About prmcs

This author has not yet filled in any details.
So far prmcs has created 34 blog entries.

{Tech Tip Tuesday} Ivanti Endpoint Manager – Importing Software Licenses

2018-10-09T19:47:45+00:00October 9th, 2018|How To, Ivanti, Tech Tip Tuesday|

The second in our new series 'Tech Tip Tuesday'.  Be sure to subscribe, like and share our videos!  Have a topic you would like to see?  Let us know! Watch the {Tech Tip Tuesday} video to see how to import Software Licenses in Ivanti Endpoint Manager. For more information on Ivanti contact the NAI Team. We [...]

{Tech Tip Tuesday} Ivanti Service Desk – List Creation

2018-10-02T21:18:59+00:00October 2nd, 2018|How To, Ivanti, Tech Tip Tuesday|

The first in our new series 'Tech Tip Tuesday'.  We will be posting short videos, usually less than 10 minutes, that will explain how to do tasks in the Ivanti line of products.  Be sure to subscribe, like and share our videos!  Have a topic you would like to see?  Let us know! Watch the [...]

Tips For Making Ivanti Patching Easier

2018-08-17T18:16:29+00:00August 17th, 2018|How To, Ivanti, Patch Management|

Using Definition Download Settings for Disabled Replaced Rules and Autofix to Help Make Patching Easier A lot of organizations are struggling with patching. They have a well-established patching process and schedule, however, they are putting more work into it that they need to. One area that is overlooked is the Disabled Replaced Rules tool is [...]

Cost Savings And Business Benefits Enabled By Security Solutions

2018-08-03T17:27:22+00:00August 2nd, 2018|Ivanti|

Experience Real ROI with Ivanti Security Solutions Marketing claims are one thing. Genuine facts and figures speak for themselves—like the ones found in the Forrester Consulting Total Economic Impact ™ (TEI) study, commissioned by Ivanti. Forrester examined the potential ROI that organizations could experience by using Ivanti® Security Solutions. Here are some highlights of the [...]

Ivanti Automation 2018.2 Product Update

2018-07-31T14:41:19+00:00July 31st, 2018|Ivanti|

Ivanti Automation 2018.2 is now available Ivanti Automation is better than ever with the latest release. Using Ivanti Automation, organizations are able to: Automate routine configuration, provisioning and upgrades using more than 300 built-in automation tasks Transform request fulfillment and incident resolution times, no longer waiting on human decision and availability to [...]

Which Ivanti Patch Tool is Right for You?

2018-06-13T17:05:19+00:00June 13th, 2018|Ivanti|

Which Ivanti patch solution is right for you? Eighty-six percent of reported vulnerabilities are found in third-party applications. In minutes, Ivanti solutions can be operating to help you catch, analyze, and remediate systems across your organization, automatically, based on procedures you specify. Ivanti’s patching tools are proven to remediate threats, Patch for [...]

Highlights from Ivanti Interchange 2018

2018-05-24T20:27:41+00:00May 23rd, 2018|Ivanti, News|

Highlights from Ivanti Interchange 2018 Didn't make it to Interchange 2018? No problem. Our entire team was in attendance and we put together some of the major announcements and highlights below. Unified IT and ELA Ivanti announced a new Enterprise License Agreement before Interchange but if you missed it. It is a user-based, 2-3 year subscription [...]

{Press Release} Network America Formalizes Partnership with CyberloQ

2018-05-11T17:48:01+00:00May 11th, 2018|News|

Network America formalizes partnership with CyberloQ to bring best-of-breed identity governance solutions to clients  VENICE, FL, May 10, 2018 (GLOBE NEWSWIRE) -- Advanced Credit Technologies, Inc. ("CyberloQ" or the "Company") (PINK: ACRT) is pleased to announce the following update on the Company's business and information objectives going forward. After months of in depth coding and testing [...]

New C# Ransomware Compiles itself at Runtime

2018-04-30T18:57:25+00:00April 30th, 2018|Ivanti|

New C# Ransomware Compiles itself at Runtime A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directly into memory. Discovered by MalwareHunterTeam, this ransomware contains an encrypted string that is embedded into the dropper as [...]

Next-Generation ITSM: The Past as Prologue

2018-04-03T21:10:18+00:00April 3rd, 2018|Ivanti|

This post was originally published on Next-Generation ITSM: The Past as Prologue Can the past help you to plot and navigate an effective course to the future of ITSM and IT at your enterprise? Research by respected analysts Enterprise Management Associates® (EMA™) indicates that it can—and should. That research is featured in a new report [...]