About
Experienced CISO, CTO, architect and engineer of 40 years, with a demonstrated history of…
Articles by Mike
Activity
-
A coworker made a meme today to ask for my help and it made my day — maybe even a top moment of my professional life. I definitely laughed. And I…
A coworker made a meme today to ask for my help and it made my day — maybe even a top moment of my professional life. I definitely laughed. And I…
Liked by Mike Riemer
-
Leadership accountability is vital for a healthy organizational culture. In more concrete terms, this means consistency, taking ownership, sound…
Leadership accountability is vital for a healthy organizational culture. In more concrete terms, this means consistency, taking ownership, sound…
Shared by Mike Riemer
-
Arriva Group, a UK-founded transportation company with 35,000 employees, made the switch from Cherwell to Ivanti Neurons for ITSM. The transition has…
Arriva Group, a UK-founded transportation company with 35,000 employees, made the switch from Cherwell to Ivanti Neurons for ITSM. The transition has…
Shared by Mike Riemer
Experience
Education
Patents
-
Autonomous policy enforcement point configuration for role based access control
Issued EP4022865B1
In general, this disclosure describes techniques related to network security and a network security infrastructure. The network security infrastructure may be operated to deploy and enable enforcement points to enforce network policies in designated private or protected network zones or subnets. The technology specifically relates to identifying unknown network device types, identifying network policy element to apply to the newly identified network device types and enabling policy enforcement…
In general, this disclosure describes techniques related to network security and a network security infrastructure. The network security infrastructure may be operated to deploy and enable enforcement points to enforce network policies in designated private or protected network zones or subnets. The technology specifically relates to identifying unknown network device types, identifying network policy element to apply to the newly identified network device types and enabling policy enforcement points to enforce the network policies without preventing the unknown device types from carrying out their intended purpose.
More activity by Mike
-
Ivanti is partnering with Project Hosts, Inc. to expedite our FedRAMP High and DoD IL5 compliance process. This partnership will strengthen our cloud…
Ivanti is partnering with Project Hosts, Inc. to expedite our FedRAMP High and DoD IL5 compliance process. This partnership will strengthen our cloud…
Shared by Mike Riemer
-
Cybersecurity is evolving, and exposure management is at the forefront of this fundamental shift. Ivanti's new report '2025 State of Cybersecurity:…
Cybersecurity is evolving, and exposure management is at the forefront of this fundamental shift. Ivanti's new report '2025 State of Cybersecurity:…
Shared by Mike Riemer
-
Coming soon to a city near you! Join Ivanti for an exciting event where business and technical leaders come together to learn, share, and…
Coming soon to a city near you! Join Ivanti for an exciting event where business and technical leaders come together to learn, share, and…
Liked by Mike Riemer
-
Why is Ivanti a Leader in #ITSM, according to the IDC MarketScape? Ivanti was recognized for the following strengths in the IDC MarketScape:…
Why is Ivanti a Leader in #ITSM, according to the IDC MarketScape? Ivanti was recognized for the following strengths in the IDC MarketScape:…
Liked by Mike Riemer
-
We're thrilled to announce that Ivanti has won the Utah Business Marketing & Communications Award 2025 for Best Content Marketing Campaign! 🎉 Our…
We're thrilled to announce that Ivanti has won the Utah Business Marketing & Communications Award 2025 for Best Content Marketing Campaign! 🎉 Our…
Liked by Mike Riemer
-
Things are changing rapidly in the digital threat landscape. GenAI is fueling sophisticated phishing attacks and deepfakes, and 45% of IT and…
Things are changing rapidly in the digital threat landscape. GenAI is fueling sophisticated phishing attacks and deepfakes, and 45% of IT and…
Shared by Mike Riemer
-
Don't let device issues and routine maintenance slow down your team! Ivanti bots can handle these tasks, freeing up your users and IT analysts to…
Don't let device issues and routine maintenance slow down your team! Ivanti bots can handle these tasks, freeing up your users and IT analysts to…
Shared by Mike Riemer
-
See how Latitude Information Security, a top cybersecurity firm, uses Ivanti Neurons for RBVM to manage and secure 10,000+ assets and sensitive data.…
See how Latitude Information Security, a top cybersecurity firm, uses Ivanti Neurons for RBVM to manage and secure 10,000+ assets and sensitive data.…
Shared by Mike Riemer
-
Inspiring Ivantian Valeria Spyro shares her experience using Volunteer Time Off to mentor a refugee in Germany. Her story highlights the profound…
Inspiring Ivantian Valeria Spyro shares her experience using Volunteer Time Off to mentor a refugee in Germany. Her story highlights the profound…
Liked by Mike Riemer
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Mike Riemer in United States
-
Mike Riemer
Executive Vice President
-
Mike Riemer
-
Mike Riemer
Production Control Analyst at Spirit AeroSystems
-
Michael Riemer
30 others named Mike Riemer in United States are on LinkedIn
See others named Mike Riemer