Approved Agreements

Total Page:16

File Type:pdf, Size:1020Kb

Approved Agreements General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved 45Press Privacy Policy 12-Dec-2016 45AIR Terms & Conditions 12-Dec-2016 2SMS Limited Warranty 29-Aug-2013 2SMS End User License Agreement 29-Aug-2013 A10 Networks, Inc. License Terms and Conditions 25-Jan-2018 A Better Solution (ABS) Consulting EULA 15-Dec-2014 Abbott Informatics Software License, Support, and Services Agreement 4-Dec-2015 Abeyon Service Agreement 21-Aug-2018 Ab Initio Software LLC Master License Agreement 24-Aug-2017 Acadis Envisage Technologies, LLC Readiness Suite Master Agreement 12-Oct-2017 Accela Accela Subscription Terms and Conditions 30-Jul-2014 Accela, Inc. Software License, Maintenance Terms and Conditions 16-Sep-2014 Accelerated Technology Laboratories, Inc. ATL LIMS OnDemand Software and Services Subscription Agreement 17-Jun-2016 Accelerated Technology Laboratories, Inc. Master Software & Services Agreement 2-Dec-2013 Accellion Solutions License Agreement 27-Jul-2015 Access Smart Power LogOn Administrator End User License Agreement 7-Apr-2014 ACF Technologies Master License Agreement 8-Nov-2017 Acronis End User License Agreement 4-Mar-2015 ACS Internet LLC Alaska Communications Acceptable Use Policy 17-Dec-2016 Alaska Communications End User License Agreement 17-Dec-2016 Acunetix Web Vulnerability Scanner End User License Agreement 6-Apr-2017 Alaska Communications Services Agreement Terms and Conditions 13-Dec-2016 Actionable Intelligence Technologies Software License Agreement 30-Mar-2015 Active Navigation, Inc. 14-Aug-2012 Active Navigation, Inc. End User License Agreement 14-Aug-2012 Active Navigation, Inc. Software Maintenance Agreement 14-Aug-2012 Actsoft End User License Agreement 23-Oct-2014 Adaptive Computing 22-Sep-2013 Addendum for GSA Customers for licenses to Contrast On- Premises Edition 14-Jan-2015 AdmitMac 31-Dec-2012 ADL Data Systems, Inc. Software Rental Agreement 7-Jan-2015 General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved Adobe Universal Amendment to Adobe End User License Agreement 9-Aug-2017 Agate Software Inc 3-Jun-2013 AgileAssets - Software as a Service Agreement 3-Jul-2018 AgileAssets - Addendum for Hosting Services 3-Jul-2018 Airbus Defense & Space Airbus Defense and Space End User License Agreement 15-Nov-2017 Airbus Defense and Space General Supply Conditions of Satelitte 15-Nov-2017 Airbus Defense and Space Non-Exclusive License to Use Pleiades Satellite Products 15-Nov-2017 Airbus Defense and Space Non-Exclusive License to SPOT 15-Nov-2017 Airbus Defense and Space Non-Exclusive License to SPOTMaps Products 15-Nov-2017 AGI SOTA SLA 17-Aug-2018 AGSI, LLC Altium End User License Agreement 16-Mar-2015 Akamai Acceptable Use Policy for GSA 7-Feb-2018 Alamo City Engineering Services, Inc. Scalable Network Technologies Software LIcense Agreement 4-Mar-2016 Aligned Business Solutions, LLC EULA 4-Nov-2014 Alcatel-Lucent End User License Agreement 20-Jul-2016 Alutel Mobility End User License Agreement 6-Jun-2018 Alutiiq Pacific Mentor Enterprises EULA Software License Agreement 5-Mar-2013 ManageID Enterprise License & Services Agreement 27-Sep-2013 Altima Technologies, Inc. Subscription Agreement 22-Mar-2018 Altum, Inc.folder. Easygrants Grants Management End User Agreement 27-Sep-2016 Amazon