Security: Ivanti strengthens the protection of customers

Security: Ivanti strengthens the protection of customers

Share post

Summer of Security: Ivanti increases customer protection. Ivanti is expanding its efforts to secure the Everywhere Workplace - in response to the rapid increase in cyber attacks.

The security provider Ivanti is starting the "Summer of Security". The initiative is a reaction to the significant increase in cyber attacks in recent months. The company also supports US President Biden's Executive Order to improve cybersecurity. With the Summer of Security, Ivanti is strengthening its goal of securing the Everywhere Workplace.

Cybersecurity infrastructure is being optimized

Ivanti recently appointed Daniel Spicer as the new Vice President of Security. He will help optimize Ivanti's entire cybersecurity infrastructure. In the longer term, Ivanti plans to expand its product safety team. In addition, Ivanti wants to acquire companies that strengthen its security capabilities and also enter into partnerships with security providers in order to increase the reach of the Ivanti Neurons platform. With new product functions, the digital assets of companies in the Everywhere Workplace can be better protected. Ivanti also plans to work with industry leaders, including US government and private sector executives, to set new security standards for the industry.

“The attackers have refined their methods, so the security industry has to react to this development,” explains Spicer. “As companies and government agencies face increasingly sophisticated attacks, Ivanti wants to better protect its customers and mitigate threats as quickly as possible. This is how we develop secure products, show best practices and help organizations build a strong security foundation through a zero trust strategy. This also requires transparency and cooperation. "

Build a robust security network

Zero trust security enables organizations to build a robust security network. They do this by continuously verifying every asset and transaction before allowing access. The verification includes, among other things, the strong authentication of users, device testing and microsegmentation of networks. Zero Trust also takes into account the entire context of the user's environment before access is granted.

Current research shows that speed is of the essence: According to a study by Ivanti, 58% of respondents said that their organizations had suffered a ransomware attack in the past year. Of these, half (53%) reported that up to four weeks elapsed between the attack and full recovery. The willingness of companies to invest in zero trust technologies is clearly evident. Another Ivanti study shows this. 70% of Chief Information Security Officers (CISO) confirmed that their investments in more specialized biometric authentication solutions will increase over the next year. Strong authentication solutions such as multi-factor authentication, secure passwordless access, biometrics and the management of privileged access are among the most important pillars of a zero trust strategy.

More at Ivanti.com

 


About Ivanti

The strength of unified IT. Ivanti connects IT with security operations in the company in order to better control and secure the digital workplace. We identify IT assets on PCs, mobile devices, virtualized infrastructures or in the data center - regardless of whether they are hidden on-premise or in the cloud. Ivanti improves the provision of IT services and reduces risks in the company on the basis of specialist knowledge and automated processes. By using modern technologies in the warehouse and across the entire supply chain, Ivanti helps companies improve their ability to deliver - without changing the backend systems.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more