanti’s solution addresses all the key application controls recommended to defend against threats like BadUSB offering granular USB access controls to block or allow specific device types, real-time monitoring and reporting of USB activity across all endpoints, and automated policy enforcement that ensures compliance across departments and regions. These capabilities integrate seamlessly with broader endpoint protection strategies, preventing unauthorized devices from ever reaching sensitive systems. But Ivanti goes beyond these foundational controls with context-aware policy enforcement, allowing organizations to dynamically adjust USB access based on real-time risk signals such as user behavior, location, and device trust — providing intelligent, adaptive protection in an ever-evolving threat landscape.&lt;/p&gt;

&lt;p&gt;BadUSB is not science fiction—it’s already happening. Educating your team, enforcing USB access policies, and leveraging tools like Ivanti can mean the difference between resilience and breach. Don’t wait for a compromised device to remind you of the risks. Take control now.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 29 Jul 2025 19:43:10 Z</pubDate></item><item><guid isPermaLink="false">fca97924-8898-4e8f-8a1c-4939336dc448</guid><link>https://www.ivanti.com/blog/automate-windows-11-migration</link><atom:author><atom:name>Dan Lahan</atom:name><atom:uri>https://www.ivanti.com/blog/authors/dan-lahan</atom:uri></atom:author><category>DEX</category><category>Endpoint Management</category><category>Service Management</category><title>Your Windows 11 Migration Is Looming – but There’s a Bot for That</title><description>&lt;p&gt;I recently spoke with a CIO who had committed a large amount of IT resources to manually migrating computers from Windows 10 to Windows 11. The process required months of planning, device assessments, compatibility testing and hands-on coordination to avoid disruptions to day-to-day business operations. While their dedication ensured their rollout was on track for the looming Windows 11 end-of-support date, it highlighted the strain such projects place on internal teams.&lt;/p&gt;

&lt;p&gt;My conversation with this CIO isn’t unique. Before becoming an Account Technology Strategist here at Ivanti, I worked in various roles in IT support and still bear the scars of the Windows XP to Windows 7 migration. I also spent years helping organizations plan, execute and troubleshoot OS upgrades — often under tight timelines, with limited resources.&lt;/p&gt;

&lt;p&gt;Automation is key to any major upgrade project. It improves overall IT efficiency, reducing labor costs and human errors. In this blog, I’ll show you how you can use automation in your Windows 11 migration and where Ivanti Neurons bots can help.&lt;/p&gt;

&lt;h2&gt;Assess the fleet&lt;/h2&gt;

&lt;p&gt;Before starting any project, &lt;a href="https://www.ivanti.com/use-cases/discover-and-manage-assets"&gt;asset discovery&lt;/a&gt; is key: you can’t upgrade something you don’t know exists or isn’t really there. One Ivanti customer discovered that they had 30% more assets than they expected on their network! This echoes a study from Gartner that found 30% of IT fixed assets are "ghost" assets, or missing and can't be found, which further complicates the task.&lt;/p&gt;

&lt;p&gt;Data that exists outside of the device, such as device warranty, is important too. Perhaps upgrading a device with three months’ warranty left isn’t really worth it — it may be replaced through a refresh cycle soon anyway, leaving more disruption for users.&lt;/p&gt;

&lt;p&gt;A step you can automate is evaluating whether each device meets Microsoft’s minimum hardware requirements, which you can do in &lt;a href="https://www.ivanti.com/resources/bot-library/device-optimization/windows-11-upgrade"&gt;Ivanti Neurons using the Windows 11 Upgrade bot&lt;/a&gt;. Then, devices that don’t meet the necessary criteria can be flagged with an automatic ticket in your service or asset management solution. This helps provide the right data to IT-adjacent teams like Procurement for financial planning and purchasing new hardware.&lt;/p&gt;

&lt;h2&gt;Create a baseline for end-user experience&lt;/h2&gt;

&lt;p&gt;Creating a baseline helps IT measure the impact of the upgrade, identify potential areas of improvement to review post-upgrade and ensure that the new operating system meets or exceeds current performance levels. It also provides a point of reference for troubleshooting should any issues arise post-upgrade. This data is gold dust for the service desk team, who will be on hand to support users.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;One way to create a baseline is with a &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex"&gt;DEX&lt;/a&gt;, or digital experience, score (which you can do in Ivanti Neurons). This quantifies the quality of an employee’s digital experience by aggregating data from various indicators like CPU usage, memory performance, application crashes, disk space and battery health. For example, excessive CPU usage or frequent application crashes can lower the score, while optimal performance in these areas contributes to a higher score. Sentiment analysis of service management incidents can also provide qualitative data that impacts the &lt;a href="https://help.ivanti.com/ht/help/en_US/CLOUD/vNow/dex-scores.htm" target="_blank"&gt;DEX score&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Surveying the end user bolsters telemetry-based metrics in the DEX score. Surveys provide IT with an early indicator of problems — but you can’t ask too many questions before the end user hits the dreaded mute button! A simple emoji response via Microsoft Teams gives you an empirical response, and a free text field gets user sentiment feedback.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture1.png"&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture2.png"&gt;&lt;/p&gt;

&lt;p&gt;So how do you analyze the data at scale? Feeding these insights into AI for sentiment analysis lets you interpret the tone and emotion to detect frustration or satisfaction levels.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture3.png"&gt;&lt;/p&gt;

&lt;p&gt;One big takeaway from any migration is its impacts on end users. IT should want the end user to feel part of the process, if not own it!&lt;/p&gt;

&lt;h2&gt;Put the user at the center of the W11 migration&lt;/h2&gt;

&lt;p&gt;At this stage, we have devices suitable to upgrade and know our baseline. Now it’s time to interact with the end user.&lt;/p&gt;

&lt;p&gt;IT leaders are all too aware of the potential impact that changes like system upgrades or new software deployments can have on end users, but this awareness doesn’t always translate into action. In the push to beat pending deadlines like Windows 10 End of Support, user experience considerations can be overlooked, leading to disruptions, frustration (reduced CSAT) or decreased productivity.&lt;/p&gt;

&lt;p&gt;You can use automation, like the Windows 11 Upgrade bot, to keep the user in the loop, providing them a reason for the change and allowing them to schedule the upgrade at a convenient time.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/combo.png"&gt;&lt;/p&gt;

&lt;h2&gt;Validate changes with end users&lt;/h2&gt;

&lt;p&gt;When changes like system updates are made to their computers, end users often face disruptions to their familiar workflows. A major change like upgrading to Windows 11 can lead to confusion, reduced productivity and frustration, especially if the upgrade was unexpected or poorly communicated. Users may struggle to find previously accessible features, encounter compatibility issues, or experience slower performance, all of which can create a sense of being unsupported.&lt;/p&gt;

&lt;p&gt;Surveys have shown that knowledge workers experience such issues &lt;a href="/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook" target="_blank"&gt;3–4 times per day&lt;/a&gt; and often don’t raise support cases. A bot like the Ivanti Neurons Survey bot can be used here, capturing end user sentiment and feedback. So far, automation has done much of the hard work in your Windows 11 migration, but there will always be humans … as it stands anyway! A survey offers an opportunity to bring a human into the loop where applicable.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/picture6.png"&gt;&lt;/p&gt;

&lt;h2&gt;Software updates – and more! – with Ivanti Neurons bots&lt;/h2&gt;

&lt;p&gt;So, you’ve read a little of how the &lt;a href="https://www.ivanti.com/resources/bot-library/device-optimization/windows-11-upgrade"&gt;Windows 11 bot&lt;/a&gt; works. This is just one use case for an Ivanti Neurons bot. The same principles can also apply to major upgrades of any software, but also to a wide array of automation use cases on devices:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Reduce IT operational costs by automating manual steps.&lt;/li&gt;
	&lt;li&gt;Limit opportunities to introduce human error through manual processes.&lt;/li&gt;
	&lt;li&gt;Ensure the user is engaged and, crucially, happy with the process and their new operating system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Neurons bots help IT teams proactively identify, diagnose, and resolve issues across endpoints and devices, often before users even notice the problem. Bots communicate with devices in real time, run queries and perform actions to keep systems healthy and secure.&lt;/p&gt;

&lt;p&gt;You can check out some of the ways our bots help automate, accelerate and enhance IT operations, freeing up time for you to work on what matters, by visiting the &lt;a href="https://www.ivanti.com/resources/bot-library"&gt;Bot Library&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 28 Jul 2025 19:31:10 Z</pubDate></item><item><guid isPermaLink="false">701f3765-2d1a-4e95-86e2-42564105482d</guid><link>https://www.ivanti.com/blog/windows-11-migration-strategy</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint Management</category><category>Patch Management</category><title>Windows 11 Migration: Ivanti's Customer Zero Journey with Win11 Upgrades</title><description>&lt;p&gt;Windows 11 offers enhanced security and a modern user interface, but the transition can be complex for large organizations, with logistical and employee buy-in challenges. Microsoft will end support for Windows 10 on October 14, 2025, so it's crucial to start planning and executing Windows 11 deployments now.&lt;/p&gt;

&lt;h2&gt;The need to migrate to Windows 11&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for staying current, secure and efficient. It provides advanced security features like stronger encryption and improved threat detection, safeguarding your data and enhancing IT resilience. The user-friendly interface also streamlines daily tasks, boosting productivity. With Microsoft ending support for Windows 10 this year, upgrading can help organizations avoid increased security risks and potential downtime. According to &lt;a href="https://www.gartner.com/en/documents/6338779" rel="noopener" target="_blank"&gt;Gartner&lt;/a&gt;, many enterprises are opting to replace even compatible machines with new hardware to ensure optimal performance with Windows 11. Proactive planning ensures a smooth and seamless transition.&lt;/p&gt;

&lt;h2&gt;Ivanti’s use-case for Windows 10 to Windows 11 migration&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve been successfully rolling out Windows 11 migrations since the beginning of 2025. Like many large organizations, this migration is something we’ve been discussing and planning for quite some time. The goal is to update every eligible machine in a timely manner and triage ineligible machines for further troubleshooting or replacement.&lt;/p&gt;

&lt;p&gt;To meet this goal, we prioritized using our own Ivanti Neurons platform solutions, which equipped us with the proactive tools and insights necessary for a successful Windows 11 deployment. Using a phased approach, we were able to identify and address issues coming back from early adopters and gather valuable feedback. Once we saw validation of our plan, we could gradually roll out the upgrade to the rest of the organization, ensuring a smoother migration overall.&lt;/p&gt;

&lt;h2&gt;Potential challenges&lt;/h2&gt;

&lt;p&gt;Like any other company, we wanted to get ahead of any potential barriers to a successful migration.&lt;/p&gt;

