Ivanti Partners With Absolute Software for Improved Customer Productivity

Ivanti collaborated with Absolute Software to strengthen the health and resiliency of Ivanti Neurons for Unified Endpoint Management (UEM) using Absolute’s Application Persistence capabilities through Absolute Resilience customers.

Joint customers can now extend Absolute’s firmware-embedded, self-healing device connection to Ivanti’s UEM solution, ensuring that it stays installed and functional. This is an addition to the company’s Application Persistence ecosystem.

Edward Choi, SVP of Global Alliances at Absolute Software, commented, “By joining our Application Persistence ecosystem, Ivanti is taking the critical steps needed to empower our Resilience customers to harden their mission-critical application – and keep their sensitive data and devices protected. Absolute’s unique intelligence consistently shows that the complexity of today’s device environments has left endpoint agents under constant threat of colliding with other applications or being disabled by malicious or negligent users. By ensuring their app remains healthy and working effectively, Ivanti is helping to strengthen the overall security posture of our joint customers.”

Absolute provides an unbreakable digital tether to every device to help ensure the highest levels of resiliency. Its patented Persistence technology is present in over 500 million endpoints. Absolute’s Application Persistence service uses this unbreakable, two-way connection to monitor the health and behavior of mission-critical security applications, identify missing or corrupted components, and automatically repair or reinstall them, when necessary, without requiring human intervention.

Organizations can now have visibility into all their IT assets, including mobile devices, through Ivanti Neurons for UEM. This gives IT teams a path to hyper-automation and allows them to self-secure, self-service, and offer a customized, contextual digital employee experience on devices.

Daren Goeson, Vice President & GM of Unified Endpoint Management Products at Ivanti, stated, “Organizations across the globe rely on Ivanti Neurons every day to deliver visibility into their device estate and provide the automation capabilities needed to improve productivity. The ability to extend Absolute’s undeletable line of defense to Ivanti Neurons gives us the confidence that our joint customers always know where their most valuable assets are – and with continuous secure access.”

Absolute’s extensive Application Persistence catalog includes over 50 security and business applications required for a dependable, resilient work-from-anywhere experience. Customers with Absolute Resilience can also keep Ivanti Endpoint Manager, Ivanti Security Controls, and Ivanti Connect Secure in addition to Ivanti Neurons for UEM.

Unified Endpoint Management- A Software Solution!

Unified Endpoint Management (UEM) is a software solution that allows organizations to monitor and manage all devices like computers, mobile devices, scanners, network devices, IoT, etc. connected to their network using a single management interface. UEM treats all end-users or devices as “Endpoints”.

The Evolution of UEM – Unified Endpoint Management is replacement and upgradation for various traditional tools like Enterprise Mobility Management (EMM), Mobile Device Management (MDM) and Client Management Tools (CMT).

  • Client Management Tools were used to handle client systems and various tasks like software delivery, patch management, and remote control. However, CMT lacked the ability to manage new devices and technologies like mobile devices and the Bring Your Own Device (BYOD) System.
  • As a result, Mobile Device Management (MDM) started being used in situations where the company owned and managed every device solely for security reasons. MDM is the process of remotely managing the utility of mobile devices and allocating functions like corporate functionality, supportability, security while also allowing users some freedom and flexibility. MDM solutions worked at the device level and they lacked control of other external applications, it was difficult to overcome the obstacles posed by BYOD.
  • The limitations visible in MDM solutions, however, led to development of Enterprise Mobility Management (EMM) which includes features Mobile App Management, Mobile Content Management, Containerization, and Identity Management in a centralized solution. This provides a comprehensive approach that addresses all aspects of the device. EMM now allowed employers to remotely manage all devices like smartphones, laptops, tablets, etc., and applications used by organization’s employees. With the introduction of these versatile applications, allowing organizations to communicate and access business resources seamlessly, the emphasis shifted away from application visibility and control towards streamlining worker productivity.

UEM Removes the Need for Multiple Tools

As stated above, there is a shortage of expertise with the use of different tools. Since, administrators must perform a variety of tasks like operating system updates, security measures, and remote monitoring, and it is difficult for administrators to educate themselves on different tools, their negligence may lead to costly mistakes. Therefore, organizations felt the need to avoid multiple solutions. Enterprise firms wanted a solution that brought the management of all end-users and endpoints together on one unified solution.This led to the development of Unified Endpoint Management (UEM) Solutions. UEM solutions are the most recent iterations of software applications that control and track all devices of employees and clients throughout their life cycle. Clients appreciate the right to use their own devices, and employers appreciate the risk minimization and increased productivity that comes with knowing that employees can safely access and use company’s resources.

Features of UEM Solutions

Integration with Multiple Platforms – Unified Endpoint Management is designed to work with multiple platforms like Android, MacOS, Chrome OS, Windows, Linux, etc. It can update, monitor, control, configure and help in migration of device or OS from a single management dashboard.

Compliance – The first step in ensuring system enforcement is deciding which types of devices UEM will allow to enroll as endpoints in company’s network. With user and endpoint compliance UEM establishes perimeter-based security to protect company’s assets. Endpoints are subjected to routine compliance tests to ensure that they are up to date on security fixes, operating system updates, patches and how to treat devices that have been compromised. After a user registers and uses the organization’s network services, the endpoint user must comply with user compliance policy.

Mobile Application Management (MAM) – MAM applies security controls and policies to applications with an option to block dangerous apps. One of the key reasons for failures in a company’s security system is differences in security and management policies for controlling entities, security applications and operating system maintenance. Corporate applications that have been developed in-house can be deployed and controlled through MAM. They can also be isolated from personal applications to protect private information – so an employee does not need to separate their work and personal device but also can maintain distance between their personal and professional lives.

