Threat Intelligence & Incident Response

Automation Platform Ivanti Ushers in the Summer of Security

In response to the unprecedented increase in sophisticated cyberattacks, particularly ransomware attacks, and the elevation of cybersecurity collaboration to a global priority, Ivanti is doubling down on its mission to secure the Everywhere Workplace

Ivanti, the automation platform that discovers, manages, secures, and services IT assets from cloud to edge, today ushered in the “Summer of Security” to reinforce its commitment to protecting customers amid the uptick in sophisticated cyber threats facing companies and government agencies across the world. With the Summer of Security, Ivanti is doubling down on its mission to secure the Everywhere Workplace.

This comes on the heels of President Biden’s Executive Order to enhance cybersecurity. The order calls for improved collaboration and information sharing between the federal government and private sector, demanding “bold changes and significant investments in order to defend the vital institutions that underpin the American way of life.” In alignment with this, Ivanti is committed to taking a collaborative approach to security and raising the bar for security as threat actors continue to grow in sophistication.​

As part of this, Ivanti recently announced the appointment of Daniel Spicer as the company’s new vice president of security. He will enhance the company’s overall cybersecurity infrastructure by working with engineering teams to build stronger security into Ivanti’s solutions, assessing future acquisitions for security strength and market differentiation, and bolstering Ivanti’s network security to protect its own systems and data.

On a longer-term basis, Ivanti plans to increase its headcount to create a larger and more sophisticated product security team, acquire companies that will strengthen its security capabilities, partner with security vendors to expand the reach of the Ivanti Neurons platform, and introduce new product features that will enable organizations to better secure their digital assets in the Everywhere Workplace. Ivanti will also continue to collaborate with industry leaders, including leaders from both the federal government and private sector, to set new standards for how the industry approaches security.

“Threat actors have upped their game, so the security industry needs to meet the moment,” said Spicer. “As organizations and government agencies face ever more sophisticated attacks against their technologies, Ivanti is dedicated to protecting its customers and mitigating threats as quickly as possible. This starts with focusing on building products securely, educating about best practices, and helping organizations to form a strong security foundation through a zero trust strategy. It also requires transparency and collaboration.”

The rapid shift to remote work has forever changed the threat landscape. In the Everywhere Workplace, employees use various devices to access corporate networks, data, and services as they work from different locations. While productivity has skyrocketed, this remote work landscape has also expanded the enterprise attack surface and created a myriad of security challenges for organizations.

At the same time, threat actors have grown in sophistication and boldness. Recently, hackers have disrupted daily lives and caused widespread chaos through ransomware attacks on major meat suppliers and pipeline systems. And according to a recent global study conducted by Ivanti, a whopping 58% of those surveyed said their organizations have suffered a ransomware attack in the past year. Of those organizations that suffered a ransomware attack, the majority (53%) said it took between one to four weeks to recover. Ivanti surveyed over 1,000 enterprise IT professionals across the U.S., U.K., France, Germany, Australia, New Zealand, and Japan.

To combat these growing threats, the Everywhere Workplace demands everywhere security. ​Zero trust security enables organizations to achieve a stronger and more impenetrable network by continually verifying each asset and transaction before permitting any access. Verification includes, but is not limited to, strong authentication of users, posture checks for devices, and micro-segmentation of networks. Zero trust also takes the whole context of the user’s environment into consideration, not just unconnected pieces of data, before granting access.

“Zero trust is the only security framework that can enable companies to effectively defend against the onslaught of attacks, and enable a trusted and secure Everywhere Workplace,” said Dr. Chase Cunningham, industry analyst, formerly of Forrester and creator of Forrester’s Zero Trust eXtended Ecosystem. “By implementing a zero trust security strategy that includes automation technologies, organizations can achieve comprehensive security across users, devices, apps, networks and data.”

For more such updates and perspectives around Digital Innovation, IoT, Data Infrastructure, AI & Cybsercurity, go to AI-Techpark.com.

Related posts

Lumen disrupts cybercriminals targeting home and office routers

PR Newswire

Cyberint and Cyware announce integration

Business Wire

Cyber Dive To Catch Human Trafficking Warning SignsOn Social Media

PR Newswire