&lt;h3&gt;Hardware compatibility and unknown devices&lt;/h3&gt;

&lt;p&gt;One of the biggest challenges in upgrading to Windows 11 is meeting the hardware requirements. Many existing devices may not satisfy Microsoft's strict criteria, limiting the number of eligible machines. This can be especially problematic for organizations with a mix of older hardware. To tackle this, Ivanti’s IT team used our discovery capabilities to perform a thorough inventory and assessment of all devices, identifying those that would need to be upgraded or replaced before starting the migration. You can’t migrate devices you don’t know about, which made a comprehensive view of our IT landscape a key first step.&lt;/p&gt;

&lt;h3&gt;End-user friction and disruptions to productivity&lt;/h3&gt;

&lt;p&gt;User resistance to new interfaces and features can be another barrier to success. Change can be daunting, and the new look and features of Windows 11 may intimidate users accustomed to older versions. OS upgrades can also cause disruptions to users’ work, causing frustrations and downtime. To minimize these issues, Ivanti’s IT team wanted to make sure that updates were happening at a time most convenient to the end user to avoid losing unsaved work or disrupting productivity in general.&lt;/p&gt;

&lt;h3&gt;Continuing security updates with extended support&lt;/h3&gt;

&lt;p&gt;Not every machine can immediately upgrade to Windows 11 due to hardware requirements. However, Ivanti’s extended support will allow us to continue Windows 10 security updates past October, keeping these devices protected and functional.&lt;/p&gt;

&lt;p&gt;Ivanti’s Extended Security Update (ESU) deployment streamlines the patching process, reduces IT workload and maintains compliance with regulations like GDPR, HIPAA, or PCI-DSS. Unpatched systems face over 1,200 vulnerabilities annually, and a data breach can cost an average of $4.45 million, according to &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;IBM&lt;/a&gt;. We need to make sure that any devices that don’t update to Windows 11 are kept safe and secure from vulnerabilities.&lt;/p&gt;

&lt;p&gt;Extended support also helps us extend our device lifecycle for devices that aren’t quite ready to be replaced, or when budget constraints are a factor. According to Gartner, many enterprises are still delaying purchases despite the need to move from Windows 10 to Windows 11, extending the lifecycle of their existing equipment and seeking alternatives to maximize their budgets. Ivanti’s ESU solutions help extend the lifespan of these devices, avoiding the high costs of a full hardware refresh. This ensures seamless patching, minimizes security risks and reduces manual IT effort, helping us avoid potential losses and disruptions.&lt;/p&gt;

&lt;h2&gt;Ivanti’s Windows 11 migration workflow&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons allowed us to automate key elements of the migration, from the initial device assessment to the upgrade itself, streamlining each phase and allowing our IT team to concentrate on other mission-critical activities. In general, here is how the workflow for updating devices from Windows 10 to Windows 11 looks at Ivanti.&lt;/p&gt;

&lt;h3&gt;1. Preparation&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Identify Devices:&lt;/strong&gt; Create a group of Windows 10 devices that need to be upgraded.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Download Files:&lt;/strong&gt; Push necessary files to the devices, ensuring efficient data transfer by using ZIP files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;2. Pre-Check&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Eligibility Check:&lt;/strong&gt; Run PowerShell scripts to verify if the device meets the hardware requirements for Windows 11.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Power Check:&lt;/strong&gt; Ensure the device is connected to A/C power.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;3. User Interaction&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Notification:&lt;/strong&gt; Use Teams bot integration to notify users about the upgrade and allow them to schedule it.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Consent:&lt;/strong&gt; Users provide consent for the upgrade via an interactive Teams message.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="it notices" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/win11screenshot.png"&gt;&lt;/p&gt;

&lt;h3&gt;4. Upgrade Execution&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run Upgrade:&lt;/strong&gt; Execute the Windows Update Assistant to perform the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitor Progress:&lt;/strong&gt; Track the upgrade process and handle any errors or issues that arise.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;5. Post-Upgrade Actions&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Restart Device:&lt;/strong&gt; Prompt users to restart their devices to complete the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Activation Check:&lt;/strong&gt; Verify that the device is activated with an enterprise license key.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Additional Updates:&lt;/strong&gt; Apply any necessary Windows updates post-upgrade.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;6. Error Handling&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Automated Ticket Creation:&lt;/strong&gt; Use a bot to generate tickets for devices that fail the upgrade process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Troubleshooting:&lt;/strong&gt; Enterprise services team handles cases where devices cannot be upgraded automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;7. Continuous Improvement&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Refinement:&lt;/strong&gt; Break down the upgrade process into smaller automated steps to streamline operations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Feedback:&lt;/strong&gt; Incorporate user feedback to improve the upgrade experience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This workflow ensures a smooth transition from Windows 10 to Windows 11 while minimizing disruptions and handling exceptions efficiently. This process has been rolled out gradually, taking it one week at a time. It’s been thoughtful and intentional, working to build this process and workflow for the future by ensuring it’s flexible and modular. That way, we can revisit a similar process for the next generation of Windows whenever it comes.&lt;/p&gt;

&lt;h2&gt;Ready to start your Windows 11 migration?&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for maintaining security, efficiency and compliance. Ivanti has leveraged our own solutions to automate key steps, gather user feedback and provide extended security updates for ineligible devices, all while ensuring a smooth transition that minimizes end-user disruption and maximizes IT efficiency.&lt;/p&gt;

&lt;p&gt;Ivanti’s approach and workflow not only addresses current challenges but also sets up a flexible and modular foundation for future OS upgrades.&lt;/p&gt;

&lt;p&gt;Ready to start your own Windows 11 migration? Learn how Ivanti Neurons can simplify and automate the process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Explore Ivanti Neurons&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 21 Jul 2025 15:46:23 Z</pubDate></item><item><guid isPermaLink="false">31bf4b1c-e4f6-4de2-8af2-9da46c453fd4</guid><link>https://www.ivanti.com/blog/apple-wwdc25-announcements</link><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><category>Endpoint Management</category><title>Apple WWDC25 Announcement of Enterprise IT Enhancements</title><description>&lt;p&gt;At WWDC25, Apple announced a set of updates to simplify IT management for enterprises. These updates, spread across macOS 26, iOS 26, iPadOS 26, tvOS 26 and visionOS 26, introduce practical tools to improve device, application and user management.&lt;/p&gt;

&lt;p&gt;This article outlines the specific capabilities and how they can be applied effectively in enterprise environments.&lt;/p&gt;

&lt;h2&gt;Enhanced Apple Business Manager for flexible device management&lt;/h2&gt;

&lt;p&gt;Apple Business Manager (ABM) improvements in iOS 26, iPadOS 26 and macOS 26 bring enhanced flexibility to enterprise IT operations. Being able to migrate devices between &lt;a href="https://www.ivanti.com/autonomous-endpoint-management/mobile-device-management"&gt;Mobile Device Management (MDM)&lt;/a&gt; solutions means that businesses can react to evolving technological requirements or vendor changes without needing to reconfigure devices manually. For example, an organization switching to one of Ivanti’s on-premises solutions to Ivanti Neurons for MDM can retain operational continuity by utilizing the new ABM Device Migration APIs while aligning configurations with the latest policies.&lt;/p&gt;

&lt;p&gt;Administrators can now enforce enrollment deadlines for Managed Apple Accounts, helping enterprises integrate new devices into their IT systems on schedule. This feature is particularly helpful for compliance with internal policies or regulatory requirements, ensuring devices are accounted for during deployments.&lt;/p&gt;

&lt;p&gt;Enhanced onboarding processes with Account Driven Enrollments, supported by the Service Discovery API, simplify enrollment by enabling preconfigured settings to guide users through setup. This reduces time spent onboarding large numbers of employees or devices.&lt;/p&gt;

&lt;p&gt;Organizations can also bolster account security with stricter access controls. By allowing only Managed Apple Accounts during device setup and login, enterprises can prevent personal accounts from compromising company data or workflows. Additionally, including warranty and AppleCare coverage details lets enterprises plan for the entire lifecycle of their devices, optimizing replacement or support strategies to maintain productivity while minimizing downtime.&lt;/p&gt;

&lt;h2&gt;Modernized app management with Declarative Device Management&lt;/h2&gt;

&lt;p&gt;Declarative Device Management (DDM) updates provide better tools for managing app lifecycles in enterprise environments. Administrators get granular control over app installations and updates, so you can enforce mandatory upgrades for security-critical applications or postpone non-essential updates to avoid disruptions during critical operations. Similarly, the ability to pin apps to specific versions can stabilize environments where software dependencies are tightly coupled.&lt;/p&gt;

&lt;p&gt;Real-time reporting of app installation and update statuses offers IT teams actionable insights into compliance and troubleshooting. For instance, administrators managing thousands of devices can track which apps are outdated or whether installation errors occurred, resolving issues without delays. Furthermore, organizations managing extensive mobile fleets can restrict app downloads over cellular data to conserve bandwidth and ensure adherence to security policies, useful in industries with strict data regulations or cost-control measures.&lt;/p&gt;

&lt;p&gt;Updates to macOS 26 let enterprises scale their device operations more effectively. Declarative Application Management lets administrators deploy apps — whether they are from the App Store or custom-built solutions — across thousands of devices simultaneously, streamlining rollouts during enterprise deployments or product launches. The ability to deploy .pkg files caters to organizations relying on proprietary software or specific configurations.&lt;/p&gt;

&lt;p&gt;VisionOS 26 also supports deploying managed applications via DDM.&lt;/p&gt;

&lt;h2&gt;Improved Safari configuration for efficiency and compliance&lt;/h2&gt;

&lt;p&gt;Safari updates bring practical configuration tools that enterprises can use to align browser settings with organizational needs. Administrators can now preconfigure bookmarks to direct employees to relevant software tools, company websites or knowledge bases upon login, reducing onboarding times and improving workforce efficiency. You can set landing pages to match company branding and guarantee employees start their browsing sessions on compliant and secure portals, which is especially useful for maintaining organizational policies.&lt;/p&gt;

&lt;h2&gt;Better audio accessory management for shared device scenarios&lt;/h2&gt;

&lt;p&gt;For shared device deployments, such as in healthcare, education or retail, Apple’s enhanced audio pairing management introduces useful controls to maintain security while enabling flexibility. Administrators can allow temporary audio accessory pairing without data syncing to iCloud, ensuring that employee or customer data is not inadvertently retained on shared devices. For added security, pairing data can be erased automatically based on predefined schedules, such as each night.&lt;/p&gt;

&lt;p&gt;These controls are critical for shared environments where sensitive data protection and operational continuity are key. For example, hospitals using shared iPads for patient intake can ensure that data is cleared between users while still enabling seamless accessory use for each individual session.&lt;/p&gt;

