View
Sorting
From A to Z
Products found: 18
Ivanti Application Control
Ivanti® Application Control offers IT unprecedented control over endpoints, reducing security risk while providing a great user experience in the latest Windows environments. In addition to contextual application control, the solution delivers secure Windows privilege management that lets you remove users’ full admin rights and prevents unauthorized executables such as malware, ransomware, unlicensed software, and other unknown applications from being installed or executed. Application Control 10.1 also enables your IT team to manage application access and user privileges efficiently across your desktop and server estate.
Full Support for Windows Server 2016 and extended support for Windows 10
Application Control 10.1 delivers full support for Windows Server 2016 and extended support for Windows 10, expanding its ability to stop ransomware and malware. This latest version also provides IT admins with enhanced, granular end user controls to improve end user personalization and endpoint security.
Trusted Ownership™
Application Control uses Trusted Ownership, checking for out-of-the-box endpoint security. It relies on examining the NTFS owner of an application. If an application is introduced, and hence owned, by a non-trusted owner, e.g. a standard user, the application is prevented instantly from running.
However, if an application is introduced and owned by a ‘Trusted Owner’, e.g. an administrator or a software deployment system such as Microsoft SCCM, then every user can run the application, unless otherwise stated. This alleviates IT of the ongoing burden of maintaining whitelists associated with other application control solutions, when application or operating system content requires patching.
Digital Signatures
You can assign SHA-1, SHA-256, or ADLER32 digital signatures to applications and files to ensure application integrity and to prevent modified or spoofed applications from executing.
Whitelisting and Blacklisting
IT can use whitelist and blacklist configurations in conjunction with Trusted Ownership to control known applications that pass the NTFS owner check. Applications that users should not have access to, such as administratorowned tools like cmd.exe or ftp.exe, are denied automatically. Or, whitelists can be created to guarantee that only known and trusted applications can execute on a system.
Windows Privilege Management
Providing users with full admin rights can leave endpoints vulnerable, significantly increasing security and manageability costs, decreasing productivity, creating legal and liability issues, and making compliance difficult. By removing users’ full admin rights and providing them with elevated privileges for just the apps or tasks they need, you can simplify endpoint security, reduce support calls, and lower TCO.
On-Demand Change Requests
Mobile users or users who spend time working offline may need to access unapproved applications. Preventing access to these applications slows productivity and leads to a poor user experience. On-Demand Change Requests enables end users to request emergency privilege elevation or application access when productivity is affected by the unavailability of applications.
URL Redirection
If a user leaves a web browser open on a specific web page or application and then reconnects from a new device or location, the browser can be redirected to a predefined, safe address.
Application Archiving
Automatically copies prohibited files that users have attempted to run and stores them in a secure repository for secured analysis.
License Management
Application Control is recognized by Microsoft for enforcing device-based software license control. By controlling which users or devices have permission to run named applications, limits can be placed on the number of application instances, which devices or users can run the application, when users can run a program, and for how long.
Application Control 10.1 delivers full support for Windows Server 2016 and extended support for Windows 10, expanding its ability to stop ransomware and malware. This latest version also provides IT admins with enhanced, granular end user controls to improve end user personalization and endpoint security.
Trusted Ownership™
Application Control uses Trusted Ownership, checking for out-of-the-box endpoint security. It relies on examining the NTFS owner of an application. If an application is introduced, and hence owned, by a non-trusted owner, e.g. a standard user, the application is prevented instantly from running.
However, if an application is introduced and owned by a ‘Trusted Owner’, e.g. an administrator or a software deployment system such as Microsoft SCCM, then every user can run the application, unless otherwise stated. This alleviates IT of the ongoing burden of maintaining whitelists associated with other application control solutions, when application or operating system content requires patching.
Digital Signatures
You can assign SHA-1, SHA-256, or ADLER32 digital signatures to applications and files to ensure application integrity and to prevent modified or spoofed applications from executing.
Whitelisting and Blacklisting
IT can use whitelist and blacklist configurations in conjunction with Trusted Ownership to control known applications that pass the NTFS owner check. Applications that users should not have access to, such as administratorowned tools like cmd.exe or ftp.exe, are denied automatically. Or, whitelists can be created to guarantee that only known and trusted applications can execute on a system.
Windows Privilege Management
Providing users with full admin rights can leave endpoints vulnerable, significantly increasing security and manageability costs, decreasing productivity, creating legal and liability issues, and making compliance difficult. By removing users’ full admin rights and providing them with elevated privileges for just the apps or tasks they need, you can simplify endpoint security, reduce support calls, and lower TCO.
On-Demand Change Requests
Mobile users or users who spend time working offline may need to access unapproved applications. Preventing access to these applications slows productivity and leads to a poor user experience. On-Demand Change Requests enables end users to request emergency privilege elevation or application access when productivity is affected by the unavailability of applications.
URL Redirection
If a user leaves a web browser open on a specific web page or application and then reconnects from a new device or location, the browser can be redirected to a predefined, safe address.
Application Archiving
Automatically copies prohibited files that users have attempted to run and stores them in a secure repository for secured analysis.
License Management
Application Control is recognized by Microsoft for enforcing device-based software license control. By controlling which users or devices have permission to run named applications, limits can be placed on the number of application instances, which devices or users can run the application, when users can run a program, and for how long.
Ivanti Asset Manager
Keeping tabs on hardware is challenging for asset managers: IT assets are assigned, reassigned, and moved from one location to another depending on business dynamics. Of IT hardware fixed assets, 30% are missing and can’t be found, and 53% of all data loss and systems downtime is caused by hardware failure.
Knowing what assets you have and where they reside, tracking contracts and regulatory compliance, and gaining visibility into cost of ownership are just the tip of your management iceberg.
With Ivanti® Asset Manager, you gain all the management support you need. Get a comprehensive view of your managed assets across your entire environment at any lifecycle status. This enterprise-grade hardware asset management solution keeps tabs on your contracts while tracking lease, warranty, and financial information to ensure your IT assets are optimized and secured.
Manage Your IT Assets from Purchase to Disposal for Complete Asset Optimization
Due to the complexity of discovering, tracking, and managing hardware, many organizations today still aren’t tracking their IT assets effectively. In fact, 56% of enterprises verify the location of their fixed assets only once a year, while 10% to 15% haven’t verified their assets in more than five years.3 It’s crucial that you monitor your hardware assets from procurement to disposal to know where they are and how they’re performing so you can make the most of your IT investments.
When you better understand the changes that occur throughout the lifecycle, you can make informed purchasing decisions, replace hardware at the right time, and empower management with accurate, thorough information about total cost of ownership. Ivanti Asset Manager monitors and reports what hardware needs to be purchased, updated, and maintained so that IT management can plan ahead, avoid hasty purchasing decisions, and optimize asset use operationally and fiscally.
Track Asset Availability and Performance
Manhours spent grappling with multiple systems and inaccurate spreadsheet data to search for and track assets— or produce a single report—is time you can’t afford. Asset Manager simplifies the process with an Asset Repository.
This enables consistent management—from procurement to purchase order, receipt, deployment, and disposal. It allows the assignment of asset information, including identifying data, lifecycle status, stock, location, and warranty information.
While it’s easy to assign data, the task of tracking assets and their performance becomes difficult as the organization evolves, or users change jobs. To maintain repository accuracy, Asset Manager includes powerful data-importing capabilities that allow imported data from several discovery sources, including Ivanti Endpoint Manager, Ivanti Data Center Discovery, and barcode scans. Compare actual against discovered data and report on exceptions. With these insights you can validate assumptions about assignments and update the asset information so that your data is always accurate and relevant.
Retrieve Data with Barcode Scanning
Speed up data retrieval with Ivanti’s barcode scanning capability. Download the app onto your Android scanning device. Scan assets to look up or modify information or scan multiple assets to update information in Asset Manager as part of your asset-tracking discipline.
Gain Cost and Contract Visibility
Providing accurate, timely financial and contractual information helps you optimize your asset purchases in the way the business needs. With Ivanti, it’s simple to store and view procurement data. Open and maintain purchase orders easily and access individual transactions associated with each asset. Roll up to the total cost of ownership to better manage budgets and forecast needs. Now you can assign financial ownership to report on IT spend by department to defend budget spend and achieve accountability.
Take the guesswork out of asset refresh requirements by calculating and tracking asset age and value. View and manage the complete list of contracts in your environment tied to individual assets. Ensure you’re in contract compliance.
Anticipate contract-renewal dates with configurable notification time periods; be ready to negotiate new contracts on your terms.
Deliver Enhanced User Experiences with a Product Catalog
Maintain a product catalog of authorized items. See assets purchased or assigned, current stock levels, or active orders. Use the catalog to increase speed to provision while reducing service desk calls. Eliminate frustrations that lead to shadow IT and subsequent asset management complexity. This at-aglance information ensures you can organize asset availability proactively to meet business and user requests.
Drive Vendor Management
Managing the vendors that provide your assets is an ongoing process that should include performance monitoring and feedback. Asset Manager stores vendor information to ensure you are managing strategic vendors effectively.
You can also keep tabs on vendor interactions by logging comments about their service and the assets they provide.
View these comments in aggregated Vendor Scorecards on your dashboards. Determine whether you’re getting the most out of your investments or if it’s time to terminate relationships.
Highly Configurable to Meet Your Needs
Ivanti Asset Manager provides you out-of-the-box reports and dashboards configured to meet the specific needs of your asset management team roles. Rest assured that many years of Ivanti asset management experience and the best practices of industry organizations such as IAITAM are at the heart of the Asset Manager solution. It also features full customdesign options, including full Development, Test, and Live instance configuration. Asset Manager is available in a turnkey Essentials version, prebuilt for fast time to value, or as an Enterprise-grade fully configurable solution both in the cloud and on-premises.
Integrate with Service Management for improved Service Delivery
Ivanti Asset Manager is built on the proven Ivanti Service Manager platform, leveraging a mature user interface and offering a strong foundation for growth. Asset Manager integrates with Ivanti Service Manager for easy request management. Users benefit from a rich self-service experience as they navigate easily through an approved service catalog, alleviating pressure on IT staff. In addition, Asset Manager enhances change management processes and policies by providing status updates to IT assets to help maximize productivity. The solution delivers a single asset repository that integrates with your service management CMDB, ensuring accurate, up-to-date information.
With Ivanti® Asset Manager, you gain all the management support you need. Get a comprehensive view of your managed assets across your entire environment at any lifecycle status. This enterprise-grade hardware asset management solution keeps tabs on your contracts while tracking lease, warranty, and financial information to ensure your IT assets are optimized and secured.
Manage Your IT Assets from Purchase to Disposal for Complete Asset Optimization
Due to the complexity of discovering, tracking, and managing hardware, many organizations today still aren’t tracking their IT assets effectively. In fact, 56% of enterprises verify the location of their fixed assets only once a year, while 10% to 15% haven’t verified their assets in more than five years.3 It’s crucial that you monitor your hardware assets from procurement to disposal to know where they are and how they’re performing so you can make the most of your IT investments.
When you better understand the changes that occur throughout the lifecycle, you can make informed purchasing decisions, replace hardware at the right time, and empower management with accurate, thorough information about total cost of ownership. Ivanti Asset Manager monitors and reports what hardware needs to be purchased, updated, and maintained so that IT management can plan ahead, avoid hasty purchasing decisions, and optimize asset use operationally and fiscally.
