Join Ivanti cybersecurity experts as they share best practices for implementing an effective zero trust security strategy at the user, device and network-access levels to ensure the optimal security posture for your organization. Learn how you can implement a multi-tiered approach to mobile phishing protection to best protect against data breaches.
Defend your Everywhere Workplace through adaptive zero trust security and adapt to modern threats faster and experience better outcomes.
We call this new business environment, 'The Everywhere Workplace"
For users:
This is more than just the pandemic... more than just working from home.
It means:
meeting with clients while you're walking the dog
signing into cloud services and collaborating on a document
managing your kid's screen-time, ordering dinner, or juggling a shared calendar
Work happens *everywhere* now.
Consumer and social behaviors all happen *everywhere* now.
But, for IT, the Everywhere Workplace means:
more devices
more platforms
more apps, networks and services
It just means MORE!
[ TRANSITION ]
So, let's break this down...
Users are expecting more everyday.
And..technology is delivering.
What's driving it all is people's desire to...
Get work done from everywhere
Share their world with everyone
and...Manage their private life
But, making this all work is harder than users realize.
All of these expectations place huge burdens on IT,
which has to manage…
A higher pace of change
Greater complexity
and...An increased need for security
[ TRANSITION ]
For example…
76% of CIOs think growing information technology complexity may soon make it impossible to efficiently manage digital transformation.
And...cybercriminals are going all out to exploit the vulnerabilities caused by the shift to a remote work culture. These threat actors are ceaselessly launching phishing attacks on individuals and organizations alike to fill their own pockets.
Here are some outrageous phishing stats showing the severity of the situation:
97% of the users are unable to recognize a sophisticated phishing email.
95% of all attacks targeting enterprise networks are caused by successful spear phishing.
Our Mission - Deliver Zero Trust Access Control, Zero Sign-On, and Vulnerability Management
Let's continue on with the Ivanti story and dive a bit deeper. At Ivanti, we have a fire that never goes out. It is fueled by understanding the threats our customers face, the changes in the working environment, and also by innovation that is bringing very cool technology to the market.
Cool trends and technologies we see include Biometrics/Passwordless Authentication (sometimes referred to or used in conjunction with MFA – multi-factor authentication), 5G, AI/ML, autonomous computing and vehicles.
Ivanti Security Controls
Ivanti Security Controls simplifies security with unified and automated prevention, detection, and response techniques that target your biggest attack vectors. It provides the security global experts agree creates the highest barriers to modern cyber attacks, including discovery, OS and application patch management, privilege management, and whitelisting
Patch For Endpoint Manager
Patch for Endpoint Manager can swiftly detect vulnerabilities in Windows, Mac OS, Linux, and hundreds of third-party apps (Acrobat Flash/Reader, Java, Web browsers, and more) and deploy expertly pre-tested patches everywhere you need them.
Endpoint Security for Endpoint Manager
Give your team the tools they need to be immediately effective at saving your company’s data and reputation by detecting and preventing threats before they impact you,and respond swiftly to infections with app control and automated patch management.
Patch for MEM
Easily automate the process of discovering and deploying your patches to third-party apps from the Config Manager and Intune consoles with no additional infrastructure or training.
Connect Secure (VPN)
Pulse Secure Connect Secure enables secure remote and mobile access from any device to enterprise services and applications in the data center and cloud. It delivers fast, secure, and optimized access to a rich set of applications and services while ensuring a consistent native user experience across desktop, laptops, tablets, and smartphones. Pulse Connect Secure simplifies network administration and compliance management with a centralized web-based console, end-user self-provisioning, and integration with EMM policy management platforms. Administrators can automate appliance software updates and policy changes while viewing a dashboard of appliance status. Pulse Connect Secure is flexibly deployed as a hardware or virtual appliance
Policy Secure (NAC)
Network Access Control (NAC) solutions provide organizations with continuous visibility, endpoint and IoT access control, and automated threat mitigation. Pulse Profiler provides full visibility of local and remote endpoints, so organizations know what’s connected at any time. Pulse Policy Secure (PPS) enables strong Zero Trust based “comply to connect” policy enforcement so users and endpoints are authenticated, and their security posture are validated before they are connected to the network with appropriate access for their role.
Virtual Application Delivery Controller (vADC)
Delight your users with faster, more reliable applications, with no compromise on performance or security. More than just a software load balancer, Pulse virtual Application Delivery Controller drives more transactions, even at peak load conditions, ensuring continuous uptime and real-time security monitoring of application traffic.
Zero Trust Access (PZTA)
Pulse Zero Trust Access (PZTA) enables diverse users from any location to securely access any public, private, and hybrid cloud applications as well as data center resources consistent with Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) framework. As enterprises continue to evolve with mobile workforces and hybrid IT adoption, PZTA enhances security, productivity, increases compliance and visibility, and greatly enhances
We provide best in class endpoint management, zero-trust access, and service management in one platform
These three solution pillars combined with our hyper-automation platform – Neurons – creates the market’s only end-to-end platform
A single pane of glass to Discover, Manage, Secure, Service, and Automate Critical Workflows Across all Device Types
When I talk about Zero Trust internally or externally, I have always tried to explain this as a mindset and a journey. Some ways in which I think about it include:
Reduce the attack surface overall and with every inch of new product added.
