在线讲座

近期网络研讨会

December Patch Tuesday

2017年12月13日

Chris Goettl | Manager, Product Management, Security | Ivanti

Todd Schell | Product Manager | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out

录制的网络研讨会

November Patch Tuesday

2017年11月15日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Cut Profile Size, Cut Login Times

2017年11月8日

Jon Wallace | Chief Technologist | Ivanti

Peter Jones | Chief Technology Officer | Avanite Limited

The user profile is often one of, if not the biggest contributing factor to slow logins with size having a dramatic impact. Whether traditional PC environments, or desktop virtualization implementations, roaming environment personalizations can have a detrimental effect on the user experience. As a result, organizations like AppSense and RES (both acquired by Ivanti) along with Citrix, VMware and Microsoft have all attempted to ease these challenges through the introduction of smarter persona management technology.

The team at Avanite, an Ivanti One partner, have spent years dissecting and understanding the user profile and its contents allowing them ascertain what can be tuned or safely eliminated allowing organizations to take full advantage of their persona management solutions. By applying things like smart policies to cookies or aging unused application data, Avanite can reduce the overall size of the user profile allowing persona management solutions to be more efficient, reducing the overall storage costs and speeding up the logon process.

Join us live to understand how this technology can benefit your environment.

The Biggest Mistake You Can Make With Your Data Center Licenses

2017年11月3日

Jason Christensen | ITAM Product Marketing Manager | Ivanti

Matt Reardon | ITAM Consultant | iQuate

IT is spending more money on software than ever before. This most likely leaves you looking for ways to make the most of the software licenses you already have. On top of that, increasingly complex data center environments compound spending on software assets. Limited visibility into those assets could expose your most valuable business-critical applications to significant risk and additional cost.

See how data center discovery ninja Matt Reardon, takes an aggressive approach to eliminate complexities and save you money. 

A Non-Salesy Introduction to the Ivanti Portfolio

2017年11月1日

Kevin J. Smith | Senior Vice President | Ivanti

Steve Morton | 执行副总裁兼首席营销官 | Ivanti

Chris Goettl | Manager, Product Management, Security | Ivanti

David Martinez | Sr. Product Marketing Manager | Ivanti

Amber Boehm | Manager, Product Marketing | Ivanti

It's been over 8 months since HEAT and LANDESK merged to create Ivanti. Now that the dust has settled, you may be wondering, "what does Ivanti do anyway?" In this webinar, Kevin J Smith (former HEAT SVP), Steve Morton (Ivanti CMO), and Chris Goettl (Ivanti Product Manager) will discuss Ivanti's products and how they're helping to unify IT. In this minimal slides, zero-sales pitch webinar, you'll learn how HEAT products fit into the Ivanti portfolio and all about the various products Ivanti offers.

New Data: Surprising Discoveries and Key Takeaways on Warehouse Efficiency

2017年10月25日

Rob DeStefano | Product Marketing Manager | Ivanti

Eric Klein | Director, Enterprise Mobility and Connected Devices | VDC Research

See what nearly 150 global warehouse technology leaders are saying about their mobile applications and OS migration plans. VDC Research and Ivanti are teaming up to break out the surprise findings from VDC’s new research report, along with the key trends you need to focus on in order to keep pace with warehouse demands. Join us for this research recap in a 35 minute webinar featuring VDC Research’s Eric Klein and learn:

  • The top warehouse improvement initiatives for 2018
  • Key factors driving new investment in mobile warehouse solutions
  • What warehouse decision makers are saying about app migration
  • Nine key takeaways to keep in mind for future growth
  • Plus answers to your questions!

Top 5 Healthcare IT Challenges

2017年10月24日

Adam Smith | Senior Product Marketing Manager | Ivanti

Aaron Ortiz | Manager, Enterprise Device Architecture | Sharp Healthcare

Dan Lutter | Director, Field Technology Services, Health Informatics and Technology | Advocate Health

The healthcare world is always changing. This webinar features discussions with two healthcare IT leaders who will join us to discuss their top challenges. We will focus on discovering what challenges they are facing and some of the strategies and methods they are developing and modifying in order to solve their top issues.

Join Ivanti customers Dan Lutter, Director at Advocate Health Care, and Aaron Ortiz, Manager at Sharp Healthcare, for this exclusive customer webinar.

Transform Desktops and Accelerate User Experience

2017年10月12日

Paul Whalley | Product Manager | Ivanti

Andrew Swindells | Product Manager | Ivanti

Major IT projects, like Windows 10 migration and updates, Office 365 adoption, migrating to Citrix Cloud, desktop transformation, or reducing cyber-threat risk, are challenging to plan and execute while keeping end users productive. While user acceptance is critical to IT project success, delivering a great user experience during and post-project can become an afterthought due to the pressure to keep a project “on time and on budget”.

For the end user computing initiatives described above (and more), Ivanti User Workspace Manager (UWM), formerly DesktopNow Plus, significantly reduces the need to sacrifice user productivity to keep projects on track and ensures that those projects deliver results that significantly improve the user experience, driving up acceptance and productivity. In this webinar, you’ll learn:

  • Which IT initiatives can benefit most from UWM inclusion
  • How UWM keeps end users working throughout the project
  • How UWM increases user acceptance when initiatives are delivered.

October Patch Tuesday

2017年10月11日

Chris Goettl | Manager, Product Management, Security | Ivanti

Todd Schell | Product Manager | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Hacked!?! How can I Fix This Fast?

2017年10月4日

Eran Livne | Principal Product Manager | Ivanti

Amber Boehm | Manager, Product Marketing | Ivanti

Phil Richards | Chief Security Officer | Ivanti

While WannaCry and NotPetya remain open wounds for many organizations, the Shadow Brokers are back with a new stolen exploit, and Equifax just put an exclamation point on the risk to personal data. What do you do if your business gets breached?

Sit in as our CISO and Principal Product Manager dish on the state of security, and how the newly automated remediation features in Ivanti Endpoint Security for Endpoint Manager 2017.3 can help you effectively respond to attacks that do get through.

A Non-Salesy Introduction to the Ivanti Portfolio

2017年9月20日

Steve Morton | 执行副总裁兼首席营销官 | Ivanti

Bob Janssen | Chief Technology Officer | Ivanti

It’s been two months since Ivanti acquired RES, adding the RES products to Ivanti’s extensive offering of IT solutions. You’ve probably wondered, ‘what does Ivanti do anyway?” Well, in this webinar join RES founder and CEO, Bob Janssen and Ivanti CMO, Steve Morton for a discussion on Ivanti’s products and how they’re helping to unify IT. In this 30-minute, minimal slides, zero-sales pitch webinar you’ll learn how RES products fit into the Ivanti portfolio and all about the IT asset management, IT service management, unified endpoint management, and IT security products Ivanti offers.

Bob and Steve will also be taking your questions about RES solutions and the future of Ivanti.

September Patch Tuesday

2017年9月13日

Chris Goettl | Manager, Product Management, Security | Ivanti

Todd Schell | Product Manager | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Breaking Down Gartner's Magic Quadrant for ITSM Tools

2017年9月12日

Kevin J. Smith | Senior Vice President | Ivanti

Matt Hooper | ITSM Evangelist | Ivanti

David Martinez | Sr. Product Marketing Manager | Ivanti

Melanie Karunaratne | Senior Manager, Product Marketing | Ivanti

Ian Aitchison | Director, Product Management | Ivanti

What should you look for in an IT Service Management vendor? What does Gartner say about the ITSM market? It's all in Gartner's Magic Quadrant for ITSM Tools. Join our panel of ITSM experts as they dive deeper into Gartner's analysis, and also share their observations on ongoing trends and predictions for future developments in service management. All registrants will receive a download of the report, compliments of Ivanti.

Winning with Analytics

2017年9月6日

Melanie Karunaratne | Senior Manager, Product Marketing | Ivanti

Nick Gehr | Manager, Enterprise Application and Support Services | Aviall, Inc.

Christy Phongsavanh | Warehouse Operations Control Center Specialist | Aviall, Inc.

Are you surviving on adhoc excel spreadsheet reporting or relying on word of mouth data points to make decisions? Everyone is searching for those best practices to turn metrics into meaningful reports. So, how do you get immediate, targeted, analytics for different informational needs and decisions?

Join Ivanti customer Aviall, and hear how they solved their reporting visibility challenges. Learn how they went from manual reports to daily dashboards in their Control Center. Hear how they answered important questions about customer experience and delayed order shipments. See how they use Ivanti Xtraction to improve operational control and on-time shipping.

5 Ways to Tighten Security with Endpoint Management

2017年8月31日

Eran Livne | Principal Product Manager | Ivanti

Jason Forsgren | Product Manager | Ivanti

In a world of BYOD and rapidly expanding mobility, securing and managing endpoints is more challenging than ever. This is confirmed, along with many surprising statistics, in a recent survey conducted by analyst Enterprise Management Associates (EMA).

Join us for this 60-minute webinar where security experts Jason Forsgren and Eran Livne go over report highlights and share their insights on how to best address these challenges. All webinar registrants will get a free copy of the complete EMA research report.

Some surprising statistics discussed in the EMA survey include:

  • 70 percent of mobile device users and 35 percent of laptop PC users report they personally own the devices they use to perform their jobs
  • 40 percent of surveyed end users report they regularly use insecure methods for sharing company data
  • On average, 50 percent of all business tasks are performed outside the physical workplace
  • Only 5 percent of surveyed organizations indicate they are fully prepared to support all modern endpoint management requirements 

The 4 Keys for World Class ITSM + Magic Quadrant Review

2017年8月30日

Kevin J. Smith | Senior Vice President | Ivanti

David Martinez | Sr. Product Marketing Manager | Ivanti

IT organizations are undergoing a remarkable transformation as they prepare for the future. In this session, we will begin with a special review of the Gartner ITSM Magic Quadrant. We will share a set of proven best practices models, key processes and functions to focus on during the journey of ITSM, along with Tips for Success based on the habits of leading IT organizations around the world.

Join this 60-minute webinar with ITSM experts Kevin J Smith and David Martinez to learn important initiatives and tricks to build a successful Service Management strategy.

Steps to Cut your Software Spend by 30 Percent

2017年8月16日

Todd Labrum | ITAM Product Manager | Ivanti

Mark Devereux | Product Manager | Ivanti

It's time for a total asset management makeover. Making the most out of hardware and software assets is a challenge every business faces. On average, businesses only utilize 35-38 percent of the software they pay for. Inefficiencies swirl around hardware assets as well. 
Join this 60-minute webinar to learn helpful tricks that help maximize the performance and value of your IT assets.

August Patch Tuesday

2017年8月9日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Tackling Office 365 Deployment Challenges

2017年8月2日

Paul Whalley | Product Manager | Ivanti

Neil Barnett | Product Manager | Ivanti

Office 365 adoption is exploding. According to a recent study from Skyhigh, one out of every five corporate employees uses an Office 365 cloud service—an enormous change from the less than 7% of corporate employees using Office 365 nine months ago. There are now over 100 million corporate Office 365 users according to Microsoft!

While Office 365 brings simpler pricing and reduction of on-premises infrastructure and maintenance, it also brings new challenges for IT. In this webinar, you’ll learn:

  • How to migrate from earlier versions of Office to Office 365 without user disruption

  • How to solve Outlook 365 and One Drive performance issues in virtual desktops and sessions

  • How to leverage and control the 1 TB of cloud storage for each user

Windows 10 Updates - The Great Debate

2017年7月27日

Rex McMillan | Principal Product Manager | Ivanti

Alan Braithwaite | Director of Product Management | Ivanti

Should you be more aggressive with your Windows 10 migration and updates or should you favor a more conservative approach? What are the pros and cons of each approach? If your organization is delaying your migration until you have a better understanding of Microsoft’s latest OS updates, this webinar is for you.

Join us for this LIVE debate, where Alan Braithwaite, Director of Product Management and former Engineering Director at Ivanti, and Rex McMillan, Principal Product Manager at Ivanti, will duel it out and fight for Windows 10 migration and update dominance. No matter who you side with, this debate may make you change your mind about how hard Windows 10 updates need to be. 

Maximize your IT Data: How to Save Time and Money

2017年7月26日

Jeremy Carter | Manager, Product Management | Ivanti

Melanie Karunaratne | Senior Manager, Product Marketing | Ivanti

Gregg Smith | Solutions Expert | Ivanti

Get a handle on your IT reporting and analytics!

Data, data everywhere and not one useful insight – sound familiar? Our reporting panel will discuss how you can maximize the value of your IT data and get to the insights that impact your business. In this webinar, we’ll cover:

  • Where to start when you don't know where to start
  • How to spot the pitfalls and avoid data traps
  • How to solve business challenges with information you can trust
  • Plus suggestions of what to do with all that new found free time!

5 Things That Will Transform IT Service Management

2017年7月20日

Kevin J. Smith | Senior Vice President | Ivanti

David Martinez | Sr. Product Marketing Manager | Ivanti

IT is currently undergoing a remarkable transformation that will create a new course for the organization of the future. In this session, we will take a brief look at the 5 factors that are driving this transformation and why each is so important. This is a dramatic change from the past and will reshape much of what we have accepted as the standard operating model for IT. Taking this a step further, these 5 factors will result in a new set of metrics and a new organizational model for IT.
Join David Martinez and Kevin J Smith as they take a glimpse into the future of ITSM.

LIVE Q&A with Ivanti's CEO and CMO

2017年7月13日

Steve Daly | 董事长兼 CEO | Ivanti

Steve Morton | 执行副总裁兼首席营销官 | Ivanti

On July 5, Ivanti announced an agreement to acquire RES Software. In this LIVE Q&A style webinar, you'll have the opportunity to spend 60 minutes with Ivanti CEO, Steve Daly, and Ivanti CMO, Steve Morton. They'll discuss the acquisition and what it means to you. 

  • Get responses to your questions from the CEO and CMO
  • What does this mean for your product
  • Long-term vision and strategy
  • Find out more details here

July Patch Tuesday

2017年7月12日

Chris Goettl | Manager, Product Management, Security | Ivanti

May and June brought tornadoes of weaponized malware, but we appear to have blue skies in Kansas again for July Patch Tuesday. Don't get too comfortable, though. If history is any indication, we're in the eye of the cyber threat storm. So, use the downtime wisely: fewer updates today mean you can really focus on the public disclosures to get your house in order before the winds start picking up. 

Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?

2017年6月29日

Phil Richards | Chief Security Officer | Ivanti

Chris Goettl | Manager, Product Management, Security | Ivanti

Amber Boehm | Manager, Product Marketing | Ivanti

In this emergency webinar, our security panel is getting together to discuss the Petya attack, where malware is going, and what it means for you. Specifically, we'll cover:

  • The latest on Petya and how it compares to WannaCry
  • What this attack and others tell us about the future design and potential crushing impact of malware
  • How you can stop it from bringing your business to its knees.

He Said/She Said: Tech Trends Impacting your ITAM Program

2017年6月28日

Patricia Adams | ITAM Evangelist | Ivanti

Denny Cannon | Enterprise Architect | Ivanti

With technological change accelerating and businesses on the lookout for ways to gain a competitive advantage, keeping an eye on upcoming trends is a must. But what trends are affecting your asset management program, and which strategies will help you prepare for the inevitable? In this webinar, Patricia Adams and Denny Cannon with participate in a panel discussion, where they will go over:

  • IT trends in 2017 and beyond that will impact IT Asset Management programs
  • Strategies that will be helpful in preparing for these changes

WannaCry: It Wasn't the First, It Won't be the Last. So Now What?

2017年6月21日

Phil Richards | Chief Security Officer | Ivanti

Chris Goettl | Manager, Product Management, Security | Ivanti

Matthew Walker | AVP EMEA Product Specialist | Ivanti

History repeats itself, even in the world of cybersecurity. Heartbleed, Conficker, WannaCry…. We tend to forget it all once the carnage is cleared away and we’ve rebuilt. That’s why these attacks happen on a large scale every time. Join us as we dissect the recent WannaCry attack, showing you how it exploits a machine and then infiltrates the extended enterprise swiftly. In this webinar, we'll discuss:

  • What you can do each step of the way to protect against and respond to infection
  • How to ready yourself for what's inevitably coming next
  • How to keep your eyes peeled for the next attack

June Patch Tuesday

2017年6月14日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us as we recap the Microsoft and third-party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure and test adequately, and which patches should be highest priority to roll out.

What's the State of Windows 10 Migration?

2017年5月31日

Diane Hagglund | Founder and Principal | Dimensional Research

Nannette Vilushis | Manager, Product Marketing | Ivanti

Whether you are planning your Windows 10 migration, are currently migrating, or are completing your migration, this quick, 30-minute webinar will provide you with insights that will help you succeed. We asked 1826 IT professionals with decision-making responsibility for corporate desktops and laptops questions ranging from current Windows 10 adoption to migration approaches and issues, post-migration findings, and future plans.

Global Ransomware Attack: Latest Updates with our Security Panel

2017年5月17日

Simon Townsend | Chief Technologist | Ivanti

Chris Goettl | Manager, Product Management, Security | Ivanti

Phil Richards | Chief Security Officer | Ivanti

Matthew Walker | AVP EMEA Product Specialist | Ivanti

The attack continues to morph and grow - even since we finished our live updates on Monday. So, our security experts will host a discussion on the latest vulnerabilities and how to fix them during this LIVE security panel on Wednesday.

Come with your questions for the security team. During this webinar, you can expect:

  • Recap of the current situation
  • Response by Ivanti
  • What's new since Monday (5/15)
  • Detection, prevention, and recovery
  • Biggest concerns going forward
  • Offer and updates
  • Question and answer session

Get Ahead of your Windows 10 Migration

2017年5月16日

Simon Townsend | Chief Technologist | Ivanti

Paul Whalley | Product Manager | Ivanti

Andrew Swindells | Product Manager | Ivanti

Ollie Sills | Sr. Product Marketing Manager | Ivanti

In this 60 minute webinar recording, you'll get practical advice on how to reduce complexity, ease, migration challenges, and migrate users to Windows 10 with minimal interruption. You'll also learn:

  • How to ensure a transparent user migration to Windows 10 with no loss of local user file or profile data
  • How to manage and roam between hybrid Windows 7, 8, and 10, and physical/virtual environments
  • How to centrally manage and audit your migration

LIVE Updates on the UK Ransomware Attack

2017年5月15日

Simon Townsend | Chief Technologist | Ivanti

Chris Goettl | Manager, Product Management, Security | Ivanti

Phil Richards | Chief Security Officer | Ivanti

Matthew Walker | AVP EMEA Product Specialist | Ivanti

On Friday the news broke: a massive ransomware attack which started on the UK NHS immediately spread to global proportions. The attack has now impacted over 200,000 organizations in 150 countries.  Our security experts have received interview requests from across the globe. We want to make sure our customers and friends know exactly what happened and what they can do about it. So, Monday (AM in the US and PM in the UK) join our brightest security minds for a LIVE panel discussion of the massive breaches and what it all means for you.

During this webinar, the following points will be discussed:

  • Current situation
  • Ivanti Get Well Quick offer
  • Why it is spreading so fast
  • Anti-virus as a layer of defense
  • How patching fits in
  • The killswitch
  • Preventing threats with a layered approach
  • Question and answer session

May Patch Tuesday Analysis

2017年5月10日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us as we recap the Microsoft and third-party security patches released on Patch Tuesday, live from Ivanti Interchange 2017. We will discuss things to watch out for, products to be sure and test adequately, and which patches should be highest priority to roll out.

[Demo] Ivanti Patch for Microsoft SCCM

2017年4月21日

John Rush | Sr. Systems Engineer | Ivanti

[Demo] Ivanti Patch for Windows Servers and Workstations

2017年4月19日

John Rush | Sr. Systems Engineer | Ivanti

April Patch Tuesday 2017

2017年4月11日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us as we recap the Microsoft and third-party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure and test adequately, and which patches should be highest priority to roll out.

Best Practices for a Successful Service Catalog

2017年3月15日

Kevin J. Smith | Senior Vice President | Ivanti

As the Service Catalog emerges as a strategic element in modern Service Management environments, the importance of a successful initiative is critical. Many IT organizations are being called upon to offer a Service Catalog that is engaging and meets rising customer expectations right from the start. In this webinar, you’ll learn best practices before, during and after successful implementations. Join us to learn more about:

•             The importance of the Service Catalog

•             Top mistakes to avoid

•             Key areas for special attention

•             Successful behaviors of high performing organizations

•             The positive business impact from successful initiatives

 

March Patch Tuesday 2017

2017年3月15日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us as we recap the Microsoft and third-party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure and test adequately, and which patches should be highest priority to roll out.

Android Speaks the Language of Mobile Productivity

2017年3月8日

Rob DeStefano | Product Marketing Manager | Ivanti

Tom Butler | Systems Engineer | Ivanti

Faced with 5% annual metrics for productivity gains, supply chain businesses look to voice as a way to keep workers in motion, getting more done each shift. There’s good news: The fastest and easiest way to voice-enable your mobile applications comes to Android. Spend an hour with us and learn how easy it is to add voice to your enterprise applications with Speakeasy. You’ll get a look into our Velocity app modernization platform, and see how voice can be incorporated, simply, into your Android applications.

Move Beyond Software Audits and Attain IT Asset Management Maturity

2017年3月1日

Patricia Adams | ITAM Evangelist | Ivanti

IT asset management (ITAM) and software asset management (SAM) are disciplines that have been around for over twenty years, though there are few organizations that have attained the highest level of maturity. Join Patricia Adams, ITAM Evangelist for this live one-hour webinar to learn how you can transform or refine your approach to increasing ITAM/SAM maturity. During the webinar we’ll provide characteristics of ITAM/SAM maturity from a people, process, technology, and business impact perspective. Cost, risk, time and quality of service (aka metrics) will be key components of determining how successful an organization will be with its implementation. If your organization is just starting out on the ITAM/SAM journey, the attainment model can be used to build the business case for investment in an ITAM/SAM program. If the program is already underway, it can be used to justify ongoing investment.

Ransomware: Harden Your Defenses Now for This Growing Threat

2017年2月22日

Chris Goettl | Manager, Product Management, Security | Ivanti

Ransomware, once just a consumer scourge, is increasingly holding enterprises hostage. However, by focusing on the basics and implementing proper controls, security and risk (S&R) pros can slow the ransomware snowball. Join us to learn why ransomware is on the rise and examine strategies for preventing it — or recovering from it if you become a victim.

Windows 10 Migrations—Five Ways to Get Thousands of Users There Fast

2017年2月15日

Simon Townsend | Chief Technologist | Ivanti

Windows 10 migration projects are highly complex and incredibly disruptive. This complexity is exacerbated by constant changes in user profile versions and the fact that migrations are one-way in nature. Additionally, PST and OST files are critical to user productivity but hard to capture without disrupting users. In this webinar, you’ll learn how to migrate everything faster, easier, and with less impact to end user productivity, while you also clean up those nagging issues that keep people generating service tickets.

Managing Android Mobility

2017年2月15日

Alex Evans | Principal Product Manager | Ivanti

How do you ensure your Android mobile computers are ready to start each day? These powerful new devices go a long way toward ensuring your workers can maximize productivity. We’ll take you through some of the latest enhancements to our Enterprise Mobility Management platform, with focus on Android mobile computers, plus you will get tour of how Avalanche helps you manage this growing platform, with tips and tricks that will help you make the adjustment from your previous generation mobile computers.

Optimizing IT for Financial Performance in the Digital Age with Next-Generation Asset Management

2017年2月8日

Patricia Adams | ITAM Evangelist | Ivanti

While traditional IT asset management (ITAM) may have worked well when IT assets were more static and less directly relevant to business performance, a new approach is needed in the dynamic age of cloud, agile and digital transformation. Next-generation asset management works hand-in-glove with IT service management and operations to optimize IT assets as performing entities relative to value and usage rather than simply idle assets purely managed for cost. On the other hand, building toward next-generation asset management (NGAM) requires a solid foundation in ITAM fundamentals. Join Dennis Drosgeth, Enterprise Management Associates, VP as he shares results of from recent survey research, “Optimizing IT for Financial Performance”.

 

  • Why issues of discovery, audits, and software license management remain so problematic—for instance 30 hours is the average time preparing for audits purely for reconciling inventory data
  • Is the role of the CMDB passé or more relevant than ever?
  • The challenges of endpoint and mobile asset management—what strategies work best?
  • Organizational patterns optimized for next-generation asset management
  • Next-generation asset management and the cloud
  • Data management for NGAM and why it’s so critical
  • What metrics should you prioritize and why?
  • What factors signify success; what are the red flags for failure?

Live Q&A: Our CEO Answers Your Questions About our New Name, HEAT Merger and IT Operations

2017年2月6日

Steve Daly | 董事长兼 CEO | Ivanti

Steve Morton | 执行副总裁兼首席营销官 | Ivanti

In early January LANDESK and HEAT Software announced a merger. In late January the combined company announced it’s new name: Ivanti. The new company is perfectly positioned for the future of IT Security and Operational IT. In this webinar you have an exclusive opportunity to hear our CMO and CEO discuss the rebrand, the merger, and the future of operational IT.

 

Submit your questions during the live webinar and they’ll address as many as they can.

Configuration Management - The most Critical yet most Avoided Processes

2017年1月11日

Matt Hooper | ITSM Evangelist | Ivanti

Organizational improvements leveraging ITSM best practices require the understanding of business process and asset relationships. Assignment of tasks, understanding of risk, tracing fault and instability within the infrastructure all require accurate and up to date information about changes to the systems configuration and the way the business utilizes these technology assets. Why then have so many organizations delayed, failed or neglected all together to implement a proper configuration management strategy? Frankly, it's just plain hard. In this webinar we will walk you through how to approach a Configuration Management implementation, how to sell it as a business project and not an IT project, and what mistakes to avoid to establish an initial working phase that you can build on for success.

January Patch Tuesday 2017

2017年1月10日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

How to Upgrade From Green Screen to Touch Screen

2016年12月14日

Tom Butler | Systems Engineer | Ivanti

Join Wavelink’s Tom Butler as he walks you through the step-by-step process of capturing your existing mobile telnet “green screens” and converting them to use on Velocity for your Android devices. This technical webinar will demonstrate:

  • Capturing a mobile session’s telnet screens
  • Alleviating duplicates
  • Adding a new mobile theme using Velocity configurator
  • Customizing Velocity telnet screens
  • Deploying and running your new user interface on an Android mobile device using Velocity

 

December Patch Tuesday 2016

2016年12月13日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Customer Service: Maximizing Service Management Beyond IT

2016年12月8日

There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence — creating a better connection in a digital world. Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

Mapping Mobile Solutions to Meet Warehouse Modernization Trends

2016年11月16日

Rob DeStefano | Product Marketing Manager | Ivanti

Mobility solutions are widely used throughout the supply chain, but the technology is at a crossroads as operating systems transition to “smart OS” platforms.  VDC’s David Krebs delivers the trends and considerations to help you navigate the hardware transition and the implications for productivity apps that enable your workers.

November Patch Tuesday 2016

2016年11月8日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Aligning Your Reporting with Your IT Maturity

2016年10月26日

Jeremy Carter | Manager, Product Management | Ivanti

There is no doubt that every IT team -ITAM, ITSM, Security and UEM want to improve their IT Operations. However, many can’t easily obtain the reports, dashboards and analytics they need at the level of IT maturity they’ve achieved to assist them, and don’t know where to start.
Join Jeremy Carter for a webinar, to learn how to focus in and refine your approach to reporting based on your current people, processes and technology. We’ll take you step by step through the type of reporting, dashboards, analytics and insights an organization requires to attain different levels of IT maturity.

Unified Endpoint Management: New Tools for Managing Mac and iOS Together

2016年10月19日

Bennett Norton | Sales Engineer | Ivanti

At the heart of a Unified Endpoint Management strategy is a solution that delivers common control across the devices users carry. As more Apple devices – whether Macs, iPhones or iPads - are entering your business, you’re looking for a common approach to enroll, deploy apps, and manage these popular devices. Join us and learn how our latest release of LANDESK Management Suite 2016.3 provides a common set of tools for Mac & iOS management.

