Latest release continues focus on quality-of-life and functional enhancements.
Drawbridge is pleased to report another smooth production release for the Drawbridge cybersecurity program management platform. We completed QA last week and promoted the latest version to production on Wednesday, May 11. This release focused on quality-of-life enhancements for both Drawbridge and client users, including several functional enhancements.
A Focus on Cybersecurity Workflows and Automation
The cornerstone of this week’s release, we’ve built upon the recent introduction of the Risk Editor tool. Clients using Drawbridge’s Due Diligence solution can now add risk data directly into a Vendor Risk Assessment template via the Admin controls within the Risk Editor utility. We’ve also released the ability to generate a Word-compatible version of the automated Vendor Risk Assessment report based on both submitted questionnaires and Risk Editor data.
Additional Checks on Vulnerability Management
For clients using both the Drawbridge Agent and Drawbridge Scan solutions for Vulnerability Management, this latest release brings the two tools closer together. We have enhanced Scan’s ability to detect Agent-monitored machines, ensuring that the machine’s details (e.g., IP, Hostname, etc.) and vulnerability findings are properly merged in the Vulnerability Management user interface as well as in vulnerability reports.
Client Requests and Other Enhancements
We’ve addressed a number of client requests and other fixes and enhancements, including enhancements, streamlinings, and fixes to:
- Drawbridge News Feed
- Cyber Risk Assessment reports
- Due Diligence Questionnaire templates
- DarkWeb scanning and CSV uploads
- Network scanning and vulnerability management
- Drawbridge platform admin
Our current sprint kicks off on Monday, May 16 and our next platform release will reach production by early June. Look out for our next product release post in a few weeks for more insight into Drawbridge’s ongoing investment in our clients’ and partners’ cybersecurity capabilities.