Ivanti extend cybersecurity offerings to help customers

With Ivanti Neurons for Zero Trust Access, customers can secure access across devices and networks and align with President Biden’s Executive Order

Ivanti, the automation platform that discovers, manages, secures, and services IT assets from cloud to edge, has announced the latest release of Ivanti Neurons for Zero Trust Access. 

According to the company, Ivanti Neurons for Zero Trust Access will help organisations improve their security posture through a Zero Trust aligned and flexible direct-to-application access solution. With this announcement, Ivanti continues to deliver on its mission of securing the Everywhere Workplace, in which employees use various devices to access corporate networks, data, and services as they work from different locations.

 

US Executive Order on cybersecurity

 

This announcement comes soon after President Biden’s Executive Order to enhance cybersecurity. The order states that federal agencies must “develop a plan to implement Zero Trust Architecture, which shall incorporate, as appropriate, the migration steps that the National Institute of Standards and Technology (NIST) within the Department of Commerce has outlined in standards and guidance, describe any such steps that have already been completed, identify activities that will have the most immediate security impact, and include a schedule to implement them.”

“Zero Trust should be in the hearts and minds of all IT and security professionals today,” said Dr. Chase Cunningham, industry analyst, formerly of Forrester and creator of Forrester’s Zero Trust eXtended Ecosystem. “Zero Trust is more important today than ever before due to the recent onslaught of attacks we have seen from sophisticated threat actors. While the White House’s cybersecurity executive order directly impacts federal agencies, all organisations should implement a Zero Trust strategy to achieve comprehensive visibility across users, devices, apps, and networks, and combat growing cyberthreats as quickly as possible.​”

 

Changing work environments calls for Zero Trust 

 

According to a recent survey conducted by Ivanti, 98%% of North American IT and security practitioners say their security practices will become more aligned with a Zero Trust strategy over the next year, including 21% who say they’ll become significantly or completely aligned. 

“Forming a strong security foundation through a Zero Trust strategy is ground zero for securing the Everywhere Workplace,” said Daniel Spicer, VP of Security at Ivanti. “With Ivanti Neurons for Zero Trust Access, organizations can align with a Zero Trust architecture and advance their security posture while improving end-user experiences. And perhaps best of all, customers can achieve greater granularity in contextual policy enforcement without replacing their existing network access investments.”

Ivanti has recently announced that it has been selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate as a collaborator in the Implementing A Zero Trust Architecture project. The goal of the project is to build Zero Trust security architectures to help organisations mitigate cybersecurity risk.

Share

Featured Articles

Arctic Wolf: BEC Now Top Method of Cyber Attack on Business

A new study has revealed that Business Email Compromise attacks are now the primary method used by cybercriminals to target organisations.

BlueVoyant's Tom Moore Talks Legal Procedure Following Hack

BlueVoyant's Tom Moore explains how companies should act with legal council following a cyber attack

GDPR: Studying the World's Strictest Security Law 6 Years On

We take a look at the history, impact, and future of GDPR to see how it has effected the cyber sphere six years after its enactment

Banking Titan Baird Gives 9 Pointers for Cyber Investors

Cyber Security

OpenText's Pillr Buy Show Acquisitions Still in its Strategy

Cyber Security

Zoom Prepares for Quantum World with Post-Quantum Encryption

Cyber Security