ITSM tools, Put the Why before the What

2016年10月12日

Matt Hooper | ITSM Evangelist | Ivanti

When it comes to selecting ITSM tools, you should be focused on the “why” over the “what” and “how.” - understand where your organization is heading, your goals and objectives for IT and how best to reach those goals. Learn more about the “why” from Matt Hooper, ITSM Evangelist as well as tips on what to look for when putting together your ITSM tools short list.

October Patch Tuesday 2016

2016年10月11日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Managing Apple Devices in a Windows World

2016年10月6日

As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms. However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness. Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.

Ten Mistakes Not to Make When Implementing ITAM/SAM

2016年9月28日

Patricia Adams | ITAM Evangelist | Ivanti

Organizations often struggle to master the art of IT Asset Management. They stumble over the unexpected hurdles, slowing down or sometimes derailing their ITAM program development. This webinar will cover the top ten mistakes made most often by companies and how to avoid them. From governance and process to policy and tools, join Patricia Adams for our one-hour webinar where we will walk you through different facets of an ITAM program to help you become more successful in your ITAM initiative.

Reporting and Analytics for Data Driven IT

2016年9月21日

Jeremy Carter | Manager, Product Management | Ivanti

How can you empower business and IT users to make the right IT decisions for the business without resorting to coding reports and spreadsheets? By providing real-time, self-service analytics and data visualization dashboards quickly and easily that’s how! Xtraction provides information insights from multiple IT Operations Management data sources in a single view. Anyone can access and share real-time dashboards about the business impact of major incidents, the time-to-patch vulnerabilities, monitor asset lifecycle and more to take action faster.

Join Jeremy Carter, Product Manager to learn about reporting and dashboard solution, Xtraction. Watch a live demo and learn how easy it is for anyone to configure, connect to data sources and build dashboards without coding.

Ransomware Update: New Threats, New Defenses

2016年9月14日

Stephen Brown | Director of Product Management | Ivanti

The fight against ransomware is nothing less than an arms race—and the bad guys aren’t slowing down. Which means you can’t, either. “Fantom” ransomware encrypts your files while pretending to be a legitimate Windows update. “Hitler” ransomware doesn’t encrypt your files—it deletes them. “Petya” ransomware doesn’t even bother with your files—it goes after the master boot records and file tables that govern access to entire hard drives.As these threats evolve, so must your efforts to detect them, protect against them, and prevent them from infecting your networks and bringing your business to a halt. Join LANDESK Director of Product Management Stephen Brown and Principal Product Manager Eran Livne for a Webinar that will help you to understand the threats, how best to combat them, and how LANDESK is evolving its solutions to help you.

September Patch Tuesday 2016

2016年9月13日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Know What Joins, Uses, and Leaves Your Network

2016年9月7日

Rex McMillan | Principal Product Manager | Ivanti

For those in IT who always want to be in the know and have the answers for their managers, this webinar is for you. Devices are constantly joining, utilizing resources on or leaving your network, but how much do you know about them? You can’t secure, track, or manage what you don’t know about on your network. That’s why it’s important for many IT teams to have timely information about devices on the network, including teams dealing with asset management, IT security, or IT operations. See a myriad of methods you can use to discover information with LANDESK solutions and then see and use that data to gain insights about your entire IT environment. You’ll also get a peek into new technologies and data integration that will make your job easier. You’ll have the answers to more questions when your manager wants to know about that next hot issue.

Manage Any Device, Anywhere from a Single Console with HEAT LANrev

2016年9月6日

HEAT LANrev was Highly Commended in the recent Computing Vendor Excellence Awards in London - Mobile Management category. With the fragmentation of technology platforms and proliferation of mobile devices organisations today need a unified management approach for smart connected devices. Join this session to learn how HEAT LANrev can provide end to end multi-platform support for Windows, Mac, Linux, iOS and Android.

Getting to The Value Point of ITSM Attainment

2016年8月31日

Matt Hooper | ITSM Evangelist | Ivanti

Every organization goes through a process of improving their operation. Despite this, ITSM initiatives struggle to get to the level of organizational effectiveness they promise. Why do so many ITSM projects fail to deliver on the value they know could be achieved? Join us for a one-hour informative webinar, where we walk through the levels of organizational capability required to achieve effective results. Learn the building blocks required to create institutional processes and a culture of shared learning and accountability that is needed to deliver optimized ITSM.

Windows 10—What You Need to Know Before You Migrate

2016年8月24日

Rex McMillan | Principal Product Manager | Ivanti

Microsoft is turning up the heat, hoping more people will make the leap to Windows 10. Although it's an easier migration than Windows 7, you'll still need to consider the longterm implications of making the move to Windows 10. In this webinar we'll discuss the top questions and considerations you should be able to confidently answer before migrating. We'll also provide an overview of what to expect in your migration when you combine LANDESK automation with AppSense personalization and profile management. Join us and find out more about how to confidently move your organization to Windows 10.

Your Assets Have a Life – Don’t Lose Track

2016年8月17日

Todd Labrum | ITAM Product Manager | Ivanti

Your IT environment is a complex machine of working “parts”,or assets that require updates, maintenance, and refreshing. Tracking thoseparts from purchase to disposal can be complicated.

Join Todd Labrum, ITAM Product Manager, for a live demo of LANDESK Asset Central, asolution built to monitor software and hardware lifecycles. During the presentation you will gain insight into:

  • Data imports

  • Data relationships

  • Out-of-the-box processes

  • Workspaces

  • And more…

Windows 10 - One Year Later

2016年8月16日

In the one year since the launch, Windows 10 is off to the fastest start in Windows history, with over 350 million active devices. Are organizations reaping the productivity benefits, how far along are they in their migration efforts, what best practices have distilled around how to handle apps and carry out updates with Windows 10?

August Patch Tuesday 2016

2016年8月9日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Ransomware: The NSA’s Top 10 Mitigation Strategies (and More)

2016年8月3日

Phil Richards | Chief Security Officer | Ivanti

The US National Security Agency (NSA) has issued a set of 10 prioritized security measures it recommends to combat ransomware and assure information security. The NSA has also collaborated with 13 other federal government agencies to produce anti-ransomware guidance for small, medium, and large organizations. Join LANDESK Chief Security Officer Philip Richards and Senior Product Marketing Manager Michael Dortch to learn details about these recommendations, and how LANDESK can help you to take advantage of them at your enterprise.

IT Dashboards and Reporting, From Zero to Hero

2016年7月27日

Jeremy Carter | Manager, Product Management | Ivanti

Canyou measure and communicate metrics around the value IT brings to the businesswithout depending on reporting specialists? With Xtraction reporting anddashboard code-free solution-you can!

 

Xtractionprovides information insights from multiple IT Operations Management datasources in a single view. Anyone can access and sharereal-time dashboards about the business impact of major incidents, the time-to-patch vulnerabilities, monitor assetlifecycle and more for greater visibility.

 

JoinJeremy Carter, Product Manager for a one-hour webinar and learn about the powerof Xtraction. Watch a live demo of how easy it for anyone to configure, connectto data sources and build dashboards from scratch.

How to Select your IT Asset Management (ITAM) Vendor

2016年7月20日

Patricia Adams | ITAM Evangelist | Ivanti

Todd Labrum | ITAM Product Manager | Ivanti

Deciding which IT asset management (ITAM) vendor is right for you can be complicated. And sorting through features and priorities most important to you and your organization can be a confusing process. Let us help.

Join Patricia Adams, ITAM Evangelist and Todd Labrum, Product Manager for this webinar to take a look at Info-Tech's recent vendor landscape report to better help you identify and select the perfect ITAM vendor.

  • Identify your key stakeholders
  • Explore your processes
  • Pinpoint your integration
  • Build your requirements

Look Outside-In Expose your IT Iceberg with Nexthink Analytics

2016年7月13日

Mike Oleksinski | Channel & Alliance Director | Nexthink

TraditionalIT service desks all work in much the same way and share the same workingmantra: no call = no issue. There is a significantly inherent flaw in thismodel which relies on end-users to actually pick up the phone and log a call.Studies have shown that over 60% of end-users experiencing problems will neverlog in tickets, leaving you completely in the dark with regards to issueshappening in your environment: you’re seeing only the tip of the iceberg! Youwill thus need data from the end-user point of view to more fully measurequality and consistency of IT service delivery: you’ll need to change yourperspective and take an outside-in approach.

July Patch Tuesday 2016

2016年7月12日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Microsoft Software Licensing Gotchas - How to Avoid and Optimize Your Existing Spend

2016年7月6日

Jason Christensen | ITAM Product Marketing Manager | Ivanti

It's no secret that software licensing models have become more complex and confusing over the years, especially with virtual, cloud, and hybrid environments. Join LANDESK One partner Anglepoint for this live one-hour webinar to learn the top insider Microsoft software licensing "gotchas" from "reformed" Big 4 software auditors and how to turn your confusion into optimization and cost savings. We'll then walk you through real-life examples so you too can start taking control of your Microsoft license estate immediately.

IT Security Today: How to Close the Vulnerability Gap(s)

2016年6月29日

Michael Dortch | Senior Product Marketing Manager | Ivanti

Cybersecurity attacks are a large and growing business worldwide, generating a nearly constant stream of media reports of high-profile, high-impact security breaches. Despite these, at many enterprises, inadequate and inconsistent security practices create multiple, serious vulnerability gaps. Join LANDESK Chief Security Officer Philip Richards and Senior Product Marketing Manager Michael Dortch to learn about the true scope of these gaps, how best to close them, and how LANDESK can help.

SCCM as a Security Compliance Tool? You can Bank on it.

2016年6月23日

Duncan McAlynn | Principal Security Engineer & Evangelist | Ivanti

In this session, 6x Microsoft MVP and Sr. Solutions Specialist, Duncan McAlynn, will have a discussion with Logun Baker, Senior Systems Administrator for The Huntington National Bank, regarding the challenges of 3rd party application patching within their enterprise and how they have solved those problems. During the webinar, McAlynn will also be demonstrating how PatchLink natively plugs into the SCCM Admin Console, providing seamless integration into existing patch management workflows without any additional client deployment, infrastructure requirements or added consoles.

5 Steps to Milk Your IT Assets for All They’re Worth

2016年6月22日

Todd Labrum | ITAM Product Manager | Ivanti

Denny Cannon | Enterprise Architect | Ivanti

IT Assets have a life of their own. Some may say they have a mind of their own. So tracking your hardware and software from purchase to disposal can be tough. Hardware ages and requires maintenance. Software needs the occasional update, and both require replacing eventually.


Join Todd Labrum, Product Manager, and Denny Cannon, Enterprise Architect, for this one-hour webinar to learn five important steps to better manage your IT assets through their lifespan. During the webinar, you will get a close look at Asset Central, a solution designed to track asset lifecycles to lower maintenance spend, drive business processes, and control IT costs.

ITSM Essentials: Gain the Most from Your Configuration Management Database

2016年6月15日

Matt Hooper | ITSM Evangelist | Ivanti

Mobile apps, hardware specifications, operating system patch levels, custom software, and other configuration items combine as business services that create the customer experience. At the heart of all this configuration information is the CMDB. Tracking changes, relating incidents, and building knowledge and support artifacts are crucial to ITSM operations. 


Join Matt Hooper, ITSM Evangelist, to learn key best practices that will help you leverage the heart of your ITSM platform, the CMDB.

June Patch Tuesday 2016

2016年6月14日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

ITAM, ITSM, and Security: The Foundation for Modern, User-Centered IT

2016年6月8日

Michael Dortch | Senior Product Marketing Manager | Ivanti

Patricia Adams | ITAM Evangelist | Ivanti

Your enterprise relies upon its IT assets to do business and to thrive competitively. Access to and management of the services provided by those assets is critical to enterprise agility and user productivity. And all IT assets and services must be comprehensively, effectively protected from threats and vulnerabilities, external and internal, planned and accidental.


Clearly, to deliver the modern, user-centered IT your enterprise needs, you must implement and integrate solutions and processes for IT asset management (ITAM), IT service management (ITSM) and IT security. This introductory Webinar will describe the factors and trends driving this integration in greater detail, and set the stage for further discussions of optimized, well-integrated ITAM, ITSM, and security management.

Passive Protection Against Ransomware

2016年6月1日

Stephen Brown | Director of Product Management | Ivanti

Eran Livne | Principal Product Manager | Ivanti

When an FBI agent is quoted publicly as advising ransomware victims to “just pay the ransom,” you know the threat is real and significant. And as some victims have already learned, paying the ransom does not guarantee the safe return of assets held hostage, or elimination of the threat from your infected systems.


Join LANDESK Director of Product Management Stephen Brown and Principal Product Manager Eran Livne for a lively and informative 30-minute Webinar. Learn how LANDESK Security Suite 2016 unique ransomware solution can prevent bad guys from taking your data hostage....

Arm Yourself with Analytics

2016年5月11日

Sharon Gee | Host | Ivanti

The IT landscape has changed beyond recognition over the past few years. Technology trends such as consumerization, BYOD, virtual applications, virtual desktops, and mobility have created a number of unique challenges for IT operations management. Are you overwhelmed by the need to understand and manage this confusing and complex environment? We can help! LANDESK, in conjunction with Nexthink, enable you to better manage your environment through gaining a real understanding of the user’s IT usage experience, through user and service analytics, and actionable reporting.


Join Nexthink’s CMO, Poul Nielson, for a one hour webinar to hear how the new Nexthink product release advances even further your ability to understand the end-user IT experience and transform data into meaningful real-time analytics and intelligence. Also see how combining LANDESK and Nexthink solutions can provide IT with a unique contextual perspective and proactive ability in managing, delivering and improving IT service.

May Patch Tuesday 2016

2016年5月10日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Discover Three Quick Ways to Take Advantage of a More Modernized IT User Experience

2016年5月4日

David Broschinsky | UX Manager | Ivanti

Adam Smith | Senior Product Marketing Manager | Ivanti

Jeremy Carter | Manager, Product Management | Ivanti

This webinar is a short conversation with LANDESK user experience experts. You'll learn about the design principles used to create role-based workspaces for both corporate users and people inside IT. We'll also share insights we've gathered from our UX research and how you can apply it to your internal IT services.

Join us and find out how you can modernize IT and provide the best in user experiences for your entire organization.

