Product Updates

View the latest and greatest changes here!
7 months ago

✨ Chrome Browser Management

What is Chrome Browser Management?

The majority of employees’ work happens in a browser, such as Chrome, but browsers are also prone to hacks and vulnerabilities. Chrome Enterprise Core sets safe browsing settings to makes sure browsers are secured and protected. Chrome Browser Management leverages Mobile Device Management (MDM) to give you deeper visibility into browser activity in Chrome. You can now enforce key security policies, like Safe Browsing and mandatory Chrome updates, to keep your organization secure. We’ve developed configurations and settings that mean you are able to just toggle-on features in a simple light-touch way.

What’s New?

With this feature, you can:
  • View Installed Extensions: Chrome extensions are often a source of vulnerabilities. Now, you can easily view which extensions are installed across your fleet. Simply navigate to the device details page to see all installed extensions.
  • Set Security Policies: Configure security policies directly in the Chrome Browser, such as enabling Safe Browsing and enforcing Chrome updates. This is especially important for industries with strict compliance requirements, like HIPAA, where enhanced protection is a must.
Zip’s Manage Chrome Browsers control with configurable settings
Zip’s Manage Chrome Browsers control with configurable settings
View managed browsers and extensions on a per-device level
View managed browsers and extensions on a per-device level

Make Sure this Feature is Enabled!

Check out our help article here and follow the instructions to turn on Chrome Browser Management.

Coming Soon!

We’re working on building more controls, such as setting policies to block certain actions and receive real-time alerts. Expect more enhancements to roll out in the coming weeks!
Extension Management: We’re planning to release a new feature for extension management that will allow you to set policies and block risky extensions. To prepare for this update, we may require additional permissions from your Google Workspace. Don’t worry—there’s no need to update anything right now, but stay tuned for instructions on how to update your API permissions when the time comes.

Why is this great?

Increased Visibility: See what’s happening inside your Chrome browsers and manage extensions more effectively.
Enhanced Security: Automatically enforce security policies to protect your users without disrupting their workflow.
Stay Ahead of Threats: With our upcoming controls and alerting mechanisms, you’ll be able to respond to risks before they impact your organization.

7 months ago

✨ Managed Windows Updates

We’re excited to announce the expansion of our macOS Version Control! The control has now been renamed to OS Version Control and has been enhanced to include management of Windows updates alongside macOS updates. This update will allow you to monitor and manage the OS versions across both macOS and Windows devices within your organization, ensuring they are up-to-date and compliant.
Image without caption
To read more about our control and get guidance for how to auto-enforce it, check out our guidance here.

Why is this great?

Expanded Coverage: Ensure that both macOS and Windows devices in your fleet are up-to-date and compliant with your security standards.
Focus on user experience: Our built in 14-day soak period allows for version updates to be validated as bug-free before being pushed out onto devices. We also default to allowing a 7-day window for user-led restarts to minimize disruption and impact — we don’t want anyone to be forced to restart their device in the middle of a busy day!

Revamp
9 months ago
We’ve heard your feedback, and have built out the ability to disable controls, should you chose not to enforce them. This will help present a more accurate view of your security performance that excludes unused controls, providing a simpler view with just the features you care about being visible.
To configure enabled controls, visit the Organization Settings page. Click the “Select Controls” button to disable individual controls, uncheck the controls you wish to disable, and click “Save Enabled Controls” to save your changes.
Image without caption
Controls will still show in the control tab, but will have a flag indicating that the control is disabled.
Image without caption

Why is this great?

✅ Customizable Security Dashboard: Tailor your security view by disabling controls you don't use, focusing only on the most relevant features.
✅ Enhanced User Experience through Simplified Monitoring: Eliminate clutter from unused controls, making it easier to monitor and manage the security aspects that matter most to you.
✅ Warning Pop Ups will help notify you if any controls that are being disabled will impact compliance with your selected compliance frameworks.

Revamp
9 months ago
Within our Device Enrollment control, we have added an additional Windows-only step that helps users identify and upgrade devices that are operating on the incorrect operating system. It’s essential that devices are on the correct operating systems to ensure they are able to be properly managed (allowing for things like password resets). You will automatically be notified of devices via the Notification center, which will allow you to take action on affected devices:
Image without caption
ALT
We’ve built a new step that provides step-by-step instructions on how to purchase license keys, and instructions for users for how to upgrade their devices.
Image without caption
ALT

Why is this great?