Web Services 12-Sep-2012 AMD ExamFlow Software End User License Agreement 13-Nov-2014 AMD Agnes Software End User License Agreement 13-Nov-2014 Analytical Graphics 21-Apr-2014 Analytical Graphics, Inc. Space Situational Awareness Software License Agreement 21-Aug-2015 Analytical Graphics Software License Agreement 8-Apr-2016 Anchor Software, LLC Anchor Computer Software Perpetual License Agreement 23-Sep-2013 Animal Intelligence Software Inc. 24-Oct-2014 Animetrics End User License Agreement 12-Mar-2014 Annams Systems Corporation Sunflower Systems Software Support Agreement 28-Jun-2011 Ansible Subscription and Services Agreement 7-Aug-2015 Ansys Software License Agreement 6-Oct-2015 AnyLogic 8.0x Software Licensing Agreement 18-Sep-2017 ApexSQL Software End User License Agreement 17-Dec-2015 General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved Appery.IO End User Subcription License Agreement 6-Jul-2016 Applied Coherent Technology End User License Agreement 7-Dec-2017 AppliedInfo Partners, Inc. DIF End User License Agreement 28-Mar-2014 Approval Email Vocera 8-Dec-2014 Approved Vocera Master Terms and Conditions 8-Dec-2014 Apptio Subscription Services Agreement 27-Jul-2018 Aquilient, Inc. Aquilent AWS GovCloud Customer Agreement Terms of Use 30-Oct-2014 Aquilent Epic Perpetual License Agreement 1-Jun-2015 Aquilent Olympus Software License 1-Jun-2015 Aquilent, Inc. ZF360CA 1-Jun-2015 Arachno License and Services Agreement Addendum 19-Mar-2015 Arachno Master Subscription Agreement 1-Apr-2015 Infor Software License Agreement 30-Jul-2013 Arbor Networks CSA 28-Jun-2018 ARC-P Cloud Services Agreement 1-Sep-2016 Arctic Information Technology, Inc. Scribe Online End User License Agreement 8-Aug-2016 Scribe Software Corporation License Agreement 8-Aug-2016 Arcus Streaming Terms of Service 11-Jul-2017 ArdentMC Netfinity Terms of Use 18-Sep-2014 Arellia Master Software License Agreement 14-Apr-2015 Armedia LLC Formtek Software License Agreement 1-May-2017 Crafter Enterprise Software License Agreement 1-May-2017 Crafter Cloud Subscription Agreement 1-May-2017 Ascom Software End User License Agreement 23-May-2017 Asavie End User License Agreement 28-Jun-2018 Aspect Security Inc. Aspect Security On-Premises Edition 8-Sep-2014 Aspect Security eLearning License Agreement 8-Sep-2014 Aspose End User License Agreement 17-Dec-2015 Astound Subscription Service General Terms and Conditions 24-Jul-2018 Asysco, Inc. Software License & Support Agreement 31-Aug-2018 Atlantic Systems Group, Inc. End User License Agreement 19-Feb-2015 Atlantis Computing End User License Agreement - ILIO 21-Aug-2015 Atlassian Government End User Agreement 8-Aug-2016 Atomicorp Master End User License Agreement 7-Mar-2018 AtoZdatabases.com Terms and Conditions 20-Mar-2017 Attachment A - Blue Prism Software License and Support Agreement 18-Jun-2018 Attachment A - HashiCorp Enterprise Software License Terms and Conditions 15-Jun-2018 General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved Attachment A-Trend Micro EULA 18-Jun-2018 Attask 7-May-2013 ATS - Galileo Performance Explorer End User Agreement 6-Jul-2015 AT&T Asset Management End User License Agreement for AT&T Asset Management - Operations Center 15-May-2018 AT&T Equipment and Machinery Solutions – End User License Agreement (EULA). 7-May-2018 AT&T Fleet Manager Terms and Conditions 21-Feb-2018 End User License Agreement for AT&T Fleet Complete 25-Jul-2018 AT&T Mobility, LLC Samsung Knox for Enterprise End User License Agreement 28-Feb-2017 AirWatch End User License Agreement 19-Feb-2014 Box VPAT - Voluntary Accessibility Product Template 23-Feb-2013 Mobile Iron, Inc. End User License Agreement 20-May-2013 Mobile Iron SaaS Agreement for Mobileiron (Basic) Connected Cloud 8-Jul-2014 ProntoForms Terms of Use 15-Oct-2013 AT&T WorkForce Manager End User License Agreement 10-Jul-2018 A&T Systems, Inc. FleetCarma Product End User License Agreement - Appendix R 26-Feb-2017 EidosMedia Professional Services Agreement 4-Feb-2017 Rocket End User License Agreement and Software Maintenance Support Service Terms 16-Mar-2016 TaaSera Before the Breach Software Subscription License Agreement 8-Mar-2016 Titus Docs 2.3 Software License 8-Mar-2016 Titus Mail iOS 2.2 Software License 8-Mar-2016 Titus Message Classification 4.3/Classification for Microsoft Officer 4.3/Classification for Desktop 4.3 Software License Agreement 8-Mar-2016 Audiocare Systems Audiocare Systems Maintenance and Support Services 7-Jan-2015 Audioeye 3-Nov-2012 AudioEye 10-Oct-2014 AudioEye Master Services Agreement 28-Aug-2018 August Schell Enterprises 3Play Content Management Solution Terms and Conditions 11-Mar-2013 5/26/2016Nicira, Inc. Master License and Services Agreement 11-Mar-2013 AUP 23-Feb-2013 AURIGO SOFTWARE TECHNOLOGIES, 29-Jan-2014 Authentidate 9-Jun-2014 Autodesk 22-Feb-2012 AutoGas End User License Agreement 6-Oct-2016 Avatar 23-May-2014 Avatar Terms and Conditions Applicable to Term Software Licenses 11-Jun-2018 Avatar Software License Agreement 11-Jun-2018 Avaya Global Software License Terms Customer Agreement 26-Oct-2017 Avaya Rider to Manufacturer Global Software License Terms Customer Agreement 26-Oct-2017 General Services Administration, IT Schedule 70 9/4/2018 Company/Manufacturer Agreements GSA Approved EULA/CSAs Listings Date Approved Ave Point 1-Jul-2012 Avid Technology Override to Avid Software License Agreement 23-Sep-2014 Avizia 2-Apr-2014 Avocent Trellis 20-May-2014 Avoka End User License Agreement 28-Apr-2015 Avoka Master Supply Agreement 28-Apr-2015 Aware Inc 29-Sep-2014 Awareness Technologies, Inc. InterGuard License and Services Agreement. 3-Apr-2018 AWS Customer Access 29-Jul-2013 Axiom Pro Software as a Service Agreement 5-Oct-2017 Axiom Pro Term Software End User License Agreement 5-Oct-2017 Axiom Digital Library Software as a Service (SaaS) Agreement 18-Oct-2017 Axiomatics Federal Inc. Master Software License and Maintenance Agreement 14-Dec-2016 AXIOMATICS MASTER SOFTWARE LICENSE AND MAINTENANCE AGREEMENT 1-Apr-2015 Axway License, Support, and Service Agreement 18-Nov-2014 BA Insight License and Service Agreement 26-May-2016 BackBox 14-May-2013 Backupify Terms of Service 18-Feb-2015 Balesio 4-Apr-2013 Banyan Virtual Care Service Maintenance Agreement 25-Jun-2018 Banyan Virtual Care Project Order 25-Jun-2018 Banyan Virtual Care Master Agreement 25-Jun-2018 Barracuda Software License Agreement 17-Aug-2015 Basis Technology Corporation 3-Jun-2013 BCWipe Product License Information 17-May-2017 BCWipe Total WipeOut End User License Agreement 18-Jul-2018 BDNA Addendum 13-Dec-2013 Beacon by Netcomm Master Subscription Agreement 17-Nov-2017 Bear River 25-Sep-2014 Becrypt 7-Apr-2014 Belarc, Inc.
