<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/rob-destefano/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/rob-destefano</link><item><guid isPermaLink="false">ad252e94-28ef-445d-8992-901af38a4510</guid><link>https://www.ivanti.com/en-gb/blog/sovereign-cloud-data-sovereignty-eu</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/rob-destefano</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><category>Security</category><title>Digital Sovereignty and Sovereign Cloud: Protecting EU Cloud Data for Operational Resilience</title><description>&lt;p&gt;Traditional data protection followed a straightforward principle: Data stored in country A is protected by the laws of country A; data stored in country B is protected by the laws of country B. But in today’s global economy, where your data physically resides no longer determines which governments can demand access to it.&lt;/p&gt;

&lt;p&gt;Cloud infrastructure brought new jurisdictional complexity. The physical location of data centres, the nationality of the cloud provider's headquarters, and the entity controlling operations can each create competing jurisdictional claims, potentially allowing multiple governments to demand access to the same data.&lt;/p&gt;

&lt;h2&gt;What is digital sovereignty?&lt;/h2&gt;

&lt;p&gt;This challenge has a name: digital sovereignty. Digital sovereignty is the principle that organisations maintain complete control over their data within their home jurisdiction's legal framework. This idea has become a necessity for organisational resilience as businesses work in a more fractured, less trusting geopolitical world. Private and public organisations need secure access to cloud-based platforms that are compliant with local regulatory requirements and shielded from the known or unknown geopolitical risks their region faces.&lt;/p&gt;

&lt;h2&gt;How the U.S. CLOUD act impacts EU data residency&lt;/h2&gt;

&lt;p&gt;The &lt;a href="https://www.justice.gov/criminal/cloud-act-resources" rel="noopener" target="_blank"&gt;2018 US CLOUD (Clarifying Lawful Overseas Use of Data) Act&lt;/a&gt; further cemented these concerns for EU organisations. This law empowers US law enforcement to compel any US-based cloud provider to produce data stored anywhere globally — regardless of the data's physical location or the customer's nationality.&lt;/p&gt;

&lt;p&gt;Both the US CLOUD act and the &lt;a href="https://www.congress.gov/crs-product/IF11451" rel="noopener" target="_blank"&gt;Foreign Intelligence Surveillance Act (FISA)&lt;/a&gt; have given firms in the European Union cause for concern. Through these two policies, US authorities could access data contained within cloud platforms of any US-headquartered organisation, even when the cloud data centre is stationed in another country.&lt;/p&gt;

&lt;p&gt;For EU‑based companies, using US‑based tools triggers specific &lt;a href="https://www.ivanti.com/blog/what-is-gdpr" target="_blank" rel="noopener"&gt;GDPR obligations&lt;/a&gt; because personal data leaves the EU. And since the EU–US Privacy Shield was invalidated (known as “Schrems II”), EU companies need other protections. Standard Contractual Clauses (SCCs) remain valid but are conditional and complex as they require case-by-case review.&lt;/p&gt;

&lt;p&gt;A subsequent Data Privacy Framework has been introduced since, but underlying trust among the nations involved only goes so far. These dynamics increased pressure to ensure &lt;a href="https://www.ivanti.com/en-gb/use-cases/data-protection-application-security"&gt;data protection&lt;/a&gt;, and so sovereign cloud solutions were needed to ensure operational resiliency.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons for MDM – Sovereign Edition: built for EU cloud sovereignty&lt;/h2&gt;

&lt;p&gt;For our partners and customers in the EU, Ivanti Neurons for MDM Sovereign Edition addresses these requirements through fundamentally different architecture and operations. Located in Germany and independently operated, this solution was designed to align with the Cloud Sovereignty Framework of the European Commission and has been evaluated by the highly reputable &lt;a href="https://cyberintelligence.institute/" rel="noopener" target="_blank"&gt;cyberintelligence.institute&lt;/a&gt;, where their expert assessment explained:&lt;/p&gt;

&lt;p&gt;“The Ivanti Sovereign Cloud demonstrates a high level of European control in the areas of data processing, security and compliance governance. In its current configuration, the Ivanti Sovereign Cloud achieves at least SEAL 2 certification, meaning that data sovereignty is ensured in all areas. Furthermore, the Ivanti Sovereign Cloud meets the requirements for SEAL 3 certification in many relevant areas, thus achieving digital resilience.”&lt;/p&gt;

&lt;p&gt;You can read the &lt;a href="https://www.ivanti.com/lp/aem/contact/sovereign-cloud-mdm" target="_blank" rel="noopener"&gt;full technical assessment&lt;/a&gt; to learn more.&lt;/p&gt;