✅ Enhanced Visibility Into Non-Compliant Devices: Get a centralized view of all non-compliant devices, complete with clear, step-by-step instructions for upgrading them to meet compliance standards.
✅ Efficient Issue Resolution: Quickly identify and solve issues related to incorrect operating systems, before it becomes a real issue.

Revamp
10 months ago

We are excited to share the improvements we have made to the Device Enrollment control to help give you a more accurate report of which devices users are on, and whether their devices are enrolled or not.
You now have the ability to edit device allocation in the Device Enrollment tab, which means you can overwrite the predictions the Zip console generates on which users have which work devices, to more accurately reflect reality. This will give you the ability to take actions such as: excluding contractor devices, excluding devices with only CrowdStrike deployed, and allocating multiple devices to one user. All of which will help give you an accurate picture of your device enrollment compliance state.
Simply select ‘Edit Device Assignments’, then add or remove devices directly in the table, and click ‘Save Device Assignments’ to save your changes.
Image without caption

Why is this great?

Edibility Offers Greater Flexibility: Now you can directly edit the device assignment, you can ensure 100% accuracy in how device enrollment is being reported.
Improved Ease of Identifying Non-compliant Devices: You’ll clearly be able to see the mapping of employees and the devices they have, to action on tracking down non-compliant devices.
Better Control of Accounts Without Devices: You no longer need to exclude accounts that don’t have assigned devices. This means you can now still enforce controls like 2FA, and see information on Identity Threat Detection, and Third-Party App Monitoring, on accounts that are not tied to devices without affecting your enrollment metrics.

Feature
10 months ago
We are so excited to announce a brand new integration that now allows you to receive Zip notifications via Slack or Email. Notifications will help alert you to changes in your fleet and within the Zip console that require your attention.
Notifications alert you to important updates such as: failing health checks for providers (like Google workspace or CrowdStrike), devices that are not checking in, CrowdStrike alerts, or unmanaged devices. New notifications are sent out hourly, but to keep the volume of notifications manageable, you will only be notified of new actions (e.g. you won’t continually be notified of the same issue).

Why is this great?

Enhanced Visibility: Stay informed about critical updates and issues in real-time without needing to constantly check the Zip console.
Proactive Management: Quickly address and resolve potential security threats or system failures as soon as they arise, minimizing downtime and risk.
Here’s a sample notification email:
Image without caption
And here is a sample Slack notification:
Image without caption

Enable External Notifications

Check out additional information on this feature + instructions for how to set up external notifications here.

Feature
10 months ago
Building on our existing Identity Threat report, which provides visibility into potentially harmful behaviors, including failed login attempts, logins from unusual IP addresses, or admin accounts removing security configs, such as 2FA, we have now released a control that allows you to triage those alerts from within the platform. This will help you manage any suspicious identity threats, check in with users to confirm the behavior, and then close our alerts directly within the Zip console.
Check out additional information and guidance on the control here.

Why is this great?

Enhanced Visibility: Gain comprehensive insights into identity-related threats with detailed reports on failed login attempts, unusual IP addresses, and administrative actions.
Proactive Threat Management: Stay ahead of security threats by promptly addressing suspicious activities, reducing the risk of breaches.
Image without caption

Coming soon!

🔜 Including more IdPs: We're working to include more identity providers, namely Okta and Microsoft Entra, to ensure that even more users can benefit from this new feature. Stay tuned for updates!

Revamp
10 months ago
We’ve changed how we measure your organization’s compliance with various frameworks! Previously, the denominator was total number of devices only, and the numerator was devices that are 100% compliant. This made it very hard for organizations to get to 100% on these controls!
We’ve changed the measurement to be the total number of control targets that are satisfied over the total number of controls that could be satisfied, painting a more accurate (and nicer!) picture of compliance across your organization.
Image without caption

Revamp
10 months ago
We're pleased to share that we have revamped the reporting for our Device Enrollment Control, to give you more precise and comprehensive insights into how complete your enrollment process is.
What’s Changed?
Previously device enrollment percentage was measured against number of ‘members’ (people) in the organization. This meant users with multiple devices, users with devices that didn’t need to be managed (such as contractors), or members without devices (such as service accounts) were skewing the data on device enrollment, and ultimately making it harder to determine how your organization was tracking towards 100% device enrollment.
Now we measure device enrollment against the number of devices your organization has that should be enrolled. We combine data from your identity provider and session data, to make informed predictions on which users have which work devices. The new UI shows each device that is enrolled or expected to enroll nested under the members in the control progress table with details such as the device type, status, and the reasoning for why we predicted the device exists. This will help give you an accurate picture of how many devices should be enrolled, and your progress towards 100% enrollment.
Image without caption

Why is this great?