Recommended publications
  • LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console
    LANDESK ANTIVIRUS Powered by Kaspersky Protect Your Endpoints from One Console Every moment you are connected to the LANDESK Antivirus helps you: Internet (and sometimes even when n Deliver the fastest response times to you’re not), you are under attack. minimize your risk of security breaches Today’s cyber attacks have become n Reduce cost and complexity with a extremely dynamic and exponentially centralized solution more complex. LANDESK Antivirus n Detect significant numbers of virus software delivers comprehensive anti- and malware instances missed by malware solutions that are powerful, other solutions through advanced efficient and easy to manage. LANDESK heuristics n Enable IT staff and executives to Antivirus uses the award-winning quickly see which systems are Kaspersky Anti-Virus Engine to to deliver protected and which are vulnerable comprehensive protection from a wide n Provide vulnerability assessments for range of malware including viruses, multiple platforms including Trojans, worms, rootkits, spyware, and Windows, Mac, Linux and HP-UX adware. Security Capabilities: n Kaspersky Lab Awards Real-time protection against multi- vector threats – Protect against Kaspersky Anti-Virus has received viruses, trojans, worms, spyware, multiple highest accolades from leading adware, rootkits, bootkits, independent testing labs: keyloggers, screencapture malware, botnets, zero-day attacks, drive-by download infections and other malicious vectors n System watcher – Monitors and analyzes system operations proactively for suspicious activity
    [Show full text]
  • Ivanti Device and Application Control Version History Since V 2.6
    Ivanti Device and Application Control Version History Since v 2.6 Details NEW IN VERSION 5.1 Update 2 [29-May-2018] • More granular control over device attached/detached notifications Additional controls have been added such that the IDAC Control system tray icon remains visible but notifications relating to 'device attached/detached' are now suppressed. For more information refer to https://community.ivanti.com/docs/DOC-67782. • Authorization Wizard now scans inside MSP files Most Windows 10 and Office 2016 updates are delivered as MSP files rather than MSIs. In previous IDAC versions, the Authorization Wizard could only scan inside MSIs making it very difficult to whitelist updates that were delivered as MSPs. We've changed this in 5.1U2 so that the Auth Wizard now scans inside MSPs in addition to MSIs. • Windows 10 version Support We've added support for Windows 10 version 1803 (OS build 17134) which was released by Microsoft on April 30th. Refer to the following community article for details of Windows version support with Ivanti Device and Application Control https://community.ivanti.com/docs/DOC-62154. • Citrix XenApp and XenDesktop Support We've added support for versions 7.15 and 7.17 of Citrix XenApp and XenDesktop. • 7zip library updated We've updated the 7zip library to version 18.01 to address vulnerability CVE-2018-5996. 7zip versions prior to 18.00 contain insufficient exception handling which can lead to multiple memory corruptions and allow remote attackers to cause a denial of service attack or execute arbitrary code. • SQL 2017 Support We've added support for Microsoft SQL 2017.
    [Show full text]
  • Supported Products for ESAP 3.7.8
    Firefox https://172.21.158.254/dana-admin/auth/listEsapProducts.cgi?versionid=... Windows ANTI-VIRUS Products PRODUCTS: Marketing Name Display Name 2345安全卫士 (3.x) 2345安全卫士 (3.x) 360 Internet Security (4.x) 360 Internet Security (4.x) 360 Internet Security (5.x) 360 Internet Security (5.x) 360 Internet Security (6.x) 360 Internet Security (6.x) 360 Total Security (4.x) 360 Total Security (4.x) 360 Total Security (5.x) 360 Total Security (5.x) 360 Total Security (6.x) 360 Total Security (6.x) 360 Total Security (8.x) 360 Total Security (8.x) 360 Total Security (9.x) 360 Total Security (9.x) 360天擎 (6.x) 360天擎 (6.x) 360安全卫士 (11.x) 360安全卫士 (11.x) 360杀毒 (1.x) 360杀毒 (1.x) 360杀毒 (3.x) 360杀毒 (3.x) 360杀毒 (5.x) 360杀毒 (5.x) ALYac Enterprise (2.x) ALYac Enterprise (2.x) ALYac Enterprise (3.x) ALYac Enterprise (3.x) AVANSI Antivirus (4.x) AVANSI Antivirus (4.x) AVG Anti-Spyware (7.x) AVG Anti-Spyware (7.x) AVG AntiVirus (10.x) AVG AntiVirus (10.x) AVG AntiVirus (15.x) AVG AntiVirus (15.x) AVG AntiVirus (16.x) AVG AntiVirus (16.x) AVG AntiVirus (2013.x) AVG AntiVirus (2013.x) AVG AntiVirus (2014.x) AVG AntiVirus (2014.x) AVG AntiVirus (2016.x) AVG AntiVirus (2016.x) AVG AntiVirus (7.x) AVG AntiVirus (7.x) AVG AntiVirus (8.x) AVG AntiVirus (8.x) AVG AntiVirus (9.x) AVG AntiVirus (9.