Software Vulnerability Research (and  SVM Next)

Release Notes

February 2019

Introduction

Software Vulnerability Research (and SVM Next) reimagines how software is secured by closing the gap between IT Security and IT Operations by providing industry leading security research, risk assessment and remediation through Software Vulnerability Research (and SVM Next)’s key components:

Research: Keep up with the latest software vulnerability research and advisories from Secunia Research
Assessment: Discover where software vulnerabilities are installed across your organization
Patching: Remediate software vulnerabilities in third-party applications

New Features and Enhancements

The following table lists new features and enhancements for Software Vulnerability Research (and SVM Next). The Affected Module(s) column refers to the specific Software Vulnerability Research (and SVM Next) module(s) affected by the new feature or enhancement.

Affected Module(s)

Feature or Enhancement Description

Reference Number

Settings

Under Settings > Service Provider Configuration, there is now an option to upload an IDP meta data file for Single Sign-On (SSO).

SVM-884

Threat Intelligence

There is now support for our upcoming Threat Intelligence Module. Software Vulnerability Manager 2019 will be introducing an optional module to offer a threat score as a means of prioritizing vulnerabilities that have known exploits. Stay tuned for more information at Flexera.com.

SVM-1002

Resolved Issues

No resolved issues were included in this release.

Product Feedback

Have a suggestion for how we can improve this product? Please come share direct feedback with the product team and vote on ideas submitted by other users in our Customer Community feedback page for Software Vulnerability Research (and SVM Next).

Note • You will need your Flexera Customer Community credentials to enter feedback.

You can also submit feedback through the Software Vulnerability Manager user interface by clicking the feedback icon in the upper-right-hand corner of each module.

System Requirements

Software Vulnerability Research (and SVM Next)’s User Interface will resize and adapt when being used on different devices. You can access the system from anywhere using any device, such as a smartphone or tablet, running Internet Explorer 11 or higher, Chrome, Opera, Firefox, Safari and mobile browsers with an Internet connection capable of connecting to https://app.flexerasoftware.com.

Legal Information

Copyright Notice

Copyright © 2019 Flexera.

This publication contains proprietary and confidential information and creative works owned by Flexera and its licensors, if any. Any use, copying, publication, distribution, display, modification, or transmission of such publication in whole or in part in any form or by any means without the prior express written permission of Flexera is strictly prohibited. Except where expressly provided by Flexera in writing, possession of this publication shall not be construed to confer any license or rights under any Flexera intellectual property rights, whether by estoppel, implication, or otherwise.

All copies of the technology and related information, if allowed by Flexera, must display this notice of copyright and ownership in full.

Intellectual Property

For a list of trademarks and patents that are owned by Flexera, see https://www.flexera.com/producer/company/about/intellectual-property/. All other brand and product names mentioned in Flexera products, product documentation, and marketing materials are the trademarks and registered trademarks of their respective owners.

Restricted Rights Legend

The Software is commercial computer software. If the user or licensee of the Software is an agency, department, or other entity of the United States Government, the use, duplication, reproduction, release, modification, disclosure, or transfer of the Software, or any related documentation of any kind, including technical data and manuals, is restricted by a license agreement or by the terms of this Agreement in accordance with Federal Acquisition Regulation 12.212 for civilian purposes and Defense Federal Acquisition Regulation Supplement 227.7202 for military purposes. The Software was developed fully at private expense. All other use is prohibited.