  • User Experience (UX)
  • Workspaces

Protect for Servers: Your Next Step Toward Complete IT Security

2016年4月27日

Sharon Gee | Host | Ivanti

 You know that comprehensive security is essential to your enterprise's agility, resilience, and trustworthiness. And you're confident that you've got your users' endpoints covered. But what about your servers? LANDESK now offers [Shavlik] Protect for Servers, the industry's leading patch management solution designed specifically for servers. Watch this complementary webinar to learn more about this new LANDESK offering, and how it can complement and enhance IT security efforts at your enterprise.

 

ITAM Attainment Model

2016年4月20日

Patricia Adams | ITAM Evangelist | Ivanti

IT asset management (ITAM) and software asset management (SAM) are disciplines that have been around for over twenty years, though there are few organizations that have attained the highest level of maturity. 

Join Patricia Adams, ITAM Evangelist, for this one-hour webinar to learn how you can transform or refine your approach to increasing ITAM maturity. During the webinar, we will provide characteristics of ITAM/SAM maturity from a people, process, and technology and business impact perspective.

How to Improve Your ITSM End User Experience By Integrating Skype for Business

2016年4月13日

Sham Ramakrishnan | Manager | Sensiple

Ian Aitchison | Director, Product Management | Ivanti

Gartner stated recently, “the digital workplace is changing how IT service desks need to support the business....Traditional ITSD support channels, such as the telephone and email for business users, will fail to provide the flexibility required for the digital workplace.”1

Watch this informative webinar to find out how you can support the digital workplace and remain relevant to the business by integrating Skype for Business with LANDESK Service Desk. Learn why integrating this highly collaborative channel with Service Desk will improve user experiences, drive satisfaction, and improve productivity. Watch a demonstration to see how to turn chat into tickets and create user profiles directly from chat.

1. How IT Service Desks Should Support the Digital Workplace, Gartner 23 Nov 2016

April Patch Tuesday 2016

2016年4月12日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Unified Endpoint Management: Addressing the Challenges to Updating and Patching Windows 10

2016年3月30日

Stephen Brown | Director of Product Management | Ivanti

Rex McMillan | Principal Product Manager | Ivanti

Are you planning to move to Windows 10, but notsure how to maintain the constant flow of updates? Windows 10 is a greatoperating system and eventually all Windows shops will want to move. However, it'simportant you have a plan and the right processes in place to make sure youdon't get overrun by Windows 10 updates and patches. 

Join endpoint security expert Stephen Brown andWindows client management expert Rex McMillan for this webinar to learn moreabout: 

  • Identifying top concerns to maintaining Windows 10
  • Security issues and network impacts you should plan for
  • How to automate staged updates to Windows 10

Security and Education: Smarter Users Make Safer Networks

2016年3月23日

Michael Dortch | Senior Product Marketing Manager | Ivanti

While high-profile hacks garner the bulk of the publicity, they are not the biggest threat to your organization's IT security. In 2015, Ponemon Institute and IBM found that only 45 percent of IT security breaches are caused by malicious activities. The other 55 percent are caused by system glitches or problems-and by mistakes made by legitimate users.

The good news? Regular engagement and education of those users about their roles in protecting business-critical assets can make them the most powerful elements in your organization's portfolio of security solutions.

Watch this informative and timely Webinar on “Security and Education: Smarter Users Make Safer Networks.” You'll learn how enterprises like yours are working to make their networks safer by making their users smarter-and how your enterprise can do so, too.

Weathering the Economic Downturn with an Effective IT Asset Management Strategy: Lessons from the Oi

2016年3月16日

Patricia Adams | ITAM Evangelist | Ivanti

Global economic challenges shock certain industries more than others. For example, in recent years, the record rise in oil prices followed by the prolonged plunge has wielded a major impact on the petroleum industry. As the energy sector slashes budgets to weather the downturn, unprecedented numbers of PC's and software applications are no longer needed. This influences asset disposal decisions as well as software license contract negotiations. What's more, preparing for the eventual recovery requires carefully orchestrated lifecycle planning and forecasting.

Join LANDESK IT asset management evangelist, Patricia Adams, for a one-hour webinar that covers asset lifecycle planning for tough economic times. Using examples from the oil and gas industry, learn how to find savings in the IT budget, strategize for future procurement agility, and put IT asset lifecycle processes in place that will adapt to changing business environments.

How I Stopped a Kid Hacker

2016年3月9日

Sharon Gee | Host | Ivanti

Providing users with system security training and ongoing communication about potential security breaches can prevent a lot of problems. But what do you do when the hacker is the Inside Man? How do you stop someone with malevolent intentions who’s an end user in your organization?

Pearland Independent School District of Pearland, TX investigated how a student brought his own malware toolkit into his high school, copied them onto school’s computers from a USB and ran those tools. His end game was to steal the Social Security numbers for students, parents, teachers, and staff, and sell the information.

To find out more about the hack, and how Pearland ISD leveraged AppSense technology to stop the attacks, watch our webinar "How I Stopped a Kid Hacker."

Accelerating Digital Transformation Through Agile Service Management

2016年3月9日

Matt Hooper | ITSM Evangelist | Ivanti

The greatest challenge every CIO will face over the next decade is executing on their digital transformation strategy. Transforming cultural norms, processes, and intelligence into a secure, mobile digital ecosystem requires a discipline ITSM experts have been fine tuning for the last decade: Continual Service Improvement (CSI).  Modern ITSM methods demand social, mobile, big data, and responsive design to eliminate waste and increase effectiveness.

Please join us for a one-hour on-demand session featuring Matt Hooper, LANDESK ITSM Evangelist.  In this session you'll learn how CIOs can effectively deliver digital platforms through the four core underpinnings of agile service management. 

March Patch Tuesday 2016

2016年3月8日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Xtraction Software - Changing the Way You Manage Your Business

2016年3月2日

Bruce Cameron | Xtraction Area Director | Ivanti

Learn how Xtraction reports and analytics can help you make more informed business decisions. Xtraction is a self-service, easy-to-deploy reporting solution that provides visibility into company data to support decisions at all levels in the business and IT without technical or advanced analytical knowledge. Display multiple data sources into dashboards and reports easily, with simple drag-and-drop functions. Dramatically improve insight into your business with real-time dashboards, historical reports, and views into future events. Leverage operations alerts and schedule reports, ensuring thorough coverage of your service is constantly in hand.

Join us for a one hour on-demand session with Bruce Cameron, Xtraction Product Evangelist. Bruce will show the power and simplicity of the Xtraction analytics system.

Technologies to Close the Security Skills Gap

2016年2月24日

Michael Dortch | Senior Product Marketing Manager | Ivanti

The biggest challenge to the success of your IT security efforts may be your IT security people…or lack thereof. Skilled, experienced security personnel are enjoying unprecedented demand and ever-increasing salaries. Great for them, but not so great for those who need and want them.

Watch our on-demand video for an informative and timely Webinar on “Technologies to Close the Security Skills Gap.” You'll learn how automation, consolidation, visualization, and personalization technologies are helping enterprises like yours to deliver more and better security, without having to find and hire more security people.

Introducing HEAT LANrev for Unified Endpoint Management

2016年2月18日

Join Tim Williams, Director of Product Marketing, for a 30 minute overview of HEAT LANrev for Unified Endpoint Management.

Bringing Mobility into the Fold: The How and Why of Unified Endpoint Management

2016年2月17日

Jon Sharp | Principal Product Manager | Ivanti

With the LANDESK Management and Security 2016 release, we've upgraded mobile device management (MDM) to a first-class citizen and delivered a true unified endpoint management solution. In this webinar, you'll learn how to manage mobile devices with less effort and gain greater visibility into the fastest-growing segment of devices you need to manage.

Join Jon Sharp, product manager, for this one-hour webinar to learn more about Unified Endpoint Management (UEM).

February Patch Tuesday 2016

2016年2月9日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

The Top 5 Most Vulnerable Vendors of 2015

2016年2月3日

Chris Goettl | Manager, Product Management, Security | Ivanti

Michael Dortch | Senior Product Marketing Manager | Ivanti

While many enterprises strive to patch their Windows systems consistently, the US National Institute of Standards (NIST) says that some 86 percent of reported vulnerabilities come from third-party applications. So which of these created the most risk for your network in 2015, and how can that information help you to have a more secure 2016?

Join the Shavlik Team for an informative Webinar: “Top 5 Most Vulnerable Vendors of 2015.” You'll learn what the Shavlik content team learned about third-party application vulnerabilities, and how that information can help you to shorten the vulnerability gap at your enterprise.

Five Ways to Modernize ITSM

2016年1月27日

Melanie Karunaratne | Senior Manager, Product Marketing | Ivanti

According to industry analysts, digital revenues will increase by more than 80% over the next five years and many organizations are already implementing a digital business strategy to harness this growth. In this rapidly changing environment, how well does your IT Service Management operation enable your business currently? Can you offer the services and support that users now need and want to be more productive in this new age? A modern approach to ITSM will ensure the right mix of exceptional user experiences, streamlined processes, and business value creation to assist you on your transformation journey.

Simplify Management with Unified Endpoint Management (UEM)

2016年1月20日

Sharon Gee | Host | Ivanti

Managing your users and all their devices can be a daunting task when you consider the complex nature of today's IT environments. To manage this complexity effectively, you need to somehow organize a multitude of devices including Windows laptops and desktops, Android, iOS and Windows phones and tablets, Macs, Chromebooks, Linux devices… the list goes on and on.

Don't despair! We've got you covered with our Unified Endpoint Management solution that takes the complexity out of IT management. Join us for a one hour webinar to learn how you can:

  • Manage all your devices within a single view
  • Deploy software to all your devices regardless of the OS
  • Simplify your patching process
  • And much more

January Patch Tuesday 2016

2016年1月12日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Converged Value: ITAM and ITSM

2016年1月6日

Patricia Adams | ITAM Evangelist | Ivanti

Matt Hooper | ITSM Evangelist | Ivanti

Historically IT asset management (ITAM) and IT service management (ITSM) have been managed as separate entities with separate teams and tools. In reality, they are highly dependent upon each other with intersecting processes and shared data in the Configuration Management Database (CMDB). When these tools are integrated, they reflect that the whole is more effective than the parts.

Join IT Asset Management Evangelist Patricia Adams and ITSM Evangelist Matt Hooper at LANDESK for a one-hour webinar to explore the synergies between ITAM and ITSM, and the benefits an organization can achieve with greater visibility into the assets that make up its business services.

Patch Management and Cybersecurity, 2015/2016: A Look Back, A Look Ahead

2015年12月16日

Michael Dortch | Senior Product Marketing Manager | Ivanti

With numerous high-profile, high-impact hacks and security breaches reported throughout the year, 2015 was certainly a tumultuous year for IT and security managers and their teams. And 2016 shows no signs of being any less roiling.

How best to respond and prepare? Join members of the Shavlik team in this webinar, to review the lessons learned in 2015, and to gain insights to help you plan to make your enterprise more secure, in 2016 and beyond.

A 2016 Survival Guide to Providing Multi-Device Support

2015年12月15日

Enterprises are currently experiencing a major paradigm shift in how they support an increasingly mobile workforce, and 2016 is poised to be a critical year of change. Until recently, mobile device management solutions have evolved completely independent of more traditional PC lifecycle management platforms. However, as tablet and laptop form factors begin to merge and operating systems, such as Windows 10, are creating common software environments, the distinction between a PC and a mobile device is blurring. To effectively meet this rapidly changing world, IT organization must adopt management solutions that unify both PC and mobile device administration. In this one hour webinar Steve Brasen, Managing Research Director from industry analyst firm, Enterprise Management Associates (EMA), joins Tim Williams, Director Product Marketing at HEAT Software to provide a prescriptive discussion on supporting multi-device environments in 2016. The presentation will leverage EMA primary research to reveal best practices and solutions necessary for any organization to maintain a competitive edge by boosting workforce productivity.

Challenges and Solutions to Windows 10 Migration

2015年12月15日

Windows 10 is here! Are you ready to deploy it in your organization or are you going to wait for any bug fixes first? Whether you are actively planning an enterprise-wide Windows 10 deployment or not, the influx of new devices onto the corporate network means you need to be able to manage them. Watch this video to learn how you can make the most of your OS migration.

How to Survive a Tsunami of Service Requests

2015年12月10日

Many service organizations are handcuffed by rigid, overly complicated systems and processes. Service teams often need to access 3 to 5 disparate applications to help customers and users, limiting their ability to improve service delivery and satisfaction. IT or business changes further magnify the challenge when it leads to potential service disruptions, prompting a flood of customer and user calls.

How to Build the Business Case for ITAM

2015年12月9日

Patricia Adams | ITAM Evangelist | Ivanti

Jason Christensen | ITAM Product Marketing Manager | Ivanti

Todd Labrum | ITAM Product Manager | Ivanti

Support from your CIO, CFO, and/or CSO can determine the success or your IT asset management (ITAM) program, but gaining that support can be challenging. Fortunately, there are ways to prove business value and ROI. Providing value to key stakeholders within your organization ensures continued investment and delivers a renewed focus on your ITAM.

Join IT Asset Management Evangelist, Patricia Adams, for a one hour webinar to learn how you can demonstrate:

  • Challenges in your organization and quantify the impact
  • Benefits asset management can deliver
  • Methods to achieve support from management

Patch Tuesday December 2015

2015年12月8日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

How and Where to Start the Asset Management Journey

2015年12月2日

Patricia Adams | ITAM Evangelist | Ivanti

Jason Christensen | ITAM Product Marketing Manager | Ivanti

Todd Labrum | ITAM Product Manager | Ivanti

IT asset management (ITAM) helps identify existing or potential risks within your IT environment. Implementing ITAM best practices can cut costs, sometimes by as much as 25 to 50%.* Why don't more companies invest in asset management? For many, the reason may be that they don't know where to start. Join Patricia Adam's, IT Asset Management Evangelist at LANDESK, for a one-hour webinar to learn five key stages to begin implementing a successful ITAM program. During the presentation, you will gain detailed insight about the metrics associated with these processes that will influence early success to achieve risk reduction and cost efficiencies.

  • Lifecycle planning processes
  • Onboarding/off-boarding processes
  • Contract negotiation and renegotiation
  • Hardware refreshes
  • Disposal processes

CyberSecurity – From Firefighter to SecOps

2015年11月18日

Michael Dortch | Senior Product Marketing Manager | Ivanti

Is security at your enterprise focused on reactive firefighting, or on proactive business enablement?

