Analytics
10/1/2013
06:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Panorama9 Updates MSP Partner Program

Additions include new team collaboration tools, user management permissions, deeper Zendesk integration

San Francisco – Panorama9 , a cloud-based IT management platform, has released an update to its Partner Program to offer MSPs an increased level of support and control with their clients. The combination of sleek new features puts Panorama9 among the most sophisticated web-based MSP offerings available today.

The update provides MSPs with advanced user management tools, templates for a standardized notification system, and a new design. In addition to being able to monitor vulnerabilities, server outages, and compliance issues for multiple clients from a single dashboard, the Panorama9 MSP solution now includes:

- Enhanced collaboration tools that let users assign responsibilities and add notes about client details and procedures

- Greater granularity on admin permission tools: partners can select which users have access to which clients

- Templates for client notifications and weekly/monthly reports

- Advanced Zendesk integration that lets partners track multiple clients through one helpdesk account while keeping a full overview of individual client details like alarms and notifications

- Seamless integration with other helpdesk systems

MSPs can also now give clients secure access to their own dashboards and network status. This new level of transparency makes it easy for MSPs to demonstrate the value they bring to a client organization on a continual basis for managing and supporting their network and all devices.

"The latest additions give both MSPs and their clients the peace of mind that all areas of concern are being properly monitored and addressed," says Panorama9 CEO, Allan Thorvaldsen, "No matter how many clients an MSP has, they can track all activity and alerts from a single view, then easily drill down and focus on a particular area or client."

Already known for its sleek, simple design, Panorama9 has further fine-tuned its design. Thorvaldsen continues, "We're blowing the competition out of the water in terms of ease-of-use. Alternative MSP solutions look quite outdated and clunky in comparison."

Like the core product, the MSP Interface monitors mixed environments and remote machines, and is currently available for a free trial at . For more information on partnership details and platform features, please email partners@panorama9.com.

ABOUT PANORAMA9

Panorama9 is a cloud-based IT management platform bundled into a single dashboard to show you everything about your company's assets, IT availability, security vulnerabilities, and non-compliant systems. Your organization can cut its IT costs through improved up-time without having an infrastructure to deploy or manage. Panorama9 was founded in 2010 and has received a $900,000 seed round and have offices in San Francisco, CA and Copenhagen, Denmark.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web