&lt;h2&gt;Platform Single Sign-On for simplified authentication&lt;/h2&gt;

&lt;p&gt;The new Platform Single Sign-On (SSO) tools in macOS 26 reduce friction during the authentication process for enterprise employees. Platform SSO can now be activated during automated device enrollment, meaning employees can immediately access managed apps, company services and their Managed Apple Accounts without additional sign-ins. This feature simplifies the device setup process for organizations onboarding large numbers of employees or contractors.&lt;/p&gt;

&lt;p&gt;The addition of Authenticated Guest Mode benefits shared environments, such as schools or hospitals, by allowing temporary logins via organizational Identity Provider (IdP) credentials. This ensures that users can access only the resources they are authorized for, while personal data is automatically erased upon logout. This is especially beneficial in environments with transient users where data security and quick turnover are priorities.&lt;/p&gt;

&lt;h2&gt;Return to Service: streamlined device reuse&lt;/h2&gt;

&lt;p&gt;Apple’s improvements to the Return to Service workflow allow enterprises to retain managed apps during device preparation for reuse. This feature significantly reduces the time needed to prepare devices for new users in shared-use scenarios. For instance, retail organizations can erase user data while retaining critical operational apps, allowing devices to be redeployed within minutes rather than hours. Automated re-enrollment into MDM ensures that settings, restrictions and compliance policies are applied quickly and consistently.&lt;/p&gt;

&lt;p&gt;If you have a healthcare use case, check out Return to Service features supported by &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;Ivanti Neurons for MDM&lt;/a&gt;. By adding a Return to Service option on your Ivanti iOS client, your floor staff can safely repurpose devices with one click.&lt;/p&gt;

&lt;h2&gt;ManagedApp Framework for secure enterprise app configurations&lt;/h2&gt;

&lt;p&gt;The ManagedApp Framework, built on Declarative Device Management, introduces a structured approach to defining and passing configuration details to enterprise apps. This framework allows IT administrators to establish app behavior — such as server URLs, credential parameters or connection policies — tailored to specific employees or teams.&lt;/p&gt;

&lt;p&gt;For example, an IT department can provide custom app settings for field technicians that include preconfigured server endpoints and unique digital certificates, while offering a more limited set of configurations for interns or temporary staff. The framework integrates seamlessly with features like Single Sign-On and Managed Device Attestation for secure, scalable and compliance-ready app deployments across industries. This feature requires support both from the application and from the MDM side.&lt;/p&gt;

&lt;h2&gt;Software updates changes in iOS/iPadOS/macOS 26&lt;/h2&gt;

&lt;p&gt;Apple is deprecating legacy software update management methods in iOS, iPadOS and macOS 26, and removing support in 2027 OS versions, requiring all organizations to transition to the new Declarative Management Software Update Enforcement and Software Update settings. Ivanti fully supports these new workflows, enabling automated and proactive update management. Declarative Management Updates are supported on iOS/iPadOS 17+ and macOS 14+. To prepare, customers should update their device management policies in Ivanti, configure Software Update Enforcement and settings for their devices and ensure compliance with Apple’s updated requirements—securing a smooth transition ahead of the deadline.&lt;/p&gt;

&lt;h2&gt;Key takeaways for enterprise IT&lt;/h2&gt;

&lt;p&gt;Apple’s WWDC announcements introduce meaningful improvements for enterprise IT, from streamlined device reuse to more flexible management and security controls. Using Ivanti’s endpoint management solutions alongside these new Apple features will help organizations automate deployments, ensure compliance and support diverse user needs with greater efficiency.&lt;/p&gt;
</description><pubDate>Fri, 18 Jul 2025 14:15:25 Z</pubDate></item><item><guid isPermaLink="false">6a220831-f48d-4163-87fb-942ca6c2ff3d</guid><link>https://www.ivanti.com/blog/a-guide-to-apple-declarative-device-management-for-enterprises</link><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><title>A Guide to Apple Declarative Device Management for Enterprises</title><description>&lt;p&gt;Apple declarative management introduces a shift from the traditional command-based model to a more autonomous and flexible framework. This approach aims to improve the efficiency and responsiveness of managing Apple devices.&lt;/p&gt;

&lt;p&gt;The components of Apple declarative management — declarations, assets, predicates and status channels — work together to create a more efficient, scalable and responsive &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-mdm"&gt;MDM&lt;/a&gt; framework. Declarations define the desired states; assets provide the necessary resources; predicates enable context-aware policy application; and status channels facilitate efficient communication.&lt;/p&gt;

&lt;p&gt;Apple is deprecating legacy software updated management methods in iOS, iPadOS and macOS 26 and removing support in 2027 OS versions, requiring you to transition to the new declarative management software update enforcement and software update settings. Ivanti fully supports these new workflows for automated and proactive update management.&lt;/p&gt;

&lt;h2&gt;The shift to declarative device management&lt;/h2&gt;

&lt;p&gt;Let's explore the technical aspects of Apple declarative device management and its benefits for MDM users.&lt;/p&gt;

&lt;p&gt;Traditional MDM operates on a command-and-control basis, in which servers send commands to devices to perform actions such as installing apps or enforcing policies. Devices then report their status back to the server, necessitating constant communication.&lt;/p&gt;

&lt;p&gt;This frequent check-in process is needed for devices remain compliant with the organization's policies and that changes or updates are promptly applied. Without regular check-ins, administrators would have limited visibility into the device's status, making it challenging to verify compliance, deploy updates or address security issues in real-time.&lt;/p&gt;

&lt;p&gt;Apple declarative device management utilizes a declarative format with which administrators define desired states and policies. Devices receive these declarations and autonomously enforce the desired state, reporting back to the server only when there is a change.&lt;/p&gt;

&lt;p&gt;In this model, the device's operating system plays a critical role in making the device more autonomous. The OS continuously evaluates the current state of the device against the desired state defined by the declarations. If discrepancies are detected, the device will self-heal.&lt;/p&gt;

&lt;p&gt;The OS independently applies the necessary changes defined in declarations and predicates to align with the specified policies. This autonomous evaluation and enforcement capability minimizes the reliance on server commands and allows for real-time adjustments, ensuring devices remain compliant even when offline or out of network range.&lt;/p&gt;

&lt;h2&gt;Key components of Apple declarative device management&lt;/h2&gt;

&lt;h4&gt;Declarations&lt;/h4&gt;

&lt;p&gt;Declarations represent the desired state or configuration that an administrator wants to apply to devices. Declarations are sent to devices, which then interpret and autonomously enforce these states. The key features of declarations include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Configuration definition:&lt;/strong&gt; Administrators define configurations in a declarative format. This includes settings for Wi-Fi, VPN, device restrictions and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Autonomous enforcement:&lt;/strong&gt; Devices interpret the declarations and apply the specified policies independently, without requiring continuous communication with the server.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Assets&lt;/h4&gt;

&lt;p&gt;In Apple Declarative Management, &lt;a href="https://support.apple.com/guide/deployment/authentication-credentials-identity-asset-dep597c7b47d/1/web/1.0" rel="noopener" target="_blank"&gt;assets&lt;/a&gt; are resources used by devices to implement policies and configurations defined in declarations. These assets include certificates, data and user information.&lt;/p&gt;

&lt;p&gt;Certificates are used for authentication, encryption and secure communication among devices and services. Administrators deploy digital certificates via declarations to enable secure access to corporate networks, email, VPNs and other resources. These certificates can be updated independently from the declarations, maintaining current security credentials without a complete policy overhaul.&lt;/p&gt;

&lt;p&gt;Data consists of configuration files, scripts, binaries and content resources. Configuration files contain specific settings for applications or network configurations, while scripts and binaries automate tasks or add functionality. Content resources include branding materials or compliance documents. Managing data as assets allows for efficient updates and reuse across multiple declarations.&lt;/p&gt;

&lt;p&gt;User information includes user profiles, preferences and roles within the organization. This information tailors device settings and permissions based on user roles. Dynamic data, such as location-based information or activity logs, ensures device configurations adapt to the user's current needs.&lt;/p&gt;

&lt;p&gt;Assets are managed separately from declarations, allowing for efficient reuse and updates. When an asset is updated, all declarations referencing that asset can automatically apply the updated version.&lt;/p&gt;

&lt;h4&gt;Predicates&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://developer.apple.com/library/archive/documentation/Cocoa/Conceptual/Predicates/AdditionalChapters/Introduction.html#//apple_ref/doc/uid/TP40001789" rel="noopener" target="_blank"&gt;Predicates&lt;/a&gt; in Apple Declarative Management work as the conditional logic elements within declarations that define when and how specific policies should be applied to devices. Predicates are evaluated on the device itself, allowing for real-time, context-aware decision-making. They consist of logical expressions that can reference various device attributes and contextual information. When the conditions specified by a predicate are met, the corresponding policies or configurations within the declaration are enforced.&lt;/p&gt;

&lt;p&gt;Predicates leverage the syntax and capabilities of the Cocoa programming language to define conditions under which specific policies should be applied. Cocoa predicates are expressions that evaluate a Boolean value, enabling complex logical conditions using attributes such as device type, OS version, network status and more.&lt;/p&gt;

&lt;h4&gt;Status channels&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://support.apple.com/guide/deployment/declarative-status-reports-depd90ee8a5f/web" rel="noopener" target="_blank"&gt;Status channels&lt;/a&gt; are communication pathways that devices use to report their state back to the server. Unlike traditional MDM, with which devices constantly check in with the server, status channels enable asynchronous and event-driven communication. Key features of status channels include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Asynchronous reporting:&lt;/strong&gt; Devices send status updates only when there is a change in their state or when specific conditions are met.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Efficient communication:&lt;/strong&gt; This reduces the need for continuous polling, minimizing network traffic and server load.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Real-time monitoring:&lt;/strong&gt; Administrators receive timely updates about the compliance and state of devices, allowing for prompt action if necessary.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Status channels ensure that administrators are informed of any deviations from the desired state, enabling proactive management and quick remediation.&lt;/p&gt;

&lt;h2&gt;Apple declarative device management in Ivanti UEM solutions&lt;/h2&gt;

&lt;p&gt;Ivanti keeps its products updated with the latest enhancements in the device management industry. Both our UEM cloud and on-premises solutions support declarative management.&lt;/p&gt;

&lt;p&gt;Declarative device management is not a full replacement of the traditional MDM protocol. Therefore, solutions will present a hybrid approach, leveraging the best of both frameworks. Ivanti customers will see progressive and seamless integration of the new capabilities in our platforms as Apple also makes improvements to the framework with every new release of its operating systems.&lt;/p&gt;

