Ivanti finds, heals, and protects every device, everywhere - automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.
Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.
👷🏽♀️ Exceptional employee experiences Any device. Any location. Ensure proactive, efficient service so employees can work how they want. 🔒 Security for the Everywhere Workplace Work anywhere, secure everywhere, with a comprehensive and scalable security strategy. 🎯 Accurate, actionable asset insights Build the big-picture view of your IT estate and turn visibility into value.
Ivanti has the worst support we have ever had. Tickets are stuck in automation and NO one responds. WHy did they purchase Cherwell if they are not going to support it? Horrible
Yes, but not to the extent that is needed which is why Risk-based Vulnerability Management solutions were created and CISA has a Known Exploited Vulnerabilities list. CVSS and Vendor Severity are static algorithms and something like known exploited make a difference but not enough to get visibility. In general you need more than CVSS and Vendor Severity to prioritize more effectively.
Somebody PLEASE tell all these idiots that think everybody has, wants or needs a phone to stop being stupid and discriminatory. The email verification that has been working just fine is all I need. No, I will not take a hand out for I could pay for IF I WANTED TO. I can't access my Chase or eTrade accounts ON LINE now, Helping the Post Office while making Chase and eTrade spend more money to answer me. In the near future I will not be able to access Social Security or Microcrap. I don't care about microcrap but I don't like the idea of a day twenty miles away to see somebody at the SS office when I could have done IT ALL ON LINE. These are discriminatory and predatory attacks on those of us that have a life and don't need to see what you are doing every minute of the day. Or for you to know what I am doing in the privacy of my own home, wherever home may be at the moment.
Also there was once a time in Sweden leaked every voice recording of people calling for health advice (1177), somebody saw a network cable at a datacentre that looked like it had been accidentally disconnected so he put it "back in". there was no other security for all this sensitive information other that it not being connected right there..
They are doing a better job than most companies. Microsoft, a first party company, didn't even bother to develop a product like Ivanti EPM. WSUS has fallen behind the times.
My question is about the integration of Ivanti Neurons for ITSM & UEM integration. In case that users request to install applications via Ivanti Neurons for ITSM Service Request and once it is approved. Will the Neurons for ITSM trig the Neurons for UEM to install application for users PC client automatically?
Hi there! Thanks for the question. Here's the reply from our Product Manager: "App Distribution can be one step of a broader Bots automation workflow. So I expect this all works today by using Bots. Secondarily, distribution API’s will be released in the future, and once released, it would be possible to have ITSM call the rest API’s. This would require some customization, though." Hope this helps!
Ivanti you fundamentally failed your entire customer base because you failed to challenge yourself when it came to your own product security. There is a current, on going live fire global war going on in cyber security and it requires constant vigilance and proactive action. God knows what security secrets and sensitive data was compromised due to your products failure. There are three tenets you needed to follow when it came to security but you did not. The world of cyber security has changed and it requires a fundamental shift in the actions of developing software and it's maintenance with an eye on current and future unknown threats. Trust in your product is now forever lost. It's time to tear it down to atoms and start over.
Il faudrait tout ré-écrire de zéro pour y intégrer la sécurité dès la conception. Trop cher. Il ne peuvent donc que pipoter les naïfs. La seule solution est de se passer de tels produits bouts de chandelles de milliers de scripts et d'ajouts dans tous les sens développés rapidement sur un coin table.
There's only one real plan: defence in depth. Over a long enough timeline, nothing is secure. So having many layers in place, along with monitoring and alerting tools, is the only way to get CLOSE to being truly secure.
what about in house application which can not be avaialble on cloud storage like aws or azure, almost impossible to do share this type of application on internet