Track Asset Availability and Performance
Manhours spent grappling with multiple systems and inaccurate spreadsheet data to search for and track assets— or produce a single report—is time you can’t afford. Asset Manager simplifies the process with an Asset Repository.
This enables consistent management—from procurement to purchase order, receipt, deployment, and disposal. It allows the assignment of asset information, including identifying data, lifecycle status, stock, location, and warranty information.
While it’s easy to assign data, the task of tracking assets and their performance becomes difficult as the organization evolves, or users change jobs. To maintain repository accuracy, Asset Manager includes powerful data-importing capabilities that allow imported data from several discovery sources, including Ivanti Endpoint Manager, Ivanti Data Center Discovery, and barcode scans. Compare actual against discovered data and report on exceptions. With these insights you can validate assumptions about assignments and update the asset information so that your data is always accurate and relevant.
Retrieve Data with Barcode Scanning
Speed up data retrieval with Ivanti’s barcode scanning capability. Download the app onto your Android scanning device. Scan assets to look up or modify information or scan multiple assets to update information in Asset Manager as part of your asset-tracking discipline.
Gain Cost and Contract Visibility
Providing accurate, timely financial and contractual information helps you optimize your asset purchases in the way the business needs. With Ivanti, it’s simple to store and view procurement data. Open and maintain purchase orders easily and access individual transactions associated with each asset. Roll up to the total cost of ownership to better manage budgets and forecast needs. Now you can assign financial ownership to report on IT spend by department to defend budget spend and achieve accountability.
Take the guesswork out of asset refresh requirements by calculating and tracking asset age and value. View and manage the complete list of contracts in your environment tied to individual assets. Ensure you’re in contract compliance.
Anticipate contract-renewal dates with configurable notification time periods; be ready to negotiate new contracts on your terms.
Deliver Enhanced User Experiences with a Product Catalog
Maintain a product catalog of authorized items. See assets purchased or assigned, current stock levels, or active orders. Use the catalog to increase speed to provision while reducing service desk calls. Eliminate frustrations that lead to shadow IT and subsequent asset management complexity. This at-aglance information ensures you can organize asset availability proactively to meet business and user requests.
Drive Vendor Management
Managing the vendors that provide your assets is an ongoing process that should include performance monitoring and feedback. Asset Manager stores vendor information to ensure you are managing strategic vendors effectively.
You can also keep tabs on vendor interactions by logging comments about their service and the assets they provide.
View these comments in aggregated Vendor Scorecards on your dashboards. Determine whether you’re getting the most out of your investments or if it’s time to terminate relationships.
Highly Configurable to Meet Your Needs
Ivanti Asset Manager provides you out-of-the-box reports and dashboards configured to meet the specific needs of your asset management team roles. Rest assured that many years of Ivanti asset management experience and the best practices of industry organizations such as IAITAM are at the heart of the Asset Manager solution. It also features full customdesign options, including full Development, Test, and Live instance configuration. Asset Manager is available in a turnkey Essentials version, prebuilt for fast time to value, or as an Enterprise-grade fully configurable solution both in the cloud and on-premises.
Integrate with Service Management for improved Service Delivery
Ivanti Asset Manager is built on the proven Ivanti Service Manager platform, leveraging a mature user interface and offering a strong foundation for growth. Asset Manager integrates with Ivanti Service Manager for easy request management. Users benefit from a rich self-service experience as they navigate easily through an approved service catalog, alleviating pressure on IT staff. In addition, Asset Manager enhances change management processes and policies by providing status updates to IT assets to help maximize productivity. The solution delivers a single asset repository that integrates with your service management CMDB, ensuring accurate, up-to-date information.
Ivanti Device Control
Data leakage caused by the accidental or sometimes malicious use of removable devices and/or removable media has reached alarming levels. Ivanti® Device Control enforces security policies on removable device usage and data encryption. The solution centralizes management of devices and data using a whitelist / “default deny” approach, plus it provides an additional layer of protection against malware introduced via physical means.
Protect Data from Loss or Theft
With more employees working remotely, access is required from outside the network. But the potential impact of data loss, be it accidental or malicious, is a very real concern. Today, removable media / devices are the most common data leakage routes—no file copy limits, no encryption, no audit trails, and no central management. Ivanti Device Control enables the secure use of such productivityenhancing tools while limiting the potential for data leakage and its impact.
Key Features Whitelist / “Default Deny” Assigns permissions for authorized removable devices and media to individual users or user groups. By default, those devices / media and users not explicitly authorized are denied access. Policy-Enforced Encryption for Removable Storage Centrally encrypts removable devices (such as USB flash drives) and media (such as DVDs/CDs), plus enforces encryption policies when copying to devices / media. Data Copy Restriction Restricts the daily amount of data copied to removable devices and media on a per-user basis; also limits usage to specific time frames / days. File Type Filtering Controls file types that may be moved to and from removable devices / media on a per-user basis; helps limit malware propagation. Centralized Management / Administrators’ Roles Centrally defines and manages user, user groups, computer and computer groups access to authorized removable devices / media on the network. By default, those devices / media and users not explicitly authorized are denied access. Temporary / Scheduled Access Grants users temporary / scheduled access to removable devices / media; employed to grant access “in the future” for a limited period. Context-Sensitive Permissions Access / usage policies remain enforced regardless of connection status, and can be tailored whether the endpoint is connected to the network or not. Role-based Access Control Assigns permissions to individual users or user groups based on their Windows Active Directory or Novell eDirectory identity, both of which are fully supported. Tamper-proof Agent Installs agents on every endpoint on the network. Agents are protected against unauthorized removal—even by users with administrative permissions. Only Device Control Administrators may deactivate this protection. Flexible / Scalable Architecture Provides organization-wide control and enforcement using scalable client-server architecture with a central database that is optimized for performance. Supports virtualized server configurations. How Ivanti Device Control Works
Key Features Whitelist / “Default Deny” Assigns permissions for authorized removable devices and media to individual users or user groups. By default, those devices / media and users not explicitly authorized are denied access. Policy-Enforced Encryption for Removable Storage Centrally encrypts removable devices (such as USB flash drives) and media (such as DVDs/CDs), plus enforces encryption policies when copying to devices / media. Data Copy Restriction Restricts the daily amount of data copied to removable devices and media on a per-user basis; also limits usage to specific time frames / days. File Type Filtering Controls file types that may be moved to and from removable devices / media on a per-user basis; helps limit malware propagation. Centralized Management / Administrators’ Roles Centrally defines and manages user, user groups, computer and computer groups access to authorized removable devices / media on the network. By default, those devices / media and users not explicitly authorized are denied access. Temporary / Scheduled Access Grants users temporary / scheduled access to removable devices / media; employed to grant access “in the future” for a limited period. Context-Sensitive Permissions Access / usage policies remain enforced regardless of connection status, and can be tailored whether the endpoint is connected to the network or not. Role-based Access Control Assigns permissions to individual users or user groups based on their Windows Active Directory or Novell eDirectory identity, both of which are fully supported. Tamper-proof Agent Installs agents on every endpoint on the network. Agents are protected against unauthorized removal—even by users with administrative permissions. Only Device Control Administrators may deactivate this protection. Flexible / Scalable Architecture Provides organization-wide control and enforcement using scalable client-server architecture with a central database that is optimized for performance. Supports virtualized server configurations. How Ivanti Device Control Works
- Discover all removable devices that are currently connected or have ever been connected to your endpoints.
- Assess all “plug and play” devices by class, group, model, and/or specific ID and define policy through a whitelist approach.
- Implement file copy limitations, file type filtering, and forced encryption policies for data moved onto removable devices.
- Monitor all policy changes, administrator activities, and file transfers to ensure continuous policy enforcement.
- Report on device and data usage to document compliance with corporate and/or regulatory policies.
- Protects data from loss / theft
- Enables secure use of productivity tools
- Enhances security policy enforcement
- Delivers precise control with access limits
- Prevents malware infiltration via physical means / mapping of centralized and decentralized management structures
- Allows for monitoring of all file transfers to printers and physical media
ivanti ENDPOINT SECURITY
Get a comprehensive solution to reduce complexity, cost, and chaos
Relying on multiple, point-based endpoint security technologies? Then you already know how this impacts IT time and budget, while opening the door to security gaps between solutions.
Ivanti Endpoint Security, powered by Heat, reduces the known exploitable surface area on your endpoints, detects exploits targeting your environment, and responds to threats before they can wreak havoc on your organization. And all of this takes place in one platform.
ELEVATE YOUR SECURITY POSTURE
Improve your security stance fast, when you can manage your endpoints using a single vendor solution for prevention, detection, and remediation.
Prevention, detection, and remediation are all critical to protecting your organization, so why manage them in separate, severed tools? Free up IT, reduce human error, and harden your security stance when you can do it all in a single solution.
PREVENTION
Minimize your attack surface. Lock down unauthorized use of devices and stop the execution of unknown apps.
DETECTION
You can’t always plan for zero-day attacks, but you can get ahead of them faster with discover and protection capabilities in one console.
RESPONSE AND REMEDIATION
You’ve been breached. Now what? Respond faster when you can remediate configurations on the fly.
PROACTIVE APPROACH
Reduce your attack surface, detect threats, and respond to malware with a single solution. No need to get a new point product every time a new attack makes the news.
FULL DISK ENCRYPTION
Upgrade your encryption policy to protect data at rest and in motion (when being transferred onto removable devices / media).
ANTIVIRUS
Stay healthy with multiple detection techniques to identify and block unknown malware.
PATCH MANAGEMENT
Upgrade the way you patch with an automated solution using the largest patch catalog available.
DEVICE AND PORT CONTROL
Lock down endpoints to prevent illicit use of removable devices and ports.
APPLICATION WHITELISTING
Enforce a comprehensive list of approved apps to protect against malware and untrusted changes.
WAKE-ON-LAN
Ensure that your offline machines awaken to receive critical patches and software updates.
CONTENT WIZARD
Free up time and resources with easier deployment for removing software, remediating configurations, performing systems management tasks, and more.
REAL-TIME REPORTING
Make smarter decisions with critical insights from a single dashboard. Break down unwieldly data silos and gain a holistic view of your organization.
Ivanti Environment Manager
Ivanti® Environment Manager, powered by AppSense, navigates complex and mixed Windows desktop infrastructures to deliver a consistent and portable user environment, and ensu`res a smooth voyage to Windows 10 or cloud-hosted desktops.
Achieve breakneck logon speeds and a personalized user experience, delivered by IT with calm and tranquility. Outstanding User Experience Ensure a Consistent User Workspace Reward users with a familiar workspace regardless of how their desktop is composed and delivered yet ensure conditional settings can be applied—dependent on the user’s context—to meet security and compliance mandates. Seamless Migration to Windows 10
Remove the IT complexity and user upheaval typically associated with Windows 10 migration and enable fluid movement of user settings between physical, virtual, and cloud desktops. Release the Full Power of Office 365 Deliver the ultimate Office 365 experience by roaming offline caches in non-persistent VDI and RD Session Host environments. Boost Productivity Accelerate logon times and increase productivity while liberating IT from the shackles of slow and complex desktop configuration tools, such as logon scripts or Group Policy. User Personalization
Provide users with a tailored desktop dependent on how they log on, where they log on from, and on which device.