&lt;hr&gt;
&lt;h3&gt;Related Content&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/devices/ios-device-management"&gt;iOS Device Management solutions&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Sat, 07 Jun 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">97d6a618-6e80-482b-b581-806fced981ef</guid><link>https://www.ivanti.com/blog/apple-declarative-device-management-updates</link><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/blog/authors/yosune-baltra</atom:uri></atom:author><category>Endpoint Management</category><title>Optimizing Apple DDM with Ivanti’s Latest Innovations</title><description>&lt;p&gt;The explosion in devices—particularly Apple devices—deployed across a modern enterprise is increasing the already arduous device management burden on IT and cybersecurity teams.&lt;/p&gt;

&lt;p&gt;According to recent &lt;a href="https://www.computerworld.com/article/1634358/three-quarters-of-large-us-firms-now-using-more-apple-devices-survey.html?utm_source=chatgpt.com" rel="noopener" target="_blank"&gt;research&lt;/a&gt;, 76% of large enterprises are using more Apple devices, and 57% of US firms say Apple adoption is outpacing other options. So, it’s become crucial for more enterprises to leverage Apple Declarative Device Management (DDM) to streamline device management, automate compliance and enhance scalability.&lt;/p&gt;

&lt;p&gt;Apple's approach to DDM was introduced in 2021 and expanded with each OS release. It’s created a fundamental shift in device management, streamlining software updates and patching. Now, IT teams can define desired states so Apple devices can self-enforce configurations and updates &lt;em&gt;locally&lt;/em&gt;, reducing reliance on servers and manual intervention.&lt;/p&gt;

&lt;p&gt;Thus, updates can happen faster, errors can be minimized, and end-user experiences can be improved invisibly and proactively. Which appreciably eases IT workloads while sustaining security and operational agility.&lt;/p&gt;

&lt;p&gt;Apple is deprecating legacy software update management in iOS, iPadOS and macOS26, and they will remove support in 2027 OS versions, which means now is the time to make the switch to DDM. Let's explore how Ivanti's MDM and UEM products will enable admins to get the most out of Apple DDM.&lt;/p&gt;

&lt;h2&gt;What is declarative device management (DDM)?&lt;/h2&gt;

&lt;p&gt;DDM is an advanced approach to managing devices, primarily in enterprise or organizational IT environments. It empowers administrators to define a device or system's desired state and allows the system to automatically enforce and maintain that state.&lt;/p&gt;

&lt;p&gt;The DDM model shifts away from traditional imperative management, where configurations and actions are centrally scripted and managed by IT administrators. That approach requires direct instructions to achieve the desired outcome on each device.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key features and benefits of DDM&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What are DDM’s advantages over a traditional device management model?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Administrators can specify the desired state or behavior of a device, focusing on "what" it should look like instead of "how" to achieve that state. For example, rather than scripting individual commands for configuring security settings, an admin can simply declare the required settings and the system will enforce them.&lt;/li&gt;
	&lt;li&gt;Devices autonomously monitor their configurations to ensure compliance with a predefined state. If a device deviates, it automatically corrects itself to restore compliance without manual intervention.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;DDM proves highly effective in large-scale settings since it minimizes the need for repetitive and manual configuration tasks.&lt;/li&gt;
	&lt;li&gt;DDM minimizes the complexity of management workflows and ensures consistency across devices.&lt;/li&gt;
	&lt;li&gt;DDMs employ modern management protocols for faster and more reliable updates to device configurations and policies.&lt;/li&gt;
	&lt;li&gt;DDM is commonly implemented in cloud-based mobile device management (MDM) solutions, leveraging the cloud for synchronization, monitoring and enforcement, although it can also be implemented in on-prem solutions.&lt;/li&gt;
	&lt;li&gt;DDM reduces manual effort by automating configuration and enforcement processes.&lt;/li&gt;
	&lt;li&gt;Ensures consistency and compliance across devices, reducing the risk of human error.&lt;/li&gt;
	&lt;li&gt;Dynamic updates means quicker application of policies and settings versus traditional methods.&lt;/li&gt;
	&lt;li&gt;Changes are implemented seamlessly without disrupting the user experience.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;blockquote&gt;
&lt;h2&gt;An example DDM use case&lt;/h2&gt;

&lt;p&gt;In a hypothetical example, an IT administrator declares that all employee devices within the enterprise environment must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Have a specific version of the operating system.&lt;/li&gt;
	&lt;li&gt;Enable encryption.&lt;/li&gt;
	&lt;li&gt;Restrict access to certain applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Using DDM, these requirements are automatically applied, continuously enforced and remediated if there’s any deviation.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;Software updates and OS patching via Apple DDM&lt;/h2&gt;

&lt;p&gt;Utilizing Apple Declarative Device Management for software updates and operating system (OS) patching seriously improves these processes, making them more proactive, efficient and seamless. It simplifies administration, cuts down on delays and guarantees a fleet of devices is always secure and up-to-date.&lt;/p&gt;

&lt;h4&gt;Software update benefits&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;Centralized control with distributed execution&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Administrators set configurations centrally but rely on the device's local capabilities for execution.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Proactive local enforcement&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Updates are enforced at the device level, eliminating the need for constant server intervention. Admins set a desired OS version and deadline, and the device autonomously ensures compliance.&lt;/li&gt;
	&lt;li&gt;The device monitors itself, applying updates without the need for constant server communication.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Automation&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Admins can configure specific versions and deadlines and update schedules (e.g., after work hours), automating the process while minimizing end-user disruption.&lt;/li&gt;
	&lt;li&gt;For example, a critical security patch can be scheduled for a particular time, ensuring all devices are updated without user intervention.&lt;/li&gt;
	&lt;li&gt;If a device is powered off and misses the update deadline declarative management reschedules the update automatically for a later time.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;User notification and experience&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Notifications begin 14 days before the deadline, reminding users to update at their convenience. On the deadline, the device automatically reboots and installs updates if necessary.&lt;/li&gt;
	&lt;li&gt;Admins can customize these notifications or suppress early reminders (e.g., for retail or healthcare environments).&lt;/li&gt;
	&lt;li&gt;Admins can configure the level of user interaction allowed by Apple DDM, such as permitting manual updates before the enforced deadline or limiting user deferrals.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Faster updates with reduced network dependency&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Unlike traditional MDM, where the server continuously checks device status, DDM reduces latency by shifting the compliance mechanism to the endpoint.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Enhanced status reporting&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Devices proactively report the status of updates to the server including whether an update is in progress, completed successfully or failed. In case of failure, detailed error logs are available.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;OS patching benefits&lt;/h4&gt;

&lt;p&gt;&lt;em&gt;Predicates for context-aware updates&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;DDM allows conditional rules (predicates) for updates, such as only applying a patch when a device is charging or has a battery above 80%.&lt;/li&gt;
	&lt;li&gt;These conditions are evaluated locally on the device, making updates context-sensitive and efficient.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Seamless transition to new OS versions&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;DDM automatically manages the transition to new OS releases or security patches without requiring manual admin oversight at each step.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Local action without internet&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Devices can enforce configurations and patches even when offline, applying updates based on preloaded criteria and activating changes when conditions permit (e.g., when connected to power or during off-hours).&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;blockquote&gt;
&lt;h2&gt;Another practical use case&lt;/h2&gt;

&lt;p&gt;In an organization with 1,000+ iPhones and MacBooks, a zero-day vulnerability requires immediate patching. The solution?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The admin declares a patch deadline and target version using Apple DDM.&lt;/li&gt;
	&lt;li&gt;Devices enforce the update based on local predicates, ensuring the patch is applied under optimal conditions (e.g., during low battery drain times).&lt;/li&gt;
	&lt;li&gt;Users receive notifications prior to the update so they’re informed without interrupting workflows.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Ivanti’s declarative management support&lt;/h2&gt;

&lt;p&gt;Ivanti’s declarative management support builds on Apple’s Declarative Device Management (DDM) framework to offer a seamless, proactive and efficient approach to managing Apple devices. What are some of its key components?&lt;/p&gt;

&lt;h4&gt;Integration with Apple’s DDM framework&lt;/h4&gt;

&lt;p&gt;Ivanti utilizes Apple’s DDM as an enhancement to the existing Mobile Device Management (MDM) protocol – &lt;em&gt;not&lt;/em&gt; a complete replacement but an additional layer designed to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automate device responses: Allow devices to enforce configurations and policies locally, reducing reliance on the server for continuous checks.&lt;/li&gt;
	&lt;li&gt;Enable real-time proactivity: Devices can autonomously apply updates or configurations when predefined conditions (predicates) are met.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Software update enforcement&lt;/h4&gt;

&lt;p&gt;Ivanti's platform supports Apple’s declarative software update management, which introduces:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Enforcement settings: Administrators can specify OS versions, deadlines and update schedules.&lt;/li&gt;
	&lt;li&gt;Proactive local actions: Devices monitor themselves and apply updates without requiring manual input or waiting for server-side triggers.&lt;/li&gt;
	&lt;li&gt;Improved communication: Devices report their update progress, success or failure directly to the Ivanti management server, providing admins with real-time visibility.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Predicate management&lt;/h4&gt;

&lt;p&gt;A standout feature of Ivanti’s support is its handling of predicates – logical conditions that devices evaluate before applying configurations or updates. For example:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A policy applies only if the device’s battery is above 80%.&lt;/li&gt;
	&lt;li&gt;A configuration activates when the device is charging.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Simplified predicate management in Ivanti’s console&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ivanti provides a dedicated interface for creating, managing and reusing predicates across configurations.&lt;/li&gt;
	&lt;li&gt;These predicates can be easily applied to declarative configurations, streamlining complex workflows.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;User experience and notifications&lt;/h4&gt;

&lt;p&gt;Ivanti enhances the user experience by leveraging Apple’s notification capabilities:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Notifications can start 14 days before the update deadline, with options to tailor their frequency and content.&lt;/li&gt;
	&lt;li&gt;Critical updates can override user deferrals by enforcing reboots and updates at the scheduled deadline.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Past-due handling&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If a device misses the deadline (e.g., turned off), Ivanti reschedules updates automatically ensuring compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Supported configurations&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ivanti ensures backward compatibility and a smooth transition to declarative management by supporting both legacy MDM and newer DDM configurations.&lt;/li&gt;
	&lt;li&gt;Existing policies and workflows continue without disruption.&lt;/li&gt;
	&lt;li&gt;Declarative configurations (e.g., predicates and local enforcement) are gradually integrated and highlighted within the platform.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Watch the webinar &lt;a href="https://www.ivanti.com/webinars/2024/mastering-apple-device-management-with-ivanti"&gt;Mastering Apple Device Management with Ivanti&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Ivanti’s guidance for updating and patching Apple devices with declarative device management&lt;/h2&gt;

