Latest products, services and ventures

November 28, 2016

BlackLine announces platform enhancements
BlackLine, a leading provider of financial controls and automation software that enables Continuous Accounting has announced updates to its flagship Finance Controls & Automation Platform designed to further enable Finance & Accounting departments to transform their operations into true Modern Finance organisations. With significantly increased processing speeds and enhanced functionality, BlackLine customers can now access extremely large amounts of data instantly, enabling customers to generate custom reports within seconds from within the BlackLine application screen where they are working. BlackLine’s navigation tool also now combines an intuitively organised menu with enhanced system search capabilities. Finally, a typical customer running SAP ERP may have millions of open items, often requiring lengthy analysis as part of the reconciliation process and also manual effort to clear these items after analysis. Without BlackLine, the manual process of analysing this information can often lead to transactions that are written off or inaccurately left open. BlackLine’s updated connector for SAP ERP is now able to automatically clear open items in SAP ERP, delivering an end-to-end solution to automate the analysis, reconciliation and clearing of open items.

LogRhythm 7.2 boosts effectiveness and efficiency of enterprise security operations
LogRhythm has announced the release of LogRhythm 7.2, a major upgrade to its leading security intelligence and analytics platform. This release extends LogRhythm’s lead in providing the most accurate security analytics with embedded security automation and orchestration to help customers quickly detect, respond to and neutralise cyberthreats before they result in a material breach. LogRhythm 7.2 provides up to 200 percent improvement in data processing and indexing performance to help customers cost-efficiently scale, especially in high-volume environments such as those exceeding 100,000 messages per second. Fully-automated data source onboarding saves countless hours of administration time in large environments. Specifically, LogRhythm 7.2 delivers advanced threat detection capabilities by expanding its industry-leading data schema with more than 20 additional metadata fields. These added fields complement the platform’s industry-leading support for over 785 unique data sources. LogRhythm 7.2 also advances customers’ visibility into cloud-based systems, including AWS, Salesforce, Box and Microsoft Office 365.

WatchGuard Simplifies and automates Security-as-a-Service for MSSPs with connectwise integration
WatchGuard Technologies has developed a certified integration with ConnectWise, a leading business management platform, that provides managed security service providers (MSSPs) with one trusted source for all their managed security service needs. Now, MSSPs can streamline their operations and increase customer satisfaction by delivering enterprise-grade network security that is easy to deploy and manage, and includes automated service ticketing, visibility and reporting. Business Management platforms are commonly used by MSSPs to enable end-to-end IT service management for their customers. They improve business operations by consolidating multiple applications and functions into one platform, including service ticketing, project management, asset management, and customer relationship management. The WatchGuard-ConnectWise integration delivers a unique combination of capabilities for ConnectWise users that significantly enhances security automation and visibility into managed security services, while providing a scalable and easy-to-manage solution. Key integration features include auto synchronisation of asset information, integrated, closed-loop service ticketing and automated reporting.

CyberArk adds credential theft blocking to expand privilege protection at the endpoint
CyberArk, the company that protects organisations from cyber attacks that have made their way inside the network perimeter, has announced new behavioural analytics to block and contain advanced threats targeting credential theft at the endpoint.  The new analytics are based on cyber threat detection technology acquired from Cybertinel last year, combined with continuous research from CyberArk Labs focused on identifying common privileged account-based attack patterns and malware behavior to further reduce the risk of emerging threats. These new capabilities complement enterprise security best practices for hardening the endpoint, including removing local administrator credentials and enabling flexible application control. Additionally, by focusing specifically on detecting and containing credential theft at the endpoint, security teams are alerted on the specific threats that can pose the most danger to an organisation, allowing them to reduce “noise” and prioritise remediation efforts accordingly. CyberArk Endpoint Privilege Manager, previously CyberArk Viewfinity is available as a single agent and part of the CyberArk Privileged Account Security Solution. CyberArk Endpoint Privilege Manager is available as a SaaS or on-premises solution.

TIBCO Simplr makes cloud-based task automation easy
TIBCO Software has announced the immediate availability of its Personal Automation Software-as-a-Service (SaaS) solution, TIBCO Simplr. The application includes a do-it-yourself tool that automates repetitive tasks, and makes it easy to build forms and flows to collect, manage, and move data from people as well as cloud applications. With its unique mix of forms and integration, Simplr empowers users of all backgrounds to increase productivity and save time by putting tedious tasks on autopilot. From demand generation campaigns and content marketing tasks to event planning and social media processes, TIBCO Simplr can help by linking cloud applications and automating tasks. The application also lets users to gather information from people with a robust online forms tool – one of the only in the space to do so. At the same time users can build forms to gather data from people and send it where you like via flows; improve efficiency and increase data quality on the fly by applying transformations while data is being mapped; and tailor the frequency of running flows, triggering them on-demand, on a schedule, or in real time by an event, such as a form submission.

Tenable Network Security Integration with McAfee ePolicy Orchestrator delivers comprehensive vulnerability data to customers
Tenable Network Security has joined the Intel Security Innovation Alliance and completed a new technology integration that will provide McAfee® ePolicy Orchestrator (ePO) customers with continuous visibility across their existing McAfee environment. The integration between the two companies provides customers with continuous visibility and critical context into all networked assets, configuration policies, known vulnerabilities and detected malware. With access to comprehensive vulnerability management data from Tenable, ePO customers are able to detect and track all devices, services and applications in use on the network, giving them increased assurance that their distributed IT environments are secure.

Hyland announces the Hyland Cloud
Hyland has announced the rebranding of its secure, privately managed, multi-instance cloud hosting architecture. The Hyland Cloud features a scaled up infrastructure to accommodate the growing cadre of Hyland’s product offerings. The Hyland Cloud is exclusively designed to act as a hosting architecture for OnBase, Hyland’s enterprise information platform, ShareBase, Hyland’s cloud-based, file sharing platform, as well as any future cloud-based applications and product offerings. The Hyland Cloud is built on multiple co-located data centres across six countries — including United States, Mexico, United Kingdom, the Netherlands, Australia and Japan — and provides organisations with the precise locations of their content at all times, available with 99.99 percent uptime since the cloud’s inception. Additionally, the Hyland Cloud is a private cloud that eliminates any instances of co-mingling of data, configured and maintained to provide maximum security demonstrated by ongoing audits and adherence to strict ISO-based policies. Authorised users are able to access protected, mission-critical information, while appropriate disaster recovery and business continuity commitments are simultaneously enforced.


Leave a Reply

Your email address will not be published. Required fields are marked *

Martin Shanahan, CEO, IDA Ireland