Context-aware conditions enable IT teams to configure custom desktop environments easily to accommodate security, compliance, and ease of use.
A set of rules can be combined easily to deliver Boolean logic without any complexity, enabling IT to satisfy any custom requirements.
Desktop configuration actions can be set to run simultaneously, to speed up processing, or consecutively, to provide different levels of dependency. This provides a simple-to-use alternative to logon scripts and GPOs, removing complexity for IT teams and improving the user experience. Where you have existing GPO settings, these can be easily imported and applied to desktops, significantly reducing your administration overhead and setup time.
Key Feature: Effortless User Migration
Simplify migration projects with Environment Manager’s unique User Personalization capabilities.
Automatically capture and roam users’ personal settings easily across distinct operating systems and between physical, virtual, and cloud-based desktops.
Built-in templates provide out-of-the-box configuration settings for a host of common applications. Self-service tools let users roll back their personal settings on a per-application or operating systemcomponent basis in the event of profile corruption or inconsistencies, to help reduce IT support calls.
Personalization Analysis Tools ease management of user settings and a web-based Personalization Operations Console empowers IT to perform multi-user operations such as deleting, creating, or editing profile setting backups.
Major Benefits
Achieve breakneck logon speeds and a personalized user experience, delivered by IT with calm and tranquility. Outstanding User Experience Ensure a Consistent User Workspace Reward users with a familiar workspace regardless of how their desktop is composed and delivered yet ensure conditional settings can be applied—dependent on the user’s context—to meet security and compliance mandates. Seamless Migration to Windows 10
Remove the IT complexity and user upheaval typically associated with Windows 10 migration and enable fluid movement of user settings between physical, virtual, and cloud desktops. Release the Full Power of Office 365 Deliver the ultimate Office 365 experience by roaming offline caches in non-persistent VDI and RD Session Host environments. Boost Productivity Accelerate logon times and increase productivity while liberating IT from the shackles of slow and complex desktop configuration tools, such as logon scripts or Group Policy. User Personalization
- Automate the management of application and OS content, in real time, to remove the complexity associated with managing user profile settings.
- Stream personal settings, on-demand, to ensure rapid logon times.
- Easily rollback personal settings in the event of profile inconsistencies or corruption.
- Self-service tools empower users to be self-sufficient and help reduce the burden on the IT support desk.
- Apply desktop configuration actions simultaneously to speed up logon times.
- Ease the strain on the logon process by setting desktop-configuration actions to apply on-demand, only when needed.
- Complement built-in desktop configuration actions and conditions by creating custom items to cater to more complex, bespoke environments.
- Simplify desktop configuration for IT Teams by removing the complexity of managing and maintaining logon scripts or GPO inheritance rules.
Provide users with a tailored desktop dependent on how they log on, where they log on from, and on which device.
Context-aware conditions enable IT teams to configure custom desktop environments easily to accommodate security, compliance, and ease of use.
A set of rules can be combined easily to deliver Boolean logic without any complexity, enabling IT to satisfy any custom requirements.
Desktop configuration actions can be set to run simultaneously, to speed up processing, or consecutively, to provide different levels of dependency. This provides a simple-to-use alternative to logon scripts and GPOs, removing complexity for IT teams and improving the user experience. Where you have existing GPO settings, these can be easily imported and applied to desktops, significantly reducing your administration overhead and setup time.
Key Feature: Effortless User Migration
Simplify migration projects with Environment Manager’s unique User Personalization capabilities.
Automatically capture and roam users’ personal settings easily across distinct operating systems and between physical, virtual, and cloud-based desktops.
Built-in templates provide out-of-the-box configuration settings for a host of common applications. Self-service tools let users roll back their personal settings on a per-application or operating systemcomponent basis in the event of profile corruption or inconsistencies, to help reduce IT support calls.
Personalization Analysis Tools ease management of user settings and a web-based Personalization Operations Console empowers IT to perform multi-user operations such as deleting, creating, or editing profile setting backups.
Major Benefits
- Deliver a superior user experience
- Reduce the IT complexity of desktop configuration
- Ease Windows 10 migrations
- Enable faster adoption of cloud services
- Provide an optimized Office 365 experience in nonpersistent desktop environments
- Proven enterprise scalability
- Built-in DR and failover for business continuity
Ivanti File Director
Ivanti® File Director enables effortless migration and sync of user files from the local desktop to onpremises or cloud storage, simplifying desktop migration, eliminating data sprawl, and ensuring centralized back-up of corporate data.
Effortless File Migration
Ivanti File Director helps you reap the benefits of Office 365’s free 1TB per user of OneDrive for Business storage. This simplifies the move to the cloud and helps user adoption of Office 365.
Reduce Data Center Storage Costs
With File Director, you can ensure that important business-file data is synced from all devices into one centrally managed location. This can save huge amounts of money caused by downtime, lost data, and compliance issues.
Eliminate Virtual Private Networks (VPNs) File Director eliminates the need to implement VPNs for access to file storage, removing user connection headaches and IT support issues.
Key Feature: Total Sync Control
File Director’s granular control syncs user files to onpremises or cloud storage (OneDrive and Google Drive for Business), and also to every device the user employs. Sync occurs in the background, on demand, or in real time. IT can control which files sync by type, age, size, and path to ensure only relevant content is uploaded to corporate storage.
Elective sync methods allow users access to files as needed, without incurring costly storage or bandwidth penalties associated with limited local disk resources or slow network links.
File Director’s efficient delta sync ensures large files, including in-use Outlook PST files, can be synced from endpoints, sending only relevant changes. This reduces network traffic and sync time significantly and provides complete endpoint coverage of users’ data requirements.
Key Feature: In-Location Sync
The In-Location Sync feature ensures user files are synced to on-premises or cloud storage from their current folders and locations. Files within a user’s existing profile are synced automatically from their current location, for example, from the Desktop, Documents, Pictures, or Downloads folders, without redirection or file copies. The feature also ensures that applications work as before, and that Windows Search can still index them.
Users continue to save their files locally on their endpoint, in the usual folders, without having to move or copy them to a specific folder for them to be synced. This eliminates the need for user re-training, as all file-sync and migration actions are imperceptible to the user, and ensures a native user experience.
Key Feature: Mapped Drive Emulation
Usually in Windows when a file share is mapped to a drive letter, the files become inaccessible when the user goes offline. This can lead to user dissatisfaction, productivity loss, and additional complexity associated with VPN connections and support.
File Director’s Mapped Drive Emulation lets users view and access files on mapped drives even when offline. All content is searchable and files that have been accessed before going offline remain accessible for viewing and editing.
Any files that are edited offline are then synced automatically to on-premises or cloud storage as soon as a network connection becomes available.
Key Feature: Ghost and Placeholder Files
The sync mechanism included with File Director enables users to list files held centrally in your on-premises or cloud storage without first having to download the files locally. This introduces huge savings on network usage, particularly for devices being used over limited bandwidth connections, and allows users to search files while offline.
Key Feature: Cache Management
Cache Management provides administrators with a method to deliver up to 1TB of cloud or on-premises storage to users, regardless of the disk space available locally. File Director can both deliver and clean up files when the user has finished working with them.
On RD Session Host and VDI—particularly where disk space is limited—File Director removes the headache of server or cloud storage exceeding the disk space available on the server, ensuring a seamless experience for the user regardless of desktop platform or storage type.
Key Feature: Hardened Data Center Virtual Appliance
File Director is delivered in a hardened virtual appliance that can be utilized on-premises or within a hybrid or full cloud environment.
- Make Windows 10 Migration Effortless: Ivanti File Director makes migrations fast, secure, and easy for users, with immediate file availability on their new Windows 10 desktop using the same folder structure.
- Cater for Replacement Devices: Eliminate downtime associated with lost, stolen, or replacement desktop devices, and reduce break/fix or managed service costs with easy recovery of user files.
- Roam User Files between User Sessions: Ensure user files are instantly accessible between sessions on different desktop devices, whether physical, virtual, or cloud-hosted desktops.
- Make Corporate Data Available On-the-Move: Deliver secure file access to mobile workforces through native Windows, macOS, iOS, Android, and Web clients. Save a file on your Windows desktop and access it instantly on your smart phone or vice versa!
Ivanti File Director helps you reap the benefits of Office 365’s free 1TB per user of OneDrive for Business storage. This simplifies the move to the cloud and helps user adoption of Office 365.
Reduce Data Center Storage Costs
- By syncing files to OneDrive for Business, you can reduce the cost of on-premises storage for user files and potentially eliminate it completely. This can save your organization thousands of dollars in infrastructure and maintenance costs.
- With File Director acting as a broker, IT has complete visibility of how OneDrive storage is being used. And by providing a native user experience without the need for special folders or awkward redirection, no longer must users turn to alternative shadow IT solutions, which are inherently insecure and can lead to compliance issues.
With File Director, you can ensure that important business-file data is synced from all devices into one centrally managed location. This can save huge amounts of money caused by downtime, lost data, and compliance issues.
Eliminate Virtual Private Networks (VPNs) File Director eliminates the need to implement VPNs for access to file storage, removing user connection headaches and IT support issues.
Key Feature: Total Sync Control
File Director’s granular control syncs user files to onpremises or cloud storage (OneDrive and Google Drive for Business), and also to every device the user employs. Sync occurs in the background, on demand, or in real time. IT can control which files sync by type, age, size, and path to ensure only relevant content is uploaded to corporate storage.
Elective sync methods allow users access to files as needed, without incurring costly storage or bandwidth penalties associated with limited local disk resources or slow network links.
File Director’s efficient delta sync ensures large files, including in-use Outlook PST files, can be synced from endpoints, sending only relevant changes. This reduces network traffic and sync time significantly and provides complete endpoint coverage of users’ data requirements.
Key Feature: In-Location Sync
The In-Location Sync feature ensures user files are synced to on-premises or cloud storage from their current folders and locations. Files within a user’s existing profile are synced automatically from their current location, for example, from the Desktop, Documents, Pictures, or Downloads folders, without redirection or file copies. The feature also ensures that applications work as before, and that Windows Search can still index them.
Users continue to save their files locally on their endpoint, in the usual folders, without having to move or copy them to a specific folder for them to be synced. This eliminates the need for user re-training, as all file-sync and migration actions are imperceptible to the user, and ensures a native user experience.
Key Feature: Mapped Drive Emulation
Usually in Windows when a file share is mapped to a drive letter, the files become inaccessible when the user goes offline. This can lead to user dissatisfaction, productivity loss, and additional complexity associated with VPN connections and support.
File Director’s Mapped Drive Emulation lets users view and access files on mapped drives even when offline. All content is searchable and files that have been accessed before going offline remain accessible for viewing and editing.
Any files that are edited offline are then synced automatically to on-premises or cloud storage as soon as a network connection becomes available.
Key Feature: Ghost and Placeholder Files
The sync mechanism included with File Director enables users to list files held centrally in your on-premises or cloud storage without first having to download the files locally. This introduces huge savings on network usage, particularly for devices being used over limited bandwidth connections, and allows users to search files while offline.
Key Feature: Cache Management
Cache Management provides administrators with a method to deliver up to 1TB of cloud or on-premises storage to users, regardless of the disk space available locally. File Director can both deliver and clean up files when the user has finished working with them.