Improved Accuracy in Reporting: These change provide a more accurate picture of how many devices need to enroll in MDM, and exactly how you are tracking in your compliance
Improved Ease of Identifying Non-compliant Devices: You’ll clearly be able to see the mapping of employees and the devices they have, to action on tracking down non-compliant devices.
Better Control of Accounts Without Devices: You no longer need to exclude accounts that don’t have assigned devices. This means you can now still enforce controls like 2FA, and see information on Identity Threat Detection, and Third-Party App Monitoring, on accounts that are not tied to devices without affecting your enrollment metrics.
Coming Soon! Our next feature update will make this editable, meaning you can make adjustments to device assignments by adding or removing devices in the enrollment control to keep your metrics 100% accurate.

Feature
1 year ago
We're excited to roll out the Identity Threat Detection Report, a new feature in your Zip security toolkit. This report provides visibility into potentially harmful behaviors, including failed login attempts, logins from unusual IP addresses, or admin accounts removing security configs, such as 2FA.
The report pulls identity provider data into an events log that provides a single place to see activity across all corporate accounts associated with your organization. To help navigate and filter out potentially suspicious activity, we’ve built a severity categorization that applies ‘warning’ and ‘critical’ severity flags so that you can have easy access the events that require attention while still being able to see informational events (like normal logins).
Under this report you’ll see a high-level overview of key metrics, including the number of ‘warning’ and ‘critical’ alerts and the rate of failed login attempts.
Image without caption

Why’s This Great?

Improved Visibility: Track and monitor security-related events such as blocked login attempts, compromised passwords, accounts taking sensitive actions, and elevated permissions being granted.
Severity Levels: With the addition of severity levels to the report, you can quickly discern which events pose the greatest risk and require immediate attention.
Event Log Table: Easily access and navigate through a detailed log of security events, helping you to stay informed and proactive.

What's Next?

🔜 Actionable Controls: We're developing a feature that will let you take immediate action on the security events you see. Soon, you'll be able to respond to alerts directly within the console via a Control, with prescriptive recommendations for remediation.
🔜 Including more IdPs: We're working to include more identity providers, namely Okta and Microsoft Entra, to ensure that even more users can benefit from this new feature. Stay tuned for updates!
If you have any feature requests, or would be interested in sharing user feedback, we’d love to hear from you! Please reach out to success@zipsec.com.

Feature
1 year ago
We’re excited to announce our new control: Third-Party Applications Permissions. This feature allows you to review all the permissions granted across third party applications in a single place. We’ve built a ‘permissions sensitivity’ categorization, which flags the high sensitivity permissions to your company data.
Image without caption

Why is this great?

✅ Increase visibility into the permissions of apps across your business in a single view
✅ High sensitivity permissions are flagged to support quick management and ability to action the highest-risk permissions.
Sounds familiar? This functionality used to live on individual user’s accounts, were you could see the app permissions they’d granted. With this new Control you have a more manageable single-view where you can see a comprehensive list of every application with permissions granted across all your employees.
Coming soon! This feature is currently in beta, and currently this feature is view-only (i.e. you can review app permissions, but cannot action changing them yet). We are building out the functionality to manage permissions from within the Zip console, so keep an eye out for our new product feature update on this!
In order to preview this feature, you’ll need to add two new permissions to the Google Workspace integration. To see what permissions you need to add, you can go to https://console.zipsec.com and click in to your Google provider. You can see a health check that will flag if you’re missing any permissions!
Image without caption
You can then proactively add these permissions by reviewing the “Granting Permissions to the Zip Service Account” section here. Reach out to success@zipsec.com if you have any questions!
Image without caption

Feature
1 year ago
We’re excited to announce the release of our new notifications, which now helps you manage your Zip console by alerting you to actions and changes in the status of your fleet.
Notifications will alert you to changes in the status or abnormal activities across devices, including: devices that fall out of management, devices failing to check in, or Windows devices operating on ineffective licenses (Windows Home rather than Pro). Any CrowdStrike alerts will also be flagged in notifications.
The notifications will be categorized with ‘important’ tags to help highlight critical items, and each notification will contain a summary of the issue along with a recommended action to take and the ability to directly click in to action on the issue.
We will continue to build out the scope of this feature over time so look out for additional notification types over the coming weeks!

