Posts tagged with "UEM"



05. April 2022
Demystifying Security: Threat Detection, Prevention, and Response (EPP, EDR, and MTD)
In a previous article, we covered Mobile Threat Defense (MTD) solutions, offering threat detection, prevention, and response on mobile devices. Today we will cover similar functions but in more traditional desktop devices like workstations, laptops, and servers. Although the goal is similar, due to its own idiosyncrasies, the response is delivered in a different manner, with two different solutions providing a combined response: Endpoint Protection Platform (EPP) and Endpoint detection and...
09. March 2022
State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...
01. March 2022
Cyber Security Solutions
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.
03. November 2021
Demystifying: Apple, Android for Enterprise, and Samsung Knox for Your Enterprise
It’s safe to say that in today’s world everyone has gone remote, with users accessing data online from different devices like smartphones, tablets, and laptops. In previous blog posts, we’ve discussed how UEM solutions are ideal when it comes to ensuring the security of data and devices that are operating remotely. However, Apple, Google, and Samsung also offer their own services and tools to help manage their devices and protect their data. Let’s break down their...
14. September 2021
Solution Highlight: VMware Carbon Black
In our recent blog post, we talked about behavior-based security, a whole new approach to tackling today’s security challenges by preventing an attack before it even happens.
04. May 2021
Better data security in the post-pandemic world
2020, meant it was one the busiest year on record for security teams as they fought off bad actors and adapted to new employee behaviours When the pandemic began, organisations believed remote working would be temporary, but as two weeks became six, and six weeks became six months and most of us remained at home. As we begin 2021, it has become too clear to many businesses that remote work is here to stay. In fact, Research from Ivanti/former MobileIron found that 80% of the global workforce...
09. April 2021
Acquisition with Intent and The Rise of The Everywhere Workplace: Why Ivanti Is Moving Faster Than Ever During a Global Pandemic
It's easy for businesses to drop into reactive survival mode during a crisis like COVID-19. Navigating rapidly changing conditions can make it difficult to think beyond immediate challenges. And yet, even – or perhaps especially – in a crisis, it’s imperative that companies execute strategies that will make them stronger in the long term. In the case of COVID-19, those strategies should support clients as they transition to new working conditions.
17. March 2021
Not All Buzzwords are Created Equal: Real Applications of Zero Trust Security for IoT
Zero Trust security. Some would say it’s the latest and greatest buzzword and this disposition is understandable given the amount of jargon introduced into the Information Technology market each year. With vernacular being used interchangeably like “AI,” “Machine Learning,” and “Deep Learning,” these words get stripped of their real significance.
08. February 2021
7 Ways UEM Enhances Your Security
Many things blur the line between endpoint management and security. Examples? Managing an endpoint. Configuring it. Performing application and software management. And patching the endpoint. The fact is, managing and securing a device is so interrelated that it makes sense for these two functions to come together in a single platform that can accomplish these, and other tasks needed in your IT organization. Here are the seven ways Unified Endpoint Management (UEM) can support security.
01. February 2021
IVANTI/MOBILEIRON AS A LEADER IN WORLDWIDE UEM SOFTWARE
Ivanti/MobileIron has been recognized as a Leader in the IDC MarketScape: Worldwide UEM software 2020-2021 Vendor Assessment. Read an excerpt of the IDC MarketScape evaluation of Ivanti/MobileIron in the UEM market, including:

Show more