Endpoint

12/4/2017
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Ivanti Automates Device Isolation and Remediation to Further Operationalize a Defense-in-Depth Security Strategy

Integrated Console and Workflows Enable Actions and Policies to be Applied to Any Mix of Device Types, Enhancing Security Response and Remediation

SALT LAKE CITY — November 30, 2017 — Ivanti, the company that unifies IT to better manage and secure the digital workplace, today announced the release of a new version of Ivanti Endpoint Manager, powered by Landesk, and Endpoint Security for Endpoint Manager.  Simplifying endpoint management and security for IT with an integrated console and workflows, Ivanti Endpoint Manager combines device discovery and inventory capabilities with secure configuration management to operationalize an organization’s defense-in-depth strategy. Ivanti Endpoint Security for Endpoint Manager extends prevention support with capabilities including device and application control, and in this release, provides significant new features to automate device isolation and remediation during a security event.

“Endpoints continue to pose the greatest security risks in today’s enterprise,” said Duane Newman, Vice President, Product Management & Marketing, Ivanti. “With the latest release of Ivanti Endpoint Manager, we are helping to streamline Security and IT Operations team processes while working to reduce the attack surface. New security automation in our Endpoint Security for Endpoint Manager solution will even detect infected devices, isolate them from the network and remediate them for rapid incident response.” 

“The assault on endpoints is still increasing. Attackers continue exploiting new vulnerabilities and evolving new techniques to compromise endpoints and steal information,” said David Monahan, Research Director, Enterprise Management Associates. “Once an endpoint is compromised, early detection and the ability to respond quickly and effectively are crucial to minimizing impact and loss. Endpoint Security for Endpoint Manager’s enhanced automation brings response and recovery to the next level. Isolation is a key component for reducing the spread of malware, especially ransomware, while surgical remediation reduces the admin restoration workload by as much as 80% and employee downtime by as much as 75%.”

Ivanti Endpoint Security for Endpoint Manager, offered as an on-premises or hosted cloud solution, now includes capabilities to harden endpoints for true defense in depth.  These new automated features enable the rapid recovery of endpoints following a security event while dramatically limiting the spread of malware.  

·  Automated Detection – Using Ivanti detection logic, along with Ivanti’s Application Programming Interface (API) that integrates with leading endpoint security solutions, Endpoint Security for Endpoint Manager will detect new malware events quickly for immediate response.   

·  Automated Isolation – Once a breach is detected, Endpoint Security for Endpoint Manager will isolate the device from the network automatically, preventing the malware from spreading throughout the network. 

·  Automated Remediation – Further, Endpoint Security for Endpoint Manager will automate actions that are triggered by the detection of malware. These actions include installing software and running scripts as well as allowing remote access while the machine is isolated.  Administrators can also perform forensic analysis and reimage the infected machine, speeding the endpoint’s recovery to a true production state. 

As either an on-premises or hosted cloud solution, Ivanti Endpoint Manager includes the following new capabilities:

·  Internet of Things (IoT) and Ubuntu Device Support – Ivanti Endpoint Manager now supports tvOS (10 and 11) and Raspbian IoT devices and systems that use the Ubuntu operating system, expanding the list of device types under unified management for comprehensive policy control.

·  Expanded Mobile Device Management (MDM) – For mixed-device enterprises, Ivanti Endpoint Manager lets you manage devices via an agent, MDM management, or both. The MDM management capabilities enable group enrollments for faster batch provisioning to multiple device types that now include Android 8, iOS 11 and macOS devices in addition to Windows. 

·  Extended Real-Time Analysis and Dashboards – Ivanti Endpoint Manager leverages comprehensive discovery and analysis data to provide actionable real-time dashboards powered by Xtraction. These dashboards enable informed decision making related to key processes such as Windows 10 migrations, software and hardware discovery, hardware refresh analysis, mitigating security vulnerabilities, and OS and application patching and compliance.

Ivanti Endpoint Manager 2017.3 and Ivanti Endpoint Security for Endpoint Manager 2017.3 are available now. Ivanti Endpoint Manager is a proven, reliable solution that consolidates the management of all the devices users access from a single, unified endpoint management suite. Ivanti Endpoint Security for Endpoint Manager detects and prevents security threats on endpoints using media protection, remote endpoint control, security diagnostics, application control and automated patch management technology along with flexible dashboards and reporting. 

                                                                                         

Ivanti: The Power of Unified IT.

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com and follow @GoIvanti.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.