201609.20
Off
0

Negotiating Enterprise Licensing and Cloud Service Agreements with Microsoft

Software licensing options for large enterprises have evolved substantially over the past several years. Businesses today have more options and flexibility to meet their software needs. However, with that flexibility often comes complex software asset management (SAM) obligations. Licensing models that were previously unavailable absent extensive negotiations are now regularly offered. IT teams must equip…

201609.20
Off
0

Cloud Contracts to Minimize Risks

Cloud contracts expose both the client and the service provider to risks not present in more traditional technology service or software transactions. The transformation from on-premises software deployments to cloud based models has widespread implication for data privacy, security, and regulatory compliance. Robert Scott addresses each element that contributes to privacy and security risk in…

201605.31
Off
0

Spotlight on ITAM Review Conference 2016 Speakers

The ITAM Review, May 17, 2016 We’re pleased to announce the details of some of our confirmed conference speakers at our upcoming US conference in Florida on 19th & 20th September and UK conference in London on 4th & 5th October. Here we put 3 of our confirmed speakers under the spotlight. More speaker details can be…

201605.31
Off
0

BSA PAYS DISGRUNTLED EMPLOYEES TO RAT ON ‘PIRATING’ BOSSES

Ernesto, Torrent Freak, 5/28/16 The Business Software Alliance, a trade group representing Adobe, Apple and Microsoft, is known to offer cash payments to people who help them find companies that run unlicensed software. Today we speak with an attorney who has represented more than 250 defendants in these cases, which are regularly triggered by disgruntled employees.

201605.11
Off
0

Software piracy claims can ruin your business and reward those responsible

Robert J. Scott, TechCrunch, 5/11/16 There is a highly divisive and costly practice that software companies have inflicted on their customers for nearly a decade. This practice brings with it significant emotional duress, time investment and financial penalties — all of which divert meaningful resources from revenue-driving activities. And to add insult to injury, this…

201604.12
Off
0

Shadow IT: When Employees Become Bounty Hunters

Michael O’Dwyer, ipswitch, 4/11/16 Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT.