You are here

Blogs

Make Recognizing Indirect Access to SAP a Key Priority

SAP’s position is clear, SAP wants to be compensated by the use and value generated by its IP even if it is done via Indirect Access

7 Steps to Kickstart Your GDPR compliance

How to identify key risks and where to concentrate your efforts before the regulation is introduced on May 25, 2018

How to prioritize and mitigate SAM risks

Quickly identify which vendors you should concentrate on first

The Basics of Software Asset Management

Learn How to Address Real-world Challenges of Managing Software Assets

ISO 19770-1 has had a makeover, but has anyone noticed?

A few key points to consider for the update to the international standard for SAM

Security Loves IaaS Automation

See how Snow can help leverage the power of IaaS in your organization, securely and cost-efficiently

Your Top 5 Concerns for Software License Optimization

The topics you've considered important over the past year and a half

2018 resolutions for cloud cost containment

Three recommendations to keep your cloud costs under control

Patching the Meltdown/Spectre data leak

See the extent of patching in your network in a single view

Audit – A Five-letter Word That Evokes Four-letter Responses

How Software Vendors Leverage Audits to Increase Sales.

Pages

X

some content goes here