Why Is This Great?

✅ Increased Visibility: Stay informed about critical actions and status changes across your fleet without needing to constantly track each control manually.
✅ Efficient Prioritization: Notifications are tagged as 'important', ensuring you can swiftly prioritize and address pressing issues with summarized details and actionable recommendations.
✅ Easily Actionable: Take immediate action by directly accessing the related issue from the notification, enabling quick investigation and resolution.
Image without caption
Check out our guidance here to learn more about the feature and how best to use it.

Revamp
1 year ago
We’re excited to announce that we have revamped our branding! Our website has gone live with the full sweep of changes. As a current Zip user, we wanted to give you the heads up to avoid any confusion when you log into the console or go to our website and notice that things are looking a little different.
Image without caption

What’s different?

  • We’ve updated our external branding, colors, and logo
  • Our website has had a total refresh - check it out here!
  • The console remains largely the same, so in terms of your user experience on the console, you don’t need to navigate anything differently in the console.
    • We do want to call out, the login page will look slightly different! Have a quick look at the screenshot below of what the newly-branded login page will look like.
Image without caption
As you can tell, the console looks largely the same, but you can see our new logo displayed in the top left hand corner:
Image without caption

The Story behind our Branding and Identity

We have released a blog post, where we break down the design process behind our branding and explore the values and story behind Zip.
Check out our blog here!

Feature
1 year ago
To support the Crowdstrike Falcon Device Control we have built a control in the Zip Console that allows you to turn on and configure it right within our Platform.
Within Crowdstrike the control monitors and allows you to set the permissions around safe and accountable usage of USB devices. The feature we have built in the Zip console allows you to enable this control in just a few clicks. You can then review and manage the specific activities of your devices within the Crowdstrike portal.

Why is this great?

✅ At Zip, we’re all about making life easier and simpler, and this control enables you to configure this control in just a few clicks!
✅ With the auto-enforce feature, devices will automatically be compliant with this feature from day-1 with no action required from your IT department or the user.
Image without caption
Check out our guidance here to learn more about the Control and how to ensure it’s enabled for you!
Flag! If the USB Control shows as ‘disabled’ in your Zip console, this means you don’t have the Falcon Device Control in Crowdstrike. Reach out to success@zipsec.com if you’d like this feature and we can enable it for you!

Revamp
1 year ago
We are excited to offer the new functionality that now allows you to create and edit email templates within the Zip console.
This means when you are sending out enrollment instructions for device enrollment, or other controls, you can now tailor the email templates directly within the Zip console before sending!

Why is this great?

✅ Improved user experience as language within emails can now be tailored to align with language and terminology of your organization. Instructions will be clearer and easy to follow meaning users can quickly execute on enrollment activities.
✅ Improved flexibility and efficiency through the ability to create and save multiple email templates. Once a template is created you can select it from a dropdown menu when you’d like to use it!
Image without caption
To read the full instructions on how to edit email templates, check our guidance document here.

Feature
1 year ago
📰
Read more about Activation Lock by checking out our Zip Blog Post here!
We’re excited to introduce our latest control to help you manage your fleet: Activation Lock Management! Our new control provides a solution to the challenge faced by IT-teams of dealing with Apple devices that have ‘Activation Lock’ turned on. Activation Lock can prevent IT teams from re-issuing devices from old employees to new — if not properly managed, returned Apple devices are at risk of being unusable, and resulting in a massive waste of money for a company.
Our Activation Lock control features helps organizations ensure all Apple devices have activation lock disabled, giving them back control of their fleet! This control:
  1. Prevents activation lock from being turned on without preventing users from using personal imessage accounts
  1. Once auto-enforced, this control monitors activation lock usage, and automatically notify users to turn off activation lock if it’s on.

Why is this great?

✅ Cost and Time saving for businesses by preventing the risk of returned laptops being un-usable and turning into “$2,000 paperweights”.
✅ Ensures activities, such device locking and wiping, are managed by your company’s IT team, and not the individual, which is much better corporate security practice.
✅ … without restricting users! Users can still have personal FindMy on their laptop, without impacting the disabling of activation lock.