On RD Session Host and VDI—particularly where disk space is limited—File Director removes the headache of server or cloud storage exceeding the disk space available on the server, ensuring a seamless experience for the user regardless of desktop platform or storage type.
Key Feature: Hardened Data Center Virtual Appliance
File Director is delivered in a hardened virtual appliance that can be utilized on-premises or within a hybrid or full cloud environment.
Ivanti Identity Director
Automating Onboarding and Offboarding
Today’s workforce is composed of people who may be fullor part-time, temporary, contractors, consultants, interns, pensioners, or retirees. With global employees working in multiple offices or remotely, safeguarding their identity—including characteristics and data attributes—is increasingly challenging and crucial to maintaining business security.
Automated onboarding provides access and provisions employees with services, applications, and devices. When employees’ roles or responsibilities change, access is adjusted automatically as needed. When people leave an organization, automated offboarding ensures quick and efficient cancellation of account access and privileges, while ensuring policy consistency and reducing the risk of security breaches.
Ivanti® Identity Director, an attribute-based identity management solution, empowers IT staff to manage identities and access to company resources easily and expertly. It gives employees the right levels of access based on identity and enables them to stay productive while the business remains secure.
One Solution, Many Uses
An employee’s identity is central to many other aspects of enterprise IT. Common ways enterprises leverage Ivanti
Identity Director include:
Identity Director include:
- Identity Management: IT can provision the right access to services and apps—based on identity attributes—and then modify access based on attribute privileges throughout the entire identity lifecycle.
- Auditable Compliance: Supports the need to demonstrate compliance with regulatory data-protection standards such as GDPR, HIPAA, and PCI.
- Infrastructure Automation: IT can consolidate, control, and enforce access privileges, no matter where apps are hosted. With the visibility to centrally troubleshoot, you are future-proofed with automation to simplify infrastructure or process changes.
- Security Risk Mitigation: Automate and streamline provisioning and deprovisioning processes to eliminate human error, enforce security policies, and reduce “shadow IT.”
- User Self-Service: Offer self-service and a mobile app for workers to request access and other common IT services.
- Access Control – Manage access based on identity attributes and context-aware policies to maintain worker productivity and business security.
- Automated Delivery and Return – Automate the delivery of predictable services to the business when needed, based on policy and workflows.
- Flexible Administration – Simplify the management of your complex hybrid environment with connectors to help with service delivery and return in both on-premises and cloud systems.
- Governance – Reduce risk and ensure compliance through insight into delivery and return processes through transaction analytics and audit trail. Easy access to audit trails and reports simplifies audit reporting and reduces the manual-attestation tasks associated with meeting governance requirements.
- Self Service – Deliver services to the business when requested via a self-service portal or mobile app.
- Single-Sign-On – Provide end users one-click access directly to vendors, without presenting credentials each time.
- Identity Warehouse – Identity Director’s central identity warehouse aggregates digital resources from existing systems, enabling IT to deliver predictable services to the business automatically when needed.
Ivanti License Optimizer for Clients
Ivanti® License Optimizer for Clients is a software asset management (SAM) solution that delivers clarity on what software you have – and how it’s being used – to model and improve your effective license position. Discover and inventory owned IT assets, aggregate vendor data with B2B connectors, and monitor software usage for intelligent business decision-making. Plus, you gain a broad view of how users interact with assigned software applications to ensure compliance while reducing license overspending.
Discover Your IT Environment
The first step in managing your IT assets is knowing what assets you have. The discovery and tracking processes in Ivanti License Optimizer for Clients identify and aggregate data on IT assets in your environment automatically, including printers and SNMP devices.
Determine assets in use and understand where you can optimize your investments. Accurate information about your owned assets delivered at the right time drives confidence in data and fosters informed decision-making. Close the Vendor Visibility Gap with B2B Connectors Eliminate spreadsheets and gain vendor visibility from the moment you acquire a new asset. Business-to-business (B2B) connectors aggregate manufacturer, vendor, and reseller data such as purchase order numbers, device types, and location mapping. Collect this information automatically from a continually growing number of connectors like Apple, Dell, HP, IBM, Lenovo, Lexmark, Verizon, CDW, En Pointe, and more. Standardize Asset Naming with Data Normalization Ivanti License Optimizer for Clients employs a normalization and rules engine that applies standard naming conventions automatically to collected asset data and reporting fields. This eliminates reporting and management headaches associated with varied and complex vendor naming schemes. Reclaim Your Unused Software Licenses Gain visibility through software monitoring and comprehend clearly what’s in use, when it was last used, and how long it was deployed to determine appropriate reclamation processes and policies. You maximize software licenses and enable users to make license requests for authorized software. No over-spending required. Gain Control Over Software Compliance Software audits are increasingly more common. Software not purchased, maintained, or licensed correctly places organizations at risk of non-compliance. The incurred penalties and unexpected true-up costs can drain financial resources. Ivanti License Optimizer for Clients delivers detailed insight into your current software license usage so you can negotiate more favorable licensing deals, eliminate over-buying of licenses, minimize rogue purchases, and avoid fines associated with failed audits. Optimize Your Software Assets Making the most of your software assets is challenging, especially when dealing with licensing structures that are constantly changed and updated. Now you can maximize your software spend and avoid the financial risk of noncompliance by matching your usage data against license entitlements with support for the most advanced licensing regimes.
Determine assets in use and understand where you can optimize your investments. Accurate information about your owned assets delivered at the right time drives confidence in data and fosters informed decision-making. Close the Vendor Visibility Gap with B2B Connectors Eliminate spreadsheets and gain vendor visibility from the moment you acquire a new asset. Business-to-business (B2B) connectors aggregate manufacturer, vendor, and reseller data such as purchase order numbers, device types, and location mapping. Collect this information automatically from a continually growing number of connectors like Apple, Dell, HP, IBM, Lenovo, Lexmark, Verizon, CDW, En Pointe, and more. Standardize Asset Naming with Data Normalization Ivanti License Optimizer for Clients employs a normalization and rules engine that applies standard naming conventions automatically to collected asset data and reporting fields. This eliminates reporting and management headaches associated with varied and complex vendor naming schemes. Reclaim Your Unused Software Licenses Gain visibility through software monitoring and comprehend clearly what’s in use, when it was last used, and how long it was deployed to determine appropriate reclamation processes and policies. You maximize software licenses and enable users to make license requests for authorized software. No over-spending required. Gain Control Over Software Compliance Software audits are increasingly more common. Software not purchased, maintained, or licensed correctly places organizations at risk of non-compliance. The incurred penalties and unexpected true-up costs can drain financial resources. Ivanti License Optimizer for Clients delivers detailed insight into your current software license usage so you can negotiate more favorable licensing deals, eliminate over-buying of licenses, minimize rogue purchases, and avoid fines associated with failed audits. Optimize Your Software Assets Making the most of your software assets is challenging, especially when dealing with licensing structures that are constantly changed and updated. Now you can maximize your software spend and avoid the financial risk of noncompliance by matching your usage data against license entitlements with support for the most advanced licensing regimes.
Ivanti Optimizer для SAP
Complex SAP licensing necessitates organizations to find a better way to optimize their SAP investments and manage their SAP licenses effectively. Ivanti Optimizer for SAP provides efficient control over SAP license management by combining user inspection, user behavior-analysis methods and best practices.
Ivanti Optimizer for SAP provides full visibility to optimize and manage your entire SAP license environment which can lead to significant financial savings and reduce liabilities from indirect access or misclassified users. The solution provides organizations with the insight and intelligence needed to ensure they are correctly licensed based on actual usage and arm them with the proper analysis during contract negotiations.
Reclassify Licenses Based on Actual Usage
While many organizations choose to classify SAP licenses based on theoretical calculation methods, Ivanti Optimizer for SAP allocates SAP licenses based on actual usage and not based on the structure of the organization, titles of employees or authorizations that are assigned in the SAP systems. Organizations can rest assured they will never be under- or over-licensed.
Reclaim Unused Licenses
Ivanti Optimizer for SAP includes a built-in analysis to optimize your SAP licensing and reduce the amount of licenses. The solution pinpoints inactive users enabling organizations to reallocate these licenses to other users. It can also eliminate duplicate and redundant users by automatically matching users across different systems and applications to avoid duplicate license counts.
Indirect Access Usage
Ivanti Optimizer for SAP helps organizations to identify indirect access which allows them to either reduce the amount of access or simply restrict the use. The solution allows companies to model their current exposure and financial risks from indirect access, and receive immediate alerts regarding any new suspicious SAP data consumption so they can review the activity and stop unnecessary SAP access on the spot.
On-going License Management Control
Maintain on-going control of SAP licenses and allocations up to the minute by automatically assigning the proper license type based on the actual usage. Ivanti Optimizer for SAP provides the ultimate control over SAP licensing by combining user inspections, user behavior-analysis methods and best practices.This gives organizations the visibility and insights to know exactly how many SAP licenses they currently have, maintain contractual compliance, and defend audits at any time.
Achieve Optimized Models for SAP Engines
Ivanti Optimizer for SAP enables organizations to assess their SAP engines, providing a clear understanding of which engines are actually being used and provides insight to the best possible payment models. This provides an accurate reading and reflects real usage of engines.
Reduce Costs
By providing a clear view of the current licensing and available licenses, organizations no longer need to pay for duplicates or unused licenses. Ivanti Optimizer for SAP reduces the cost of SAP licensing and maintenance costs, as well as, the manual efforts to prepare and execute license audits. Organizations can save between 50%-90% for each re-classified license, 100% on dormant and multiple username accounts, 50% on license management resources, and OVER 15% on total maintenance fees.1
Robust Reporting
In a multi-system, multi-environment organization, the question of “What is our current SAP licensing position?” can be very tricky to answer. To generate a rough SAP licensing report would entail mapping all existing SAP systems, receiving a SAP licensing report from each one, and mapping multiple user accounts to employees. With Ivanti Optimizer for SAP, this can be done in a matter of minutes; you can receive usage data and licensing data from each SAP application automatically and map SAP accounts from different SAP systems to employee records, understand the current situation and identify immediate saving potentials using combined views and best practices.
Rapid Deployment
Ivanti Optimizer for SAP can be implemented within days depending on the customer’s environment. It is a stand alone solution outside of the SAP environment, and requires no changes to the SAP systems.
Reclassify Licenses Based on Actual Usage
While many organizations choose to classify SAP licenses based on theoretical calculation methods, Ivanti Optimizer for SAP allocates SAP licenses based on actual usage and not based on the structure of the organization, titles of employees or authorizations that are assigned in the SAP systems. Organizations can rest assured they will never be under- or over-licensed.
Reclaim Unused Licenses
Ivanti Optimizer for SAP includes a built-in analysis to optimize your SAP licensing and reduce the amount of licenses. The solution pinpoints inactive users enabling organizations to reallocate these licenses to other users. It can also eliminate duplicate and redundant users by automatically matching users across different systems and applications to avoid duplicate license counts.
Indirect Access Usage
Ivanti Optimizer for SAP helps organizations to identify indirect access which allows them to either reduce the amount of access or simply restrict the use. The solution allows companies to model their current exposure and financial risks from indirect access, and receive immediate alerts regarding any new suspicious SAP data consumption so they can review the activity and stop unnecessary SAP access on the spot.
