Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Lost & Stolen Device Management with Ivanti MDM

Ivanti
04/06/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Ivanti automates lost/stolen device response by simultaneously notifying IT, security, legal, HR, asset management, building security, and other departments with context-specific tasks, eliminating manual coordination.
  • The MDM integration enables immediate remote actions including app removal (demonstrated removing TikTok in seconds), device locking, selective enterprise data wipes, or full device wipes directly from the service desk.
  • Security incidents automatically generate risk register entries mapped to affected compliance controls (ISO, HIPAA, GDPR), ensuring governance teams assess regulatory impact alongside technical remediation.
  • Mobile threat defense integration provides real-time device risk posture monitoring, while Apple Business Manager enrollment ensures wiped devices remain organizationally locked and unusable by unauthorized parties.
  • Devices can be re-enrolled in under two minutes if recovered, minimizing business disruption while maintaining security controls throughout the incident lifecycle.

Cross-Functional Incident Response Process

This demonstration showcases Ivanti's approach to managing lost or stolen mobile devices through automated, cross-functional workflows. When a device is reported missing, the platform automatically notifies multiple departments including IT operations, asset management, legal, HR, security operations, risk and compliance, building management, and procurement. Each team receives context-specific tasks aligned with their responsibilities, eliminating manual notification processes and ensuring comprehensive incident response. The integration between Ivanti's service management platform and its Neurons for MDM solution enables two-way communication — pulling device information into incident records while pushing remote commands like lock, wipe, or app removal directly to the device.

Technical Controls and Mobile Threat Defense

The technical demonstration illustrates granular device control capabilities through the MDM console. Administrators can remotely remove specific applications (demonstrated with TikTok removal in seconds), lock devices, wipe enterprise data selectively, or perform full device wipes. The platform integrates mobile threat defense monitoring, providing real-time risk posture assessment and threat history for enrolled devices. For devices enrolled through Apple Business Manager's Device Enrollment Program, wiped devices remain tied to the organization, effectively becoming unusable by unauthorized parties. The solution supports both corporate-owned and BYOD scenarios, with options to wipe only enterprise data while preserving personal information.

Risk and Compliance Integration

Beyond immediate technical response, the platform automatically creates security incidents and risk register entries when devices are reported lost or stolen. The risk and compliance module maps incidents to affected controls (encryption, SSO, physical security, mobile device policies) and links them to broader regulatory frameworks like ISO, HIPAA, and GDPR. Risk officers can track mitigation plan effectiveness, monitor risk score changes over time, and maintain visibility into how device loss impacts organizational compliance posture. This integration ensures that device incidents are evaluated not just as isolated technical problems but as potential compliance and security risks requiring governance-level attention.

Rapid Recovery and Re-Enrollment

The demonstration concludes with a recovery scenario where the lost device is found and re-enrolled in under two minutes, highlighting the platform's ability to quickly restore service. This rapid re-enrollment capability, combined with the automated workflows and integrated controls, demonstrates Ivanti's positioning around minimizing both security exposure and business disruption when mobile devices go missing. The end-to-end process — from initial incident logging through departmental notification, technical remediation, risk assessment, and device recovery — is presented as a unified, automated workflow rather than a series of disconnected manual steps.

Chapters

0:00 - Introduction and Overview
0:52 - Why Device Loss Management Matters
1:59 - Cross-Functional Notification Requirements
4:26 - Service Desk Incident Logging Demo
5:52 - Automated Task Creation and Assignment
7:02 - Device Asset Integration and Remote Actions
9:25 - MDM Console: App Removal Demo
11:38 - Mobile Threat Defense Integration
12:42 - Remote Device Wipe Demonstration
14:24 - Security Incident Management Workflow
16:08 - Risk and Compliance Integration
20:01 - Use Case Summary and Timeline
22:13 - Device Recovery and Re-Enrollment

Key Quotes

0:26 "Who needs to know that a high-priority device has gone missing? Whether there's data that needs protecting, what controls, what part of the business needs to know that a device with sensitive data has gone walkabout, how we walk that through a process that contacts every part of the business that needs to know."
2:32 "The building management team, this is an unusual one, but some organizations have smart apps on their phones that allow them to enter the building using their mobile phone as opposed to a plastic card, a physical card that they may use. So if your phone has gone missing, potentially our building access is potentially not secure."
7:16 "Again, we could be feeding in from the MDM solution to get all the information about that phone, but, again, it's a two-way street. I can actually interact with that device as well."
11:24 "And we can see on the right here TikTok has now been removed. And that literally took a few seconds to do and a few clicks to get that app off the device."
13:32 "Because this is enrolled in Apple Business Manager using the device enrollment program, it is tied to the organisation anyway, but it'll just become effectively a brick to anyone else other than the organisation's employees."
16:56 "Security operations are doing their piece, but now risk and compliance need to be involved as well."

Categories:
  • » Webinar Library » Ivanti
  • » Cybersecurity » Endpoint Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Endpoint Management
  • Security Operations
  • Compliance & Governance
  • Technical Deep Dive
  • Demo
  • Mobile Device Management
  • Incident Response Automation
  • Cross-Functional Workflows
  • Risk and Compliance Integration
  • Mobile Threat Defense
  • Remote Device Control
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Lost & Stolen Device Management with Ivanti MDM

              Upcoming Webinar Calendar

              • 04/08/2026
                11:00 AM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202611:00 AM ET
                • Apr
                  15

                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities

                  04/15/202601:00 PM ET
                  • Apr
                    30

                    Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                    04/30/202610:00 AM ET
                    • Apr
                      30

                      The New Economics of VMware Exit

                      04/30/202601:00 PM ET
                      More events
                      Truth in IT
                      • Sponsor
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Preference Management
                      Desktop version
                      Standard version