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (20.x) AVG AntiVirus
    [Show full text]
  • The Forrester Wave™: Endpoint Security Suites, Q2 2018
    NOT LICENSED FOR DISTRIBUTION The Forrester Wave™: Endpoint Security Suites, Q2 2018 The 15 Providers That Matter Most To Enterprises And How They Stack Up by Chris Sherman and Salvatore Schiano June 21, 2018 Why Read This Report Key Takeaways In our 21-criteria evaluation of endpoint security Trend Micro, CrowdStrike, And Symantec Lead suite providers, we identified the 15 most The Pack significant ones — Bitdefender, Carbon Black, Forrester’s research uncovered a market in Check Point, Cisco, CrowdStrike, Cylance, ESET, which Trend Micro, CrowdStrike, Symantec, Ivanti, Kaspersky Lab, Malwarebytes, McAfee, Check Point, ESET, Sophos, and Bitdefender are Microsoft, Sophos, Symantec, and Trend Micro — Leaders; Carbon Black, McAfee, Kaspersky Lab, and researched, analyzed, and scored them. This Cisco, Cylance, Microsoft, and Malwarebytes are report shows how each provider measures up to Strong Performers; and Ivanti is a Challenger. help security professionals make the right choice. Security Pros Want An Effective Endpoint Security Suite From Vendors They Trust Buyers want an endpoint security suite that is effective at stopping modern threats without adding to their security team’s complexity. They also want to trust the vendor, both as a strategic partner and as a steward of their data. Behavioral Analysis, Automation, And Real- World Performance Are Key Differentiators As traditional approaches to endpoint security prove less effective, behavioral protection and suite automation have become key differentiators in today’s market. Buyers
    [Show full text]
  • ISG Provider Lens™ Quadrant Report | August 2021 Section Name About This Report
    Cybersecurity - A research report Solutions & Services comparing provider strengths, challenges U.S. 2021 and competitive differentiators Quadrant Report Customized report courtesy of: August 2021 ISG Provider Lens™ Quadrant Report | August 2021 Section Name About this Report Information Services Group Inc. is solely responsible for the content of this report. ISG Provider Lens™ delivers leading-edge and actionable research studies, reports Unless otherwise cited, all content, including illustrations, research, conclusions, and consulting services focused on technology and service providers’ strengths and assertions and positions contained in this report were developed by, and are the sole weaknesses and how they are positioned relative to their peers in the market. These property of Information Services Group Inc. reports provide influential insights accessed by our large pool of advisors who are actively advising outsourcing deals as well as large numbers of ISG enterprise clients The research and analysis presented in this report includes research from the ISG who are potential outsourcers. Provider Lens™ program, ongoing ISG Research programs, interviews with ISG advisors, briefings with services providers and analysis of publicly available market information For more information about our studies, please email [email protected], from multiple sources. The data collected for this report represents information that call +49 (0) 561-50697537, or visit ISG Provider Lens™ under ISG Provider Lens™. ISG believes to be current as of July 2021, for providers who actively participated as well as for providers who did not. ISG recognizes that many mergers and acquisitions have taken place since that time, but those changes are not reflected in this report.