&lt;p&gt;Ivanti’s approach to supporting Apple DDM leverages the proactive capabilities of Apple's declarative management framework, combining it with a user-friendly interface, automation and support for complex enterprise workflows. This comprehensive guidance enhances enterprise device management efficiency and security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enforcing updates and patches&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automated scheduling lets admins enforce updates by specifying the target OS version along with a specific date and time for the update to occur. This eliminates the need for manual updates and ensures compliance with organizational policies.&lt;/li&gt;
	&lt;li&gt;Devices enforce update enforcement locally, applying updates based on preconfigured conditions without relying on continuous server communication.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Managing user notifications&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Notifications are sent to end users starting 14 days before the update deadline, providing transparency and encouraging users to update at their convenience.&lt;/li&gt;
	&lt;li&gt;For specific use cases such as retail or healthcare, flexible notification configurations let admins suppress early notifications and opt for last-minute alerts to minimize disruption.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Improving compliance and visibility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Devices proactively report their update status to the Ivanti server, reporting whether updates are in progress, completed successfully or failed. Administrators also gain access to detailed error logs to troubleshoot issues.&lt;/li&gt;
	&lt;li&gt;If a device misses the deadline (e.g., if it is powered off), the device automatically reschedules the update for the next available hour.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Using predicates for conditional updates&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Administrators can define predicate logic for when updates should be applied.&lt;/li&gt;
	&lt;li&gt;Since conditions are evaluated locally, updates can happen even when the device is offline.&lt;/li&gt;
	&lt;li&gt;Ivanti provides tools for creating, managing and reusing predicates across configurations, making conditional updates simpler and easier to implement.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Enhancing user experience&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;End users get clear communication about the update schedule, including the enforced deadline. They have the option to install updates manually before the deadline to avoid automatic enforcement.&lt;/li&gt;
	&lt;li&gt;Updates can be scheduled during off-hours to minimize disruption of the user's daily activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Streamlining patch management&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ivanti supports declarative patch management -Apple system updates.&lt;/li&gt;
	&lt;li&gt;Administrators can enforce updates, including critical security patches, ensuring devices remain secure and compliant.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Read our Knowledge Base article on &lt;a href="https://forums.ivanti.com/s/article/How-to-enforce-Apple-Software-Updates-with-Neurons-for-MDM-and-EPMM?language=en_US" target="_blank"&gt;How to enforce Apple Software Updates with Neurons for MDM and EPMM&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;A standout approach to supporting Apple DDM&lt;/h2&gt;

&lt;p&gt;Ivanti's approach to Apple Declarative Device Management stands out because it extends an organization’s automation, local enforcement and proactive capabilities.&lt;/p&gt;

&lt;p&gt;Administrators benefit from user-friendly tools, customizable notifications and detailed status reporting, while end-user disruption is minimized through scheduled updates and seamless workflows. With Ivanti, Apple DDM becomes even more efficient, secure and scalable for the organizations that rely on it.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: &lt;a href="https://www.ivanti.com/blog/a-guide-to-apple-declarative-device-management-for-enterprises"&gt;A Guide to Apple Declarative Device Management for Enterprises&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Tue, 21 Jan 2025 20:10:27 Z</pubDate></item><item><guid isPermaLink="false">331fe042-9a9f-4fc2-9264-3a7113fcdc48</guid><link>https://www.ivanti.com/blog/how-implementing-risk-based-patch-management-prioritizes-active-exploits</link><atom:author><atom:name>Todd Schell</atom:name><atom:uri>https://www.ivanti.com/blog/authors/todd-schell</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>How Risk-Based Patch Management Prioritizes Active Exploits</title><description>&lt;p&gt;Resistance to change is always present, especially if you think the processes you have in place are efficient and effective. Many organizations feel this way about their software management procedures until they have a security breach or incident and are left wondering where they went wrong.&lt;/p&gt;

&lt;p&gt;The reality is that most patch management programs are built on assumptions and recommendations, rather than facts about actively exploited vulnerabilities.&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Risk-based patch management&lt;/a&gt;&amp;nbsp;is the answer to this issue.&lt;/p&gt;

&lt;p&gt;In this article, find:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;What’s wrong with keeping typical prioritizations.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;What risk-based patch management is.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Why it’s the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2 id="one"&gt;The problems with typical patch prioritization&lt;/h2&gt;

&lt;p&gt;Software feature updates, security fixes, bug fixes, performance enhancements and many other types of software releases have existed since the software industry started. Vendors often assign a severity rating or other score to each of these to let customers know what they think is most important.&lt;/p&gt;

&lt;p&gt;Unfortunately, there’s no industry standard associated with these ratings, so we are left to compare and prioritize releases for deployment on our systems based on recommendations. On top of that, such ratings are rarely updated to account for active threat context even as vulnerabilities change.&lt;/p&gt;

&lt;h3&gt;Overlooking an actively exploited vulnerability&lt;/h3&gt;

&lt;p&gt;While better than nothing at all, vendor severity ratings often come up short.&amp;nbsp;Consider the Follina vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190" rel="noopener" target="_blank"&gt;CVE-2022-30190)&lt;/a&gt;&amp;nbsp;published in May of 2022. This vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) allows for remote code execution.&lt;/p&gt;

&lt;p&gt;Follina was under attack for several months before Microsoft finally responded with several updates. Alarmingly, Microsoft only assigned this vulnerability a Common Vulnerability Scoring System (CVSS) v3 rating of 7.8 and severity of Important. If you’re only patching based on Critical severity,&amp;nbsp;you'd&amp;nbsp;have missed this one, leaving a significant gap in your attack surface.&lt;/p&gt;

&lt;p&gt;Worse yet, Follina’s CVSS score remained at 7.8 even after it was revealed the vulnerability was being&amp;nbsp;&lt;a href="https://www.fortinet.com/blog/threat-research/ransomware-roundup-bisamware-and-chile-locker" rel="noopener" target="_blank"&gt;actively exploited to distribute Bisamware ransomware&lt;/a&gt;, exposing organizations that had overlooked the vulnerability to even more risk.&amp;nbsp;&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti Neurons for Vuln KB" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/bisamware-ransomware-intel.png"&gt;
&lt;figcaption&gt;Intelligence on the ransomware threat associated with CVE-2022-30190 displayed in Ivanti Neurons for VULN KB&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h3&gt;CVSS shortcomings&lt;/h3&gt;

&lt;p&gt;Severity ratings are ‘augmented’ with CVSS scores from&amp;nbsp;&lt;a href="https://www.first.org/cvss/" rel="noopener" target="_blank"&gt;FIRST&lt;/a&gt;. Each CVE is assigned a CVSS number, such as the 7.8 given to CVE-2022-30190 in the example above.&lt;/p&gt;

&lt;p&gt;One of the major objectives behind&amp;nbsp;calculating&amp;nbsp;the actual CVSS number is to ensure standardization so all CVEs are scored consistently and can be accurately compared. The higher the CVSS score for a vulnerability and the associated patch, the more critical it is to deploy in most environments.&lt;/p&gt;

&lt;p&gt;For software updates that address multiple CVEs, the highest CVSS value is usually considered for prioritization. But is this value even accurate?&lt;/p&gt;

&lt;p&gt;The results of an analysis of CVSS scores in a&amp;nbsp;&lt;a href="https://www.darkreading.com/application-security/discrepancies-discovered-in-vulnerability-severity-ratings" rel="noopener" target="_blank"&gt;recent article&lt;/a&gt; showed&amp;nbsp;there's&amp;nbsp;a discrepancy for nearly 20% of CVSS scores (25,000). This analysis was based on a comparison of the scores reported in the NIST National Vulnerability Database (NVD) and those reported directly by the vendors themselves.&lt;/p&gt;

&lt;h3&gt;Vendor severity inconsistencies&lt;/h3&gt;

&lt;p&gt;One important point to keep in mind is vendors have historically assigned their own terminology to severity (e.g., critical, important).&amp;nbsp;Using&amp;nbsp;vendor severity scoring as a priority mechanism may work well when comparing all patches by a given&amp;nbsp;vendor,&amp;nbsp;but&amp;nbsp;doesn't&amp;nbsp;always provide an accurate comparison of patches between vendors. In fact, many use different terminology entirely.&lt;/p&gt;

&lt;p&gt;Likewise, vendor severity&amp;nbsp;isn't&amp;nbsp;always a positive indicator. Many zero-day vulnerabilities are only rated Important by Microsoft but have high CVSS numbers. You can see how patching using severity and CVSS for prioritization is using assumptions and recommendations and can result in a vulnerable environment.&lt;/p&gt;

&lt;h3&gt;Why prioritize active exploits over any other prioritization method?&lt;/h3&gt;

&lt;p&gt;According to the US&amp;nbsp;Cybersecurity and Infrastructure Security Agency (CISA), an&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;actively exploited vulnerability&lt;/a&gt;&amp;nbsp;is “one for which there is reliable evidence that execution of malicious code was performed by an actor on a system without permission of the system owner.” In layman’s terms, a vulnerability under active exploitation is one&amp;nbsp;that's been used by a threat actor to launch a cyberattack.&lt;/p&gt;

&lt;p&gt;Thus, to minimize the risk of an attack on your organization, you must prioritize actively exploited vulnerabilities above all others. This is good news as most vulnerabilities aren't being actively exploited and thus pose little to no risk to your organization. You can identify those that have been exploited through risk-based patch management.&lt;/p&gt;

&lt;h2 id="two"&gt;What is&amp;nbsp;risk-based patch management?&lt;/h2&gt;

&lt;p&gt;Risk-based patch management is an extension of risk-based vulnerability management, which goes beyond vendor severity and basic CVSS scores to identify and qualify the specific vulnerabilities that pose the most significant risk to an organization. This brings real-world risk context into the patch management process so that IT teams can focus their efforts on updates with known exploited vulnerabilities that matter most to an organization’s security posture.&lt;/p&gt;

&lt;h3&gt;How can my organization adopt risk-based patch management?&lt;/h3&gt;

&lt;p&gt;For organizations ready to adopt a risk-based approach to patch management, a good place to start is the CISA&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;Known Exploited Vulnerabilities&lt;/a&gt; (KEV)&amp;nbsp;catalog. CISA took a major step forward to help prioritize vulnerabilities when it introduced&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities" rel="noopener" target="_blank"&gt;Binding Operational Directive 22–01&lt;/a&gt;&amp;nbsp;along with its KEV&amp;nbsp;catalog.&amp;nbsp;When originally released, the catalog contained some 200 actively exploited vulnerabilities. It has since grown to almost 900.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;CISA builds the list with the knowledge the vulnerabilities it contains are being exploited in the wild by active threats.&amp;nbsp;However, the list does have its shortcomings, as it currently excludes&amp;nbsp;&lt;a href="https://www.securin.io/ransomware/" rel="noopener" target="_blank"&gt;131 vulnerabilities associated with ransomware&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Is the CISA KEV catalog the only resource available for risk-based patch management?&lt;/h3&gt;