Identity and Access Management – Endpoints are the subject of identity and access management, which ensures that only trusted individuals or devices have safe access to organization’s data. By associating registered devices (endpoints) with users’ credentials with various services like application signing and Single Sign-On (SSO), UEM assesses an endpoint’s behaviour to calculate certificate management risk. This helps indicates whether a user is to be granted or refused access to a particular resource.

Data Stripping – Data stripping is a security technique that removes company’s information from standard applications and redirects it to protected ones. It is a security feature of UEM. It provides a secure and isolated approach to protect organization’s sensitive information.

Devices are becoming more advanced; employees and work policies are changing, and the security environment is constantly changing. These factors are pushing businesses to implement a single endpoint management system (UEM) to handle and protect all endpoints, their users, applications and information in an efficient manner.

Unified Endpoint Management (UEM) in 2022

Unified Endpoint Management is gradually becoming the way to manage devices in the future. Many organizations trying to handle thousands of endpoints are looking for a perfect, custom-made UEM solution.

Unified endpoint management (UEM) is an architecture and approach that allows a centralized command center to govern many types of devices such as PCs, cellphones, and IoT devices. These systems aid in making various networks safer and more efficient. Unified endpoint management (UEM) refers to a group of technologies that allow companies to protect and manage a variety of staff devices and operating systems from a single console.

According to the researchers at Infosecurity Outlook, IT departments seem to experience difficulties integrating old systems on these new devices, resulting in greater IT costs. Unified endpoint management makes connecting these systems easier while also saving costs and reducing threats.

Advantages of Unified Endpoint Management

Companies can use UEM solutions to monitor and manage all their endpoints, including mobile devices and traditional endpoints, in one place. UEM systems’ design and ability to replace many standalone solutions bring considerable benefits to a business, including:

Threat Detection: Cyber attackers and other threat actors are increasingly targeting endpoints as they migrate outside of the corporate network and its perimeter-based defences. UEM solutions have a thorough understanding of the endpoints they monitor, allowing them to spot unusual activity or signs that an endpoint has been hacked. This allows security teams to respond to suspected threats before they harm company networks, data, or applications.

Single Pane of Glass Management: The ability of a business to monitor and manage the devices used by its remote workforce is hampered by remote and hybrid work. UEM solutions allow a company to manage both mobile and traditional endpoints from a single platform, allowing for better visibility and management.

Cost Savings: UEM tools provide a single solution for monitoring and managing all of an organization’s endpoints, resulting in cost savings. UEM reduces the capital and operational expenditures (OPEX/CAPEX) of managing an organization’s IT infrastructure by eliminating the need to acquire, deploy, maintain, and operate multiple standalone solutions. It also allows security teams to scale to meet their needs as their responsibilities grow. 

Importance of UEM

UEM solutions give a centralized view of all the endpoints connected to your network and allow you to manage them centrally and remotely without having to gather data from on-site and off-site device management tools; the UEM solution takes care of everything. This solution also makes it easy to keep track of device usage and health, such as vulnerabilities that need to be patched, operating system updates, and software or application updates that need to be distributed. When these features are combined, you can provide a baseline level of security and threat monitoring across all your endpoints, including personal mobile devices.

Unified Endpoint Management also helps in keeping track of device usage and health, such as vulnerabilities that need to be patched, operating system updates, and software or application updates that need to be distributed. When these features are combined, you can provide a baseline level of security and threat monitoring across all your endpoints, including personal mobile devices. Some UEM systems even include built-in security features that allow you to safeguard your endpoints from malware, viruses, and harmful software.


Unified Endpoint Management systems support consistent and stringent security rules across the board. Having such consistent regulations makes it easy for the IT staff to locate, monitor, and resolve any endpoint-related issues. As a result, purchasing a single UEM solution is more cost-effective and productive than purchasing multiple solutions that fulfil distinct needs.

Magnet Forensics Introduces Magnet IGNITE

A provider of digital investigation solutions, Magnet Forensics, today released a version of Magnet IGNITE, a cloud-based screening solution that allows organizations to manage rapid, remote scans of target endpoints for malicious and insider behavior.

Adam Belsher, chief executive officer at Magnet Forensics, commented, “When enterprises suffer cyber-attacks, it is imperative that they react both quickly and efficiently to minimize downtime and the monetary and reputational damages that come with it. Magnet IGNITE is a strategic first step for enterprises to turn to in their post-incident plans that can provide a quick and early assessment to pinpoint the systems involved with malicious or insider activity. With this information in hand, security teams can save time and resources by only performing full forensic analyses on impacted endpoints.”

Magnet IGNITE is the very first product to emerge from the Magnet Idea Lab, a network of beta testers that enable the organization in developing the next generation of digital forensics technology. Magnet IGNITE has been tested by 263 people since March 2021. Professional service providers and Fortune 500 firms in the telecommunications, healthcare, and technology industries were among the participants.

The newly launched Magnet IGNITE helps remediate many remote endpoints at the same time, giving digital forensic and incident response teams an early case evaluation that will help them plan the next stages in their security investigations. Magnet IGNITE helps organizations determine where and when they need to execute full forensic studies by swiftly gathering intelligence and assessing a suspected cyberattack or an insider’s exfiltration of intellectual property.

The Managing Partner of CYBIR and Former President of the Delaware Valley Chapter of the High Technology Crime Investigation Association, Michael Nelson stated,  “During testing, we immediately saw the value that Magnet IGNITE brings to data breach investigations. Data breaches can happen anywhere in the world and one of the most powerful features of Magnet IGNITE is that it allows us to investigate how they happened, the actions the threat actors took, and what data was exfiltrated, from any remote location. Our customers need these answers as quickly as possible to minimize business interruption and Magnet IGNITE has enabled us to provide them hours — and sometimes days — earlier.”