SlideShare a Scribd company logo
1 of 15
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
© 2022 Freshworks Inc. All rights reserved.
2010
Founded
5000+
Employees
60,000
Total Customers
* As of Aug 2022
~$495M
FY22 Annual Guidance*
Recognition
Leader in 3 Major Peer Reviews
Recognized in 3 Gartner
Magic Quadrants
Freshworks at a glance
Providing best-in-class customer and employee engagement software solutions
+37%
YoY FY22 Q3 Revenue Growth
Freshservice: A right-sized
service management
solution
Intuitive
Delivering end-to-end,
consumer-grade, end-user
and employee experience
Intelligent
Providing agility through
AI to create contextual and
intelligent service delivery
Extensible
Enabling enterprise-scale
integrations with a marketplace
approach, built on an open and
secure platform
Partner like
engagement model
Drive customer success by
focusing on feature adoption
and value realization
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
Unified service
management across all
business functions
Employee focused,
modern service
management
PPM ESM
Plan, execute, and deliver
projects on time with
enhanced PPM
ITAM ITOM
ITSM
Cut through alert noise,
manage critical incidents
and minimize downtime
What you see is what you get
Future proof your CMDB
and optimize process
and spending
© 2022 Freshworks Inc. All rights reserved.
2008
Founded
25+
Countries where our
customers come from
* As of Aug 2022
Recognition
Leader in patch management.
Recognised by IDC, GigaOm,
and Others
About SecPod
Providing Security Assurance to Every Connected Device, Globally.
160,000+ checks
Leading Provider of the World’s
largest Security Intelligence Feed
© 2022 Freshworks Inc. All rights reserved. * As of Aug 2022
• Manage Vulnerabilities &
Security Risks Beyond CVEs
• Mitigate Vulnerabilities On-time
with Integrated Remediation
Controls
• Execute everything from a truly
integrated, centralized console
• Automate end-to-end tasks and
establish a continuous routine
Advanced
Vulnerability
Management
Framework
© 2022 Freshworks Inc. All rights reserved. * As of Aug 2022
Our product philosophy is offering
simplicity and automation to make
the job of security administrators
slightly better, everyday.
SanerNow
CyberHygiene
Platform
Powered by SecPod Security Intelligence
Built Since 2009
World’s Largest Library of
160,000+ Security Checks
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
The importance of integrating your ITSM and SecOps strategy
Not having the right security operations (SecOps) strategy in place can cost businesses in millions. What are the key
challenges when it comes to IT security?
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
More uninterrupted IT in 2023
What are some of the trends that will impact the future of ITSM and IT operations?
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
In 2022, cyber attacks were at an all time high with trends indicating more such
attacks this year.
As experts in this industry, how crucial do you think cybersecurity technology will be in 2023? Are there any specific tools we need
and vulnerabilities we need to watch out for?
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
ITSM tool 🤝 SecOps tools
Having 360 degree visibility over IT assets and their security risk exposures is of paramount importance. How does
aligning your ITSM and SecOps strategy help you chart the course for unstoppable IT?
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
What is the Freshservice and SecPod SanerNow integration all about?
How does FreshService and SecPod SanerNow’s integration bridge the gap between service and operations
management to improve reliability and enhance security?
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
Demo.
© 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
Are you interested in a demo?
Sign up on the link in chat.

More Related Content

Similar to Align Your ITSM and SecOps Strategy for Unstoppable IT

CWIN17 london digital disruption embracing the future through architecture ...
CWIN17 london   digital disruption embracing the future through architecture ...CWIN17 london   digital disruption embracing the future through architecture ...
CWIN17 london digital disruption embracing the future through architecture ...Capgemini
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureAccenture Operations
 
22by7 campus presentation v1.05
22by7 campus presentation v1.0522by7 campus presentation v1.05
22by7 campus presentation v1.05Sashikris
 
The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019Mirror Review
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
 
Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS OverviewChris Kluis
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM Events
 
Presentation cloud as a growth engine for a smarter enterprise
Presentation   cloud as a growth engine for a smarter enterprisePresentation   cloud as a growth engine for a smarter enterprise
Presentation cloud as a growth engine for a smarter enterprisexKinAnx
 
Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017SMAU
 
Focus on innovation for customer centricity
Focus on innovation for customer centricityFocus on innovation for customer centricity
Focus on innovation for customer centricityExo Futures
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost Mithi Software Technologies Pvt Ltd
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
warehouse solutions|supply chain solutions
warehouse solutions|supply chain solutionswarehouse solutions|supply chain solutions
warehouse solutions|supply chain solutionsbrilliantwms18
 
Reducing Total Cost of Ownership
Reducing Total Cost of OwnershipReducing Total Cost of Ownership
Reducing Total Cost of OwnershipBiBoard.Org
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceMindfields Global
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023Bernard Marr
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 

Similar to Align Your ITSM and SecOps Strategy for Unstoppable IT (20)

CWIN17 london digital disruption embracing the future through architecture ...
CWIN17 london   digital disruption embracing the future through architecture ...CWIN17 london   digital disruption embracing the future through architecture ...
CWIN17 london digital disruption embracing the future through architecture ...
 
Network Operations | SlideShare | Accenture
Network Operations | SlideShare | AccentureNetwork Operations | SlideShare | Accenture
Network Operations | SlideShare | Accenture
 
22by7 campus presentation v1.05
22by7 campus presentation v1.0522by7 campus presentation v1.05
22by7 campus presentation v1.05
 
The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019
 
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...
 
Transcendent EAM CMMS Overview
Transcendent EAM CMMS OverviewTranscendent EAM CMMS Overview
Transcendent EAM CMMS Overview
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
 
Presentation cloud as a growth engine for a smarter enterprise
Presentation   cloud as a growth engine for a smarter enterprisePresentation   cloud as a growth engine for a smarter enterprise
Presentation cloud as a growth engine for a smarter enterprise
 
Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017
 
Focus on innovation for customer centricity
Focus on innovation for customer centricityFocus on innovation for customer centricity
Focus on innovation for customer centricity
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost
 
Horizons 2013 IT Magazine
Horizons 2013 IT MagazineHorizons 2013 IT Magazine
Horizons 2013 IT Magazine
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
warehouse solutions|supply chain solutions
warehouse solutions|supply chain solutionswarehouse solutions|supply chain solutions
warehouse solutions|supply chain solutions
 
Reducing Total Cost of Ownership
Reducing Total Cost of OwnershipReducing Total Cost of Ownership
Reducing Total Cost of Ownership
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
 
4Q21 Global ISG Index™
4Q21 Global ISG Index™4Q21 Global ISG Index™
4Q21 Global ISG Index™
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 

More from SecPod

Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022SecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesSecPod
 
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxSecPod
 
How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?SecPod
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...SecPod
 
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesUncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesSecPod
 
How to Implement Organization Wide Cyber Hygiene?
How to Implement Organization Wide Cyber Hygiene?How to Implement Organization Wide Cyber Hygiene?
How to Implement Organization Wide Cyber Hygiene?SecPod
 
How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?SecPod
 
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...SecPod
 
How to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowHow to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowSecPod
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowSecPod
 
How to implement security compliance with SanerNow
How to implement security compliance with SanerNowHow to implement security compliance with SanerNow
How to implement security compliance with SanerNowSecPod
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?SecPod
 
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch ManagementThe Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch ManagementSecPod
 
The Art of Managing and Securing Endpoints
The Art of Managing and Securing EndpointsThe Art of Managing and Securing Endpoints
The Art of Managing and Securing EndpointsSecPod
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionSecPod
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedSecPod
 

More from SecPod (19)

Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022Annual Vulnerability Report Insights - 2022
Annual Vulnerability Report Insights - 2022
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 
Uncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software VulnerabilitiesUncover Vulnerabilities Beyond Software Vulnerabilities
Uncover Vulnerabilities Beyond Software Vulnerabilities
 
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptxProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
 
How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?How can SMEs combat cyberattacks through automated vulnerability management?
How can SMEs combat cyberattacks through automated vulnerability management?
 
Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...Security automation architecture principles for effective vulnerability manag...
Security automation architecture principles for effective vulnerability manag...
 
Uncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software VulnerabilitiesUncovering Vulnerabilities Beyond Software Vulnerabilities
Uncovering Vulnerabilities Beyond Software Vulnerabilities
 
How to Implement Organization Wide Cyber Hygiene?
How to Implement Organization Wide Cyber Hygiene?How to Implement Organization Wide Cyber Hygiene?
How to Implement Organization Wide Cyber Hygiene?
 