&lt;h2&gt;Achieving data sovereignty compliance with confidence&lt;/h2&gt;

&lt;p&gt;Neurons for MDM – Sovereign Edition – EU provides European firms with a strategic foundation for their IT and Security platform from a trusted leader, while maintaining local jurisdictional protections for risk management. This means public and private entities can continue their digital transformation with the confidence that their cloud data will remain secure while their operations gain resilience.&lt;/p&gt;

&lt;p&gt;Next steps? Read our whitepaper, &lt;a href="https://www.ivanti.com/resources/whitepapers/sovereign-cloud-strategy" target="_blank" rel="noopener"&gt;Sovereign Cloud as a Strategic Necessity for European Organizations&lt;/a&gt;, to discover how Ivanti Neurons for MDM Sovereign Edition achieves and exceeds SEAL 2 certification and provides the sovereign cloud architecture European organisations need to maintain data sovereignty while enabling secure digital transformation.&lt;/p&gt;
</description><pubDate>Fri, 17 Apr 2026 12:30:01 Z</pubDate></item><item><guid isPermaLink="false">726e58b5-78f4-48d6-a116-9169e85ab109</guid><link>https://www.ivanti.com/en-gb/blog/stop-the-real-costs-of-paper-documentation</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/rob-destefano</atom:uri></atom:author><category>Supply Chain</category><title>Stop The Real Costs of Paper Documentation</title><description>&lt;p&gt;Proof of condition — it’s been around for decades and serves to verify the integrity of everything from material goods to heavy equipment and myriad assets in between. A paper process from the beginning, it has been accompanied by photographs, rubber stamps, and signatures along the way.&lt;/p&gt;

&lt;p&gt;Still, hard to believe that a quarter way through the 21st century, with ubiquitous mobile device options, so many of these processes continue to reside on clipboards. And this paperwork can take hours, days or more to move from point of documentation to a recipient who can act on information reported within.&lt;/p&gt;

&lt;p&gt;Even in the best of cases, an inspection sheet walked from a loading dock to a warehouse managers office or a logistics dispatcher will take a few minutes – — minutes that could mean the subject of said documentation has changed custody or even left the facility for its next stop in the supply chain.&lt;/p&gt;

&lt;h4&gt;Discover the savings&lt;/h4&gt;

&lt;p&gt;With supply chain costs continuing to rise, where can operations teams find savings by moving away from these paper documents to digital forms?&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Proof of Condition:&lt;/i&gt; Time and money are lost when damaged goods arrive at the loading dock and given that over 10% of all unit loads have some degree of damage when they arrive at the DC, those real costs add up fast. The inverse is equally true, so avoiding chargebacks by documenting product/pallets were delivered in good condition protects shipper integrity and mitigates risk of fraudulent returns at each step along the chain.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Pre-trip Inspections:&lt;/i&gt; Performing a pre-trip inspection is not only prudent, but often required. However, it’s only as good any actions taken from the inspection. If that paper inspection is only reviewed after the vehicle has left the yard, costly breakdowns or roadside inspections could shut down deliveries – — and therefore revenue.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;Safety Inspections:&lt;/i&gt; These come in a variety of flavours – — from the forklift or pallet jack inspection at the start of a work shift, to documenting injury incidents or near-misses, these are essential to worker safety, and also may be required documentation that needs to be readily available for audit.&lt;/p&gt;

&lt;h4&gt;Digitally transform the experience (and savings!)&lt;/h4&gt;

&lt;p&gt;Above are just a few common areas where operations teams benefit from moving to digital forms. Some, and I point to the Proof of Condition documentation as the example, offer an immediate opportunity to measure the value in financial terms. Avoiding chargebacks is a clear way to help the bottom line.&lt;/p&gt;

&lt;p&gt;In other cases, the savings are more cost-avoidance. When a pre-trip inspection identifies risk, and that risk is addressed before the vehicle leaves the dock, goods are delivered on time and fines (or worse) are avoided. The same can also be said about ensuring work equipment is in good operating condition before a worker is put in danger.&lt;/p&gt;

&lt;p&gt;Take a look at &lt;a href="/en-gb/resources/v/doc/ivi/2919/d8c9d9af5ab7" target="_blank"&gt;this infographic&lt;/a&gt; (and share it with your team) for further proof of where digitising documentation offers savings. Then, explore a process consultation with your Ivanti Wavelink supply chain partner to get started with digital forms. Within the Velocity platform, workflows can include Velocity Forms as a required step of the process – — such as forcing completion of a proof of condition statement, including photos, as part of the incoming inspection process when goods roll off the truck onto the loading dock.&lt;/p&gt;