For maximum protection and business benefit, your enterprise's security must protect in silence-it must be pervasive, ubiquitous, and invisible to users. However, too often, security teams are too busy keeping up with new threats and remediation efforts to deliver truly integrated, proactive, and seamless security that protects all assets, connections, and users.

Top 3 Strategies to Future-Proof Multi-Platform Endpoint Management

2015年11月17日

Are you ready for the next wave in endpoint computing? It’s multi-platform, multi-device, mobile, virtual, - get ready to gain control! Employees are no longer chained to desktops in one location, but constantly on the move, using a variety of devices, and accessing a multitude of applications. The dramatic growth of Apple technologies in the enterprise, coinciding with the growth of mobility, and the increase in employee-owned devices is making it more challenging for organizations to manage and secure their infrastructure. Join our webinar to learn about the top challenges and 3 strategies to manage and secure your cross-platform environment and future-proof your organization for the next wave.

Getting a Handle on Your Help Desk

2015年11月11日

As a certified LANDESK One partner, Invicta Software has developed unique technology that seamlessly integrates with LANDESK Management Suite. This 45-minute live Webinar will explore exclusive ways that you can leverage your existing LANDESK investment.

  • Reigning in the number one reason for help desk calls
  • Practical advice for small organizations looking to implement the best of ITIL v3
  • Best practices for empowering the Service Desk with LANDESK Management Suite functionality
  • Question and answer time with our seasoned team of experts

Patch Tuesday November 2015

2015年11月10日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

UEM – Automating Project Rollouts

2015年11月4日

Sharon Gee | Host | Ivanti

Organizations no longer just do software distribution. They roll out software as management and staged projects. See a quick preview of how Management and Security10 will assist you in creating a project plan, automate the roll out of software and patches, and have greater visibility and control over your entire project. Below are a few questions we hope you'll ask yourself before you join us for this webinar.

  • How many software deployments do you expect to have this next year?
  • How automated and repeatable are your patch processes?
  • Would you like a timeline view of each stage of your implementation?

Three Reports That Will Make Your CIO Look Like a Rockstar!

2015年10月28日

Bruce Cameron | Xtraction Area Director | Ivanti

Learn how Xtraction reports and analytics can help you make more informed business decisions. Xtraction is a self-service, easy-to-deploy reporting solution that provides visibility into company data to support decisions at all levels in the business and IT world without technical or advanced analytical knowledge. Display multiple data sources in dashboards and reports easily, with simple drag-and-drop functions. Dramatically improve insight into your business with real-time dashboards, historical reports, and views into future events. Leverage operations alerts and schedule reports to ensure thorough coverage of your service is constantly in hand.

View an exciting hour with Bruce Cameron, Xtraction Product Evangelist. Bruce will show the power and simplicity of the Xtraction analytics system.

3 Proven Ways to Unbury your IT Service Desk

2015年10月21日

Managing IT services has rarely been as challenging as it is today. Many IT organizations are being called upon to improve service levels while being asked to control costs. In this webinar, you'll learn about three approaches IT organizations can take to streamline incoming service inquiries to improve productivity, efficiency and agility to handle escalating demands without increasing costs.

Four Policies You Need to Jump Start Your ITAM Program

2015年10月21日

Patricia Adams | ITAM Evangelist | Ivanti

Todd Labrum | ITAM Product Manager | Ivanti

Knowing the IT assets you have, where they are, and how they are performing can be challenging. However, by effectively building and implementing processes and policies, you gain necessary visibility into your IT environment. In turn, this empowers you to make informed decisions and avoid both the financial and security risks associated with your IT assets.

Join IT asset management expert Patricia Adams for a one-hour webinar to learn four policies needed to make your IT asset management program successful.

  • Loss and theft
  • Centralized procurement
  • Software downloads
  • Standards

The Need for Knowledge

2015年10月14日

Matt Hooper | ITSM Evangelist | Ivanti

The single most important process in IT is Knowledge Management. Yet most organizations neglect this process, seeing it simply as the creation of Knowledge Base Articles. Knowledge Management in modernized IT organizations is based on architecture of knowledge artifacts that are collected through integrated processes. Enterprise Knowledge requires five things to be successfully implemented. With these five components in place, knowledge will increase the value of every process and activity IT is supporting, which in most businesses is 90% of their operation.

Watch ITSM expert Matt Hooper in this webinar to see how you can increase enterprise business value through these modern knowledge management practices.

Patch Tuesday October 2015

2015年10月13日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Arm Yourself with Analytics

2015年10月7日

Poul Nielsen | CMO | Nexthink

Technology trends such as consumerization of IT, BYOD, virtual applications and desktops, mobility, external service providers, cloud, and SaaS present new challenges for IT operations management. These trends, referred to collectively as Hybrid IT, is forcing IT organizations to be responsible for service delivery and quality without necessarily having control or visibility into the services or back-end infrastructure. This lack of visibility, from the network and server perspective, is driving the need to understand IT service delivery and quality from the end-user perspective. LANDESK, in conjunction with Nexthink, enables IT organizations to better understand and manage IT service delivery, quality, and security through continuous real-time end-user analytics and actionable reporting.

Watch Nexthink's CMO Poul Nielsen to learn how Nexthink translates end-user data into meaningful real-time analytics and intelligence that can transform the way you approach end-user management and security with LANDESK.

Encryption with WinMagic

2015年9月30日

To deliver user-centered IT, your enterprise needs to deliver user-centered security-robust, comprehensive protection of every authorized user and every device, network, and corporate resource they use. A critical element of that security is how you manage protection of one of your organization's most valuable resources: its information.

Today, growing numbers of enterprises are integrating innovative data encryption methods into their overall IT, information, and security management solutions. Those organizations are achieving maximum data protection with minimum disruption to users or their businesses.

Your enterprise can reap these benefits, too. Join LANDESK and WinMagic for an informative Webinar, “Secure Your Data-Secure Your Enterprise.” You will learn specific steps you and your colleagues can begin to take immediately to achieve comprehensive information protection and truly user-centered security and IT.

Top 6 Things to Consider when Migrating to Windows 10

2015年9月16日

Windows 10 is here! Are you ready to deploy it in your organization? Whether you are actively planning a corporate Windows 10 deployment in 2015/2016 or not, the influx of the OS onto the corporate network with new devices means you need to be able to manage it. A smart Endpoint Management solution can help you both plan and deploy the new OS, as well as provide the capability to manage endpoints on the network that already have the new OS preinstalled.

LANDESK and Nexthink - Smarter IT Through End-User Analytics

2015年9月9日

The IT landscape has changed beyond recognition over the past few years. Technology trends such as consumerization, BYOD, virtual applications, virtual desktops, and mobility have created a number of unique challenges for IT operations management. Are you overwhelmed by the need to understand and manage this confusing and complex environment? We can help! LANDESK, in conjunction with Nexthink, enables you to better manage your environment through gaining a real understanding of the user's IT usage experience, through user and service analytics, and actionable reporting.

Watch Nexthink's CMO, Poul Nielson, in a one-hour webinar to hear how the new Nexthink product release advances even further your ability to understand the end-user IT experience and transform data into meaningful real-time analytics and intelligence. Also see how combining LANDESK and Nexthink solutions can provide IT with a unique contextual perspective and proactive ability in managing, delivering, and improving IT service.

Patch Tuesday September 2015

2015年9月8日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Structuring Self-Service Provisioning

2015年9月2日

Matt Hooper | ITSM Evangelist | Ivanti

The ITSM community has gone a bit crazy with self-service needing to be like Amazon. On-line ordering and self-service are not the same thing. If you want to provision services beyond simple requests, you need to structure your design with Service Management integration. This webinar will cover the Whys, Whats, and Hows to design and craft an Enterprise Self-Service system.

Leveraging marketing, supply chain, and service management best practices, our ITSM Product Evangelist Matt Hooper will discuss key ways to make your self-service valuable and usable in the enterprise. This will not be a discussion about portals and shopping carts, but a real-world review of enterprise agility created through self-service.

Watch this installment in our webinar series, "Crafting an Enterprise Self-Service System." Learn how IT is using the power of self-service tools to become more responsive, save money, and help their users work more effectively.

Protect in Silence

2015年8月26日

Michael Dortch | Senior Product Marketing Manager | Ivanti

Is security at your enterprise focused on reactive firefighting, or on proactive business enablement?

For maximum protection and business benefit, your enterprise's security must protect in silence. It must be pervasive, ubiquitous, and invisible to users. However, too often, security teams are too busy keeping up with new threats and remediation efforts to deliver truly integrated, proactive, and seamless security that protects all assets, connections, and users.

Watch this stimulating and informative webinar, Cybersecurity: From Firefighting to "SecOps." Learn how IT and security decision-makers in enterprises across multiple industries are making security more agile, operationally focused and effective, and how you and your colleagues can also do so. 

Voice Enablement: More Warehouses Are Picking Productivity

2015年8月19日

Sharon Gee | Host | Ivanti

Feeling greater pressure for on-time delivery of goods? Omni-channel pressures keeping you up at night? The warehouse is a very different place than it was 10 years ago, and so are the technologies available to help your workers keep up with the increased pace.

Watch our webinar, presented by VDC Research, for a look at how voice-directed technology has evolved. VDC’s Eric Klein will help you discover use cases throughout your warehouse where voice-enablement can deliver bottom-line improvement.

Upgrading Your OS Without Distress

2015年8月12日

Windows 10 is here, which means an OS migration is in your future -- again. Regardless of what you're migrating from, an OS upgrade is inevitable. It's time to assess, migrate, and manage for the long-term, without the pain.

Watch this one-hour, on-demand webinar discussing how you can overcome migration challenges and alleviate concerns about application incompatibility and user disruption.

Patch Tuesday August 2015

2015年8月11日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Introducing the ITSM SnapIT

2015年8月5日

Kirk Noren | Director, Sales Engineering | Ivanti

What if an end-user could get immediate, relevant IT advice or knowledge on their mobile phone, for any issue their mobile camera can see at the time? SnapIT makes it easy to get that advice. The individual user experience from question to answer is transformed.

Watch this on-demand one-hour webinar and hear about this new concept we call SnapIT. This is your opportunity to learn how you can offer a totally new user-experience to your end users using LANDESK Workspace mobile app with service desk Incident and Knowledge processes.

How and Why IT Service Management is Evolving in the Digital Age

2015年8月4日

Kevin J. Smith | Senior Vice President | Ivanti

Both the rules and the roles governing IT Service Management (ITSM) are evolving to support a far-broader need for inclusiveness across IT, and between IT and its service consumers. Join EMA Analyst Dennis Drogseth and HEAT Software VP & GM Kevin J. Smith to learn what extremely successful ITSM organizations do differently.

Secure Mobile Email Without Compromising Productivity

2015年7月29日

Eran Livne | Principal Product Manager | Ivanti

Email is the most commonly accessed application on mobile devices. However, companies have struggled to secure email because traditional approaches have been frustrating to users, limiting adoption. Securing mobile email no longer needs to be so difficult.

Watch this complimentary on-demand webinar taking an innovative approach to securing mobile email and data while preserving the native email experience for users. Rather than focusing on containing and protecting data on mobile devices, LetMobile prevents data from being stored on these devices. By prohibiting data to be stored, sensitive corporate data is protected in the event a device becomes lost, stolen, or compromised in any way.

Stop IT Overspend

2015年7月15日

Matt Bingham | Director, Product Management | Ivanti

Jason Christensen | ITAM Product Marketing Manager | Ivanti

Are you like 80% of businesses that are overpaying for software licenses?* IT overspend is prevalent in today's organizations. Because of the lack of accurate reporting, businesses are paying for software licenses they are unsure if they even need. Compounding this, non-compliant companies are experiencing significant financial risks from fines and security breaches.

Watch this 45-minute on-demand webinar for a demonstration of the LANDESK Asset Manager Workspace that provides an Infographic-style dashboard allowing IT Managers the ability to view their current state of compliance, where licenses can be optimized, and view hardware issues at a glance.

Patch Tuesday July 2015

2015年7月14日

Chris Goettl | Manager, Product Management, Security | Ivanti

Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.

Smart Service Desk with an ROI

2015年7月8日

Routine technical issues can slow down a support center like password reset calls or system outages. Find out how to streamline incoming service management inquiries and quickly build a ROI strategy using automation.

Foster Continual User-Centered Service Improvement

2015年7月8日

Ian Aitchison | Director, Product Management | Ivanti

IT departments are challenged with maintaining systems while being charged with innovating to help their organizational productivity. Maybe you want to re-position IT as an innovative, changing, and improving force but just can't make it happen.

Watch this one-hour, on-demand webinar where we address the challenges of integration and discuss a range of business and technology integration approaches proven to foster continual user-centered service improvement.

  • Why IT needs to innovate and why IT struggles to innovate
  • How technology shifts can provide dramatic improvement - often with little or no additional investment
  • A 5-step plan to introduce an easy, effective innovation process into IT
  • Ideas for small innovations steps that make a big difference, fast

Bridging the Patching Gap in Microsoft System Center

2015年6月25日

System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms? Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions. Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.

Cloud Vs. On-Premise ITSM: Is there a Clear-Cut Winner?

2015年6月24日

Industry trends strongly suggest that hybrid ITSM solutions are the wave of the future in ITSM. So why have analysts at Gartner predicted that 30 percent of the companies that are currently using cloud-based ITSM tools will go back to premises-based solutions by 2014? When it comes to choosing an ITSM solution, is a cloud-based model inherently superior? Watch this webcast to find out!

Contain Threats. Not Productivity.

2015年6月24日

LANDESK Security Suite protects against today's threats using a layered security approach, including vulnerability management, application control, Antivirus, and security configuration management. BUFFERZONE, a LANDESK One Certified Partner, complements Security Suite by adding a security layer to protect application exploits effectively through a secure container reducing risk and limiting the impact of malicious threats.

Watch this 45-minute on-demand webinar with LANDESK Security Suite and BUFFERZONE experts covering how the two solutions work seamlessly together to defend organizations from the advanced threats that evade detection.