On-going License Management Control
Maintain on-going control of SAP licenses and allocations up to the minute by automatically assigning the proper license type based on the actual usage. Ivanti Optimizer for SAP provides the ultimate control over SAP licensing by combining user inspections, user behavior-analysis methods and best practices.This gives organizations the visibility and insights to know exactly how many SAP licenses they currently have, maintain contractual compliance, and defend audits at any time.
Achieve Optimized Models for SAP Engines
Ivanti Optimizer for SAP enables organizations to assess their SAP engines, providing a clear understanding of which engines are actually being used and provides insight to the best possible payment models. This provides an accurate reading and reflects real usage of engines.
Reduce Costs
By providing a clear view of the current licensing and available licenses, organizations no longer need to pay for duplicates or unused licenses. Ivanti Optimizer for SAP reduces the cost of SAP licensing and maintenance costs, as well as, the manual efforts to prepare and execute license audits. Organizations can save between 50%-90% for each re-classified license, 100% on dormant and multiple username accounts, 50% on license management resources, and OVER 15% on total maintenance fees.1
Robust Reporting
In a multi-system, multi-environment organization, the question of “What is our current SAP licensing position?” can be very tricky to answer. To generate a rough SAP licensing report would entail mapping all existing SAP systems, receiving a SAP licensing report from each one, and mapping multiple user accounts to employees. With Ivanti Optimizer for SAP, this can be done in a matter of minutes; you can receive usage data and licensing data from each SAP application automatically and map SAP accounts from different SAP systems to employee records, understand the current situation and identify immediate saving potentials using combined views and best practices.
Rapid Deployment
Ivanti Optimizer for SAP can be implemented within days depending on the customer’s environment. It is a stand alone solution outside of the SAP environment, and requires no changes to the SAP systems.
Ivanti Password Director
Ivanti® Password Director unburdens IT by providing end users with a fast, secure way to reset their passwords or unlock their accounts on their own, while enforcing strong password policy. The result?
Fewer service desk calls, reduced IT costs, and greater productivity and security.
Increase Productivity with Self-Service Password Reset
As IT teams implement more rigorous security policies to protect data and the business, end users are challenged to remember more complex passwords, increasing calls to the service desk when they forget them.
Resolving password reset requests manually through an already overburdened service desk not only wastes valuable IT time, it hinders the productivity of end users while they’re in queue waiting for assistance.
Fortunately, Ivanti Password Director empowers end users to resolve their own password resets by giving them secure, 24/7 access to a number of automated, self-service password reset options. End users can reset their passwords or unlock their accounts quickly and securely from the convenience of their Windows pre-login screen, a self-service web portal, or a mobile app—without needing to contact the service desk. This drastically reduces the number of service desk calls, freeing up more time for IT while keeping end users productive.
The reset can be performed against Active Directory, Office 365, Salesforce.com, Concur, and a growing list of reset sources. Ivanti Password Director also includes support for a wide range of end-user environments, including Windows, Mac, Linux, Unix, mobile, and virtual clients.
The benefits are clear:
Password reset tickets are opened, updated, and closed automatically with zero touch from service desk staff through Ivanti Service Manager, Ivanti Service Desk, or other thirdparty service desk software. Because the software stores a record of all password reset and account unlock activities, you also gain an audit trail for tracking and compliance purposes.
Enforce Stronger Password Policy
Despite the threat of data breaches, many end users practice poor password hygiene by selecting weak passwords that they can remember easily, reusing passwords, or writing their passwords on a sticky note—creating security risks. Ivanti Password Director enables you to strengthen security through the consistent enforcement of your password policy. You define the requirements for password strength and complexity that end users’ passwords must meet in order to be in compliance with IT policy. Then when an end user is resetting their password, the user-friendly interface shows in real time whether their password is meeting the defined requirements. It’s easy for them and for you.
Increase Security with Authentication
For added security, Ivanti Password Director offers multiple authentication methods to verify an end user’s identity before proceeding with the password reset or account unlock:
Ensure Enrollment and Adoption
With Ivanti Password Director, you have the option to allow end users to manually self-enroll and set their own security questions through an easy-to-use user interface. Or you can mass-enroll end users efficiently using data from authoritative sources to speed up the enrollment process.
You can also configure email communications to be sent automatically to end users to encourage enrollment, adoption, and usage of the self-service solution.
Ivanti Password Director also includes multi-language support throughout the user interface and in email communications, making it easy to accommodate most end users in their native language.
Customize Reporting to Your Needs
Using the Ivanti Xtraction self-service reporting and dashboard solution, you can create dashboards that track and monitor enrollment, adoption, and use related to password resets and account unlocks.
Realize Quick Time to Value
Ivanti Password Director is an affordable solution for organizations of all sizes across all industries. It offers a fast deployment timeline, flexible configuration, low maintenance, and easy upgrades. Coupled with all the benefits enjoyed from a reduction in service desk calls, you’re sure to see an immediate and measurable return on your investment.
Part of a Complete IAM Solution
Through a tight integration, Ivanti Password Director allows for an easy upgrade to Ivanti Identity Director, a trusted Identity and Access Management (IAM) solution. Get started with Ivanti Password Director to fulfill your immediate password-reset needs. Then grow into Ivanti Identity Director when you wish to add identity management and access governance functionality, including automated user provisioning and deprovisioning and workflow automation, in one unified solution.
Fewer service desk calls, reduced IT costs, and greater productivity and security.
Increase Productivity with Self-Service Password Reset
As IT teams implement more rigorous security policies to protect data and the business, end users are challenged to remember more complex passwords, increasing calls to the service desk when they forget them.
Resolving password reset requests manually through an already overburdened service desk not only wastes valuable IT time, it hinders the productivity of end users while they’re in queue waiting for assistance.
Fortunately, Ivanti Password Director empowers end users to resolve their own password resets by giving them secure, 24/7 access to a number of automated, self-service password reset options. End users can reset their passwords or unlock their accounts quickly and securely from the convenience of their Windows pre-login screen, a self-service web portal, or a mobile app—without needing to contact the service desk. This drastically reduces the number of service desk calls, freeing up more time for IT while keeping end users productive.
The reset can be performed against Active Directory, Office 365, Salesforce.com, Concur, and a growing list of reset sources. Ivanti Password Director also includes support for a wide range of end-user environments, including Windows, Mac, Linux, Unix, mobile, and virtual clients.
The benefits are clear:
- Eliminate your No. 1 service desk request
- Reduce IT costs by reducing contact volume
- Streamline operations and improve service levels
- Satisfy end users’ expectations for self-sufficiency
- Ensure business doesn’t stop during IT’s off-hoursBoost productivity of both service desk staff and end users
Password reset tickets are opened, updated, and closed automatically with zero touch from service desk staff through Ivanti Service Manager, Ivanti Service Desk, or other thirdparty service desk software. Because the software stores a record of all password reset and account unlock activities, you also gain an audit trail for tracking and compliance purposes.
Enforce Stronger Password Policy
Despite the threat of data breaches, many end users practice poor password hygiene by selecting weak passwords that they can remember easily, reusing passwords, or writing their passwords on a sticky note—creating security risks. Ivanti Password Director enables you to strengthen security through the consistent enforcement of your password policy. You define the requirements for password strength and complexity that end users’ passwords must meet in order to be in compliance with IT policy. Then when an end user is resetting their password, the user-friendly interface shows in real time whether their password is meeting the defined requirements. It’s easy for them and for you.
Increase Security with Authentication
For added security, Ivanti Password Director offers multiple authentication methods to verify an end user’s identity before proceeding with the password reset or account unlock:
- Secondary email address
- Security questions (pre-built or custom)
- One-time PIN sent via SMS or other method
Ensure Enrollment and Adoption
With Ivanti Password Director, you have the option to allow end users to manually self-enroll and set their own security questions through an easy-to-use user interface. Or you can mass-enroll end users efficiently using data from authoritative sources to speed up the enrollment process.
You can also configure email communications to be sent automatically to end users to encourage enrollment, adoption, and usage of the self-service solution.
Ivanti Password Director also includes multi-language support throughout the user interface and in email communications, making it easy to accommodate most end users in their native language.
Customize Reporting to Your Needs
Using the Ivanti Xtraction self-service reporting and dashboard solution, you can create dashboards that track and monitor enrollment, adoption, and use related to password resets and account unlocks.
Realize Quick Time to Value
Ivanti Password Director is an affordable solution for organizations of all sizes across all industries. It offers a fast deployment timeline, flexible configuration, low maintenance, and easy upgrades. Coupled with all the benefits enjoyed from a reduction in service desk calls, you’re sure to see an immediate and measurable return on your investment.
Part of a Complete IAM Solution
Through a tight integration, Ivanti Password Director allows for an easy upgrade to Ivanti Identity Director, a trusted Identity and Access Management (IAM) solution. Get started with Ivanti Password Director to fulfill your immediate password-reset needs. Then grow into Ivanti Identity Director when you wish to add identity management and access governance functionality, including automated user provisioning and deprovisioning and workflow automation, in one unified solution.
Ivanti Security Controls
With IT teams spending too much time managing security device sprawl, and Security teams suffering a labor shortage, Ivanti simplifies security with a unified solution that targets your biggest attack vectors. In Ivanti Security Controls (formerly Ivanti Patch for Windows) we’ve brought together the security tools global experts agree create the highest barriers to modern cyber attacks—discovery of the authorized and unauthorized software in your environment, so you can protect and defend against it; patch management for your heterogeneous OS and thirdparty app environment; dynamic whitelisting; and granular privilege management—as well as additional patch tools that help IT and Security work together better to better protect the business.
Patch for Windows and Linux
Ivanti Security Controls is a single automated patching solution that spans not only physical and virtual Windows servers but workstations as well. And we’ve added Red Hat Enterprise Linux and CentOS patch support to the leading Windows patching solution on the market—further non-Windows OSes to be added in 2019.
Ivanti Security Controls offers a more dynamic whitelisting option as well, using trust models in place of lists, which reduces the ramp-up, cost of ownership once running, and performance impact, while still delivering a high degree of security. It also lets IT take back admin rights but still enable users to do what they need to, including easing the process of adding additional permissions if needed.
Microsoft provides just two levels of control: user or a full admin. There’s some variation in between, but not enough to make it a good experience for the user or administrator.
We implement Just Enough Administration (JEA) and Just-in-Time Administration (JIT) – letting you take back your admin rights but still enable users to do what they need to, including easing the process of escalating or adding additional permissions if needed.
Now you can choose. Take a full admin back down to a regular user, and provide escalation of privileges where and when needed, from access to install applications, install a printer, use PowerShell, or whatever the user may need, but nothing more than what the user should have. Or you can take that full administrator and strip away the things they should not have access to. Take PowerShell away, for example, or access to specific capabilities. Limit administrative privilege to specific consoles, applications, services, and commands, reducing the risk of admins introducing malware, halting essential services, or affecting performance of mission-critical services.
More Tools to Save You Time and Money
Ivanti Security Controls also includes the following features that make it even easier for Security and IT Ops to undertake the business of securing your organization.
Ivanti Security Controls is a single automated patching solution that spans not only physical and virtual Windows servers but workstations as well. And we’ve added Red Hat Enterprise Linux and CentOS patch support to the leading Windows patching solution on the market—further non-Windows OSes to be added in 2019.
