<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/steve-feldstein/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/steve-feldstein</link><item><guid isPermaLink="false">27e0712f-f1fe-4e5a-b850-a0d3a54d5017</guid><link>https://www.ivanti.com/en-gb/blog/ivanti-protecto</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How to Safeguard Healthcare Data in ITSM: Ivanti and Protecto</title><description>&lt;p&gt;The healthcare sector, perhaps more than any other, needs to scrutinise the balance between data utility and data privacy. Healthcare organisations must manage large amounts of sensitive data while complying with stringent regulations such as the Health Insurance Portability and Accountability Act (HIPAA). For IT teams seeking to implement AI-augmented service management, that responsibility weighs heavily.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;A notable recent incident involved over four million customers affected by &lt;a href="https://therecord.media/healthcare-data-breaches-blue-shield-california" rel="noopener" target="_blank"&gt;a data breach at Blue Cross Blue Shield&lt;/a&gt;, where Google Analytics had been configured in a manner that allowed member data to be shared with Google Ads, likely including protected health information.&lt;/p&gt;

&lt;p&gt;Forward-looking IT leaders want to take advantage of advanced IT service management capabilities to improve operational efficiency, including emerging AI applications. But to avoid becoming the latest headline, they also need the highest standards of data protection. In this article, we’ll go into how Ivanti integrates with Protecto to do just that.&lt;/p&gt;

&lt;h2&gt;Where healthcare compliance and AI intersect&lt;/h2&gt;

&lt;p&gt;The myriad regulations that healthcare organisations must follow (HIPAA, GDPR, CCPA and others) are designed to protect patient data and ensure that it is handled securely and ethically. Data security and privacy are fundamental aspects of patient trust, and noncompliance can result in significant fines and legal actions.&lt;/p&gt;

&lt;p&gt;At the same time, AI and ML technologies require access to large datasets – data that may include sensitive information that is subject to these stringent requirements. To add another layer of complexity, healthcare organisations are often large and complex, with multiple departments and locations, which means any data privacy solutions need to be able to scale without compromising performance.&lt;/p&gt;

&lt;h2&gt;Healthcare requirements for ITSM&lt;/h2&gt;

&lt;p&gt;IT organisations that want to take advantage of advanced ITSM use cases without fear of compromising data privacy have specific requirements – requirements that the integration between Ivanti Neurons for ITSM and Protecto deliver.&lt;/p&gt;

&lt;h3&gt;Data masking&lt;/h3&gt;

&lt;p&gt;Intelligent data masking identifies and masks sensitive information such as PII and PHI. This lets AI agents operate on data without exposing sensitive elements, preventing data leaks and reducing misuse. Additionally, data masking ensures that the context and utility of the information remain intact, enabling effective analysis and decision-making.&lt;/p&gt;

&lt;h3&gt;Role-based access controls&lt;/h3&gt;

&lt;p&gt;Role-based access controls and policy-driven unmasking ensure data is only accessed by authorised users with appropriate roles. Only users with the necessary permissions can access or unmask sensitive data.&lt;/p&gt;

&lt;h3&gt;Audit trails&lt;/h3&gt;

&lt;p&gt;To comply with regulations, healthcare organisations need a comprehensive audit trail of how sensitive data is accessed, used and protected. Detailed logs simplify compliance workflows and support regulatory audits.&lt;/p&gt;

&lt;h3&gt;Seamless integration&lt;/h3&gt;

&lt;p&gt;Protecto integrates with Ivanti APIs, which allows existing processes to remain uninterrupted – and for IT teams to deliver the best possible service – adding a layer of protection without disrupting operations.&lt;/p&gt;

&lt;h3&gt;Scale&lt;/h3&gt;

&lt;p&gt;A single instance of Protecto can support over 3,000 tenants, safeguarding the data of millions of users. It can handle large-scale deployments while maintaining operational resilience, making it a reliable choice for AI initiatives.&lt;/p&gt;

&lt;h2&gt;Ivanti and Protecto’s partnership&lt;/h2&gt;

&lt;p&gt;The partnership between Ivanti and Protecto brings immense value to Ivanti customers in highly regulated sectors with heightened data privacy concerns.&lt;/p&gt;

&lt;p&gt;Already available features such as custom masking policies, on-premises and private cloud alternatives, and improved audit logs and reports ensure customers can meet compliance requirements with confidence.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Our commitment to research and development in AI, machine learning and data protection mean customers will always be at the forefront of managing large-scale datasets.&lt;/li&gt;
	&lt;li&gt;Our work with healthcare organisations, regulatory bodies and technology partners helps customers put in place practical data protection solutions without compromising IT efficiency.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Combining Ivanti Neurons for ITSM with advanced data security and privacy features ensures that our customers’ ITSM operations are both efficient and compliant with the most stringent guidelines, whether they’re in the healthcare industry or any other highly regulated field.&lt;/p&gt;

&lt;h2&gt;Ivanti’s partner ecosystem&lt;/h2&gt;

