user

Inedo Blog


Navigation
AuthorThe Inedo Team
The Inedo Team
Featured

ProGet

Changes in SCA Features from ProGet 2023 to 2024

Posted on July 11th, 2024.

ProGet 2024 introduces several noteworthy enhancements, especially for Basic or Enterprise users. One of the main areas of change is Software Composition Analysis (SCA). Basic users now get a more automated SCA experience, while Enterprise users unlock unlimited scanning and deeper customization. For organizations getting more...

Featured

Inedo

Important pricing information about new ProGet purchases and renewals

Posted on April 15th, 2024.

To our current users and those considering licensing for the first time- we appreciate your ongoing usage of ProGet. As you may know, Inedo is dedicated to not taking outside investments that could impact our roadmap or dilute the value users receive from our products. As a licensed user, you are our lifeblood and your satisfaction is...

Featured

Inedo

Webinar: CI/CD on Self-Hosted Docker Made Simple with BuildMaster

Posted on September 5th, 2023.

Docker adoption continues to grow, and for good reason. Containers offer improved portability, easier scalability, enhanced isolation, and simplified deployment and management processes. But with that comes several challenges, especially when you self-host Docker: BuildMaster and ProGet can help. Join Founder & CEO Alex Papadimoulis...

Featured

Inedo

Webinar: The Future of .NET is… On-prem CI/CD?

Posted on June 23rd, 2023.

The “Cloud” certainly isn’t going anywhere, but the “Cloud-Native Strategy” of putting all of your IT eggs in the Azure basket might just be this generation’s OS/2 Warp or Sun Microsystems. With Microsoft betting the farm on Azure, what does that mean for how you’ll build and deploy your .NET applications? And what about GitHub, the...

Featured

Self-Hosted

How to Choose Self-hosted Git Source Control for your Organization in 2022

Posted on April 7th, 2023.

When you evaluate self-hosted alternatives to “the public cloud” for your source code, you’ll run into a huge list of tools. After a bit of research, you’ll discover that, outside of the on-premises versions of “major cloud” vendors (Azure DevOps, GitLab, etc.), there’s a bunch of tools that seem like...

Featured

Inedo

ProGet 2023: What’s Coming and When

Posted on February 9th, 2023.

ProGet 2023 will offer a number of improvements, like better NuGet symbols support, but will mainly focus on our Software Composition Analysis (SCA) features such as vulnerability scanning and license detection. We’re also developing our own “offline” vulnerability database called ProGet Vulnerability Central...

Featured

ProGet

ProGet 2022: Scanning and Blocking Vulnerabilities

Posted on August 10th, 2022.

We’ve made a lot of improvements to Vulnerability Scanning in ProGet 2022. Not only is it simpler to configure, but it’s integrated with the new Software Composition Analysis (SCA) features. This will let you see which of your application releases (in production or in flight) are impacted by vulnerabilities...

Featured

Self-Hosted

Gitea: How to Painlessly Self-Host Your Organization’s Source Code

Posted on August 1st, 2022.

Is “the public cloud” really the best place for your source code? According to Gartner, over 90% of organizations plan to embrace hybrid- or multi-cloud strategies to mitigate the risks of “putting all your eggs in one basket”. Many are starting to do the same with their source control – and you’ve probably been thinking the...

Featured

ProGet

ProGet 2022: What is Software Composition Analysis (SCA)?

Posted on July 19th, 2022.

ProGet 2022 has been released! We’ve made a lot of improvements, but some of the most exciting changes are the revamped Software Composition Analysis (SCA) features. Not only are Vulnerability Scanning and License Detection/Blocking a lot easier to use, but they’re integrated so that you can see which of your...

Featured

DevOps

Log4Shell Impact & Other High-Severity Vulnerabilities

Posted on December 15th, 2021.

If you’re a Java team, you’re almost certainly using Log4Shell, heard of the new high-severity vulnerability, and are worried about how to deal with it.