&lt;p&gt;Organizations with more mature risk-based patch management practices leverage advanced risk scoring methodologies in place of or in addition to CVSS. These methodologies assign scores to every vulnerability identified in an organization’s environment, allowing those organizations to expand their risk-based approach beyond the CISA KEV.&lt;/p&gt;

&lt;p&gt;Many vendors in the risk-based vulnerability management space have developed proprietary scoring methodologies that represent the true risk posed by a vulnerability. They do so by delivering dynamic risk ratings that give extra weight to actively exploited vulnerabilities.&lt;/p&gt;

&lt;p&gt;For example, Ivanti’s&amp;nbsp;&lt;a href="/resources/v/doc/ivi/2683/cbe60d387c0b" target="_blank"&gt;Vulnerability Risk Rating&lt;/a&gt; (VRR)&amp;nbsp;has assigned Follina a score of 10, a score that more accurately represents the risk posed by that vulnerability than its CVSS score of 7.8.&lt;/p&gt;

&lt;figure&gt;&lt;img alt="Ivanti's VRR rating of Follina." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/05/follina-cvss-vs-vrr.png"&gt;
&lt;figcaption&gt;The difference between the VRR and CVSS v3 scores and severity levels for CVE-2022-30190 as shown in Ivanti Neurons for VULN KB&amp;nbsp;&lt;/figcaption&gt;
&lt;/figure&gt;

&lt;h2 id="three"&gt;Why it’s the perfect time to adopt risk-based patch management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;If you feel you’ve fallen behind on system updates or are overwhelmed by new systems and applications in your company, now is the perfect time to adopt risk-based patch management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even if you feel you have a solid program in place based on severity ratings and CVSS scores, it’s time to remove the resistance to change and start a new process before your business is devastated by a data breach stemming from an exploited vulnerability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Start by using the CISA KEV to prioritize your updates and&amp;nbsp;earmark&amp;nbsp;a budget&amp;nbsp;for a risk-based vulnerability and patch management solution. With the proper tools in&amp;nbsp;place,&amp;nbsp;you can quickly identify the highest risk systems to patch first and work down the list to ensure your systems are secure.&lt;/p&gt;

&lt;p&gt;Looking to take the first step? Dive into this eBook for&amp;nbsp;a one-stop guide for&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2705/11190ce11e80"&gt;implementing a modern risk-based patch management program&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Fri, 03 Jan 2025 18:10:36 Z</pubDate></item><item><guid isPermaLink="false">d680699b-34a6-4cb7-9064-ca658e3239d7</guid><link>https://www.ivanti.com/blog/ivanti-announces-android-15-readiness</link><category>Endpoint Management</category><category>Ivanti News</category><title>Ivanti Announces Android 15 Readiness</title><description>&lt;p&gt;At Ivanti, providing our customers with uninterrupted functionality and availability is important to us. So, we are pleased to announce that for the release of Android 15, our UEM products are ready for this update. That means our customers can enjoy a smooth transition to Google's latest Android release on Day Zero.&lt;/p&gt;

&lt;p&gt;This readiness for the new release is another example of how we continuously bring new functionalities to our products by working with customers and partners. Customers can access Ivanti specific product support for &lt;a href="https://forums.ivanti.com/s/article/Ivanti-Guidance-on-Android-15-Compatibility" target="_blank"&gt;Android 15 on our support page&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Line of business and Android – a new digital era with Ivanti&lt;/h2&gt;

&lt;p&gt;Business operations around the globe are thriving with Android adoption. Organizations of all sizes are competing in this new digital era and trying to maximize their ROI from the rapid innovation being driven by mobile devices and artificial intelligence, and Android is at the forefront of that.&lt;/p&gt;

&lt;p&gt;These companies are striving to achieve higher efficiencies, whether through adoption of AI for operational excellence or by leveraging Ivanti’s capabilities to reduce TCO and improve LOB insights. We see organizations around the world turning to Android + Ivanti for their digital transformation needs. This is because we’ve remained committed to continual excellence and improvement in providing advanced capabilities, privacy and trust on our platform, built from the ground up with security in mind.&lt;img alt="badge android enterprise partner" src="https://static.ivanti.com/sites/marketing/media/images/blog/2024/11/android-partnerlogos-stacked.png"&gt;&lt;/p&gt;

&lt;p&gt;We are also thrilled to share that Ivanti is once again recognized as a Google Gold Partner, in addition to having been awarded an Android Enterprise Recommended badge for our product.&lt;/p&gt;

&lt;p&gt;With the industry recognition, we look forward to helping our customers succeed and building exciting new innovations!&lt;/p&gt;

&lt;h2&gt;What’s new for enterprises in Android 15&lt;/h2&gt;

&lt;p&gt;Unlike past releases, Android 15 saw the stock Android Open Source Platform (AOSP) released first. However, many qualifying Google Pixel devices also received the day-one update as Ivanti device management solutions were ready with support. Device manufacturers follow a different cadence for over-the-air (OTA) updates; we recommend IT enforce necessary policies to maintain business continuity and check with vendors for updates and schedules.&lt;/p&gt;

&lt;p&gt;Android 15 has several features ranging from improved security to managing AI assist, as well as many enhancements to improve enterprise privacy and control.&lt;br&gt;
&lt;br&gt;
Key Android 15 highlights for enterprise include:&lt;/p&gt;

&lt;h3&gt;Private Space&lt;/h3&gt;

&lt;p&gt;This is a completely new concept being introduced for the first time on Android 15. Private Space lets users create a separate “space” on their device where they can keep sensitive apps away from accidental or deliberate access of people other than owner of the device, under an additional layer of authentication.&lt;/p&gt;

&lt;p&gt;This may seem beneficial for users for their personal apps, but it may come with concerns for enterprises that may have to choose between enabling and disabling this function for their corporate-owned-personally-enabled fleet. For fully managed devices (i.e. organizationally owned without personal profile allowed), Private Space will not be allowed.&lt;/p&gt;

&lt;h3&gt;Circle to Search&lt;/h3&gt;

&lt;p&gt;While many of us are still filled with excitement around generate AI, Google has added control to limit features like Circle to Search and Assistant apps from accessing “assist content.”&lt;/p&gt;

&lt;h3&gt;Introduction of managed eSIM&lt;/h3&gt;

&lt;p&gt;Android 15 extends the capabilities of Android for eSIM by allowing IT to manage eSIM on capable devices using activation codes. This new capability is expected to help organizations move away from hardware SIMs and prove useful for customers planning to migrate from one service to another.&lt;/p&gt;

&lt;h3&gt;New security &amp;amp; privacy controls&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;On Device Abuse Detection&lt;/strong&gt; (ODAD) will be disabled to prevent scanning of enterprise developed “in-house” apps. For organizations which may benefit from ODAD, control has been added in Android 15 to enable it for work apps.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Adhering to NIAP compliance:&lt;/strong&gt; Android 15 migrates existing backup service audit logging event from logcat to security log&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Near-field communication&lt;/strong&gt; on Android 15 can be controlled to be disabled all together.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;BYOD privacy improvements:&lt;/strong&gt; EMM solutions will be prevented from accessing users' personal subscriptions (cellular details), though access to a managed subscription will continue to be available.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some additional features include: extending screen-brightness control has been extended to WPCOD mode; control to allow embedded or physical SIMs on a device has been made available; the minimum target SDK version for apps has been changed to API 24 (this determines if an app will be allowed to be installed on an Android 15 device); apps which run foreground services for longer than six hours may require changes, and more.&lt;/p&gt;

&lt;p&gt;To learn more about what’s new, refer to &lt;a href="https://developer.android.com/work/versions/android-15" rel="noopener" target="_blank"&gt;Google’s page for Android 15&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;We’re committed to Android 15 – and our customers&lt;/h2&gt;

&lt;p&gt;Since we manage some of the world's largest Android deployments, the Ivanti team is always as excited and apprehensive as you may be when a new OS version is released.&amp;nbsp; This is why we provide our customers with a product which allows you to safely and productively adopt any new OS version on Day Zero.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There’s a lot of work going on behind the scenes, but it ensures we’re able to help make every Android release a success for our customers. As we start building support for new customer-centric features on Android 15, we ask that you share your use cases with us and the Ivanti community, and reach out to your Ivanti contacts for any additional information.&lt;/p&gt;
</description><pubDate>Thu, 07 Nov 2024 18:16:52 Z</pubDate></item><item><guid isPermaLink="false">c58ed562-e8ed-43a4-b2a3-5c5767734ab2</guid><link>https://www.ivanti.com/blog/cloud-migration-benefits</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><category>Service Management</category><title>Eliminate infrastructure and reduce maintenance costs by moving to the cloud</title><description>&lt;p&gt;Today, companies are constantly searching for ways to streamline operations and gain an edge. Many, though, are weighed down by the burdens and costs of on-premises IT infrastructure. That’s why some are considering the benefits of cloud migration.&lt;/p&gt;

&lt;p&gt;In this article, we’ll take a look at cloud migration benefits and how they help you save money, scale your business and improve your operations. We’ll talk about how getting rid of on-site infrastructure, lowering maintenance costs and using the latest security technologies can help businesses of all sizes.&lt;/p&gt;

&lt;h2&gt;Lower costs and increase scalability&lt;/h2&gt;

&lt;p&gt;By moving to the cloud and leveraging its pay-as-you-go model, businesses can avoid investing heavily in on-site infrastructure, such as servers, software and data centers. This eliminates the capital expenditures associated with purchasing and maintaining hardware and software, freeing up valuable financial resources that can be reallocated to other areas of the business.&lt;/p&gt;

&lt;p&gt;Scalability is another major benefit of moving to the cloud. Businesses can easily scale their IT resources up or down based on their needs, ensuring that they only pay for the resources they use. This is particularly helpful for businesses with fluctuating workloads or seasonal demands. By not overprovisioning infrastructure, they can optimize their IT spending and avoid unnecessary costs.&lt;/p&gt;

&lt;p&gt;Furthermore, the cloud opens the door to using the latest hardware and software, empowering businesses to improve their performance and agility. With cloud providers handling infrastructure updates and maintenance, companies can focus on their core business, free from the burden of managing and updating systems. This allows them to remain competitive and responsive, driving innovation and growth.&lt;/p&gt;