How to Turn on this Feature in your Zip Console

Check out our guidance here for full instructions on how to make sure you have enforced this control.

Feature
1 year ago
Introducing SaaS Security (Monitoring)
We’re excited to preview our new SaaS Security Monitoring feature! This feature will allow you to review all the apps that users have granted permissions to and see the ones with elevated read and/or write permissions to your company data. We’ve built a ‘permissions sensitivity’ categorization, which flags the high sensitivity permissions for your visibility.
In order to preview this feature, you’ll need to add two new permissions to the Google Workspace integration. You can proactively add the permissions by reviewing the “Granting Permissions to the Zip Service Account” section here, or you’ll be prompted to add the permissions by an alert message when viewing a Google Workspace account page within the Zip console. Reach out to success@zipsec.com if you have any questions!
Currently, this preview is only offered for Google Workspace accounts. Soon, however, you can expect this view for Entra accounts, plus the ability to manage SaaS Security / App permissions right in the Zip Console. See guidance for how to preview this feature here.
Image without caption

Why is this great?

✅ Increase visibility into the permissions of apps across your business
✅ High sensitivity permissions are flagged to support quick management and ability to action the highest-risk permissions.

Revamp
1 year ago
We’ve now made it easier to edit the parameters of controls directly within individual controls. There’s a new ‘Configuration’ tab within each control, where you can turn on auto-enforcement, edit and update the parameters you’d like to be set. Check out the guidance here.
Image without caption

Feature
1 year ago
An Easier way to Combine Users with multiple email addresses:
We’ve now built the ability for you to assign multiple email addresses to the same user! This means if you have some users with multiple emails associated with them, you can manually resolve them so there is a single member record reflecting the devices and sessions they are using.
Read our guidance on how to do this here.

Why is this great?

✅ Improved accuracy and clarity for inventory tracking and compliance reporting
✅ ’Separate members’ feature allows you to reverse this action if it changes in the future or this was done by mistake
Image without caption

Feature
1 year ago
We’ve improved the visibility into your Apple device fleet through our new asset management for apple devices feature. Now, as soon as an apple device is purchased through Apple Business Manager (ABM), it will be visible in the Zip Console, even before the device in enrolled in the MDM. Once it enrolls in the MDM, the ABM record will disappear and you will manage it as a normal managed device.
Check out our guidance on how to use this feature here, under the FAQ Can I see devices that aren’t enrolled in the MDM yet?
Image without caption

Why is this great?

✅ Improved visibility into your inventory, allowing you to identify every device and take action to enroll devices that should be enrolled.

Feature
1 year ago
We are excited to roll out our latest feature update - Automated macOS patching! This update means our existing ‘macOS Version controls, can now be ‘auto-enforced’ which means users will be automatically nudged to update their device once the version it’s running on becomes ‘out of date’. The parameter that determine what classifies as ‘out of date’ can be set by you in your Zip console.

Why is this great?

✅ Increased compliance across the MacOS Version control as users are now automatically prompted to update if they fall out of compliance
✅ Ability to set auto-enrollment means it’s a lighter management lift as users will automatically be prompted to update their devices once they are outside version parameters
✅ Whilst still being flexible … through the ability to configure the parameters from when a device should be updated
Image without caption
To turn this on, follow the instructions here.

Feature
1 year ago
We are excited to roll out our latest security control for CrowdStrike Falcon! Our new “CrowdStrike Falcon Prevention Policy” control both detects and prevents malicious processes. This builds on our existing Detection policy, after a 21 day ‘soak period’ to learn the ‘normal’ activities of your organization, we’ll automatically move devices in your organization to the new control, ensuring you best-in-class protection with minimal hassle.

Why is this great?

✅ Prevention offers a higher level of security as we are now able to prevent the activity entirely, rather than just reacting to alerts (as is the case in the detection policy)
✅ Ability to set auto-enrollment means it’s light management lift as devices can seamlessly move from detection to prevention policy after the 21-day soak period is completed
✅ Whilst still being flexible … through the ability to go into CrowdStrike and grant exceptions to activities that your organization knows to be safe

Revamp
1 year ago
You may have noticed our platform is looking a little different... for the New Year we rolled out an updated UI library and a new color palate. The functionality is exactly the same across our platform, just a little sleeker!
Image without caption

Feature
1 year ago
We listened to your feedback, and have introduced the ability to customize controls and parameters within selected Compliance Frameworks on our platform. This gives you the ability to set custom controls that meet your organization’s needs directly within our platform. Parameters such as password requirements, and computer screen lock, and more can now be easily adjusted in our platform. Don’t worry though, we make sure you can never make changes that would make you non-compliant with your compliance frameworks.

