ITSM vendor InvGate announced that due to COVID-19 any organization can use InvGate Service Desk free of charge. This promotion helps IT departments when they need it most while gaining adoption and market traction for InvGate.
As COVID-19 has impacted most businesses around the world and IT employees have been forced to work from home, InvGate has come up with its COVID-19 response program to assist organizations in better managing and tracking tasks.
Source: InvGate COVID-19 Response Program at InvGate. © InvGate 2020, Used with Permission.
InvGate’s COVID-19 response program offerings are as follow:
Since the announcement, over one hundred organizations have participated.
This promotion is great because it helps IT departments during this critical time while also gaining adoption and market traction for InvGate. COVID-19 makes it difficult for organizations to plan and to be productive. Having an ITSM tool and automated processes help organizations be more responsive to quickly changing environments. InvGate is making it easy for organizations that don’t have an ITSM solution to quickly adopt and build something.
This ultimately is a win-win for both IT departments and for InvGate. It helps clients, prospects, and organizations at the front of the pandemic response. This promotion will also improve InvGate’s visibility in the market and help it to build better relationships with current and prospective clients. Hopefully, this promotion encourages other IT vendors to do the same.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Thinking about choosing a new software vendor but don't know where to start? Narrow down your shortlist by focusing on software that has received an Info-Tech Research Group award. New data from SoftwareReviews shows that organizations reported higher satisfaction when they switched to software that had received an Info-Tech award.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Atlassian has acquired Halp, a real-time helpdesk tool that integrates with Slack. With the broader context of this move being Atlassian and Slack’s strategic alliance, might there be more to this acquisition than meets the eye?
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.