A new minor release of the VIVA2 add-on is available just in time for the new year. After the last version mainly included technical adjustments to PHP 8 and visual adjustments to the new i-doit layout, we have added a few new functions and improvements in the new version.

These are the new features in detail:

Objects can be moved freely

The objects in the graphical protection requirement determination/inheritance can now be moved not only horizontally but also vertically. Both directions can be switched on and off using two buttons. If both directions are active, the objects can be moved completely freely.

Object height adjusts itself

The height of the objects in the graphical protection requirement determination/inheritance now adapts to the number of configured basic values. Further basic values can be defined via the Admin dialogue.

Additional basic values are also exported

Additionally configured basic protection requirement values (and their values) are now also output via the CSV export of the graphical protection requirement determination/inheritance.

Bug fixes

As in every release, the open bugs have been fixed. A complete list of all fixed bugs can be found in the CHANGELOG.

premium partner

becon is an i-doit Premium Partner, Certified Support Partner and Development Partner of synetics GmbH and thus offers an all-round carefree package.

Service Management

Thei-doit Compliance Suite gathers all important tools for your IT security in one place: CMDB, ISMS, data protection and change management

Information security through ISMS in i-doit

Information security affects every company. Protect your valuable data with standards and norms such as ISO 27001 and IT Grundschutz from the BSI. Standards help to proactively counter threats from outside and inside. Minimize the risk and thereby increase the security of your company. Monitor your processes by using meaningful reports. Benefit from the integration of a CMDB and numerous extensions to automate your IT documentation.

Subscribe to our blog!

We will not only talk about ourselves here,
but above all provide interesting information about the transformation of IT with all its technological facets.

blog

Related blog articles

becon at it-sa 2025: NIS2, ISMS, CMDB, and attack detection

becon at it-sa 2025: NIS2, ISMS, CMDB, and attack detection

The it-sa Expo&Congress in Nuremberg is Europe’s largest trade fair for IT security. Meet our team on site in Hall 7, Booth 7-550, or at our presentation “Implementing NIS 2 with DataGerry – CMDB, ISMS, and attack detection in a one-stop solution.”

DataGerry | Release 3.0.0

DataGerry | Release 3.0.0

The DataGerry 3.0.0 major release brings new features such as a fully integrated ISMS module, the interactive CI Explorer, support for many-to-many relationships and a completely redesigned reporting system. Manage risks, visualize dependencies and analyze your data even more efficiently.

Modern cyber security: Why SIEM is indispensable for companies

Modern cyber security: Why SIEM is indispensable for companies

Cyberattacks are becoming increasingly sophisticated, and companies are faced with the challenge of effectively protecting their IT infrastructures. It is no longer enough to rely solely on conventional security measures such as firewalls or antivirus software. Security Information and Event Management (SIEM) plays a central role.

Contact

Instant contact

Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!

+49 (0) 89 608668-0