    [Show full text]
  • City of Mesa, AZ Contract # 2018011-02 for Information Technology Solutions and Services With
    ATTACHMENT 5 City of Mesa, AZ Contract # 2018011-02 for Information Technology Solutions and Services with SHI International Corp. Effective: March 1, 2018 The following documents comprise the executed contract between the City of Meza, AZ and SHI International Corp, effective March 1, 2018: I. Executed Contract II. Mayor and Council Approval III. Supplier Response IV. Original RFP ~ mesa-az AGREEMENT PURSUANT TO SOLICITATION CITY OF MESA AGREEMENT NUMBER 2018011 INFORMATION TECHNOLOGY SOLUTIONS & SERVICES CITY OF MESA, Arizona ("City") Department Name City of Mesa - Purchasing Division Mailing Address P.O. Box 1466 Mesa, AZ 85211-1466 Delivery Address 20 East Main St, Suite 400 Mesa, AZ 85201 Attention Sharon Brause, CPPO, CPPB, CPCP Senior Procurement Officer E-Mail [email protected] Phone (480) 644-2815 Fax (480) 644-2655 AND SHI INTERNATIONAL CORP., ("Contractor") Mailing Address 290 Davidson Ave Somerset, NJ 08873 Remit Address PO Box 952121 Dallas, TX 75395-2121 Attention Meghan Flisakowski, Public Program Manager E-Mail [email protected] Phone 512-517-4088 Fax 732-652-6599 Website www.publicsector.shidirect.com/ Page 1 of 33 CITY OF MESA AGREEMENT PURSUANT TO SOLICITATION This Agreement pursuant to solicitation ("Agreement") is entered into this 27th day of February, 2018, by and between the City of Mesa, Arizona, an Arizona municipal corporation ("City"), and SHI INTERNATIONAL CORP, a New Jersey corporation ("Contractor"). The City and Contractor are each a "Party" to the Agreement or together are "Parties" to the Agreement. RECITALS A. The City issued solicitation number 2018011 ("Solicitation") for INFORMATION TECHNOLOGY SOLUTIONS & SERVICES, to which Contractor provided a response ("Response"); and B.
    [Show full text]
  • Cybersecurity
    Cybersecurity Sector Update – April 2021 SPECIALIST INDEPENDENT M&A AND FUNDRAISING ADVISER TO FAST-GROWING TECHNOLOGY BUSINESSES APRIL 2021 1 CYBERSECURITY FAST FACTS CYBERSECURITY FUNDRAISING AND M&A ACTIVITY REMAINS STRONG DESPITE THE CHALLENGES OF A GLOBAL PANDEMIC $8.3bn $21.9bn Invested by VCs +22% -15% Total M&A deal value -36% -6% globally in 2020 transacted in 2020 Value Volume Value Volume $3.7bn $5.5bn Invested by VCs +35% -12% Total M&A deal value -14% -21% globally in Q1 2021 transacted in Q1 2021 Value Volume Value Volume PUBLIC CYBERSECURITY STOCKS ARE TRADING AT ALL-TIME HIGHS, HELPING TO LIFT VALUATIONS IN THE PRIVATE MARKETS +118% 11x LTM rev 3x 24x LTM rev Cybersecurity index Cybersecurity index CrowdStrike stock Paid by CrowdStrike appreciation since valuation appreciation since its IPO in for acquiring Expanse 16th March 2020 June 2019 (+$28.4bn in MC) in Nov 2020 Source(s): Pitchbook (Geography: North America & Europe), Capital IQ APRIL 2021 2 CYBERSECURITY SECTOR SNAPSHOT – APRIL 2021 1 The cybersecurity sector enjoyed another year of strong deal activity ▪ $8.3bn of VC money was invested in the sector in North America and Europe across 632 deals in 2020 (+22% in value but deal count was down by -15%). The strong momentum is set to continue – in the US, cybersecurity businesses already raised $3.6bn in Q1 2021 alone ▪ 2020 was also a new record year for cybersecurity investment in the UK, infosecurity businesses raised over £821m across 73 deals ▪ M&A deal activity remained at high levels compared to a record 2019, amounting to $21.9bn (-36% in value, deal count was down by -6%) ▪ Whilst VC investors were hedging their bets in later stage deals and proven business models, corporate and PE acquirers are not afraid to pay record valuations in highly competitive auctions, e.g.