Unify and Automate with LANDESK Service Desk

2015年6月17日

Melanie Karunaratne | Senior Manager, Product Marketing | Ivanti

Bill Addenbrooke | Systems Engineer | Ivanti

Employees expect more from IT. Increasingly, it's presumed that IT will offer a service experience equal to the service itself, respond differently, and be more agile to business changes-yet still offer high-quality support. But limited resources and time make it difficult to confront this scenario.

Watch this on-demand webinar for an eye-opening webcast where you will discover how integrating and automating existing service management technology and processes allow IT organizations to act faster, provide innovative solutions, and enhance delivery of existing services and support.

Intuitive IT Anywhere

2015年6月10日

Adam Smith | Senior Product Marketing Manager | Ivanti

Bennett Norton | Sales Engineer | Ivanti

The heart of IT is about empowering people. By keeping users happy, you make IT more strategic and the business more productive. Too often, organizations use IT management tools that provide too much information for certain IT-related roles, require significant training, and ultimately deliver only small pieces of information people need to do their job.

Watch this on-demand webinar covering how LANDESK Workspaces is the most intuitive experience IT can provide to increase productivity and empower the roles that consume the most IT data and services.

Migrating Your OS Shouldn't Be Painful

2015年6月2日

Jerry Winkel | Services Business Development Director | Ivanti

Regardless of what you're migrating from, an OS upgrade is inevitable. It's time to assess, migrate, and manage for the long-term -- without the pain. Windows 10 is almost here, which means an OS migration is in your future -- again. LANDESK Professional Services has migrated tens of thousands of devices to new operating systems, and we offer solutions that help ease migration headaches and provide a more seamless experience.

With options for centralized and user initiated upgrades, our methods offer the IT department incredible flexibility during the upgrade process. Watch this webinar covering how you can overcome migration challenges and alleviate concerns about application incompatibility and user disruption. You'll also learn the simplified processes of:

  • Preserving user data
  • Migrating encrypted devices
  • Restoring applications
  • Migrating local printers
  • Migrating remote sites with limited bandwidth
  • Migrating shared devices

Aligning Service Desk and ITAM for Asset Compliance

2015年5月27日

Jan Oberg | CEO | ITAMOrg

What is the Service Desk's role in relation to proper IT Asset Management control -- are they involved? Should they be?

Watch this webinar for an introduction to IT asset management and the role Service Desk plays to ensure IT asset compliance. In cooperation with The Service Desk Institute (SDI), you'll learn how these two solutions work together to: 

  • Maintain change histories across an asset's entire lifecycle
  • Aggregate data to enable a single view on asset context and accountability
  • Retain a service history for each asset to help collect cost and maintenance data over time
  • Connect hardware, software, license, discovery, and entitlement data together so you can reconcile software entitlements against discovery for true compliance management
  • Improve service levels, support the service lifecycle, and take control of your IT environment

Smarter IT Through End-User Analytics

2015年4月22日

Da-Rell Gilbert | Sales Director | Nexthink

Marcel Shaw | Sales Engineer | Ivanti

How many times has your administrative team claimed that all systems were online and functioning correctly, only to discover that they weren't? Imagine the ability to detect diminished or total loss of service before your end-users call to report the problems. With the Nexthink End-User IT Analytics from LANDESK, you can.

Watch as LANDESK expert, Marcel Shaw, and Nexthink expert, Da-Rell Gilbert, give a technical demonstration.

  • Help IT become more proactive
  • Shorten troubleshooting time dramatically
  • Target affected users with a resolution

Cover Your Assets With ITAM

2015年4月15日

Matt Bingham | Director, Product Management | Ivanti

It's time to assess your actual needs with IT asset management. Watch ITAM expert, Matt Bingham, and hear how to reclaim operational expenses, survive audits, and gain complete visibility of all your IT assets with the LANDESK IT Asset Management Suite. We empower you to manage your technology to deliver exceptional business value.

Solving the Top 3 Patch Issues

2015年3月25日

Marcel Shaw | Sales Engineer | Ivanti

Keeping all of an organization's endpoints patched and up-to-date is crucial to staying ahead of the latest exploits and vulnerabilities.

Watch LANDESK Patch Management Expert, Marcel Shaw, to learn how to tackle the top three patch management challenges organizations deal with on an ongoing basis.

  • How do I patch all my non-Microsoft applications and operating systems effectively and efficiently?
  • How do I keep my road warriors patched and up-to-date?
  • How do I simplify and improve my patch process so it requires less IT effort, decreases my exposure to vulnerabilities, and increases patch deployment success rates in a timely manner?

Self Service: Empower Your Users

2015年3月18日

Jeff Hance | Senior Systems Engineer | Ivanti

Hear from ITSM Specialist, Jeff Hance, as he navigates through the LANDESK IT service management solution, providing tips to reduce time spent creating and resolving issues or requests from the end user and analyst perspective.

  • Providing a consistent experience across platforms
  • How knowledge can take your team from good to great
  • Harnessing the power of technology to speed resolution
  • Best-in-class service catalog and self-service solution

Optimizing your Service Catalog: Transform your SC into a Service Enabler

2015年2月25日

IT organizations are in constant pursuit of improved efficiency and service delivery to be able to truly enable the business. One of the critical building blocks in achieving optimized service delivery is the Service Catalog. Many organizations by now have taken the first step and implemented a customer facing service catalog. The question now is how to realize and unlock its full potential, e.g. to truly understand what services are necessary, to analyze the services and to optimize the investment in the services that are being offered to end users. In this session we will take a look at some of the key challenges and obstacles to implementing and optimizing a service catalog and how to transform a static service catalog into one that becomes a true extension and enabler to the business.

Practical Patch Compliance: Using System Center to Reduce your Audit Pain

2015年2月19日

Security is Complex, Patching with Microsoft® System Center Shouldn't Be. System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications? Introducing the only enterprise-class 3rd party patching solution designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions. Join us for an in-depth demonstration of practical methods to improve the patch process for your most targeted 3rd party desktop applications, reduce the time you spend building updates, and improve audit readiness in your Windows environment—through our newly released Lumension® Patch Manager DeskTop plug-in.

How to Build a Successful Self-Service Environment

2015年2月18日

Jeff Hance | Senior Systems Engineer | Ivanti

Implementing self-service capabilities in your organization means IT can deliver high-end, 24/7 support from anywhere. Users stay productive, you meet service level expectations, and you spend less on IT.

Watch LANDESK IT Service Management (ITSM) expert, Jeff Hance, for a one-hour webinar to learn how to implement a successful self-service strategy that empowers your users.

Beyond PCI Compliance

2015年2月4日

Gerald Ashby | Senior Product Manager | Ivanti

Retailers everywhere are experiencing the threat of cyber criminals who hack their way to access confidential data. Recently, an explosion of breaches have dominated the news headlines. In fact, nearly one billion records were compromised in 2014 alone.* It is also true that PCI compliant organizations are still being breached at the endpoints, proving that the DSS standards are not enough protection. It's time to go beyond compliance and gain real data security.

2015 Data Protection Maturity Trends

2015年1月28日

After so many massive data breaches in 2014, it's no wonder that data protetion is such a hot topic today. The fourth annual Data Protection Maturity Trends report delves into the issues and concerns facing IT security teams, how effective their data protection efforts have been to date, and their plans for 2015 and beyond. 

Best Practice Automation for Change, Configuration, and Release Management

2015年1月23日

The practice of implementing “Service Transition” processes such as Change, Release & Configuration Management poses many questions to those trying to make it all work together. One of the main questions confronted by many is “How can I get these all to work together?”

Greatest IT Security Risks for 2015; 6th Annual State of Endpoint Risk

2015年1月21日

User-centric risk tops this year’s concerns: what is IT doing about it? Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat. The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.

Nexthink

2015年1月15日

Beau J. Wells | Solutions Architect | Ivanti

With user-based pricing, the four-in-one suite is available at one price, regardless of the type of user or how many devices or platforms each user has. Stop worrying about the cost of controlling your endpoints and focus on the best way to manage and secure them.

Software Asset Management

2014年12月10日

Ron Kirkland | Sales Engineer | Ivanti

George Leonard | IT Asset Manager | Sealed Air

Take control of your software monitoring, and reclaim operational expenses with LANDESK IT Asset Management Suite. 78% of businesses don't know if they have the right software licenses*. Make sure you're a part of the 22% who have control of their software assets.

Watch this webinar with LANDESK IT asset management experts Ron Kirkland and George Leonard.

*Source: http://www.itassetmanagement.net/2013/10/14/rimo3-infographic/

  • Software Asset Management - Discovery and inventory
  • Reclamation - Reducing IT overspend
  • Software Compliance - How to survive an audit

Hardware Asset Management

2014年12月3日

Matt Bingham | Director, Product Management | Ivanti

Marcel Shaw | Sales Engineer | Ivanti

Michael Stout | Principal Product Manager | Ivanti

Track and maintain all your hardware assets across your environment automatically with LANDESK IT Asset Management Suite. Gain complete visibility with B2B connectors that aggregate manufacturer, vendor, and reseller data, providing you with accurate and timely information from the moment you purchase your hardware asset through its entire lifecycle. Now you can import and track warranty data and automate recalls for assets like batteries, printer ink, and toner.

Steps to Building your EMR Change Management IT Strategy

2014年11月19日

Solidifying a strategy for Electronic Medical Records Change Management can be a daunting and complex endeavor. Learn how to increase advanced technology adoption, to reduce implementation failure and to improve the clinical quality and business performance of healthcare organizations.

Steps to Awesome IT Success with an Automated Service Catalog

2014年11月19日

Ian Aitchison | Director, Product Management | Ivanti

Marcel Shaw | Sales Engineer | Ivanti

End user expectations are high. IT must innovate and engage to increase business productivity. Sometimes “keeping the lights on” just isn't enough. So, if you do one thing to improve your IT/business relationship, it should be the introduction of Self Service and a Service Catalog.

In this session, learn how ‘Service Catalog’ means much more than just self-service, understand how code-free process design and automation can transform the end user experience of IT, and hear real world best practice advice gained from other organizations that have transformed their employees' perception of enterprise IT.

FrontRange HEAT Service Automation Video

2014年11月12日

The FrontRange HEAT Service Automation solution provides the necessary automated and unified support, security, and control processes for all users and endpoints across the enterprise.To learn more, please check out this video.

Mobile Security Where It Matters: Email

2014年11月12日

Eran Livne | Principal Product Manager | Ivanti

Rob DeStefano | Product Marketing Manager | Ivanti

Whether accessing email, or corporate information from databases, applications or intranet drives, securing that information when accessed on mobile applications is critical. The bottom line is that securing the personal device isn't the big requirement for enterprises. The focus of corporate IT administrators needs to be securing the information accessed on these personal devices.

Patching in the Data Center: Not a Solved Problem!

2014年11月12日

Rob Juncker | Vice President, Engineering | Ivanti

John Rush | Sr. Systems Engineer | Ivanti

Jordan Pusey | Product Marketing | Shavlik

Patching servers is inherently difficult. With shrinking maintenance windows, VM sprawl, five nines of service reliability, and the inherent hazards of deploying patches to mission critical servers, patching in the data center is fraught with danger.

Watch Rob Juncker and John Rush to see how Shavlik Protect takes control of the patching process to secure the data center.

  • Patching

How to Extend your Asset Management Strategy to Non-Computer Devices

2014年11月5日

Beau J. Wells | Solutions Architect | Ivanti

You can't control costs and increase efficiency unless you know what assets you have, where they are, and how they're being used. That's where LANDESK Data Analytics comes in. It enables you to track and manage the entire lifecycles of computer and non-computer IT assets. Plus, it empowers you to manage changing assets effectively and efficiently.

Join LANDESK Data Analytics expert, Beau Wells, for a live one-hour webinar covering visibility and tracking of computer and non-computer assets, including associated users, contracts, maintenance agreements, phones, printers, and more.

  • Asset Control
  • B2B Connectors
  • Executive Reports

Industry Report: Is your IT Team Prepared for the Mobile Enterprise?

2014年10月30日

60% of organizations regard Mobility as critical to their business, yet only 15% are fully prepared. Find out the latest analyst findings on the state of Enterprise Mobility and see how you compare to your peers. Few technology advancements have as rapidly and dramatically impacted business operations as the introduction of Mobility. The reliance on mobile resources has proportionally increased pressure on Service & Support teams and IT operations to deliver, support, and secure mobile services. Together with market analyst Enterprise Management Associates (EMA), FrontRange has conducted a global survey on the state of Mobility in the Enterprise and its impact on Unified Endpoint Management and Service Management. In this webinar, EMA Analyst Steve Brasen will review the survey highlights and share insights on the adoption of mobility best practices. Register today to find out the latest analyst findings and see how you compare to your peers!

Improve IT’s Reporting and Decision Confidence

2014年10月29日

Eric Garlepp | Solutions Architect | Ivanti

Imagine asset information that helps you make smarter business decisions. With the data normalization and standardization capabilities of Data Analytics, you gain a better view of all your assets, where they are, and how they're being used-and avoid the hefty financial penalties of software licensing mistakes.

Join LANDESK Data Analytics expert, Eric Garlepp, for a live one-hour webinar covering hardware asset management topics that will ultimately improve IT's decision-making confidence.

  • B2B Connectors
  • Data Normalization
  • Data Mapping
  • Warranty

Re-Invented: The Computer Inventory (Everything You Wish You Knew)

2014年10月22日

Beau J. Wells | Solutions Architect | Ivanti

Understand how your licenses and software are being used, optimize your licensing costs, and be ready for a software audit at any time.

  • B2B Connectors
  • Internal Connectors
  • Inventory
  • Discovery

Aggregating Manufacturer & Reseller Information via the Cloud

2014年10月15日

Bennett Norton | Sales Engineer | Ivanti

Ever wonder if there’s an easier way to reduce “renegade” purchasing, eliminate unnecessary acquisitions, and automate the process of tracking purchases? Join us for a one-hour live webinar with a LANDESK Data Analytics expert who will share insights into LANDESK B2B connectors. These proven tools let you connect directly to the databases of more of your vendors, resellers, and manufacturers. Then, using Vendor, Manufacturer, Enterprise Aggregator, and Services connectors, you can import purchases, warranty information, systems management data, and services information automatically for a noticeable improvement in inventory accuracy.
  • B2B Connectors

HEAT Client Management Supports Enterprise Mobility and BYOD

2014年9月25日

The new generation of mobile technology is game changing for many organizations. Consumer devices are dominating a whole technology sector, and IT is struggling to deliver standardized services across old and new devices with a common user experience and within appropriate security and compliance guidelines. In this session, we focus on the key trend of Enterprise Mobility and the BYOD revolution and challenges that came with it and demonstrate how HEAT Client Management provides a unified EMM solution to efficiently manage physical, virtual and mobile devices across their lifecycle.

