Comprehensive software reviews to make better IT decisions
IT Operations
Zoho Corporation has announced a strategic partnership with NVIDIA to leverage the NVIDIA AI accelerated computing platform, including NVIDIA NeMo, for the development and deployment of advanced AI models within Zoho's SaaS applications. This collaboration aims to enhance AI capabilities for Zoho's extensive customer base of over 700,000 businesses worldwide.
In a session titled “Resolving IT Crises Instantly – Transforming IT Efficiency and Business Continuity” Oren Rosen of eProc Solutions shared insights on resolving IT crises instantly at Info-Tech LIVE 2024.
Eracent is a privately held IT asset management (ITAM), software asset management (SAM) and cybersecurity solution provider founded in 2000. Their roots trace back to AT&T, Bell Labs, and Lucent’s pre-Y2K initiatives (around 1997-2000), where a core focus was placed on IT asset discovery and protection. Eracent emphasizes their experience with extensive asset discovery during a period with significantly different internet and network connectivity compared to today and have consistently focused on ITAM and SAM solutions throughout their existence. This note features Eracent’s extension into open-source software risk mitigation though software bill of materials (SBOM) management.
In this tech note I take a closer look at Devolutions, a partial stack Privileged Access Management (PAM) vendor, exploring its history, market positioning, core features, and differentiating factors. Through insights gleaned from a vendor briefing and demo, I explore Devolutions’ evolution, target audience, and its strategic approach to the PAM landscape.
Cisco consolidated its position as one of the largest software companies globally by completing the acquisition of Splunk.
This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of security solutions. It explores Zscaler's approach to overcoming the limitations of traditional VPN architectures, using artificial intelligence (AI) for threat detection, and integrating various security functionalities within a unified platform. Drawing insights from analyst demo notes, vendor information, and independent research, this analysis aims to provide a comprehensive and unbiased assessment of Zscaler's value proposition for security professionals.
In the market for software? Learn why it's important to have multiple vendors at the negotiation table.
The Morpheus cloud management platform (CMP) has moved beyond its original focus on DevOps automation and self-service. Morpheus provides a management control plane to enable users to deploy workloads anywhere. Such a control plane is the way of the future for managing complex enterprise technology stacks.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
With lots of functionality being provisioned/deployed at the tenant level, Microsoft is happy to sit back for now, watch, and start auditing in the future.
ServiceNow’s Orlando release introduced Now Intelligence, a set of features that strengthen ServiceNow’s lead in the AI-powered IT service management (ITSM) and digital transformation space.
VMware has issued the highest Common Vulnerability Scoring System 3 (CVSSv3) rating, 10.0, on a vulnerability (CVE-2020-3952) found on its VMware vCenter Server version 6.7 software. VMware now has a patch to address this vulnerability, and administrators are urged to install the patch as soon as possible.
The reality of our new world is finally sinking in, with COVID-19 sprawling across the globe. The actions you take now will determine how well organizations will weather this economic shutdown.
Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent 90-day policy.
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.
On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.
Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.
Microsoft has announced self-service purchasing, the ability for any O365 user to buy Power Platform products directly through their corporate O365 tenant. This raises numerous concerns with IT leaders and O365 administrators.
Microsoft’s overlapping endpoint management solutions (SCCM, Intune) have confused users. Microsoft itself has acknowledged this problem and resolved it by uniting its co-management services under one banner: Microsoft Endpoint Manager.
Clearlake Capital is shaking up Ivanti’s leadership. Expect greater focus on efficiency and acquisitions beyond ITSM and IT operations.