    [Show full text]
  • Security Software
    Infrastructure Software Taxonomy SOFTWARE DEVELOPMENT / DEVOPS IT OPERATIONS MANAGEMENT SECURITY Solutions that enable the Solutions that help to manage Solutions that protect software software development lifecycle, the provisioning, capacity, and systems against malicious including planning, creating, performance, and availability of attacks, unauthorized access and testing, and deploying software an organization’s IT resource use, and other external applications and systems infrastructure and internal risks Infrastructure / Application IT GRC and Service and Identity and Continuous Integration Version Test App / Database Operations Network / App / Advanced Threat SIEM / Security Lifecycle Asset Support Access / Continuous Delivery Management Management Performance Analytics Data Security Protection Analysis Management Management Management Management Monitoring Select Market Participants Select Market Participants Select Market Participants DATA MANAGEMENT CLOUD MANAGED SERVICES COLLABORATION / COMMUNICATION Solutions that manage cloud Solutions that enable groups and Solutions that integrate, cleanse, security, computing, storage, teams to communicate, share, migrate, and manage data across network operations, and coordinate, cooperate, and solve platforms to produce accurate application stacks to automate problems for the purpose of and consistent information and enhance business operations completing a task Project Business Data Quality and Database Data PaaS / aPaaS / Managed Hosting Managed Backup and Communications Agile Project
    [Show full text]
  • Ivanti Device and Application Control Version History Since V2.6
    Ivanti Device and Application Control Version History Since v2.6 Details NEW IN VERSION 5.1 Update 3 [18-Dec-2018] • File-Type Filtering for the Portable Device Class The Portable Device class now supports file-type filtering. File filters can be used to limit access to specific file types (e.g. pdf, doc, xls). Up to now, file-type filtering was only available for use with the Removable Storage Devices, Floppy Disk Drives, and DVD/CD Drives device classes. With 5.1 Update 3, file filters can also be used with the Portable Device class. This would enable customers to restrict file transfers to and from mobile phones but allow pictures to be transferred, for example. • Device Control event generated when encrypted media is unlocked Additional logging has been added in 5.1 Update 3 so that an event is generated when encrypted media (e.g. USB key) is unlocked. This log event could then be used to trigger additional actions on the endpoint, for example. • Windows Support Updates We’ve added support for Windows 10 version 1809 (OS build 17763) which was released by Microsoft on Nov 13th. Refer to the following community article for details of Windows 10 version support with Ivanti Device and Application Control https://community.ivanti.com/docs/DOC-62154. We’ve also added support for Windows Server 2019 which was released by Microsoft on Oct 2nd. • Citrix XenApp and XenDesktop Support We’ve added support for version 7.18 of Citrix XenApp and XenDesktop. Components in this Release Component Version SK version 5.1.494 SCOMC version 5.1.500 SXS version 5.1.500 DB version 5.1.500 SMC version 5.1.500 1 ISSUES RESOLVED IN VERSION 5.1 Update 3 [18-Dec-2018] Problem ID Title 51197 Endpoint UI (RTNotify) on crashes randomly with unhandled exception "phase 2 file" 53658 HES 5.0: select user filter and schedule report causes reporting to fail 64411 Card reader unusable after installing agent (Windows 10 1709).
    [Show full text]
  • Software Sector Summary Report
    SOFTWARE SECTOR REPORT Q3 2020 EXECUTIVE SUMMARY Software Q3 2020 » In Q3 2020, the software sector continued to show its resiliency. M&A deal activity and overall M&A deal value witnessed a sharp rebound, and private financing activity continued at a healthy pace. Investors have shown a strong desire for software business models amidst greater cloud adoption and remote work environments, evidenced by favorable performances in public markets and heavy IPO activity with subsequent pops in share price value – Software sector performed well in Q3 with the IGV tech-software index outperforming the S&P 500 by 34.1% LTM as of Q3 2020 – Infrastructure software index grew 148.8% LTM as of Q3 2020, outperforming all other software subsegments » Q3 ’20 saw ~$18Bn in financing deal value and ~$56Bn in M&A deal value - 215 financings, 3.2% lower than Q3 ‘19 - 469 M&A transactions, 22.1% higher than Q3 ’19 » Significant M&A activity in Q3 includes acquisitions in the Security sector: Ivanti’s $930MM acquisition of MobileIron and Fastly’s $775MM acquisition of Signal Sciences » Financial software had some of the largest financing deals in Q3 ‘20 led by the $660MM financing of Robinhood and $650MM financing of Klarna; the Security sector also saw high financing volume » Overall outlook in software growth remains healthy, with most sectors seeing notable growth Select Q3 Active Investors Select Q3 Active Acquirers Notes: Sources: PitchBook, 451 Research, Capital IQ. 2 GCA OVERVIEW The GCA Software Team Sector Coverage US Team VERTICAL SOFTWARE Josh Wepman
    [Show full text]