Comprehensive software reviews to make better IT decisions
ServiceNow New York is Here
ServiceNow version New York has entered General Availability. These features should delight high-maturity IT departments.
New features that were highlighted in their announcement include:
- Now Mobile: Improved mobile features for end users, including a virtual agent and an onboarding app
- Finance Operations Management: This new finance department offering has a Finance Close Automation application
- IT workflows: Added workflows and functionality for vendor management, service owner workspace, operator workspace, and SaaS license management
- Codeless custom workflows: The New York release contains an application called Guided App Creator that allows users to create their own workflows with a wizard
Source: ServiceNow Service Management, Report Published July 2019
Low-maturity IT departments will find it hard to get value from these new features. In the July 2019 SoftwareReviews report for ServiceNow Service Management, the product did not score highly in many categories despite ranking first in plan to renew (100%). For instance, it scored:
- Twelfth (12th) out of 15 products in the Quality of Features
- Ninth (9th) out of 15 in Usability and Intuitiveness
- Eleventh (11th) out of 15 for Business Value Created
These scores can partly be attributed to the level of maturity required to realize benefits from ServiceNow’s features. Before you can use a virtual agent, deploy an onboarding app, or have cross-functional applications, IT must have:
- Defined, documented, and adhered-to IT processes
- A high-quality user-facing knowledgebase
- Cross-functional workflows for cross-functional requests such as onboarding
- High-quality data within ServiceNow
- A well-functioning CMDB
Too many of our clients simply do not have the process maturity for taking advantage of these new features. The ones that do have high process maturity, though, will be able to innovate with these new ServiceNow capabilities.
Want to Know More?
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the leading factors behind CFGI offering Workiva to its clients.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Organizations are complex and have multiple stakeholders involved in the delivery of a service. In a public sector organization, for example, there are end users, multiple agencies and departments, and vendors involved in the delivery and consumption of the service. Service design methods and tools assist in making sense of these stakeholders’ inter-relationships and allow organizations to make sound decisions during service implementation.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
The impact of COVID-19, as it became a global pandemic in Q1 of 2020, has affected user sentiment toward software during a growing period of fear, uncertainty, and doubt. To analyze the impact, SoftwareReviews compared Satisfaction (willingness to recommend to a peer), ability to deliver Business Value (fair cost to value), and Likeliness to Renew prior to March 10 and post March 10.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.