Comprehensive software reviews to make better IT decisions
SaaS Management Tools Grow in Popularity With Zylo Leading the Way
Enterprise SaaS Management platform Zylo recently raised $22.5 million in Series B funding to grow its workforce and development, making it a strong leader in this emerging space.
Software as a Service (SaaS) management tools are growing in popularity as more and more organizations move to the cloud. These tools provide visibility into all SaaS applications being used across the organization, to help improve workflows, security, user provisioning, and license utilization. According to Zylo co-founder and CEO Eric Christopher, “Today, enterprises spend an average of $10,000 or more per employee on SaaS, making the stakes higher than ever for CIOs to optimize their investments and give employees tools that maximize productivity.”
Zylo provides a central system of record to discover, manage, and optimize SaaS applications. This includes the ability to identify and unify redundant functions and applications, centrally monitor license and data utilization, automatically deprovision inactive licenses, inform renewal negotiations, and provide an approved app catalog. This latest round of funding will enable Zylo to continue to grow its workforce and deliver on its product roadmap.
As organizations’ SaaS portfolios grow, so too does the need for a centralized system of record that allows IT managers to discover, manage, measure, and optimize their SaaS solutions. Many ITAM solutions don’t yet have pre-built SaaS management functionality, so organizations that are heavily cloud-based should consider investing in a SaaS management tool to avoid being overlicensed and overspending on their SaaS subscriptions. With Zylo’s latest round of funding and growing enterprise client base, they are well-positioned to provide the visibility these organizations need and continue to lead the SaaS management space.
As always though, a new tool alone is not enough to solve your problems; ensure your asset management and configuration management processes are up to date first to deliver value from the tool. Download Info-Tech’s blueprint Find the Value – and Remain Valuable – With Cloud Asset Management for help building your cloud asset management practice.
Read Zylo’s press release here.
Want to Know More?
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.