Skip to Main Content
Log in / Sign up
Log in
Please enter your email address
ADD A NEW IDEA
FILTER BY PRODUCT
Application Manager
Privilege Manager
Right Click Tools
Endpoint Insights
Kiosk Manager
Recast Management Server
FILTER BY CATEGORY
Application Catalogue request
3
Automation
7
Cloud App Usage
0
Dashboards and Reporting
4
Efficiency
3
Large environment needs
2
Other
0
Roles and Permissions
1
Security
2
Special Configuration needs
3
User Experience
8
Security
Sort by:
Recent
Recent
Trending
Popular
Status:
Future consideration
FILTER BY STATUS
Clear
Future consideration
Already exists
Will not implement in the near future
Planned
Not a fit for the product
Recently shipped (hidden by default)
Showing 2
1
VOTE
ADD MY VOTE
+1
+2
+3
Deployment approval email recipients
Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari 5 months ago
in
Automation
/
Roles and Permissions
/
Security
0
Future consideration
4
VOTE
ADD MY VOTE
+1
+2
+3
Map CVE to inventory
Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest almost 3 years ago
in
Security
0
Future consideration