Skip to Main Content
ADD A NEW IDEA

Security

Showing 2
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari 5 months ago in Automation / Roles and Permissions / Security 0 Future consideration
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest almost 3 years ago in Security 0 Future consideration