&lt;p&gt;Ivanti works with a wide range of technology partners like Protecto to help customers make the most of their investment in Ivanti solutions. To learn more, visit the &lt;a href="https://marketplace.ivanti.com/xchange/64b5b48e2ee9d6e08c3e6724" target="_blank"&gt;Ivanti Partner Markeplace&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Mon, 02 Jun 2025 17:00:31 Z</pubDate></item><item><guid isPermaLink="false">061ff086-9328-47bb-9516-06d6653ca2c6</guid><link>https://www.ivanti.com/en-gb/blog/how-it-device-discovery-can-identify-your-network-s-assets-and-vulnerabilities</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities</title><description>&lt;p&gt;The security of your organisation’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensuring compliance requires you to know what’s on your network. But how can that be done when only&amp;nbsp;&lt;a href="/en-gb/resources/v/doc/ivi/2732/7b4205775465"&gt;48% of leaders and security professionals&lt;/a&gt;&amp;nbsp;say they run their asset discovery program at least once per week?&amp;nbsp;One of the most effective tools for identifying assets and vulnerabilities on a network is IT asset discovery.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is IT discovery and why is it important for IT security?&lt;/h2&gt;

&lt;p&gt;IT discovery is the process of identifying and cataloging the various hardware, software and other components that make up an IT infrastructure. This is an essential process to ensure the smooth functioning of IT networks as it allows IT administrators to identify potential issues and plan for future growth.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once this identification and cataloging of IT inventory is completed, you can maintain a comprehensive inventory of all your assets.&amp;nbsp;Keeping track of all the components making up your network in one place means IT administrators can quickly identify any problems and take the necessary steps to fix them.&lt;/p&gt;

&lt;p&gt;And since,&amp;nbsp;on average, up to&amp;nbsp;&lt;a href="https://comparesoft.com/asset-management-software/eliminate-ghost-assets/" rel="noopener" target="_blank"&gt;30% of an organisation’s IT assets&lt;/a&gt;&amp;nbsp;are ghost assets,&amp;nbsp;missing or unaccounted for,&amp;nbsp;it is even more important to have accurate, up to date information about your device landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quickly detect changes in the network and respond to potential&amp;nbsp;threats,&amp;nbsp;it’s worth automating the discovery process&amp;nbsp;—&amp;nbsp;ultimately,&amp;nbsp;it'll&amp;nbsp;ensure&amp;nbsp;a secure and compliant network. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How does IT discovery work?&lt;/h2&gt;

&lt;p&gt;IT discovery&amp;nbsp;typically uses manual scanning or automated scanning tools. Manual scans involve manually entering IP addresses into a scanner, while automated scans are done with specifically designed software programs. These programs will search through an organisation's environment, looking for:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Hardware components such as computers, servers, routers and switches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software components such as operating systems and applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Network connections such as LANs (Local Area Networks) or WANs (Wide Area Networks).&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additionally, as not every asset will be on the network, the ability to discover devices from other sources via connectors is just as critical in providing a comprehensive picture of your entire IT estate.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Benefits of IT discovery for IT security&lt;/h2&gt;

&lt;p&gt;Accurate device information is an essential component of any organisation’s IT network. Without it, organisations are unable to identify and track assets on their networks or ensure compliance with relevant regulations and standards.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By automating the process of discovering devices connected to your&amp;nbsp;network,&amp;nbsp;you can capitalise on the following benefits:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Provide real-time alerts regarding any changes in the device inventory&lt;/strong&gt;.&amp;nbsp;This kind of visibility can help your organisation quickly detect potential threats and respond accordingly. With accurate device information, identifying unknown assets and reducing attack surface by removing outdated or unauthorised hardware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ensure that a network is compliant with relevant security regulation&lt;/strong&gt;s&amp;nbsp;and standards such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act).&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Accurately monitor the performance of IT infrastructure and ensure that it always remains secure&lt;/strong&gt;.&amp;nbsp;With real-time visibility into all the devices connected to the network, your IT team can easily identify problems, even before they become critical issues, and respond quickly when issues arise. This helps reduce downtime for employees, which in turn leads to improved productivity and employee experience across the organisation.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Respond&amp;nbsp;Quickly to Potential Threats&lt;/h2&gt;

&lt;p&gt;When responding to potential threats, it’s important for organisations to act quickly to minimise the impact of the attack. With extended visibility into your entire network, you can quickly locate any malicious actors or vulnerabilities that could lead to an attack.&lt;/p&gt;

&lt;p&gt;This also allows for more accurate and timely monitoring of changes in your network's architecture, which are critical in identifying potential weaknesses before exploitation can occur.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, keeping track of who has access to what parts of your network makes monitoring user activities and maintaining up-to-date user profiles a breeze. With threat actors getting better at disguise, ensuring that only authorised personnel have access to the information they need helps reduce the risk of any unauthorised access or misuse.&lt;/p&gt;

&lt;p&gt;And if a threat occurs, it’s much easier to determine where it originated from and take appropriate action against it.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Finally, providing valuable insights into how your organisation is responding to potential threats can help improve your security strategy. By measuring response time and tracking incidents over time, you can evaluate which strategies are working best and which ones to amend.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hungry for more? Watch our webinar recording and explore&amp;nbsp;&lt;a href="https://www.ivanti.com/en-gb/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs"&gt;5 Best Practices From Real‑World RBVM Programs&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 22 Jun 2023 20:09:10 Z</pubDate></item></channel></rss>