Why is this great?

✅  Increased flexibility that allows you to adjust controls to meet your preferences
  …Whilst maintaining 100% compliance through our guardrails that ensure you remain compliant with any frameworks you are deploying
Image without caption

Feature
1 year ago
We have expanded the ability to view and manage CrowdStrike alerts within the Zip platform! Our new control lets you view all open CrowdStrike alerts, including status, severity, user and device impacted, and start/end time. You then can ‘triage’ the alerts directly in the platform or ‘investigate’ with a single button that takes you directly to the relevant page on CrowdStrike.

Why is this great?

✅  Increased visibility within our platform of all CrowdStrike alerts requiring your attention
✅  Quicker resolution through our triage task that enables you to action on alerts right within our platform
Image without caption

Feature
1 year ago
In case you missed it, we have made several other improvements recently to our CrowdStrike controls to support a seamless experience for our users.

CrowdStrike Falcon Sensor Update Policy

Automatically update the sensor, resulting in:
✅  100% of devices on a recent and supported sensor version ✅ Improved EDR security

CrowdStrike Falcon Detection Policy

Automatically set our recommended antivirus policy, resulting in
✅ Best in-class security across Windows and Mac Devices ✅ Little to no end-user impact

Feature
1 year ago
We have added now added 1Password to our Application Center available to install on enrolled devices. 1Password is a best-in-class password manager that will help employees manage their login credentials and meet compliance requirements from day one. Zip has also added functionality to automatically deploy upgrades to applications for you, with no impact on your end-users.
Image without caption

Feature
1 year ago
You can now view your company and security control progress over time in our brand new reports tab.
Image without caption
To get started, navigate to the “Reports” tab in Zip. This page shows how your inventory size and compliance metrics have changed. Additionally, you can view an audit log of actions taken within the Zip platform. As time goes on, more data and events will be collected to populate these graphs.

Revamp
1 year ago
We’ve also updated the way you navigate through the Zip platform. All of the tabs have moved to a sidebar, where you can access nested pages more easily.
Image without caption
Please let us know if you have any trouble finding a page. We hope this helps to organize your workflow as we scale our product!

Feature
1 year ago
You can now easily enforce security controls and streamline progress towards a compliance framework like SOC2, HIPAA, or PCI DSS with the single click of a button! Additionally, you can now directly map each Zip security control back to relevant compliance framework standards.
Image without caption
To get started, navigate to the “Modules” tab in Zip, then click on the settings icon. Click on “Edit Settings” in the top right corner to select your target framework. Expand step 2 to preview the changes that will take effect. If any controls under your selected framework aren’t able to be deployed, they’ll be visible under step 3, “Preview Warnings”. Once you’ve selected and confirmed the changes and warnings, press “Save and Apply” to automatically roll out security settings that meet your selected framework, preview any employee impact, and apply the changes!

Revamp
2 years ago
We have changed our previous “Devices” view to a new “Inventory” view that allows you to see more types of data for your organization! You will now be able to see both devices and user accounts in this tab.
Image without caption

Feature
2 years ago
You can now "exclude" devices or accounts from management within Zip. This will omit them from the scope of Zip's security controls and any reporting within the platform. This won't impact the state of the record within the source provider system, and you can always undo this action within Zip.
You can view a step by step guide on how to exclude inventory here.
Image without caption

Feature
2 years ago
We now have an in-app walkthrough that will automatically trigger the first time you log into Zip, and a self-guided setup checklist! This will walk you through the basics of how to use our platform. You can restart this tour at any time by clicking the question mark icon in the upper right hand corner, in between the refresh and dark mode buttons.
Image without caption

Feature
2 years ago
Today we are excited to announce the release of your application center. The application center allows you to automatically manage and deploy commonly used apps to all of your devices, streamlining the IT onboarding process for both employees and administrators.
Image without caption
Image without caption
To get started, navigate to the “Apps” tab in Zip, then click on the “Available Apps” tab. We currently support Chrome and Slack, and will expand our app offerings over the next few months.
If you want more of a walkthrough on how to best use the application center, you can view a walkthrough here, or schedule some time with us to get a live demo.
Powered by Notaku