Facebook Single Sign-On Equals Internet Headache

Reports came out recently that, once again, Facebook has been breached. Hackers were able to take over the accounts of at least 50 million users. As this Wired article points out, it wasn’t passwords that were hacked, but access tokens. One thing that the Wired article details, and which is summed

Read more...

The Criteria Behind the Curtain: 2018 Gartner MQ for ITSM Tools and 2018 Gartner Critical Capabilities for ITSM Tools

The 2018 Gartner Magic Quadrant and Critical Capabilities for ITSM reports were published recently. If you want to know how Ivanti fared, download the free reports below: 2018 Gartner Magic Quadrant for ITSM 2018 Critical Capabilities for ITSM Many of you review, analyze, and use the reports a

Read more...

ITAM and Endpoint Security: You Can’t Manage, Secure, and Effectively Defend Against What You Don’t Know You Have

IT Asset Management (ITAM) is inextricably linked to endpoint security. In fact, as shown below, the first two of the Center for Internet Security’s Top 5 Critical Security Controls emphasize just how crucial it is to understand what devices you have and what software is running on them. These contr

Read more...

Advice for Women Pursuing a Career in Technology

I was amazed at this statistic from 81% of respondents from Ivanti’s Women in Tech survey, when asked what advice they would give to women starting a career in tech: Know your worth. A huge number of women obviously felt they’d missed out in their early careers, or maybe the newspaper reports o

Read more...

Virtual Event Recap: IT Executive Panel Keynote

In early October, Ivanti hosted its first ever virtual event: The IT Leadership Summit, or #ITLS18 for social media. There were a total of 30 presenters, including Forrester analysts, product marketing managers, director-level IT professionals, and executives. Here is the video and transcript from

Read more...

Operational IT and Security – Breaking the Siloed Approach

Due to the ever-increasing cyber security risk, many organizations are employing security teams, with the goal of defining security policies and detecting and remediating security risks. In addition, most organizations also employ IT operations teams, with the objective of making the business produc

Read more...

To Encrypt or Not to Encrypt, that Is the Question

Encrypting has been a problem faced by every IT team. It’s been around so long even Shakespeare wrote about it! From dealing with the complaints from Sales that you slowed down their demo boxes, to having to enter the Recovery Key for George for the umpteenth time, we all ask ourselves if encrypting

Read more...