Security should not be an afterthought, but an integral part of any solution.
Re-emphasize who and how can one get access to a service or a resource.
Last but not least, have a “Always Verify, Never Trust” mindset.
Give the pandamemic analogy – we quickly understood that even if we close our shops or stay at home, with airports working and bringing people from various places, the virus was still able to spread and evolve.
This is very similar to how we deploy IT systems today. We close the solution to most obvious threats but then we end you knowingly or unknowingly leave that gap.Now, for us to succeed to protect our resources, IT has to be right always, while the attacker has to get lucky once. This is why, we stress on “Always Verify. Never TRUST ,
Here, I am very simplistically representing few different teams who may be focused on security from different aspects.
You have Desktop and Mobile Teams focusing on device management and security of the device and data associated with it. For example: What apps are added to the device, what platforms should be managed, disk encryption, device security, etc.
Then on the left, you may have a dedicated Identity team which is focused on the authentication aspect of thousands of users and hundreds of services within the organization.
And lastly may you have a dedicated security team, or red team which is focused on maintaining a low-risk status wrt overall security across the organization.
Some of these responsibilities which have a significant overlap are SSO, MFA, Policy Enforcement, and most importantly device trust.
Security teams will have a better sleep knowing that the devices which are being used to access, share or handle any corporate data is secure. They have different challenges. How do they manage the contractors. How do they provide access to guests and how do they make sure data which was access on a temporary basis is safe and not in wrong hands.
IDP teams need to have device trust to ensure that the device which is authenticating can be trusted. IDP teams are mostly not focused on different workforces and have making authentication stronger as the main goal. But, can a IDP really decide which device can it trust? Can it understand the device posture or the risks that are associated with the device. Can it understand what type of network threats exist on a network that the device is on. Yes, they can help you with device location using IP address or GPS location, but what is between the device and the data source. Is there a network vector that can breach corporate security??
Device Management team or Mobility team is mostly you guys here. I have to say this but knowingly or unknowingly they have been picking up many responsibilities of a IDP team. Rolling out seamless mobile experience for LOB apps is their ultimate goal and we have been creating an unparalleled experience on mobile. It is really time for this circle to expand further as workforce becomes more modern and agile. Mobile teams just like others are sleeping peacefully that the devices are managed or have the right security posture. These teams can determine compliance issues whether it be device compliance or network appliance or application appliance.
So one thing is clear, we all can safely assume if I had to take out device trust from the equation, all these three teams will have a horrible Monday.
Device trust is the common ground that all these teams base their responsibilities upon.
Device trust has to be made from many vectors and can vary from situation to situation. I like to always say, this is 2019 and data is king.
When it comes to device trust all the data is with your UEM provider and I can safely say it is MobileIron for all of us.
At MobileIron we do not simply trust a device.
When deployed in the right manner, MobileIron can help you validate the device.
Validate the end user and device correlation.
Check whether the right and sanctioned LOB apps are being used.
Verify the source of devices with the expected and not stop at it. We also like to ensure that the network through which your corporate data flows is secure. Whether it be a private or a public network.
This is the power of UEM. UEM in true essence can with credibility determine these factors. But, wait…We have different approaches as well.
UEM is the bed rock of device management and the most importantly helps maintain secure device postures.
We have threat defense solutions including MTD, that can provide visibility into threats which are availanle only via specialized security products.
UEM is the bed rock of device management and the most importantly helps maintain secure device postures.
We have threat defense solutions including MTD, that can provide visibility into threats which are availanle only via specialized security products.
UEM is the bed rock of device management and the most importantly helps maintain secure device postures.
We have threat defense solutions including MTD, that can provide visibility into threats which are availanle only via specialized security products.
Our passwordless Zero Sign On technology
UEM is the bed rock of device management and the most importantly helps maintain secure device postures.
We have threat defense solutions including MTD, that can provide visibility into threats which are availanle only via specialized security products.
UEM is the bed rock of device management and the most importantly helps maintain secure device postures.
We have threat defense solutions including MTD, that can provide visibility into threats which are availanle only via specialized security products.
We provide best in class endpoint management, zero-trust access, and service management in one platform
These three solution pillars combined with our hyper-automation platform – Neurons – creates the market’s only end-to-end platform
A single pane of glass to Discover, Manage, Secure, Service, and Automate Critical Workflows Across all Device Types
Ivanti has over 45 thousand customers, and those include 78 of the Fortune 100. This goes along with the over 8k partners and millions of devices being managed worldwide.
[ TRANSITION ]
We're accomplishing all this by building and acquiring the best solutions out there. If you want to understand our acquisition strategy...