Your Security is our Top Priority - Third Party Patch Management

2014年9月23日

Today, organizations work with large volumes of sensitive information, which unfortunately is often a target of malicious attacks. According to key security experts 10 new vulnerabilities are discovered each day. In order to protect against potential harm in the most efficient and cost-effective way possible, companies need a standardized, automated and constantly updated patch management solution. In this webinar we will show you the benefit of our solution and demo the features LIVE.

2015 Endpoint and Mobile Security Buyer's Guide

2014年7月31日

Over the past few years, Endpoint Security Management offerings - including patching, configuration, device control, and mobility - have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more. Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to's on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process. 

BYOD and Mobile Security: Sneak Peek of LinkedIn Infosec Community Survey

2014年6月10日

The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk. We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices. Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!

Flexible Cloud Strategy Key to Successful Delivery of Business Applications

2014年5月30日

When it comes to IT, the Cloud can take many forms depending on the shifting needs of the business. Today, the cloud - whether public, private or a hybrid model - is re-defining how IT organizations deliver services across the enterprise. So what’s the right cloud strategy for your company? Watch this 2-minute video to determine which cloud strategy is right for your business.

Does your Service Desk Fit in your Pocket?

2014年4月24日

Extend the reach of your Service Desk to your Mobile Support Teams. Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

Infinity and Beyond IT with a Shared Corporate Services Portal

2014年3月27日

Take your Customers to Infinity & Beyond IT...and reduce cost through automation, consolidation & shared business services. In the fourth of our six part webinar series we introduce the concept of a 'Corporate Services Portal' and how introducing 'shared services' can drive process efficiencies, ensure standardization and maximize service quality across your organization.

Enterprise Mobility - Control the Service, Not the Device

2014年3月27日

Join us for the third in our six part FrontRange Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote. Empower your mobile workforce with anytime, anywhere access.

Optimize Service Delivery

2014年2月28日

Big changes are coming for IT, but they shouldn’t be barriers to business results. When it comes to service delivery, IT must work smarter, not harder. FrontRange unifies industry best practices and automation tools to provide real-world guidance and help customers deliver a higher level of service quality at a reduced cost. Let FrontRange guide you to work smarter and optimize your business.

Empower your Mobile Workforce

2014年2月28日

By 2015, there will be one mobile device for each person on earth. 24/7 connectivity is what this new “anytime, anywhere” workforce wants and expects. Learn how FrontRange puts change in your hands.

Is Your IT Stuck in the Past?

2014年2月28日

Where there is change, there is resistance. Evolution happens…in nature and in business. IT organizations must learn to innovate, adapt and embrace new trends and technologies or risk becoming obsolete. FrontRange provides real world guidance to help organizations “embrace” change, navigate the challenges and transform their business and IT operations. Learn to avoid disruption to end users and the business.

What would you Rather do Today? Automate your Way to Improved Service Delivery

2014年2月27日

Join us for the second in our six part FrontRange Webcast Series "Change is in your Hands" hosted by UK Solutions Consultants Chris Powell and Peter Coote. Discover how automation can improve the quality of services you provide and drive down costs by freeing up resources from mundane and time consuming tasks.

Point of Sale Systems: How to Stop Critical Entry Points for Malware

2014年2月20日

Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.
During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.

Change is in your Hands - 6 Part Series Introduction

2014年2月6日

Join FrontRange for our new Spring Webcast series where we'll examine the challenges of introducing and effectively managing change amid the key trends and rapid adoption of evolving technologies.

2014 Data Portection Maturity Trends. How do You Compare?

2014年1月28日

In 2012, we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate ITupside down. In this webcast, we'll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns. During this webcast we will look at each data protection trend, helping you define best practices for your organization to address the top concerns. We'll also show you how you can gauge the maturity of your security system, allowing you to plug any holes before your valuable data starts to leak through them. 

Greatest IT Security Risks for 2014: 5th Annual State of Endpoint Risk Report

2014年1月8日

Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening? For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage. Join Larry Ponemon of the Ponemon Institute and Ed Brice of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security.

Optimizing your Service Catalog: Transform your SC into a Service Enabler

2013年11月14日

How to transform your service catalog into a service enabler” IT organizations are in constant pursuit of improved efficiency and service delivery to be able to truly enable the business. One of the critical building blocks in achieving optimized service delivery is the Service Catalog.

Windows XP is Coming to an End: How to Stay Secure before you Migrate

2013年11月13日

In April 2014, Microsoft ends support for Windows XP. In a perfect world, your organization will have developed a plan by the end of 2013 and will have migrated all XP systems before Microsoft stops providing security patches. Unfortunately, there are many obstacles to making this strategy a reality – time, resources, budget, etc. If your organization still uses WinXP – or other applications such as Office 2003 or Internet Explorer 6 for which support also ends – you need a plan B.

Enterprise Mobility: Anytime, Anywhere is the New Normal?!

2013年10月9日

The new generation of mobile technology is game changing for many organizations. It is the first time, consumer devices are dominating a whole technology sector, and IT is struggling to deliver standardized services across old and new devices with a common user experience and within appropriate security and compliance guidelines. The required changes to existing IT infrastructures can be highly complex and very often make existing IT strategies, service delivery, and processes obsolete. The consumerization of IT, the sharp shift from corporate devices controlled by IT to personal devices, is such an example. The rise of the anytime, anywhere workforce means that CIOs must think carefully and strategically about how to modify their systems of record and how to implement new ways to engage with their end users to make information and access available. In this session, we will focus on the key trend of Enterprise Mobility and the BYOD revolution and challenges that came with it. We will also highlight strategies to address these challenges so you can effectively empower your mobile workforce.

Application Whitelisting Best Practices: Lessons from the Field

2013年10月9日

If you’re like most IT professionals, you’ve probably heard analyst firms like Gartner and Forrester recommend using application whitelisting to defend your endpoints. The latest generation of application whitelisting provides flexible protection against modern, sophisticated malware and targeted attacks. However, application whitelisting is not something you turn on overnight. Attend this in-depth technical webcast as we dive into the latest technologies, including reflective memory protection, and other whitelisting approaches, to learn best practices to begin preparing for your 2014 endpoint security strategy and the inevitable transition from traditional signature-based protection to a holistic solution that incorporates whitelisting.

2014 Ultimate Buyer's Guide to Endpoint Security Solutions

2013年10月2日

Last year we offered our thoughts on buying Endpoint Security Management solutions — including patching, configuration, device control, and file integrity monitoring — which are increasingly bundled in suites to simplify management. For 2014, malware and mobility have become the most critical issues facing organizations at they look to protect their endpoint devices. Thus we've updated our research to make sure you have the latest and greatest information on which to base your buying decisions.

The Connected Service Desk

2013年8月13日

Today’s customer expectations are higher than ever for what they expect from IT and their service desk. Do you have the necessary strategies and tools in place to meet those expectations? What can you do to move yourself closer to understanding your customers needs and become the leading service provider to the business? In this session, we will discuss what some of the key elements are to successfully planning, implementing and delivering a higher level of service for your customers. We’ll look at how platforms and technologies such as Service Catalogs, Voice Automation and Social Collaboration can help you extend your reach into the business. We’ll also discuss some of the key challenges facing IT departments and the Service Desk and what you can do to overcome those challenges.

BYOD and Mobile Security: How to Respond to the Security Risks

2013年6月4日

Bring Your Own Device (BYOD) is a popular topic in 2013. The trouble is that IT is trying to understand the security risks and prepare strategies to either adopt employee-owned mobile devices or decide against it for security and data control reasons. The 160,000 member Information Security Community on LinkedIn conducted the survey “BYOD & Mobile Security 2013” to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.

3 Executive Strategies to Prioritize your IT Risk

2013年5月8日

Do you want to know how ‘best-of-breed’ enterprises prioritize their IT risk? Join Richard Mason, Vice President & Chief Security Officer at Honeywell, whose team is responsible for global security, during a roundtable discussion with Pat Clawson, Chairman & CEO of Lumension and Roger Grimes, Security Columnist & Author. Uncover strategies beyond traditional antivirus signatures and learn a more holistic approach to effective risk management. Find out ‘how’ and ‘why’ you can make security a prioritized function within your organization.

The Critical Role of Service Catalog

2013年4月10日

As the role of IT continues to grow closer to the business, one of the key enabling technologies that allows for a closer and more prosperous relationship is that of the service catalog. IT organizations are now being asked to broaden their horizons and incorporate the needs from different parts of the business with the added pressure of higher accountability and level of service delivery. So the question is, “how can IT simultaneously meet the goals of the business and user community and deliver to these requirements at a high level? In this session we will take a look at what the key business drivers and challenges are to implementing a service catalog. We will also take a close look at who the key stakeholders are to ensuring a successful service catalog and what key metrics you should be using to measure performance and delivery.

Emerging Expectations of a CIO

2013年3月27日

CIO’s are witnessing significant change. Gone are the days of simply keeping IT running efficiently, reducing costs and mitigating risks. Today’s CIOs must also balance a broader role on the executive team and new responsibilities that directly influence business strategy.

Rising Above the Tide of Emerging Technologies

2013年3月20日

How to not only stay afloat, but ahead of emerging technology trends”. As an IT professional how do you keep your head above water when the rising tide of technology keeps rolling towards you, wave after wave.

FrontRange HEAT Integrated IT Service Management and Client Management Overview

2013年3月18日

A quick 3 minute overview of the FrontRange HEAT Integrated IT Service Management & Client Management Overview Video solution.

The Impact of Cloud Technologies on ITSM

2013年3月14日

The results of the FrontRange Solutions and THINKstrategies 2013 Cloud Management survey are in. Join us as THINKstrategies’ Managing Director Jeff Kaplan overviews industry findings from more than 350+ respondents on the key trends, drivers and maturity of Hybrid ITSM and Cloud Management.

Understanding the Ins and Outs of Java Vulnerabilities and What to do About it

2013年3月13日

Many organizations are jumping on the “Death to Java” bandwagon, ranting about turning off Java to eliminate risk. However, it is important to put the issue in the proper context. The reality is that a Java vulnerability is not the end game for a cyber criminal, it is merely a delivery mechanism in the quest to install and execute bigger malware. There is no “one size fits all” recommendation for eliminating Java risks. But, you do want to eliminate as much exploitable surface area as reasonably possible on your critical endpoints. This should be the philosophy engrained in every organization’s security culture. If you’re not having this conversation about Java - and quite frankly all of the third-party applications in your environment - you are missing the mark and not calculating your risk. Join Paul Henry and Russ Ernst as they bring us up to speed on the Java vulnerabilities and how to limit your exposure without going overboard.

Customer Focused Service Desk

2013年2月7日

The practice of managing a service desk can be as frustrating as navigating in the dark without a flashlight and keeping you off the right path to servicing your customers. But what if you had the right tools, process and maps to help you navigate out of the darkness and keep you on the right path to better understanding your customers and managing a successful service desk? In this session we will take a look at what some of the key tools, processes and maps are to keep you focused on the customer and how that translates to a high performing  service desk and ultimately true customer satisfaction.

Defending your Corporate Endpoints: How to go Beyond Anti-Virus

2013年1月30日

Businesses large and small continue to struggle with malware. As a result, 50% of endpoint operating costs are directly attributable to malware alone[1]. Traditional approaches to malware protection, like standalone antivirus, are proving themselves unfit for the task. Something has to give. In this roundtable discussion, independent information security expert Kevin Beaver and Lumension Security’s Chris Merritt will talk about what can be done differently.

The ROI of Problem Management

2013年1月26日

The dirty little secret is out…no one believes in Problem Management. Yes, we all want to follow best practices, but we seem to always fall short. The reasons are many, but we know it comes down to people, process and technology. That being said, we will take a look at some of the common pitfalls some have experienced and how you can mitigate some of the challenges and realize real “tangible” benefits as a result of implementing Problem Management for the service desk.

2013 Data Protection Maturity Trends. How do you Compare?

2013年1月22日

In 2012 we found out that the BYOD environment and consumerization of the workplace had turned traditional notions of corporate IT upside down. The 2013 Data Protection Maturity Report will highlight how organizations have managed this trend over the last year and what steps are being taken in 2013 to further enhance data security. Find out how IT teams are developing a holistic model that encompasses policy, education, technology and enforcement.

Greatest IT Security Risks for 2013: Annual State of the Endpoint Report

2012年12月12日

What are IT pros most concerned about heading into 2013? The annual State of the Endpoint Report sponsored by Lumension and conducted by Ponemon Institute reveals APTs and mobile devices pose the biggest security threat to organizations in the coming year. Unfortunately, respondents also demonstrated a disconnect between their identified risk and planned security spend as well as a significant need for improved internal collaboration.

Hybrid IT Service Management - Because having Only One Option isn't an Option

2012年11月13日

Learn about critical IT Service Management challenges and engage with featured Gartner Analyst Jarod Greene and FrontRange Director of Product Marketing, Craig Ledo. Walk away with actionable advice that will enable you to maximize efficiencies with reduced cost and complexity.

Sensational Headlines or Real Threats? What New Attacks Mean for You

2012年10月22日

Well-organized, highly sophisticated cyber attacks continue to make headlines, hitting major U.S. banks and global companies like Adobe to name a few. In support of October as National Cyber Security Awareness Month, Lumension CEO Pat Clawson, Prolexic CEO Scott Hammack, security industry expert and author, Richard Stiennon and industry analyst and webcast moderator Eric Ogren will share their unique insight into these recent news-making attacks and what they mean for enterprises everywhere.

Developing Best Practices to Device Control and Encryption: Technical Webcast

2012年8月28日

The proliferation of USB flash drives and other removable storage devices has increased the porosity of the network perimeter. This has resulted in sensitive corporate and customer data leaking through the corporate firewall, exposing the organization to data loss, data theft and malware propagation. Understanding the powerful data protection tools available to your organization can help you mitigate these risks, while still enabling the flexible and managed use of these productivity devices.

