ServiceNow version New York has entered General Availability. These features should delight high-maturity IT departments.
New features that were highlighted in their announcement include:
Source: ServiceNow Service Management, Report Published July 2019
Low-maturity IT departments will find it hard to get value from these new features. In the July 2019 SoftwareReviews report for ServiceNow Service Management, the product did not score highly in many categories despite ranking first in plan to renew (100%). For instance, it scored:
These scores can partly be attributed to the level of maturity required to realize benefits from ServiceNow’s features. Before you can use a virtual agent, deploy an onboarding app, or have cross-functional applications, IT must have:
Too many of our clients simply do not have the process maturity for taking advantage of these new features. The ones that do have high process maturity, though, will be able to innovate with these new ServiceNow capabilities.
The Department of Justice is looking to acquire a GRC tool for the Office of the CIO within the FBI’s Enterprise Information Security Section.
The International Association of Privacy Professionals (IAPP) has released its 2020 Privacy Tech Vendor report, reviewing key software solution vendors within the space. This year’s report highlighted the recent addition of Data Subject Request (DSR) to the feature categories.
Atlassian has acquired Halp, a real-time helpdesk tool that integrates with Slack. With the broader context of this move being Atlassian and Slack’s strategic alliance, might there be more to this acquisition than meets the eye?
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the leading factors behind CFGI offering Workiva to its clients.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Organizations are complex and have multiple stakeholders involved in the delivery of a service. In a public sector organization, for example, there are end users, multiple agencies and departments, and vendors involved in the delivery and consumption of the service. Service design methods and tools assist in making sense of these stakeholders’ inter-relationships and allow organizations to make sound decisions during service implementation.