You are here


Takeaways from the IBSMA Compliance Manager Summit

Couldn’t attend? Here’s some key considerations for software vendors and end-user organizations that were discussed at this week’s IBSMA conference

Take note of how the GDPR may affect software audits once the regulation comes into force; ensure full understanding of open source software licensing and compliance; and provide clarity around enforcing and responding to audits were key points of discussion at this week’s IBSMA conference.

Make Recognizing Indirect Access to SAP a Key Priority

SAP’s position is clear, SAP wants to be compensated by the use and value generated by its IP even if it is done via Indirect Access

SAP customers need to ensure that identifying and tackling Indirect Access risk is a key priority. So, what does Indirect Access entail, and how do you know if you’re exposed to the risk of fines? How do you identify whether you have systems which enable users to indirectly access SAP?

7 Steps to Kickstart Your GDPR compliance

How to identify key risks and where to concentrate your efforts before the regulation is introduced on May 25, 2018

After years of warning and clarifications, the time is nearly here.  Enforcement of the EU’s General Data Privacy Regulation (GDPR) is due to start on May 25, 2018.  Affected organizations find themselves at vary states of readiness, with some years into their journey and others just now realizing the mountainous effort required to achieve compliance.

If you find yourself in the latter camp, don’t despair.  The hardest part of any long journey is starting.  Here are seven steps to help start you down the path.

How to prioritize and mitigate SAM risks

Quickly identify which vendors you should concentrate on first

One of the questions I’m frequently asked by Software Asset Management professionals is how to prioritize SAM efforts.  Here is an approach which I have found useful in dealing with the overwhelming number of software applications discovered during a SAM implementation.

The Basics of Software Asset Management

Learn How to Address Real-world Challenges of Managing Software Assets

In recent years, Software Asset Management (SAM) has evolved to manage a wider range of business assets and processes, transforming beyond license compliance. Today’s SAM practices include strategic cost control, infrastructure management and security control, on top of the foundation of license optimization. Issues that figure heavily on the agendas of most CIOs. It’s their job to ensure that the organization is doing more with less, contain soaring IT costs, deliver user flexibility, and minimize risk exposure. A good SAM practice goes a long way toward helping organizations, and their CIOs, achieve these targets

ISO 19770-1 has had a makeover, but has anyone noticed?

A few key points to consider for the update to the international standard for SAM

There’s a new update to the ISO 19770-1 international standard for Software Asset Management (SAM) with many new changes. The launch has been fairly low profile, but that’s probably a reflection on the SAM community and the fact that the standard is developed by volunteers (unpaid, in their own time) who are ITAM professionals rather than marketing experts.

Security Loves IaaS Automation

See how Snow can help leverage the power of IaaS in your organization, securely and cost-efficiently

Leveraging the power of IaaS within an organization tends to be challenged by the fear of security breaches and lack of IT expertise. As a result, the technology often remains locked down in the IT department. Snow’s automation doctor, David Svee, has a remedy that enables you to unleash IaaS with a multitude of positive benefits. 

Your Top 5 Concerns for Software License Optimization

The topics you've considered important over the past year and a half

A look back at the most read blog topics from the last 18 months.

2018 resolutions for cloud cost containment

Three recommendations to keep your cloud costs under control

To ensure the CIO and CFO don’t spend the year tackling massive, unexpected bills for their cloud usage, here are three recommendations to help contain cloud costs.  

Patching the Meltdown/Spectre data leak

See the extent of patching in your network in a single view

The IT world of 2018 woke up to an unwelcome bang in the form of Meltdown and Spectre – two widespread hardware vulnerabilities. To encapsulate the problem, which security experts have classified as catastrophic, billions of computers and devices are at risk as the vulnerability exposes the data stored in the most protected part of a device’s hardware; the place where passwords, encryption keys, and other credentials are stored.



some content goes here