&lt;p&gt;Closing the gap between documentation completion and document action is a key reason to trash paper and move to digital forms. Information is routed to the appropriate recipients for review in a timely, relevant and actionable manner – — essential to controlling costs in operations when every second counts.&lt;/p&gt;
</description><pubDate>Thu, 26 Mar 2026 12:00:06 Z</pubDate></item><item><guid isPermaLink="false">f8752be7-6e61-4c1c-bc25-ad04507a7743</guid><link>https://www.ivanti.com/en-gb/blog/it-s-a-matter-of-security-how-offboarding-can-protect-your-business</link><atom:author><atom:name>Rob DeStefano</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/rob-destefano</atom:uri></atom:author><category>Security</category><title>It’s a Matter of Security – How Offboarding Can Protect Your Business</title><description>&lt;p&gt;January is traditionally a time for new beginnings and the month that employees are most likely to think about changing jobs following the Christmas break and a period of reflection. It’s interesting that the average person will change careers 5-7 times during their working life and, according to a &lt;a href="https://www.deloitte.com/global/en/about.html" target="_blank" rel="noopener"&gt;Deloitte&lt;/a&gt; survey last year, 43% of Millennials will leave their jobs within just two years. For companies, this rise in ‘short-term’ employees necessitates efficient and comprehensive onboarding and offboarding processes. With the imminent arrival of new team members, onboarding is given its due diligence to ensure that they can start-off from the get-go. Unfortunately, this is not the case when it comes to offboarding where the redistribution of workloads to maintain productivity can often be prioritised over effectively managing the offboarding process.&lt;/p&gt;

&lt;p&gt;From a business perspective, this may seem logical, however, it exposes the company to vulnerabilities particularly when you consider that it can take over a week to fully deprovision an employee’s machine and access credentials to applications and cloud resources. Remember, during this time, leavers may still have access to corporate resources that can cause severe reputational damage if misused. After all, a disgruntled former employee who leaves due to unexpected termination or to work for a competitor, can be a source of data security breaches due to lax IT protocols.&lt;/p&gt;

&lt;p&gt;With incomplete offboarding as one of the most serious risks to a company, we conducted a &lt;a href="https://www.ivanti.com/blog/ivanti-identity-survey-results" target="_blank" rel="noopener"&gt;survey&lt;/a&gt; to delve deeper and discovered that once an employee does leave, nearly half of IT professionals are only &lt;em&gt;somewhat&lt;/em&gt; confident that they no longer have access to the organisation’s critical systems and information. In today’s on-the-go society, employees access work through company mobile phones and laptops – all of which need to be returned before they leave the company. In some organisations, this process can be cumbersome or easily forgotten, resulting in loss of assets and ex-employees retaining access to resources.&lt;/p&gt;

&lt;p&gt;&lt;a&gt;What’s more shocking is that over half of those surveyed know someone who still has access to a former employer’s applications or data. What terrifies companies the most? Well, almost 40% fear leakage of sensitive data, while over a quarter worry about cybersecurity hacks and a similar number are concerned about malicious data deletion or theft.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2020/01/screen-shot-2020-01-17-at-4.23.03-pm.png"&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;It’s not uncommon that ex-employees with an axe to grind can wreak havoc on purpose. On the other end of the scale, ex-employees with good intentions can cause equally as much damage by accident. The main culprit is shared passwords for communal accounts. Shared by word of mouth or saved on file, these are often easy to remember. Although an employee has physically left the company, they still have remote access to these platforms unless the password is reset during offboarding.&lt;/p&gt;

&lt;p&gt;With these concerns stacking up you may wonder why organisations don’t implement a water-tight offboarding process. One of the reasons for this reluctance may be because in some companies offboarding is an extremely manual and time-consuming task, executed through a series of complex processes requiring multiple forms, putting businesses off from allocating the necessary resources. Although, as more systems move into the cloud, it’s essential that, alongside other departments, IT is included in the offboarding process from the start. How can IT teams overcome these issues? Well, automation is part of the answer.&lt;/p&gt;

&lt;p&gt;An automated IT infrastructure takes the headache out of laborious tasks. Companies no longer need to dedicate hours to completing the offboarding processes or live in fear of missing a system. This significantly reduces their downtime and frees-up IT teams to focus on more impactful jobs that improve the performance of the business.&lt;/p&gt;

&lt;p&gt;Find out more about how Ivanti can help you streamline your offboarding process &lt;a href="https://www.ivanti.com/en-gb/en-gb/en-gb/products/hr-service-management" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Fri, 17 Jan 2020 23:36:02 Z</pubDate></item></channel></rss>