Remove cacoo
article thumbnail

Introducing Nulab Pass: Enterprise-grade security for all Nulab services

Nulab

It’s our new enterprise-grade security option that we’re calling Nulab Pass. It’s our new centralized security subscription that gives you enterprise-grade security and governance of all of your Nulab apps for your entire organization. It works across all of our products, including Backlog , Cacoo , and Typetalk.

article thumbnail

Introducing Nulab Pass: Enterprise-grade security for all Nulab services

Nulab

It’s our new enterprise-grade security option that we’re calling Nulab Pass. It’s our new centralized security subscription that gives you enterprise-grade security and governance of all of your Nulab apps for your entire organization. It works across all of our products, including Backlog , Cacoo , and Typetalk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Nulab Pass joins the Okta Integration Network

Nulab

Managing user’s access to Backlog, Cacoo, and Typetalk is easier than ever for IT managers. Nulab Pass is a centralized security subscription that gives you enterprise-grade security and governance of Nulab’s products for your entire organization. About Nulab Pass.

article thumbnail

Moving Typetalk’s Activity Log feature into Nulab Pass

Nulab

After receiving a lot of positive feedback from customers, we’re adding the Audit Log feature to not only Typetalk but also Backlog, Cacoo, and Nulab Account — a scalable managed account for enterprise teams that offers centralized security and streamlined user management. .

article thumbnail

Security Update: Logging library Apache Log4j vulnerability

Nulab

When the update is ready, we will notify customers who use the enterprise versions of Backlog and Cacoo via email. . As of Dec 13th 9:24 (UTC), we’ve finished updating Apache Log4j on all of our servers, using the workarounds advised by NIST and other security vendors for CVE-2021-44228.