&lt;h2&gt;Reduce costs by eliminating on-site infrastructure&lt;/h2&gt;

&lt;p&gt;Moving to the cloud means more than just not having to buy and maintain hardware. It also means significant reductions in the ongoing costs of on-site infrastructure. By migrating to the cloud, companies can avoid the cost of maintaining physical servers, storage systems and networking equipment. This means no more capital expenditure for hardware, no more power and cooling costs and no more maintenance contracts. Instead, companies can direct that money into initiatives that drive growth and innovation and move their business forward.&lt;/p&gt;

&lt;p&gt;In addition, by reducing the need for an on-site infrastructure, you reduce the need to hire IT personnel to maintain and troubleshoot it. That means your existing IT team can spend less time on routine maintenance and more time on other projects that drive business value. And when you work with a cloud provider, they provide a team of experts who are always monitoring and optimizing their cloud infrastructure to make sure it’s both highly reliable and performing at its best.&lt;/p&gt;

&lt;p&gt;And, because cloud providers benefit from economies of scale, they can provide infrastructure services at a lower cost than on-premises solutions. They do this by making significant investments in state-of-the-art data centers, using energy-efficient technologies and optimizing resource utilization. As a result, your business can save money without sacrificing quality or performance, which is especially important in today’s competitive environment.&lt;/p&gt;

&lt;h2&gt;No need to worry about applying upgrades and patches&lt;/h2&gt;

&lt;p&gt;A major benefit of cloud computing is eliminating the need to apply on-premises upgrades and patches. This shift reduces the risk of human error and delayed upgrades while freeing up IT resources to focus on strategic business initiatives. By removing the complexity of managing vendor relationships for system updates and patches, organizations can significantly streamline IT operations.&lt;/p&gt;

&lt;p&gt;Furthermore, cloud computing providers offer reliable and secure data backup and disaster recovery solutions. This means that in the event of a natural disaster or system failure, businesses can quickly and easily retrieve their data and continue operations without major disruptions. This level of data protection and resilience is often difficult and costly to achieve with on-premises systems. With cloud computing, businesses can enjoy peace of mind knowing that their valuable data is always backed up and readily accessible.&lt;/p&gt;

&lt;h2&gt;Eliminate downtime caused by on-premises upgrades&lt;/h2&gt;

&lt;p&gt;One of the most attractive advantages of moving to the cloud is the elimination of downtime caused by on–premises infrastructure upgrades. These upgrades can be required at regular intervals, often involving lengthy downtime and disruptions to business operations. This can result in lost productivity and revenue as well as customer dissatisfaction.&lt;/p&gt;

&lt;p&gt;In contrast, cloud computing offers a seamless and continuous upgrade process. Cloud providers handle all infrastructure maintenance and upgrades, ensuring minimal or no downtime for businesses. This allows organizations to focus on their core competencies without worrying about the complexities of IT management. By eliminating downtime, they can maintain uninterrupted operations, improve customer satisfaction and gain a competitive edge.&lt;/p&gt;

&lt;p&gt;Furthermore, cloud computing offers access to &lt;a href="https://www.ivanti.com/blog/5-ways-to-secure-your-cloud-journey"&gt;cutting-edge security measures&lt;/a&gt; and compliance certifications. Cloud providers invest heavily in robust security infrastructure and employ dedicated security teams to protect data and systems. So, businesses can enjoy heightened security without the need for substantial investments in their own security infrastructure. This not only reduces costs but also guarantees adherence to industry regulations and standards.&lt;/p&gt;

&lt;h2&gt;Showing a green commitment&lt;/h2&gt;

&lt;p&gt;Beyond security, cloud computing also plays a role in environmental sustainability. Moving to the cloud means businesses can reduce their carbon footprint by decreasing energy consumption and minimizing hardware waste. This is particularly relevant as sustainability and responsible resource management are increasingly important. Embracing cloud computing isn't only a smart business decision but also a way for companies to demonstrate their commitment to a greener future.&lt;/p&gt;

&lt;p&gt;In summary, cloud migration eradicates downtime, eliminates the cost of on-premises infrastructure and fortifies security. Making a move to the cloud delivers a strategic advantage for businesses in pursuit of efficiency, scalability and a competitive edge.&lt;/p&gt;
</description><pubDate>Mon, 04 Nov 2024 15:50:11 Z</pubDate></item><item><guid isPermaLink="false">cd094a87-97b1-4330-a359-a9c1b0d950de</guid><link>https://www.ivanti.com/blog/cloud-migration-benefits-risks</link><atom:author><atom:name>John Armstrong</atom:name><atom:uri>https://www.ivanti.com/blog/authors/john-armstrong</atom:uri></atom:author><category>Endpoint Management</category><category>Security</category><category>Service Management</category><title>Cloud Migration Benefits – and the Challenges to Overcome</title><description>&lt;p&gt;Cloud migration has become a strategic priority for many organizations. By moving data, applications and IT resources from on-premises infrastructure to a cloud-based environment, they can see multiple benefits. But cloud migration also comes with its own unique challenges.&lt;/p&gt;

&lt;p&gt;Gaining a deeper understanding of both the benefits and possible pitfalls of cloud computing is crucial before embarking on your cloud journey. Whether your goal is to reduce infrastructure expenses, improve time-to-market, or more easily scale your IT environment, these insights will empower you to make informed decisions and navigate the migration process with more confidence.&lt;/p&gt;

&lt;h2&gt;Benefits of cloud migration&lt;/h2&gt;

&lt;p&gt;We’ve said there are multiple advantages for an enterprise that makes this move, so here are some of the details.&lt;/p&gt;

&lt;h3&gt;Scalability&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Resource elasticity:&lt;/strong&gt; Cloud platforms offer elastic resources that can scale up or down based on demand. This enables businesses to handle diverse workloads without additional hardware investments.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Global reach:&lt;/strong&gt; Cloud services have a global reach. Businesses can deploy applications closer to their users, reducing latency and improving performance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Cost efficiency&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Pay-as-you-go:&lt;/strong&gt; Cloud computing operates on a pay-as-you-go model where businesses only pay for the actual resources they use. This aligns perfectly with scalability and contrasts with traditional subscription models where customers pay a fixed fee on a regular schedule regardless of their actual usage.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Reduced or eliminated infrastucture costs:&lt;/strong&gt; Since organizations that move to the cloud no longer need to deploy extensive on-premises architecture to support operations, the costs of buying and maintaining those systems are minimized or eliminated.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Business continuity&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Backup solutions:&lt;/strong&gt; Cloud providers offer comprehensive disaster recovery solutions, ensuring business continuity in the event of infrastructure failures or other disruptions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;High availability:&lt;/strong&gt; Cloud platforms are designed for high availability, with multiple data centers and redundancy measures in place to minimize potential downtime.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Advanced protection:&lt;/strong&gt; Leading cloud service providers invest heavily in security capabilities in order to protect cloud-based applications and their users from cyber threats and vulnerabilities. These include access control, identity management, encryption and compliance across multi-cloud and hybrid-cloud environments.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Regular updates:&lt;/strong&gt; Cloud providers constantly update their security protocols to protect against emerging threats and ensure that businesses benefit from the latest security advancements.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Agility and innovation&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Innovative technologies:&lt;/strong&gt; Cloud platforms offer easier access to advanced technologies such as artificial intelligence, machine learning and big data analytics, enabling businesses to remain competitive.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Faster time-to-market:&lt;/strong&gt; Cloud services can support faster application deployment, reducing time to market. With fewer infrastructure barriers, businesses can rapidly respond to changing market conditions and competitive threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Collaboration and remote work&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;The Everywhere Workplace:&lt;/strong&gt; Cloud-based tools and services facilitate collaboration among teams, regardless of their physical location, enhancing productivity, efficiency and the overall &lt;a href="https://www.ivanti.com/blog/how-cloud-migration-helps-improve-employee-experience"&gt;employee experience&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Secure everywhere:&lt;/strong&gt; The cloud supports remote work by providing secure access from anywhere to necessary applications and data, which has become crucial in the modern work environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Cloud migration challenges&lt;/h2&gt;

&lt;p&gt;As just seen, once applications have been migrated to the cloud, there are numerous benefits. But cloud migration can pose certain challenges. Anticipating them can help IT teams prepare for any potential issues.&lt;/p&gt;

&lt;h3&gt;Data security and privacy&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Breach exposure:&lt;/strong&gt; Migrating applications and sensitive data containing &lt;a href="https://www.dol.gov/general/ppii#:~:text=Personal%20Identifiable%20Information%20(PII)%20is,either%20direct%20or%20indirect%20means." rel="noopener" target="_blank"&gt;personally identifiable information&lt;/a&gt; (PII) to the cloud might expose that data to potential security breaches, so ensuring robust encryption and access control is critical.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Maintaining compliance:&lt;/strong&gt; Ensuring compliance with industry regulations and standards can be challenging in a cloud environment. Regulated financial services, healthcare and e-commerce industries must choose a cloud provider that’s fully capable of supporting their specific compliance requirements.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Downtime and disruption&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Migration downtime:&lt;/strong&gt; The migration process can potentially cause downtime and disrupt business operations. Careful planning and a phased migration can help mitigate this risk.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Service interruptions&lt;/strong&gt;: Although rare, cloud service outages can occur and impact business operations. Having a contingency plan in place is essential. Organizations with zero tolerance for downtime should design for redundancy by utilizing two or more cloud service providers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Cost overruns&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Uncontrolled usage and spend:&lt;/strong&gt; Even with a pay-as-you-go model, cloud costs can spiral out of control without proper management. So, it’s essential to implement cost management practices and constantly monitor usage.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hidden costs:&lt;/strong&gt; Every cloud instance is unique. Beware of costs associated with data transfer, CPU, storage, memory and additional services that may not be initially apparent.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Vendor lock-in&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Single provider dependence:&lt;/strong&gt; Relying too heavily on a single cloud service provider may result in vendor lock-in, making it difficult to switch to an alternate provider or move back to on-premises.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Limited flexibility:&lt;/strong&gt; Vendor lock-in can limit flexibility, as the cost, capabilities and limitations of their chosen provider may constrain businesses.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Skill gaps&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Specialized skills:&lt;/strong&gt; Migrating to the cloud requires specialized IT skills and expertise. Investing in training for your team and hiring experienced professionals is crucial for a successful migration.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Change management:&lt;/strong&gt; Adapting to new cloud-based processes and tools can be challenging for employees at all levels. Effective change management strategies and pre-migration training are necessary to ensure a smooth transition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Performance Issues&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Latency and bandwidth:&lt;/strong&gt; Although cloud resources are elastic, specific applications may experience latency and bandwidth issues, especially if the data centers are far from end user locations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Resource contention:&lt;/strong&gt; Over-subscribed cloud resources can lead to performance degradation if not properly managed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Summary: Planning can equal migration success&lt;/h2&gt;