- Patch your virtual servers. Find online and offline workstations and servers, scan for missing patches, and deploy them. Then patch everything from the OS and apps to virtual machines (VMs) and even the ESXi hypervisor with the product’s deep integration with VMware. It’s possible to keep even offline virtual images in a constant state of readiness to be deployed. (You don’t want to go through the two-step process of creating a VM and having to patch it. If offline templates are kept current all the time, you can deploy a VM without having to worry about whether it’s up to date.)
- Patch without an agent. Agentless technology lets you assess and deploy patches to the workstations and servers connected to your network while minimizing the impact on both your team and system workloads. Alternatively, you can use the agent to create as many different agent policies as necessary to manage your network, offering significant patching flexibility, and to provide a higher degree of patch accuracy in environments where devices are not continuously connected to the network. Assign different agent configurations to different devices in your organization.
- Patch your Windows and Linux machines. You need patch management software in your toolbox that can handle today’s heterogenous environments. Extending patching beyond Windows is a must. And doing this efficiently, using a single interface and automated tool, not only frees up IT, but also reduces human error while enhancing your defenses.
- Patch your applications. Third-party applications such as Adobe Acrobat Flash and Reader, Google Chrome, Mozilla Firefox, and Oracle Java are the apps and browser add-ons hackers target most. We provide the largest patch catalog in the industry, and our content team puts all the patches through a gauntlet of testing, so you don’t have to take that on yourselves. We can save you and your team time better used to focus on core business goals.
Ivanti Security Controls offers a more dynamic whitelisting option as well, using trust models in place of lists, which reduces the ramp-up, cost of ownership once running, and performance impact, while still delivering a high degree of security. It also lets IT take back admin rights but still enable users to do what they need to, including easing the process of adding additional permissions if needed.
- Simplify whitelisting. We can provide authorized access to applications, services, and components without making IT manage extensive lists manually and without constraining users. Trusted Ownership™, for example, allows NTFS ownership of a file to simplify the process of whitelisting. Using a handful of trusted accounts to define ownership of trusted files allows easy implementation of a whitelist, and continuous addition and update of applications through your management systems, as the trusted owners are the accounts performing the install and update\upgrade efforts.
- Control the keys to the kingdom. There are many vulnerabilities that, if exploited, give the attacker permissions equal to the current user. Attackers can use stolen credentials and that user’s admin rights to gain full access to information and systems and spread further into your network. And providing full admin rights on a server has other risks as well, like the ability to start or stop services and install or remove software in error.
Microsoft provides just two levels of control: user or a full admin. There’s some variation in between, but not enough to make it a good experience for the user or administrator.
We implement Just Enough Administration (JEA) and Just-in-Time Administration (JIT) – letting you take back your admin rights but still enable users to do what they need to, including easing the process of escalating or adding additional permissions if needed.
Now you can choose. Take a full admin back down to a regular user, and provide escalation of privileges where and when needed, from access to install applications, install a printer, use PowerShell, or whatever the user may need, but nothing more than what the user should have. Or you can take that full administrator and strip away the things they should not have access to. Take PowerShell away, for example, or access to specific capabilities. Limit administrative privilege to specific consoles, applications, services, and commands, reducing the risk of admins introducing malware, halting essential services, or affecting performance of mission-critical services.
More Tools to Save You Time and Money
Ivanti Security Controls also includes the following features that make it even easier for Security and IT Ops to undertake the business of securing your organization.
- Integrate and automate beyond Ivanti. Patch REST APIs enable Security Controls to integrate with other products, automate shared processes, and provide remote access and control of the console.
- Bridge the gap between Security and IT Ops with CVE to patch list creation. Ivanti Security Controls can take a vulnerability assessment from whatever vendor the organization is using, find all the patches that relate to those Common Vulnerabilities and Exposures (CVEs), and build a patch group of updates that can be quickly approved for remediation in the environment. It’s a huge time-saver replacing today’s manual process.
Ivanti Service Manager
Managing IT services today has rarely been more challenging, and your users expect a lot from you. With Ivanti® Service Manager, you gain a proven, robust IT service management solution that transforms help desks and support teams into strategic business enablers. Optimized for the cloud but available onpremises, this fully multi-tenant solution improves dayto-day operations and helps IT teams achieve worldclass service management capabilities for IT and for other business departments.
Deliver More Strategic Value
Ivanti Service Manager provides enterprise-capable, end-toend service management capabilities throughout the service delivery lifecycle, from request capture to remediation. Built on industry standards with 13 ITIL-certified processes, Service Manager can expand and grow as your needs change and mature. Automated workflows eliminate costly manual processes while making operations more efficient, compliant, and secure. Whether you’re looking for an IT help desk / support ticket solution or need to perform more advanced ITIL service management processes, Service Manager is packaged to deploy quickly and scale up easily to adapt as your requirements grow.
Improve Service Quality
The automation services of Service Manager enable service owners and business managers to adapt, design, and take control of workflows without any coding, thereby improving the quality and consistency of services. Pre-defined blocks of integration workflow integrate smoothly with external systems and data sources to pull in required information and connect to other tools for end-to-end automated processes.
Analysts leverage relevant information exactly when they need it to grasp situations quickly and streamline processes to resolve issues more efficiently.
Provide Engaging Self Service
Transform the service experience for your users with the AIpowered Hub. Your users and employees gain the innovative tool they need to help themselves quickly and easily. Your users can simply have a conversation with the Hub to obtain answers, submit requests, or ask for help. Ticket management is a snap when users can simply ask about status, make an update, or create a new ticket. The Hub is available 24x7 and fully integrated with Service Manager’s workflows to further reduce the IT team’s workload.
Expand self-service capabilities by offering your users the Ivanti Service Catalog for enhanced visibility and access into all service offerings for the enterprise—IT and non-IT related. All self-service requests go through individually configurable approval processes, turning requests into approved and documented orders. Easy integration into the corporate website or employee portal, along with full mobile support, means users obtain the services they need—anytime, anywhere.
Boost Caller Satisfaction
Voice automation empowers your IT service team to improve customer satisfaction by increasing first-call resolution rates and handling calls more effectively. Service Manager integrates existing phone infrastructure with the IT service desk environment for intelligent call routing, integrated voice response, voice self-service, screen pops, and call management functionality. Reduce costs further with phone-enabled self service for resetting passwords, initiating and approving change requests, or checking service-request status.
Gain Real-Time Insight
Monitor service delivery, quality, and commitments with rolebased dashboards that provide the real-time information, flexibility, and tools needed to configure reports easily through a drag-and-drop interface. Several out-of-the-box dashboards and reports provide a single view of operational, financial, and productivity metrics to help you determine how well you’re meeting performance and business goals. Additional inventory and asset data dashboards enable you to make better and more informed decisions regarding the IT landscape.
Cloud or On-Premise, You Decide
Built on a multi-tenant technology platform designed for the cloud, Service Manager offers you full flexibility to deploy in the cloud, on-premise, or a hybrid combination. You can move easily from one deployment model to another without losing functionality or data. All customers receive maximum value through the solution’s ease of consolidation, configuration options, simplified deployment, automated workflow system, and socially enabled self-service access.
Stay Connected
Your employees aren’t always at their desks, yet they still need access to your services. With Ivanti’s ITSM Mobile App, users can employ their mobile devices to stay connected no matter where they are. Allow them to check on incidents, submit requests, or search for answers to common IT questions. Make it part of your communication strategy so your users stay in touch and productive while on the move.
Deliver Business Services Beyond IT
A modern service delivery experience doesn’t have to be limited to IT. All business departments must become more efficient and proactive by transforming manual processes driven currently by ad hoc emails, dated spreadsheets, or paper documents.
Do other departments approach you to learn how you’ve improved your service delivery? With Service Manager, your IT team is well positioned to automate the services and offerings of other departments. Partner with them to leverage your ITSM tools and practices to develop and deliver new innovative services.
Ivanti Service Manager provides enterprise-capable, end-toend service management capabilities throughout the service delivery lifecycle, from request capture to remediation. Built on industry standards with 13 ITIL-certified processes, Service Manager can expand and grow as your needs change and mature. Automated workflows eliminate costly manual processes while making operations more efficient, compliant, and secure. Whether you’re looking for an IT help desk / support ticket solution or need to perform more advanced ITIL service management processes, Service Manager is packaged to deploy quickly and scale up easily to adapt as your requirements grow.
Improve Service Quality
The automation services of Service Manager enable service owners and business managers to adapt, design, and take control of workflows without any coding, thereby improving the quality and consistency of services. Pre-defined blocks of integration workflow integrate smoothly with external systems and data sources to pull in required information and connect to other tools for end-to-end automated processes.
Analysts leverage relevant information exactly when they need it to grasp situations quickly and streamline processes to resolve issues more efficiently.
Provide Engaging Self Service
Transform the service experience for your users with the AIpowered Hub. Your users and employees gain the innovative tool they need to help themselves quickly and easily. Your users can simply have a conversation with the Hub to obtain answers, submit requests, or ask for help. Ticket management is a snap when users can simply ask about status, make an update, or create a new ticket. The Hub is available 24x7 and fully integrated with Service Manager’s workflows to further reduce the IT team’s workload.
Expand self-service capabilities by offering your users the Ivanti Service Catalog for enhanced visibility and access into all service offerings for the enterprise—IT and non-IT related. All self-service requests go through individually configurable approval processes, turning requests into approved and documented orders. Easy integration into the corporate website or employee portal, along with full mobile support, means users obtain the services they need—anytime, anywhere.
Boost Caller Satisfaction
Voice automation empowers your IT service team to improve customer satisfaction by increasing first-call resolution rates and handling calls more effectively. Service Manager integrates existing phone infrastructure with the IT service desk environment for intelligent call routing, integrated voice response, voice self-service, screen pops, and call management functionality. Reduce costs further with phone-enabled self service for resetting passwords, initiating and approving change requests, or checking service-request status.
Gain Real-Time Insight
Monitor service delivery, quality, and commitments with rolebased dashboards that provide the real-time information, flexibility, and tools needed to configure reports easily through a drag-and-drop interface. Several out-of-the-box dashboards and reports provide a single view of operational, financial, and productivity metrics to help you determine how well you’re meeting performance and business goals. Additional inventory and asset data dashboards enable you to make better and more informed decisions regarding the IT landscape.
Cloud or On-Premise, You Decide
Built on a multi-tenant technology platform designed for the cloud, Service Manager offers you full flexibility to deploy in the cloud, on-premise, or a hybrid combination. You can move easily from one deployment model to another without losing functionality or data. All customers receive maximum value through the solution’s ease of consolidation, configuration options, simplified deployment, automated workflow system, and socially enabled self-service access.
Stay Connected
Your employees aren’t always at their desks, yet they still need access to your services. With Ivanti’s ITSM Mobile App, users can employ their mobile devices to stay connected no matter where they are. Allow them to check on incidents, submit requests, or search for answers to common IT questions. Make it part of your communication strategy so your users stay in touch and productive while on the move.
Deliver Business Services Beyond IT
A modern service delivery experience doesn’t have to be limited to IT. All business departments must become more efficient and proactive by transforming manual processes driven currently by ad hoc emails, dated spreadsheets, or paper documents.
