Frequently Asked Questions
Yes! We have a BugZero® API for customers who do not use ServiceNow. Anyone using ServiceNow should use our certified ServiceNow app.
The core of BugZero's solution is eliminating unnecessary work. Instead of hunting for the operational bugs that pose a risk to your infrastructure, we bring them directly into where you’re already working today – your ITSM tool. We correlate the risks against your CMDB and only bring in the severity you want to see, thereby significantly reducing the number of Problem records. Check the How It Works for more details, and the Vendor Integrations to see the list of available filters per vendor.
Yes! Contact us to learn more.
We are! See our Trust & Compliance page for more details.
We are SOC 2 compliant and take stringent security measures. Each of our customers gets a dedicated tenant environment such that their data is truly isolated from other customer data. We use application firewalls and whitelisting to restrict all traffic into our customer tenants.
We have outlined our recommendations on our ISO 31000 Risk Management page.
ISO 31000.
BugZero® provides full coverage for several NIST 800-53 controls that most organizations are missing. There is no other solution on the market that provides this coverage.
We offer full support for ServiceNow, and we have an API for integration into other ITSM tools.
It is a software defect, or bug, that affects the Availability or Integrity of an IT system. An operational defect is different from a security defect, or vulnerability. It is not an attack vector like a vulnerability, it is a defect that may cause an unexpected system outage or data corruption.
See our current listing of supported vendors and features on our Vendor Integrations page.
One of BugZero's goals is to reduce the time spent being reactive, by being proactive. Ultimately, it should reduce the overall time spent dealing with the impacts of operational defects. We offer multiple ways to filter your vendor bugs so that you only see the ones that are important to you.
We do offer a Proof of Value (PoV) program, which is usually integrated with your ServiceNow development environment.
Many people believe that their CVE data feed is protecting them from operational defects. It is not. Your security tools only cover Confidentiality and some Integrity defects. Your security tools protect your system from being compromised by an attacker. They do not protect you from unexpected outages.