Endpoint
12/4/2017
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Ivanti Automates Device Isolation and Remediation to Further Operationalize a Defense-in-Depth Security Strategy

Integrated Console and Workflows Enable Actions and Policies to be Applied to Any Mix of Device Types, Enhancing Security Response and Remediation

SALT LAKE CITY — November 30, 2017 — Ivanti, the company that unifies IT to better manage and secure the digital workplace, today announced the release of a new version of Ivanti Endpoint Manager, powered by Landesk, and Endpoint Security for Endpoint Manager.  Simplifying endpoint management and security for IT with an integrated console and workflows, Ivanti Endpoint Manager combines device discovery and inventory capabilities with secure configuration management to operationalize an organization’s defense-in-depth strategy. Ivanti Endpoint Security for Endpoint Manager extends prevention support with capabilities including device and application control, and in this release, provides significant new features to automate device isolation and remediation during a security event.

“Endpoints continue to pose the greatest security risks in today’s enterprise,” said Duane Newman, Vice President, Product Management & Marketing, Ivanti. “With the latest release of Ivanti Endpoint Manager, we are helping to streamline Security and IT Operations team processes while working to reduce the attack surface. New security automation in our Endpoint Security for Endpoint Manager solution will even detect infected devices, isolate them from the network and remediate them for rapid incident response.” 

“The assault on endpoints is still increasing. Attackers continue exploiting new vulnerabilities and evolving new techniques to compromise endpoints and steal information,” said David Monahan, Research Director, Enterprise Management Associates. “Once an endpoint is compromised, early detection and the ability to respond quickly and effectively are crucial to minimizing impact and loss. Endpoint Security for Endpoint Manager’s enhanced automation brings response and recovery to the next level. Isolation is a key component for reducing the spread of malware, especially ransomware, while surgical remediation reduces the admin restoration workload by as much as 80% and employee downtime by as much as 75%.”

Ivanti Endpoint Security for Endpoint Manager, offered as an on-premises or hosted cloud solution, now includes capabilities to harden endpoints for true defense in depth.  These new automated features enable the rapid recovery of endpoints following a security event while dramatically limiting the spread of malware.  

·  Automated Detection – Using Ivanti detection logic, along with Ivanti’s Application Programming Interface (API) that integrates with leading endpoint security solutions, Endpoint Security for Endpoint Manager will detect new malware events quickly for immediate response.   

·  Automated Isolation – Once a breach is detected, Endpoint Security for Endpoint Manager will isolate the device from the network automatically, preventing the malware from spreading throughout the network. 

·  Automated Remediation – Further, Endpoint Security for Endpoint Manager will automate actions that are triggered by the detection of malware. These actions include installing software and running scripts as well as allowing remote access while the machine is isolated.  Administrators can also perform forensic analysis and reimage the infected machine, speeding the endpoint’s recovery to a true production state. 

As either an on-premises or hosted cloud solution, Ivanti Endpoint Manager includes the following new capabilities:

·  Internet of Things (IoT) and Ubuntu Device Support – Ivanti Endpoint Manager now supports tvOS (10 and 11) and Raspbian IoT devices and systems that use the Ubuntu operating system, expanding the list of device types under unified management for comprehensive policy control.

·  Expanded Mobile Device Management (MDM) – For mixed-device enterprises, Ivanti Endpoint Manager lets you manage devices via an agent, MDM management, or both. The MDM management capabilities enable group enrollments for faster batch provisioning to multiple device types that now include Android 8, iOS 11 and macOS devices in addition to Windows. 

·  Extended Real-Time Analysis and Dashboards – Ivanti Endpoint Manager leverages comprehensive discovery and analysis data to provide actionable real-time dashboards powered by Xtraction. These dashboards enable informed decision making related to key processes such as Windows 10 migrations, software and hardware discovery, hardware refresh analysis, mitigating security vulnerabilities, and OS and application patching and compliance.

Ivanti Endpoint Manager 2017.3 and Ivanti Endpoint Security for Endpoint Manager 2017.3 are available now. Ivanti Endpoint Manager is a proven, reliable solution that consolidates the management of all the devices users access from a single, unified endpoint management suite. Ivanti Endpoint Security for Endpoint Manager detects and prevents security threats on endpoints using media protection, remote endpoint control, security diagnostics, application control and automated patch management technology along with flexible dashboards and reporting. 

                                                                                         

Ivanti: The Power of Unified IT.

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com and follow @GoIvanti.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.