Do other departments approach you to learn how you’ve improved your service delivery? With Service Manager, your IT team is well positioned to automate the services and offerings of other departments. Partner with them to leverage your ITSM tools and practices to develop and deliver new innovative services.
Ivanti Unified Endpoint Manager (UEM)
Ivanti® Unified Endpoint Manager—or Ivanti UEM—increases user and IT productivity by helping IT administrators gather detailed device data, automate software and OS deployments, personalize workspace environments, and fix user issues quickly. Ivanti UEM is the only solution that personalizes the user workspace, while letting IT Analysts and Admins do their magic for all devices from one management experience—not through two, three, four or more consoles.
Act Faster with Greater Visibility
The discovery and inventory of all endpoints is key to unifying IT. When you add the right data integrated into a business-value dashboard, life in IT becomes clearer and actions happen faster. Ivanti® Xtraction helps you create business-value dashboards easily—without data scientists or gurus—and ties together all your information into data visualizations that make sense and promote quick action from your teams.
Unified Management Across More Devices
Organizations must address how to manage and enable the operating systems, applications, and profiles in corporate environments. It’s time to end the complexities of separate solutions for Enterprise Mobility Management (EMM), client management, and user experience management. When you deploy the right Unified Endpoint
Management (UEM) solution, expect it to do the following:
- Simplify and secure enterprise mobility alongside your users’ laptops and desktops
- Apply policies, personalization, and actions quickly across all devices
- Provide assets or services to users via self-service or a targeted distribution
- Leverage the intelligence of the system to determine which users and devices get what
Ivanti User Workspace Manager (UWM)
Ivanti User Workspace Manager enables an unparalleled user experience, increases productivity, and liberates IT from the shackles of slow and complex desktop tools.
With Ivanti, migration to Windows 10 and adoption of cloud services, including Office 365, is smooth, risk-free, and simplified for both IT and users alike.
Simplify Digital Workspace Management Ivanti User Workspace Manager enables organizations to reap the benefits of Ivanti solutions such as Environment Manager, File Director, Performance Manager, Application Control, and Insight:
Transform the User Workspace With User Workspace Manager, you can deliver responsive, secure desktops that users love, save money on server hardware, reduce IT management, and eliminate security risks. Detect challenges affecting user experience, quantify what is causing the issues, and benchmark how IT changes can optimize your endpoints. Patented resource management techniques ensure users are provided with the best desktop performance possible and increase user density in virtual desktop environments — often by as much as 40 percent. Abstracting users’ personal settings and files from the underlying device and operating system enables effortless migration to new desktops, platforms, or services, providing a consistent and familiar workspace for mobile users.
Powerful application control and privilege management capabilities ensure secure desktop and server environments and ease the burden of satisfying regulatory compliance.
Key Feature: User Personalization
On-demand personalization eliminates typical problems associated with roaming profiles including slow logon times due to profile bloat, and loss of personal settings and helpdesk calls due to profile corruption.
Stream personal settings as required, at application start or stop, to alleviate the burden on the logon process and provide rapid logon times.
Roll back personal settings on a per-application basis to reduce profile-related support calls and eliminate user downtime. Bulk updates on centrally-stored profile data equip IT with new problem-solving capabilities and ease the process of rolling out network changes to user sessions.
Key Feature: Desktop Configuration
The multi-threaded logon engine in User Workspace Manager replaces slow and complex logon scripts and GPO settings with context-aware actions that can be applied simultaneously at logon, rather than one-after-the-other.
Desktop configuration items typically configured to apply at logon can alternatively be set up to occur throughout the user session, on-demand, to reduce the burden on the logon process. This provides even quicker logon times and a much-improved user experience.
Key Feature: File Sync and Migration
The granular sync mechanism in User Workspace Manager allows users’ files to be synced to on-premises or cloudbased storage from anywhere within their user profile — either in the background, on-demand, or in real-time—to provide effortless migration of users’ files and eliminate the issue of data sprawl where user files are saved across different devices.
What’s more, migrating user files from on-premises storage to the cloud also means you reap the benefits of the 1TB of free OneDrive for Business storage per user with every license of Office 365.
- Effortless user migration.Migrate user profiles, settings, and files to Windows 10 with or without hardware refresh—with no disruption to the user and minimal effort for IT.
- Ease the move to the cloud. Smooth your journey to the cloud by roaming the user experience seamlessly between on-premises and cloud infrastructure using scalable, robust web services.
- Ensure a great user experience. Eliminate logon scripts, eradicate complex group policy configuration, and deliver just-in-time personalization for lightning logon times. Ensure fast desktop and application response.
Simplify Digital Workspace Management Ivanti User Workspace Manager enables organizations to reap the benefits of Ivanti solutions such as Environment Manager, File Director, Performance Manager, Application Control, and Insight:
- Agile Windows migration. Achieve future-proof, continuous migration with ease
- Easy file management. Eliminate data sprawl and reduce data center costs
- Faster cloud adoption. Consistent on-premises, hybrid, or full-cloud desktops
- Better user experience. Higher user acceptance of desktop transformation projects
- Greater security and compliance. Out-of-the-box protection against unknown threats
Transform the User Workspace With User Workspace Manager, you can deliver responsive, secure desktops that users love, save money on server hardware, reduce IT management, and eliminate security risks. Detect challenges affecting user experience, quantify what is causing the issues, and benchmark how IT changes can optimize your endpoints. Patented resource management techniques ensure users are provided with the best desktop performance possible and increase user density in virtual desktop environments — often by as much as 40 percent. Abstracting users’ personal settings and files from the underlying device and operating system enables effortless migration to new desktops, platforms, or services, providing a consistent and familiar workspace for mobile users.
Powerful application control and privilege management capabilities ensure secure desktop and server environments and ease the burden of satisfying regulatory compliance.
Key Feature: User Personalization
On-demand personalization eliminates typical problems associated with roaming profiles including slow logon times due to profile bloat, and loss of personal settings and helpdesk calls due to profile corruption.
Stream personal settings as required, at application start or stop, to alleviate the burden on the logon process and provide rapid logon times.
Roll back personal settings on a per-application basis to reduce profile-related support calls and eliminate user downtime. Bulk updates on centrally-stored profile data equip IT with new problem-solving capabilities and ease the process of rolling out network changes to user sessions.
Key Feature: Desktop Configuration
The multi-threaded logon engine in User Workspace Manager replaces slow and complex logon scripts and GPO settings with context-aware actions that can be applied simultaneously at logon, rather than one-after-the-other.
Desktop configuration items typically configured to apply at logon can alternatively be set up to occur throughout the user session, on-demand, to reduce the burden on the logon process. This provides even quicker logon times and a much-improved user experience.
Key Feature: File Sync and Migration
The granular sync mechanism in User Workspace Manager allows users’ files to be synced to on-premises or cloudbased storage from anywhere within their user profile — either in the background, on-demand, or in real-time—to provide effortless migration of users’ files and eliminate the issue of data sprawl where user files are saved across different devices.
What’s more, migrating user files from on-premises storage to the cloud also means you reap the benefits of the 1TB of free OneDrive for Business storage per user with every license of Office 365.
Ivanti Workspace Control
Controlling User Access while Delivering a Personalized Experience
IT organizations must balance control of applications, services, and assets with enabling personalized user access. What apps and services do workers need? What printers should they have access to? What resources should be blocked if they’re on an unsecure public network? IT teams typically handle these issues manually, often relying on scripts that must be managed and maintained, overloading the team and preventing them from working on more strategic projects. The results are often:
Key Feature: Easy Workspace Personalization Workspace Control lets IT create a highly personalized user workspace for workers based on what they need to do their jobs—and what they can access based on IT and corporate policy.
Key Feature: Context Awareness Allows IT to apply the appropriate policies to each user’s desktop session, whether that session is delivered via VDI, app virtualization, or conventional thick-client architecture.
Context rules detect aspects of the user’s current state related to access policies (like location, network connection type, device type, time of day, etc.) and controls access accordingly.
Key Feature: Web-based Management Workspace Control provides IT with an easy-to-use, webbased interface for managing user and application security settings and allowing the IT helpdesk to troubleshoot the desktop configuration. Key Feature: File Certificate-based Application Whitelisting File certificates allow IT to create rules to whitelist applications from a specific vendor or product name using the certificates of signed executables—providing the same level of security as file hashes, but with fewer rules and a lot less maintenance.
Key Feature: Application Whitelist Monitor Simplifies security whitelisting across a large, dynamic application set by automating the generation and maintenance of hashes and file certificates.
Transform Digital Workspaces Ivanti Workspace Control is an ideal complement to VDI, mobility, and other digital workplace transformation strategies, since it provides an automated, policy-based way of mapping individual users to their digital workspaces across devices and delivery platforms. Users can roam seamlessly across hybrid environments for full productivity. And, because Workspace Control decouples the desktop experience from underlying infrastructure, IT upgrade projects are easier to execute and less disruptive to users.
Deliver a Consistent User Experience Workspace Control helps IT provide a consistent user experience across desktops, laptops, tablets, and smartphones—while still applying the appropriate resource limitations as workers move from office to home to the road.
Regulatory and Corporate Compliance Whether it’s meeting software licensing agreements or adhering to regulatory restrictions, Workspace Control allows IT to set, enforce, and report on granular policy rules at the user level. IT gains control over user behavior while still providing the necessary access to resources to keep users productive, plus the ability to document and demonstrate compliance.
Citrix XenApp and XenDesktop Support Workspace Control is compatible with Citrix XenApp/XenDesktop 7.15 LTSR.
Updated macOS and Linux Support The macOS and Linux agents have been updated to support the latest releases of macOS, CentOS, and Red Hat Enterprise Linux.
Ivanti Workspace Control reduces the complexity of managing the user workspace to deliver:
- Delays in providing workers access to the digital resources they need
- Inadequate definition and enforcement of access policies—especially restriction of privileges when users work from non-secure devices or locations
- Valuable IT staff time consumed by routine administration
Key Feature: Easy Workspace Personalization Workspace Control lets IT create a highly personalized user workspace for workers based on what they need to do their jobs—and what they can access based on IT and corporate policy.
Key Feature: Context Awareness Allows IT to apply the appropriate policies to each user’s desktop session, whether that session is delivered via VDI, app virtualization, or conventional thick-client architecture.
Context rules detect aspects of the user’s current state related to access policies (like location, network connection type, device type, time of day, etc.) and controls access accordingly.
Key Feature: Web-based Management Workspace Control provides IT with an easy-to-use, webbased interface for managing user and application security settings and allowing the IT helpdesk to troubleshoot the desktop configuration. Key Feature: File Certificate-based Application Whitelisting File certificates allow IT to create rules to whitelist applications from a specific vendor or product name using the certificates of signed executables—providing the same level of security as file hashes, but with fewer rules and a lot less maintenance.
Key Feature: Application Whitelist Monitor Simplifies security whitelisting across a large, dynamic application set by automating the generation and maintenance of hashes and file certificates.
Transform Digital Workspaces Ivanti Workspace Control is an ideal complement to VDI, mobility, and other digital workplace transformation strategies, since it provides an automated, policy-based way of mapping individual users to their digital workspaces across devices and delivery platforms. Users can roam seamlessly across hybrid environments for full productivity. And, because Workspace Control decouples the desktop experience from underlying infrastructure, IT upgrade projects are easier to execute and less disruptive to users.