How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?How to Achieve NIST Compliance using SanerNow?
How to Achieve NIST Compliance using SanerNow?
 
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
 
How to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNowHow to effectively monitor and manage IT assets in real-time using SanerNow
How to effectively monitor and manage IT assets in real-time using SanerNow
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNow
 
How to implement security compliance with SanerNow
How to implement security compliance with SanerNowHow to implement security compliance with SanerNow
How to implement security compliance with SanerNow
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
 
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch ManagementThe Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch Management
 
The Art of Managing and Securing Endpoints
The Art of Managing and Securing EndpointsThe Art of Managing and Securing Endpoints
The Art of Managing and Securing Endpoints
 
Cybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface ReductionCybersecurity Strategies for Effective Attack Surface Reduction
Cybersecurity Strategies for Effective Attack Surface Reduction
 
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations ExposedClosing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Align Your ITSM and SecOps Strategy for Unstoppable IT

  • 1. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
  • 2. © 2022 Freshworks Inc. All rights reserved. 2010 Founded 5000+ Employees 60,000 Total Customers * As of Aug 2022 ~$495M FY22 Annual Guidance* Recognition Leader in 3 Major Peer Reviews Recognized in 3 Gartner Magic Quadrants Freshworks at a glance Providing best-in-class customer and employee engagement software solutions +37% YoY FY22 Q3 Revenue Growth
  • 3. Freshservice: A right-sized service management solution Intuitive Delivering end-to-end, consumer-grade, end-user and employee experience Intelligent Providing agility through AI to create contextual and intelligent service delivery Extensible Enabling enterprise-scale integrations with a marketplace approach, built on an open and secure platform Partner like engagement model Drive customer success by focusing on feature adoption and value realization © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
  • 4. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. Unified service management across all business functions Employee focused, modern service management PPM ESM Plan, execute, and deliver projects on time with enhanced PPM ITAM ITOM ITSM Cut through alert noise, manage critical incidents and minimize downtime What you see is what you get Future proof your CMDB and optimize process and spending
  • 5. © 2022 Freshworks Inc. All rights reserved. 2008 Founded 25+ Countries where our customers come from * As of Aug 2022 Recognition Leader in patch management. Recognised by IDC, GigaOm, and Others About SecPod Providing Security Assurance to Every Connected Device, Globally. 160,000+ checks Leading Provider of the World’s largest Security Intelligence Feed
  • 6. © 2022 Freshworks Inc. All rights reserved. * As of Aug 2022 • Manage Vulnerabilities & Security Risks Beyond CVEs • Mitigate Vulnerabilities On-time with Integrated Remediation Controls • Execute everything from a truly integrated, centralized console • Automate end-to-end tasks and establish a continuous routine Advanced Vulnerability Management Framework
  • 7. © 2022 Freshworks Inc. All rights reserved. * As of Aug 2022 Our product philosophy is offering simplicity and automation to make the job of security administrators slightly better, everyday. SanerNow CyberHygiene Platform Powered by SecPod Security Intelligence Built Since 2009 World’s Largest Library of 160,000+ Security Checks
  • 8. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. The importance of integrating your ITSM and SecOps strategy Not having the right security operations (SecOps) strategy in place can cost businesses in millions. What are the key challenges when it comes to IT security?
  • 9. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information.
  • 10. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. More uninterrupted IT in 2023 What are some of the trends that will impact the future of ITSM and IT operations?
  • 11. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. In 2022, cyber attacks were at an all time high with trends indicating more such attacks this year. As experts in this industry, how crucial do you think cybersecurity technology will be in 2023? Are there any specific tools we need and vulnerabilities we need to watch out for?
  • 12. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. ITSM tool 🤝 SecOps tools Having 360 degree visibility over IT assets and their security risk exposures is of paramount importance. How does aligning your ITSM and SecOps strategy help you chart the course for unstoppable IT?
  • 13. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. What is the Freshservice and SecPod SanerNow integration all about? How does FreshService and SecPod SanerNow’s integration bridge the gap between service and operations management to improve reliability and enhance security?
  • 14. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. Demo.
  • 15. © 2022 Freshworks Inc. All rights reserved. Confidential and Proprietary Information. Are you interested in a demo? Sign up on the link in chat.