How To

/How To

Five Ways to Use Xtraction

2018-02-15T19:25:53+00:00 February 15th, 2018|How To, Ivanti|

Five Ways to Use Xtraction Ivanti Xtraction consolidates data from multiple sources and tools and presents it in one place. Pre-built data connectors mean no coding, no BI gurus, and definitely no spreadsheets. View your data in context and make smarter, faster decisions with ease. A new version of Xtraction was just released, that includes [...]

{How-To} Ivanti InstallEase

2017-10-17T20:39:05+00:00 October 17th, 2017|How To, Ivanti|

For those of you who have used the Ivanti product lines for some time - Do you remember LANDESK Enhanced Package Builder? It was a great and simple tool to help build software distribution packages.  You’d install the Enhanced Package Builder on a device, take a snapshot, install the software, take another snapshot and then [...]

{How-To} Ivanti Endpoint Security – Device Control

2017-09-05T20:38:57+00:00 September 1st, 2017|How To, Ivanti, LANDESK, Uncategorized|

Lock Down Endpoints to Prevent Illicit Use of Removable Devices and Ports Watch this brief 5-minute video for practical tips on how to get started using Ivanti Endpoint Security for Device Control at your organization. And for more information on Ivanti or upgrade questions, contact the NAI Team. We offer custom remote or onsite packages [...]

{How-To} Ivanti Patch Manager

2017-09-08T19:46:06+00:00 July 26th, 2017|How To, Ivanti, Uncategorized|

Fail to keep up with patching needs and your whole network’s at risk. Ivanti Patch for Endpoints protects your most vulnerable software and keep your users productive, while IT focuses on core business goals. Watch this informative {How-To} video to answer some of your pressing questions and get practical tips you can start using today. [...]

{How-To} Isolate A Device On The Network Using Ivanti

2017-09-08T19:45:20+00:00 July 11th, 2017|How To, Ivanti|

The Isolate from Network tool in Ivanti’s Endpoint Management can help you keep malware from infecting devices in your network. The isolate from network feature is available via Endpoint Security. Simply using Endpoint Security enables the isolation utility on the device but how do you know if the device has malware? To select the device [...]