&lt;p&gt;Cloud migration offers many benefits, including scalability, cost efficiency, &lt;a href="https://www.ivanti.com/blog/5-ways-to-secure-your-cloud-journey"&gt;enhanced security&lt;/a&gt;, employee flexibility and access to the latest technologies. On the flip side, it also may involve several challenges, including exposure to security breaches, potential downtime, cost management issues and the risk of vendor lock-in.&lt;/p&gt;

&lt;p&gt;But by &lt;em&gt;carefully planning&lt;/em&gt; the migration process, addressing potential pitfalls and leveraging the expertise of skilled professionals, organizations can successfully navigate their cloud migration journey and open new opportunities for growth.&lt;/p&gt;

&lt;p&gt;Learn how solutions like &lt;a href="https://www.ivanti.com/products/ivanti-neurons-zero-trust-access"&gt;Ivanti Neurons for Zero Trust Access&lt;/a&gt; can protect enterprise cloud applications, data and devices from unauthorized access and threats. Team it with other cloud-enabled security solutions such as &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;Neurons for RBVM&lt;/a&gt; and &lt;a href="https://help.ivanti.com/ht/help/en_US/CLOUD/vNow/multi-factor-authentication.htm" target="_blank"&gt;Multi-Factor Authentication&lt;/a&gt; to empower your organization with secure anytime, anywhere access to business-critical apps and data.&lt;/p&gt;
</description><pubDate>Tue, 29 Oct 2024 16:11:40 Z</pubDate></item><item><guid isPermaLink="false">f7dc4c22-45de-4d0c-ab98-5ff072182d51</guid><link>https://www.ivanti.com/blog/remote-control-is-for-remotely-controlling</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/blog/authors/rob-destefano</atom:uri></atom:author><category>Endpoint Management</category><category>Supply Chain</category><title>Device Management Remote Control is for Remotely Controlling</title><description>&lt;p&gt;The title seems obvious enough, but if there weren’t a story behind it, this blog wouldn’t be necessary. How do you use remote control to keep your mobile deployments operating at peak performance? It turns out that the answers vary across organizations.&lt;/p&gt;

&lt;p&gt;The most common and expected purpose is to troubleshoot malfunctioning devices or apps. When a mobile worker is idle, it costs your business money. Getting that incident resolved fast is essential so the worker gets back to task and meets customer demand.&lt;/p&gt;

&lt;p&gt;However, there are organizations using the remote control functionality of their MDM product for mobile device management. Why? Is the MDM insufficient for remote device management?&lt;/p&gt;

&lt;h2&gt;What makes an MDM?&lt;/h2&gt;

&lt;p&gt;Using the mobile device management remote control functionality to manage devices compromises core capabilities that make an MDM valuable: automation is a primary example. Using remote control means manually performing various device management tasks, such as updating the operating system or configuring apps. This means touching (even remotely) each device in the estate.&lt;/p&gt;

&lt;p&gt;An MDM should provide a centralized, scalable means to manage fleets of devices – including but not limited to security policy enforcement, updating apps and operating systems, and configuring device and application settings. It’s about efficiency; a single pane of glass to discover, manage and secure all the mobile endpoints across the ecosystem.&lt;/p&gt;

&lt;p&gt;Especially for mobile deployments in operations, but valid for corporate workforces as well, actions like targeted updates to segmented workgroups make it easier for Systems teams to use automation to take action.&lt;/p&gt;

&lt;h2&gt;The benefits of remote control&lt;/h2&gt;

&lt;p&gt;If troubleshooting malfunctioning devices and apps is the most common purpose of remote control, a second benefit is tracking of remote session history. Logging remote control session actions give Support Admins a view into what has been pushed to the device. They can see what apps have been updated as well as any OS updates. Visibility to all these transmissions – over secure sessions, helps resolve incidents much faster.&lt;/p&gt;

&lt;p&gt;A third is the essence of the word “remote” in Remote Control. And this matters in a couple of ways, the first is the worker experience. Without Remote Control, a worker experiencing a device failure in aisle 31 of the warehouse is not only down, but now much navigate the warehouse floor to wherever the local support station is to report the incident.&lt;/p&gt;

&lt;p&gt;At best, the worker then gets another device from the local spares pool, signs in and traverses the floor back to aisle 31 and resumes the task; hopefully where they left off. At worst, they put the device down on a shelf in the aisle, walk to the spares pool location for a replacement device, sign in and travel back to aisle 31. No incident report is made, and a device is missing.&lt;/p&gt;

&lt;p&gt;Remote Control lets this worker report, and Support teams resolve, that issue right at the point of activity in aisle 31. No one leaves their location, and when resolved, the mobile worker is right where they need to be to resume work. It is also important to mention here that attended remote control (where the worker authorizes the remote control session) is possible and adds security measures beyond those in an unattended session.&lt;/p&gt;

&lt;p&gt;The flipside example of “Remote” is your Support Analysts. Remote Control allows these workers to connect to devices at other (remote!) locations to diagnose and resolve incidents. They are also able to determine if the hardware needs to be sent to a repair center, having tested and verified the issue to helping avoid the dreaded “no fault found” resolution from the repair depot.&lt;/p&gt;

&lt;p&gt;Using an MDM with remote control functionality as a crutch to compensate for limited domain knowledge compromises efficiency. The automation included in reputable MDM solutions means more reliable uptime for mobile workers, and a better experience for systems analysts. It is important and worthwhile to invest the time to learn the robust toolset an MDM delivers.&lt;/p&gt;

&lt;h2&gt;The bottom line&lt;/h2&gt;

&lt;p&gt;Each tool has a purpose. If your organization is stuck using remote control to manage mobility, take a look at &lt;a href="https://www.ivanti.com/devices/rugged-device-management"&gt;Ivanti Neurons for MDM&lt;/a&gt;, and let one of our partners help you with a process consultation. We have a library of training to help your support analysts get more comfortable with using MDM. Identifying how to best implement automation in your device management could &lt;a href="https://www.ivanti.com/customers/doddle"&gt;save your IT teams countless hours&lt;/a&gt; each month and improve uptime.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 28 Oct 2024 15:56:39 Z</pubDate></item><item><guid isPermaLink="false">139fedc2-9d61-4985-8d32-9b0e2cfbd44a</guid><link>https://www.ivanti.com/blog/the-importance-of-application-control</link><atom:author><atom:name>Gary McAllister</atom:name><atom:uri>https://www.ivanti.com/blog/authors/gary-mcallister</atom:uri></atom:author><category>Endpoint Management</category><title>The Importance of Application Control</title><description>&lt;p&gt;In today's digital age, organizations face a constant barrage of cyber threats, with unauthorized applications posing a significant risk to their security and operations. Traditional security measures are no longer sufficient to protect against the sophisticated attacks that target vulnerabilities within applications and endpoints.&lt;/p&gt;

&lt;h2&gt;What is application control?&lt;/h2&gt;

&lt;p&gt;Application control consists of the policies, procedures and tools for ensuring applications work as intended, data reliability and accuracy are maintained, access to applications and data are restricted to authorized users and application updates and changes are properly managed. Basically, application control is about &lt;em&gt;mitigating&lt;/em&gt; risk associated with data misuse, alteration or loss within applications, preserving the integrity of business operations.&lt;/p&gt;

&lt;h2&gt;The growing threat of unauthorized applications&lt;/h2&gt;

&lt;p&gt;The proliferation of cloud-based applications has made it easier for employees to access and use software without IT approval. This phenomenon, known as &lt;em&gt;shadow IT&lt;/em&gt;, can introduce significant security risks into an organization. Unauthorized applications might be infected with malware, expose sensitive data or violate compliance regulations.&lt;/p&gt;

&lt;p&gt;Furthermore, the increasing sophistication of &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cyber attacks&lt;/a&gt; has made it harder to detect and prevent malicious software from infiltrating networks. Advanced threats like ransomware, phishing and supply chain attacks can target vulnerabilities within applications to gain unauthorized access and disrupt operations.&lt;/p&gt;

&lt;h2&gt;The importance of application control&lt;/h2&gt;

&lt;p&gt;To mitigate these risks, organizations must implement robust application control measures. Application control solutions help to identify and prevent unauthorized applications from running on endpoints, &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;reducing the attack surface&lt;/a&gt; and protecting sensitive data.&lt;/p&gt;

&lt;h3&gt;Key application control benefits&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced security:&lt;/strong&gt; Prevent unauthorized applications from accessing sensitive data and compromising your network.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved compliance:&lt;/strong&gt; Ensure adherence to industry regulations and data privacy standards.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Reduced risk of malware:&lt;/strong&gt; Protect against malware infections that can disrupt operations and damage your reputation.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced productivity:&lt;/strong&gt; Streamline IT operations and reduce the burden on IT staff by automating application management tasks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved visibility:&lt;/strong&gt; Gain visibility into application usage and identify potential security risks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti Neurons for App Control: A comprehensive solution&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; is a powerful solution that empowers organizations to manage and control application usage. Its key features include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Granular application control:&lt;/strong&gt; Precisely define which applications are allowed to run on your endpoints, preventing unauthorized software from executing.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege management:&lt;/strong&gt; Enforce least-privilege principles to minimize attack surface and reduce the risk of unauthorized access.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Cloud-based deployment:&lt;/strong&gt; Easily deploy and manage Ivanti Neurons for App Control from a centralized cloud platform.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enhanced security:&lt;/strong&gt; Protect your sensitive data and prevent malware infections by blocking unknown applications.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved compliance:&lt;/strong&gt; Ensure adherence to industry regulations and data privacy standards.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;How Ivanti Neurons for App Control works&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons for App Control uses advanced technology to analyze the NTFS ownership of files and cross-reference them against a trusted owners list. If the file owner isn't trusted, the application is blocked from running. This intelligent approach provides a robust defense against unauthorized applications while allowing for exceptions to be configured for approved software.&lt;/p&gt;

&lt;h2&gt;Why invest in application control?&lt;/h2&gt;

&lt;p&gt;In today's threat-filled landscape, application control is no longer an option but a necessity. Ivanti Neurons for App Control offers a comprehensive solution for organizations to safeguard endpoints, reduce risk and improve security posture.&lt;/p&gt;

&lt;p&gt;By investing in application control, you can protect sensitive data, streamline IT operations and ensure compliance with industry regulations.&lt;/p&gt;

&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Learn more: Explore the benefits, features and functionality of &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
</description><pubDate>Tue, 15 Oct 2024 10:44:18 Z</pubDate></item></channel></rss>