Comprehensive software reviews to make better IT decisions
Snow’s Technology Intelligence Suite Can Provide an Avalanche of Value – Once You Have SAM Processes Established
Snow Software has expanded its software asset management (SAM) offering with a new technology intelligence suite. SAM teams that combine this technology with process maturity should gain needed insight into on-premises and cloud technologies.
Snow announced its vision of technology intelligence, which it says will provide organizations with insight into software, hardware, SaaS, and IaaS technologies as they navigate cloud shift and digital transformation. Snow has launched six products:
- Adoption Tracker – enables discovery, inventory, and normalization of all digital technology assets to provide visibility into usage across the organization.
- Spend Auditor – provides insights into what is driving technology spend on-premises and in the cloud to help budget and prepare for audits.
- Spend Optimizer – provides detailed information to recommend areas to reduce spend and automate license harvesting.
- Productivity Optimizer – automates lifecycle management processes and workflows, including cloud optimization for AWS, Azure, and Google Compute Engine.
- Risk Monitor – provides intelligence to prioritize applications that pose the largest risks to data privacy, compliance, and software vulnerability.
- ITSM Enhancer – supplements existing data within ITSM tools to improve data quality.
Source: SoftwareReviews Snow Product Scorecard, Accessed August 21, 2019.
Snow’s Software Asset Management solution is a strong tool for managing complex environments, and the addition of the technology intelligence suite to its line of products will move the company further into enterprise functionality, providing deeper insights into hardware, SaaS, and IaaS technologies.
The Productivity Optimizer, Risk Monitor, and Adoption Tracker products may also give Snow an edge over other non-SAM tools that cannot offer the same level of deep analysis across a broad environment. The ability to offer insights into both cloud and on-premises licensing is an advantage over most of its competitors – tools rarely offer both.
The potential enabled by this offering sounds exciting, but you need to have the right processes and people in place for the technology to provide value. The tool may make it easier to achieve these benefits, but process and role definition is necessary first.
Want to Know More?
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.