Comprehensive software reviews to make better IT decisions
BlueJeans Updates FY2021 Roadmap
On March 11, 2021, Verizon provided updates to BlueJeans’ product vision and direction for FY2021. BlueJeans experienced dramatic adoption in 2020. This was particularly true for webinars and virtual events, which saw four times as many BlueJeans events in 2020 than in 2019, reaching 150,000 in total (or 23 million hours).
BlueJeans’ roadmap updates respond to new data from IDG about participants’ preferences when attending virtual events. Out of 200 organizations surveyed, 93% of them plan on evaluating new virtual event technology and 83% expect virtual event attendance to increase over the next year. For these events to be successful, 45% reference the quality/professionalism of video/audio and 38% point to the opportunity for audience discussion.
In this context, BlueJeans announced the following expected features on its tentative roadmap for FY2021:
- Improved video capabilities: 720p active speaker (March), multi-participant pinning (Q2), and 7x7 video layout (2H).
- Emphasis on quality: improved app installation and faster join times (March), alongside improved HID capabilities and CPU optimizations (Q2).
- Support for larger meetings: participant capacity of 500 (in Q2) and 1000 (in Q3), alongside audio lock (Q3).
- Breakout rooms control: re-assign breakout rooms (1H), open breakout rooms (1H), host able to chat with any breakout room session without needing to join (2H), timer and notifications (2H), and co-host controls (2H).
- Enhanced collaboration: persistent whiteboards for asynchronous and synchronous collaboration (2H), file transfer (2H), polling (2H), and Q&A functionality (2H).
- Event features: backstage chat for presenters and moderators (1H), embeddable chat and Q&A for embedded player (2021), and mobile app embeddability in design.
There are several attractive takeaways from BlueJeans’ projected roadmap for FY2021. The breakout rooms control is certainly a capability that will position BlueJeans as a frontrunner in this space. For virtual workshops, classes, and, other use cases that rely heavily on breakout sessions, you will struggle to find better administrative control elsewhere.
However, BlueJeans is still generally catching up to other key players in the web conferencing space with other capabilities. For instance, most market leaders already have customization for a variety of grid layouts (including 9x9), while BlueJeans is only providing 7x7 video layout by the second half of FY2021. Moreover, features such as polling and file transfer have been available in this market for a while.
SoftwareReviews' data indicates that BlueJeans users do not rate this web conferencing solution high for its product features. While BlueJeans scores well for vendor experience, organizations looking for an overall market leader may not find the advanced features they need in BlueJeans.
Source: SoftwareReviews Web Conferencing Data Quadrant. Accessed March 23, 2021.
To aid your web conferencing software selection search, use Info-Tech’s Rapid Application Selection Framework to quickly short-list and score the best solution for your organization.
Want to Know More?
- Rapid Application Selection Framework
- SoftwareReviews Web Conferencing Data Quadrant
- SoftwareReviews BlueJeans Meetings Scorecard
- Briefing: BlueJeans by Verizon
- Verizon Acquires BlueJeans for $400-500 Million
This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of security solutions. It explores Zscaler's approach to overcoming the limitations of traditional VPN architectures, using artificial intelligence (AI) for threat detection, and integrating various security functionalities within a unified platform. Drawing insights from analyst demo notes, vendor information, and independent research, this analysis aims to provide a comprehensive and unbiased assessment of Zscaler's value proposition for security professionals.
In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the volume of digital certificates used to secure machines, applications, workloads, services, and devices continues to grow exponentially, organizations often struggle with a lack of visibility and manual processes, resulting in critical service outages and security vulnerabilities. AppViewX CERT+ is a next-generation automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management. It combines the best of automation, security, and insights to meet enterprise machine identity and digital trust requirements. AppViewX CERT+ features are purpose-built to address both the operational and security challenges of certificate management to, in turn, help organizations prevent application outages and security breaches. By enabling enterprise-wide crypto-agility, AppViewX CERT+ enhances machine identity trust, eliminates security gaps, promotes compliance, and supports post-quantum cryptography readiness.
In the digital realm, trust is currency. Without robust identity verification, online interactions become a breeding ground for fraud and exploitation.
In the ever-evolving landscape of SaaS Security, one company has quietly forged its path, becoming a beacon of protection for large enterprises grappling with the growing complexity of SaaS applications. This is the story of Adaptive Shield, a rising star in the SaaS Security space, whose journey from a nimble startup to a recognized industry leader is as remarkable as the solutions it offers. Founded in 2019 by cybersecurity veterans Maor Bin and Jony Shlomoff, Adaptive Shield entered the scene with a bold vision: to address the growing blind spot in the SaaS ecosystem regarding enterprise security – including the dangers deriving from misconfigured security controls, lack of management regarding human and non-human identities, interconnected apps, and the detection of threats within these business-critical apps. Recognizing the exponential adoption of SaaS and the inherent risks it posed, the company set out to build a comprehensive shield, not just for individual applications, but for the entire interconnected SaaS ecosystem.
LoginRadius started as a simple social login provider but pivoted to create a comprehensive CIAM platform that now reaches over a billion consumers worldwide. My analyst demo with LoginRadius confirmed what they pride themselves on: delivering a user-friendly platform that simplifies CIAM implementation and management.
Qwiet AI is a San Jose, California-based company that develops an AI-powered application security platform. The company's flagship product, preZero, uses machine learning to automate and accelerate application security testing, enabling developers to identify and remediate vulnerabilities early in the software development lifecycle (SDLC). Qwiet AI was founded in 2016 by a team of experienced cybersecurity professionals with a shared vision of empowering developers to build secure software. The company's mission is to "Prevent the Unpreventable" by providing a comprehensive and AI-driven solution that helps organizations of all sizes secure their applications from the very beginning.
We should start by defining what a secret is. It’s really any piece of confidential information used to authenticate access to sensitive resources. This includes passwords, API keys, encryption keys, SSH keys, and other digital credentials. Many of the organizations I talk to have an application security program with some OWASP checks in the pipeline, some SAST, but rarely SCA or DAST testing. GitGuardian believes secrets detection and remediation is crucial for maintaining security and preventing unauthorized individuals from accessing sensitive information or disrupting critical systems. I agree and believe the value it can bring to an application security program is significant.
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.