ConnectWise, a software provider for IT automation and management tools, has released three enhancements to streamline product management for its MSP clients:
These enhancements are aimed at simplifying management and administration for MSP partners, which has the potential to provide downstream service improvements for MSP customers. However, for the most part, these enhancements will be transparent to the end customer.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
VMware has issued the highest Common Vulnerability Scoring System 3 (CVSSv3) rating, 10.0, on a vulnerability (CVE-2020-3952) found on its VMware vCenter Server version 6.7 software. VMware now has a patch to address this vulnerability, and administrators are urged to install the patch as soon as possible.
TietoEVRY is using Ayehu NG to automate activities in applications such as SAP. SAP automation has great potential to free up resources in applications teams.
TietoEVRY is using Ayehu for IT automation to avoid locking in its customers. TietoEVRY is betting on its relationship building and quality of service to retain accounts.
Ayehu is leveraging quality of service as a differentiator. Info-Tech expects that service will continue to become more important among software vendors.
Ayehu is expanding its footprint in automation in the applications space. Info-Tech expects that automation vendors will compete based on their application automation capabilities.
TietoEVRY and Ayehu have announced a partnership. This partnership aligns with the strategic priorities of both companies.
Ayehu announced that it will be collaborating with Automation Anywhere, a robotic process automation (RPA) solution provider. This collaboration is a complementary marriage of opposites with the potential to benefit both vendors.
A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.