Cherwell Asset Management (CAM)’s latest release expands its software asset management capabilities with SaaS Analytics. You can use it to analyze SaaS usage and licensing costs, but this first iteration only supports Salesforce and Box.
SaaS Analytics provides visibility into usage and licensing costs from hosted applications. Once a connection is configured to a SaaS application, CAM can collect license and usage data. It then analyzes and presents that data with built-in reporting on license entitlements, assigned licenses, license usage, subscription costs, and annualized savings potential (i.e. the cost of unused licenses). IT asset managers can use this information to identify areas for cost savings and optimize license spending.
Other new features in CAM 15.0 include the ability to add custom network device types and values, improvements to discovery and configuration performance, and verified support for running on AWS.
Source: IT Asset Management Data Quadrant at SoftwareReviews, Report Published May 2019.
As organizations spend more on SaaS applications, the opportunity for waste increases as it becomes easy and common to overspend on licenses. Software asset management tools, when combined with good processes, can analyze license usage information to discover these areas of waste and help organizations optimize their software spend.
Cherwell’s expansion of its asset management tool to include SaaS Analytics will be a welcome addition for organizations that are already using Cherwell’s platform or are looking for a strong all-in-one IT software management solution that can analyze usage of both SaaS and on-premises applications.
However, while core usage and savings data are available, the number of reports that can be produced through SaaS Analytics is currently limited in comparison to more robust software asset management (SAM) tools. In addition, CAM only supports Salesforce and Box in this first version. Cherwell plans to add additional applications in the coming months, starting with Office 365, but if you’re looking for deep SaaS asset management analytics on multiple SaaS applications, you may want to consider a dedicated SAM tool with this capability.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.