How to Guard Healthcare Information with Device Control and Data Encryption

2012年8月7日

The need to protect digitized health information is a top priority in the healthcare industry. HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet or exceed industry best practices in guarding healthcare information?

Welcome to the Age of Weaponized Malware. What does it mean to your Enterprise?

2012年6月26日

The U.S. has not denied their role in the use of weaponized malware and already, other countries are jumping on board. India recently announced they are empowering government agencies to carry out similar such actions. State sponsored malware attacks are officially out of the shadows and mainstream for organizations and end users alike. In fact, Google recently announced an alert service for gmail users for “state sponsored attacks”. How exactly did we get to this point and what are the factors and threats that you need to be aware of?

How Mature is your Data Protection? 3 Steps to Effective Data Security

2012年5月22日

Make no mistake, consumerization of the workplace is one genie that is not about to go back into the bottle. With the BYOD movement overwhelming IT, and the convergence between personal devices and the corporate networks set to increase, the ability to restrict-and-ban the network is doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement. During this webcast we look at each of these aspects, helping you define your organization’s best practice guide. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.

E is for Endpoint II: How to Implement the Vital Layers on your Endpoints

2012年5月9日

IT security professionals rank third-party application vulnerabilities as the greatest security risk of 2012. And yet malware continues to exploit these – and other – vulnerabilities to breach our defenses. Clearly there’s a disconnect between knowing the problem and solving it. Yet it does not have to be this way, if we intelligently apply adequate protections against the exploitation of these vulnerabilities.

Developing Best Practices to Patch Management: Technical Webcast

2012年4月25日

In today’s complex networking environment using patch and vulnerability management as the principal component of your risk mitigation strategy, and taking prudent measures to establish a best practices approach, can help reduce costs and risks in the long term. Patch and vulnerability management continues to be the first and last line of defense against existing and newest exploits. With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities.

Why Patch Management is still the Best First Line of Defense

2012年4月13日

Vulnerabilities are on the rise - especially from third party, non-Microsoft applications, which have four times more vulnerabilities than Microsoft applications. And cybercriminals have taken notice, exploiting these vulnerabilities at a faster rate than ever before. Today more than 2 million malware signatures are identified each month and traditional anti-virus defenses simply can’t keep up. Even the major anti-virus vendors have concluded that stand-alone anti-virus no longer provides an effective defense and that additional layers of security technology are needed to address the rising volume and sophistication of threats.

E is for Endpoint: 6 Security Strategies for Highly Effective IT Pros

2012年2月26日

We all like the idea of a silver bullet—a single, simple solution to a complex problem. But there’s no silver bullet when it comes to information security. Though some IT professionals have clung to the vain hope that antivirus (AV) alone would do the trick, others have come around to the need for a layered, defense-in-depth approach to endpoint security. But today’s endpoints demand even more. Endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enabling operational improvement.

Greatest IT Security Risks for 2012: Annual State of the Endpoint Report

2012年1月17日

While malware attacks continue to be a significant risk and operational cost driver, IT security teams today are more concerned about the new threats brought on by personal mobile devices in the workplace, virtualization technologies and cloud computing, according to the 2012 State of the Endpoint survey sponsored by Lumension and conducted by Ponemon Institute. And while reliance on these productivity tools are expected by other business leaders, inadequate collaboration and lacking resources for security create a perfect storm for hackers. Join this webcast as we reveal statistics on growing insecurity, perceived areas of greatest risk for IT in 2012, and interestingly, a significant disconnect between risk and planned security strategies. In addition, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure your endpoints.

How to Reduce Endpoint Complexity and Costs

2011年11月8日

Ensuring the security of organizational endpoints is tough, especially when you have limited resources and budget. It’s not just about what security technologies to deploy, but how can you more efficiently manage your environment. Join Roger Grimes and Chris Merritt for the second part of our SMB Security Webcast Series as they discuss key recommendations for improving endpoint security.

How to Improve Endpoint Security on a SMB Budget

2011年9月27日

Today’s cybercriminals are targeting small-to-midsize organizations more frequently. With limited staff and resources, SMBs face the challenge of increasing IT security issues and more sophisticated threats with a limited arsenal.

Reorganizing Federal IT to Address Today's Threats

2011年8月11日

New reports show U.S. government servers are faced with 1.8 billion cyber attacks every month. A quick look at these numbers and it is painfully obvious that status quo security measures are not keeping pace with today’s threats. Congress has taken a step by introducing the Cyber Security Public Awareness Act of 2011, but more evolution of our cyber defenses needs to occur.

How to Enable Local Admin Access without the Risk

2011年6月16日

In today’s Windows environment, end users are accustomed to having local administrator privileges which allow them to download a variety of applications and potentially misconfigure their PCs. While standard wisdom may be to simply solve the problem by revoking local administrator rights on users’ systems, the reality is that this may not be an option at all organizations. And removing local admin rights doesn’t address applications such as Google Chrome or browser plug-ins for which admin access isn’t required.Fortunately, there’s hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base – through application whitelisting. With application whitelisting, IT can gain power over what types of applications their users install and limit their access to under-the-hood controls that determine how well config¬ured the machine remains.

Paul Henry's 2011 Malware Trends

2011年3月1日

In 2010, we again saw the volume and sophistication of malware dramatically increase over the year before. Today, more than 1.6 million new malware signatures are identified each month and the volume of zero-day attacks continues to rise. Script kiddies have been replaced by cyber criminal syndicates looking to steal personal information and intellectual property for financial gain. Join security and forensics expert, Paul Henry, to learn about the latest malware trends and more importantly, practical steps you can take to better protect your organization from evolving threats.

Shifting State of Endpoint Risk: Key Strategies to Implement

2011年1月13日

The status quo approach to endpoint security is both ineffective and costly. In the State of Endpoint Risk study, sponsored by Lumension and conducted by Ponemon Institute, organizations do not feel more secure than they did last year and IT executives acknowledge that the people, processes and technologies necessary to deal with a constantly changing IT risk environment are not supported by stagnate IT budgets. Meanwhile, operating costs are increasing and malware has proven to be a significant cost driver. New approaches to managing endpoint risk are required. In this webcast, we will examine the evolving IT risk environment and recommendations to more effectively and cost-efficiently secure endpoints.

NY Data Privacy: How to Simplify Compliance and Enhance Security

2010年10月20日

In New York, more than 400 data breaches in 2009 impacted more than 1 million state resident records – and according to the Privacy Rights Clearinghouse, NY was 6th per capita in identity theft complaints in the US. To address this data privacy challenge, NY has several statutes in place to protect and inform citizens about data breaches.
But businesses in NY must concern themselves with more than just state regulations - NY’s neighbor Massachusetts imposes data protection and breach notification mandates on all businesses with customers in MA, regardless of where the business is located. In addition, there are numerous federal data privacy, data protection and data breach notification regulations which impact specific industries – such as those included in the HIPAA / HITECH Acts in the healthcare arena. And on top of this, there are industry-specific regulations which apply – such as those in PCI-DSS which impact every organization which takes credit cards.

Endpoint Security Fundamentals: Part 3

2010年10月6日

In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it. This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity.

Endpoint Security Fundamentals: Part 2

2010年9月22日

In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it. This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity.

Endpoint Security Fundamentals: Part 1

2010年9月8日

In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it. This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity.

PCI DSS Compliance and Security: Harmony or Discord?

2010年9月2日

The Payment Card Industry Data Security Standard (PCI DSS) provides data protection requirements for organizations that process card payments. These requirements evolve over time and have even become adopted by some US states, including Minnesota, Nevada, and Washington. While organizations that fully comply with PCI DSS are considered secure credit-card processors, compliance and security are not one in the same. An organization can be compliant and still experience a security breach – look no further than Heartland Payment Systems and RBS WorldPay. Both had achieved PCI DSS compliance at one point, only to suffer massive data breaches that cost tens of millions of dollars. So what good is compliance? What is the difference between compliance and security? And how can organizations effectively move beyond PCI DSS compliance to ensure the security of all their critical information?

Four Steps to Qualifying for Power Rebates

2010年7月27日

In today’s challenging economic environment, cost reduction is a key strategy to stay competitive. Yet, many organizations are not taking advantage of the cost saving opportunities around reducing power consumption and the further rebates that may be available through local power companies. In fact, depending on where your organization is based, it could be eligible for energy rebate programs which provide savings up to $15 per PC. That’s on top of the savings you could achieve by effectively incorporating power management policies into your IT operations.

6 Keys to Securing Critical Infrastructure and NERC Compliance

2010年6月29日

With the computer systems and networks of electric, natural gas, and water distribution systems now connected to the Internet, the nation’s critical infrastructure is more vulnerable to attack. A recent Wall Street Journal article stated that many utility IT environments have already been breached by spies, terrorists, and hostile countries, often leaving bits of code behind that could be used against critical infrastructure during times of hostility. The U.S. Cyber Consequence Unit declared that the cost of such an attack could be substantial: “It is estimated that the destruction from a single wave of cyber attacks on U.S. critical infrastructures could exceed $700 billion USD - the equivalent of 50 major hurricanes hitting U.S. soil at once.” Vulnerability and exposure of utilities’ critical infrastructures originate from the Supervisory Control and Data Acquisition (SCADA) and Distribution Automation (DA) systems that communicate and control devices on utility grids and distribution systems. Many of these systems have been in operation for years (sometimes for decades), and are not designed with security in mind. Regulatory bodies have recognized the many security issues to critical infrastructure and have begun to establish and enforce requirements in an attempt to shore up potential exposures. One such regulation is NERC CIP, which includes eight reliability standards consisting of 160 requirements for electric and power companies to address. And as of July 1, 2010, these companies must be “auditably compliant” or else they risk getting slapped with a $1 million per day, per CIP violation.

Creating your Red Flags Rule Playbook

2010年5月26日

Even with organizations tightening up data security measures, cybercriminals have become very sophisticated and continue to find ways to steal personal information and use it to open or access accounts. According to Javelin Strategies, incidences of identity theft grew by 11 percent from 2008 to 2009 altering the lives of 11 million Americans. If that pattern continues, one in every 20 Americans will be a victim of identity theft this year. The Red Flags Rule, which is enforceable as of June 1, 2010, and carries significant financial recourse for non-compliance, requires organizations across multiple industries to implement additional data security measures and be able to identify the danger signs of fraudulent activity. In this 30-minute webcast, you will learn key tips to developing your Red Flags Rule playbook to effectively.

California Data Privacy Laws: Is Compliance Good Enough?

2010年5月26日

California SB 1386, which went into effect in July 2003, is the granddaddy of all state data protection laws. It requires that businesses protect customers’ personal information and provide notification if there is a security breach which reveals these data to unauthorized people. Since this California law was passed, 50 of 55 States and Territories have followed suit, enacting some sort of data protection and/or breach notification law. And not all of these laws apply only within State boundaries; for instance, the Massachusetts data protection law (201 CMR 17.00) applies to every organization which obtains personal information on residents of the Commonwealth. In addition to these state laws, there are today numerous federal data privacy, data protection and data breach notification regulations which impact specific industries – such as those included in the HIPAA / HITECH Acts in the healthcare arena. And on top of this, there are industry-specific regulations which apply – such as those in PCI-DSS which impact every organization which takes credit cards. As a result, we are left with a patchwork of confusing and sometimes contradictory statutes and regulations which impact almost every business in the US.

Federal Cyber Security Outlook for 2010

2010年4月15日

With growing concerns of sophisticated cyber attacks from overseas putting U.S. critical infrastructure at risk, Lumension commissioned Clarus Research Group to conduct the industry’s first “Federal Cyber Security Outlook for 2010” study. According to the study, which reveals the current state of endpoint security and operations in the US Federal government, the top security risk facing Federal IT in the year ahead is the growing sophistication and volume of cyber attacks. Federal IT resources are challenged in meeting these risks due to a lack of collaboration across IT operations and security, growing complexity of integrating technologies, and increasing compliance audit burdens.

Six Critical Elements to Ensure Pain-Free FISMA Compliance

2010年4月7日

Federal CISOs note compliance as one of their top three priorities with significant time spent on addressing compliance issues. This is exacerbated by the complexity of today’s IT environment, including physical and virtual environments, multiple operating systems and applications supported, and the mobility of data and users. A FISMA compliance approach that relies on a manual and labor-intensive process can produce mountains of paper and electronic documents that become quite burdensome to manage and ultimately don’t ensure a secure network. It’s no surprise then, that in a recent ISC2 survey, while FISMA is generally viewed as having had a positive effect, two in five CISOs believe it has become misdirected or is a time-wasting exercise.

Six Keys to Healthcare IT Security and Compliance

2010年4月7日

Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*. Regulators have clamped down, enforcing HIPAA Security Rule requirements with more regularity and instituting heavy financial penalties and additional audit requirements on non-compliant organizations. Add in HITECH, PCI DSS and many state data protection/breach notification laws and the data protection compliance burden for healthcare organizations is greater than ever before. Yet many organizations continue to address each security regulation as one-off projects and rely on compliance by spreadsheet, which is a surefire way to extend the cost, time, errors, and resources needed to complete audits – up to a 50 percent higher spend on compliance than necessary**. Not only is such an approach more costly, but it does not provide the necessary visibility into an organization’s IT risk so that ePHI can be effectively safeguarded against future threats. This webcast will examine six keys to cost-effectively ensuring IT security and compliance in the healthcare space. * Ponemon Institute, Electronic Health Information at Risk: A Study of IT Practitioners, ** IT Policy Compliance Group, Managing Spend on Information Security and Audit for Better Results.

How to Comply with Nevada's New Data Protection Law - NRS 603A

2010年1月21日

The new Nevada Data Protection law, NRS 603A (passed as SB 227), is unique in several ways. It is the first state data protection law to provide a “safe harbor” for merchants who are fully PCI-compliant, and provides further protection for organizations that use NIST-compliant encryption to protect personal information. As Catherine Cortez Masto, State Attorney General, put it: Nevada offers a deal both companies and government agencies are unlikely to refuse – encrypt personal data sent electronically and data residing on laptops outside your controlled premises, and you avoid liability if that encrypted data is lost or improperly accessed.

未找到任何结果