Deliver a Consistent User Experience Workspace Control helps IT provide a consistent user experience across desktops, laptops, tablets, and smartphones—while still applying the appropriate resource limitations as workers move from office to home to the road.
Regulatory and Corporate Compliance Whether it’s meeting software licensing agreements or adhering to regulatory restrictions, Workspace Control allows IT to set, enforce, and report on granular policy rules at the user level. IT gains control over user behavior while still providing the necessary access to resources to keep users productive, plus the ability to document and demonstrate compliance.
Citrix XenApp and XenDesktop Support Workspace Control is compatible with Citrix XenApp/XenDesktop 7.15 LTSR.
Updated macOS and Linux Support The macOS and Linux agents have been updated to support the latest releases of macOS, CentOS, and Red Hat Enterprise Linux.
Ivanti Workspace Control reduces the complexity of managing the user workspace to deliver:
- A more productive and engaged workforce
- Improved corporate and regulatory compliance
- Lower cost of IT operations
- Better allocation of IT staff and skills
- Greater organizational agility
- Simplified infrastructure upgrades
Ivanti Xtraction
Reporting across IT is a challenge. You gather and overlay data from IT applications by hand, wrestle to create highquality visuals, and then rework everything for another audience. There’s a better way. Ivanti Xtraction is a selfservice, real-time reporting and dashboard solution that helps you meet your IT business intelligence needs with less effort. Merge your vendor tools data—including Ivanti tools—in one place. Power your IT decisions based on real-time, comprehensive views of your IT environment.
Simple Self Service
Spend less time waiting for or chasing down reports. Be in control, and depend less on specialized staff. Designed with the user in mind, Xtraction provides an easy-to-use, flexible interface. Anyone can create personalized reports or dashboards and recut them at any time. Get to your data on demand directly from source. Drag-and-drop or point-and-click, without coding or complex commands. Select data from your connected systems, choose the display format, and let Xtraction do the rest.
Unite Data with Connectors
Maximize your IT investments and leverage your key IT data. No need to open each application and wade through masses of data. Use connectors pre-built for Ivanti tools and other common applications—ITSM, ITAM, operational security, endpoint management, and relational databases. Unify, crossreference, and cherry-pick only the data you need. Execute a level of analysis unachievable with siloed tools and data. Spot unused services by department. Assess the financial impact of major outages. Track excessive times to patch or devices in need of OS migration and more, without breaking a sweat.
Achieve Real-time Visibility
Don’t just analyze your data after the fire is out. Monitor, explore, and share critical information in real time with autorefresh. Visualize point-in-time data on dashboards at your leisure. Consume information in common formats such as pie, bar, or line charts. Export to popular file formats for business reports or presentations. Count on reliable, accurate and timely information in data-driven meetings and decisions.
Discover Hidden Information
Xtraction isn’t limited to fixed or flat dashboard views. Drill down through dashboards with ease. Filter results to focus on points of interest or areas of concern for real-time insights. With the right access, you can even open a record in the underlying application. Gain a deeper understanding of your data. Find lost assets, identify new service opportunities, or pinpoint vulnerable and offline devices. Protect worker productivity, strengthen security policies, and impact your bottom line.
Automate Scheduling and Alerts
Schedule report delivery at a time that suits you—daily, weekly, or monthly. Have reports mailed straight to your in-box. Mitigate IT risk. Take a proactive approach with Xtraction’s alerting capability. Send information dashboards automatically. Receive advanced warning about service level breaches, out-ofcompliance devices, or other critical indicators before it’s too late to act.
Minimize Data Access Risks
Maintain control over who sees your business data. Expose your data, reports, and dashboards to authorized users only with role-based access. Xtraction includes integrated authentication with Active Directory. Gain secure access that doesn’t impact user productivity.
Rapid Implementation
We’ve done the heavy lifting, so you don’t have to. The solution installs quickly and extends with the pre-defined connectors to the most popular IT systems. You’ll be up and running on the day of installation.
Spend less time waiting for or chasing down reports. Be in control, and depend less on specialized staff. Designed with the user in mind, Xtraction provides an easy-to-use, flexible interface. Anyone can create personalized reports or dashboards and recut them at any time. Get to your data on demand directly from source. Drag-and-drop or point-and-click, without coding or complex commands. Select data from your connected systems, choose the display format, and let Xtraction do the rest.
Unite Data with Connectors
Maximize your IT investments and leverage your key IT data. No need to open each application and wade through masses of data. Use connectors pre-built for Ivanti tools and other common applications—ITSM, ITAM, operational security, endpoint management, and relational databases. Unify, crossreference, and cherry-pick only the data you need. Execute a level of analysis unachievable with siloed tools and data. Spot unused services by department. Assess the financial impact of major outages. Track excessive times to patch or devices in need of OS migration and more, without breaking a sweat.
Achieve Real-time Visibility
Don’t just analyze your data after the fire is out. Monitor, explore, and share critical information in real time with autorefresh. Visualize point-in-time data on dashboards at your leisure. Consume information in common formats such as pie, bar, or line charts. Export to popular file formats for business reports or presentations. Count on reliable, accurate and timely information in data-driven meetings and decisions.
Discover Hidden Information
Xtraction isn’t limited to fixed or flat dashboard views. Drill down through dashboards with ease. Filter results to focus on points of interest or areas of concern for real-time insights. With the right access, you can even open a record in the underlying application. Gain a deeper understanding of your data. Find lost assets, identify new service opportunities, or pinpoint vulnerable and offline devices. Protect worker productivity, strengthen security policies, and impact your bottom line.
Automate Scheduling and Alerts
Schedule report delivery at a time that suits you—daily, weekly, or monthly. Have reports mailed straight to your in-box. Mitigate IT risk. Take a proactive approach with Xtraction’s alerting capability. Send information dashboards automatically. Receive advanced warning about service level breaches, out-ofcompliance devices, or other critical indicators before it’s too late to act.
Minimize Data Access Risks
Maintain control over who sees your business data. Expose your data, reports, and dashboards to authorized users only with role-based access. Xtraction includes integrated authentication with Active Directory. Gain secure access that doesn’t impact user productivity.
Rapid Implementation
We’ve done the heavy lifting, so you don’t have to. The solution installs quickly and extends with the pre-defined connectors to the most popular IT systems. You’ll be up and running on the day of installation.
LANDESK Management Suite
IT Systems Management You Can Count On
Modernize your IT, satisfy growing user expectations, and manage all the devices users carry from a single, unified endpoint management solution. Update how you deliver applications to users through automated rollout projects and a self-service app store experience. LANDESK Management Suite is proven, reliable client management software that integrates with multiple IT solutions. You gain greater visibility into what devices you have and boost IT and user productivity.
Solid Systems Management
Some solutions only give you data. But LANDESK Management Suite delivers visual decision-making data plus the ability to take action—all within one unified endpoint management solution.
Manage all your users’ multi-platform desktops and mobile devices
Integrate several IT disciplines into a single management experience
Provide the actions to speed software distribution projects
Save budget by reclaiming unused software licenses automatically
Simplify OS provisioning
Save on utility power costs
Provide secure remote control
Manage PC’s, Mac OS X, iOS, Android, Linux, and Chromebook devices
LANDESK Management Suite capabilities
Discovery and inventory
Discover all devices and assets and inventory them into a single place to simplify, secure, and manage IT processes.
Unified endpoint management
Mobile device management (MDM) capabilities are integrated into the admin console, workflows, and workspaces. Create policies and software packages and target users and groups, which apply intelligently to all of the user’s devices or platforms, including Windows, Mac OS X, Chromebook, Linux, iOS, and Android.
Software license management
Discern how your licenses and software are being used and reclaim underutilized software licenses automatically to optimize costs.
OS provisioning and OS migration
Capture and deploy operating systems and profiles. Provides a template-driven process to deploy operating systems using hardware-independent imaging, driver management, and integrated software delivery.
Windows 10 management
Deploy and update Windows 10 easily. Whether you use Current Branch or Long-term Servicing Branch or both, you control how and when to update.
Software distribution
Advance rollout projects through multiple stages of deployment automatically. Distribute software across your enterprise to multiple platforms and devices in minutes using minimal infrastructure and network traffic, or provide an app store experience for self-service app deployments.
Alerting and monitoring
Set alerts that monitor users’ devices and servers. Monitor software and hardware events and alert on these events. Alert administrators or launch process flows based on the type of event.
Enterprise Apple management
Experience complete enterprise Mac and iOS device management from inventory to software or OS deployment.
Dashboards, reporting and role-based workspaces
Provide senior management with dashboards on their mobile devices and produce detailed reports to improve IT decision-making. Enable role-based workspaces for contextual information and actions.
Remote control and problem resolution
Benefit from centrally managed, cross-platform remote control with extended problem resolution tools—all from any HTML5 browser.
Power management
Implement green IT and report on the actual energy utility savings.
Workspaces: Integrating Information with Action
Client and systems management tools are the foundation for gathering extensive IT data. To scale your business, it only makes sense to integrate this data with the tools and actions IT provides. That’s why we’ve created LANDESK Workspaces—a new, role-driven user experience that matches the right information and actions with the roles that interact with IT, such as End Users, IT Analysts, Security Administrators, and Asset Managers.
LANDESK Service Desk
Modernize your IT Service Management
Enable your service management team to meet the needs of your users and your digital enterprise by delivering higher quality IT and business services consistently across the organization. LANDESK helps you manage and automate the lifecycle of ITSM processes to modernize your service delivery and IT support.
LANDESK® Service Desk helps to optimize services, offers end users exceptional experiences, and supports business agility to meet the needs of the digital enterprise. Available on- premise, in the cloud, or as a hybrid model, the solution it integrates easily with third-party systems and applications. You gain the data and the ability to take action.
LANDESK Service Desk delivers all the capabilities expected from an enterprise-class service management system, including ITIL®-verified incident, request, problem, change, and knowledge management, as well as market- leading self service to further improve service delivery and IT support performance.
LANDESK Service Desk Capabilities
Mobile ITSM
Deliver the IT service management support, services, and data your users need—when they need them—through fast, secure mobile access.
IT Self Service
Provide a visually appealing, intuitive self service experience. Enable users to solve their own IT issues, view information, or request services from a service catalog.
Role-driven interface
Empower service management professionals with a role-driven interface that provides the tools, data, and process actions they need to do their jobs.
ITSM Reporting and Dashboards
Visualize at-a-glance dashboards about ITSM performance for continuous service improvement. Quickly gain trend insights to apply context for better decision-making.
IT Integration and Automation
Integrate with IT tools and data to improve service-level response times. Create efficiencies and reduce errors by orchestrating IT automation across systems.
Social ITSM
Build better relationships and improve the end-user experience by providing choice in how employees can engage with chat and social collaboration.
Beyond core ITSM
Improve automated processes to improve performance in your wider business operations. Deliver enterprise service management for your HR team, facilities management, or any other department.
ITIL Processes
Drive best practices effortlessly. LANDESK has PinkVERIFY™ certification for 15 ITIL 2011 processes.
ITSM Software as a Service (SaaS)
Available as a reliable, flexible, secure service management platform in the cloud or as a cloud-premise hybrid model.
Design App Store
View and select new service management apps from the LANDESK Design App Store to better support your business.