How to negotiate a better software audit clause

Many customers report that the number of software audits requested by publishers has risen dramatically over the past several years.

At best, this proves inconvenient for customers that have to allot valuable time and resources to manage the audit. At worst, organizations face steep financial penalties if unintentional license deficits are discovered.

Perhaps the best means of protecting your company from the risks of software audits is negotiating sufficient protections in your software license agreements when initiating your relationships with publishers. By getting down on paper the terms of any future audits, you mitigate many of their potential risks. Continue Reading…

Tags: , ,

The top 5 IT mistakes you’re probably making

Everyone makes mistakes. Not everyone knows when they’re making them.

This is especially true in the world of IT, where teams are often swamped just keeping their environment up and running. In that rush, details sometimes go overlooked, and opportunities sometimes get ignored. The consequences are everything from wasted money to lost time to a system outage.

Fortunately, the fixes are often easy and can save you a lot of trouble down the road. You just have to know where to look. Here are five mistakes you may not know you’re making, and the simple fixes you could consider. Continue Reading…

Tags: ,

How a virtual CISO could strengthen your security

With the ever-increasing number of cyberattacks for both financial gains and political purposes, companies, government agencies, and other organizations are forced to deploy and maintain an expanding depth of security controls. This has led to a breadth of oftentimes independent point solutions that aren’t driven by policies and processes and aren’t created by an experienced information security professional.

Many organizations just aren’t large enough to employ a chief information security officer (CISO), and even the ones that can afford it struggle to find qualified candidates. As a result, security falls by the wayside, becomes secondary to other IT operational concerns, and is more reactive than proactive.

That’s why virtual CISOs are growing more popular. These on-demand experts step in to evaluate, maintain, or repair your security, on-site or remotely, working as a flexible addition to your current IT team and offering the security management you may not be able to find yourself.

But not all virtual CISOs are created equal. To help you navigate the different types and functions—and whether they’re right for you at all—we’ve put together some background to guide your search. Continue Reading…

Tags: ,

Server memory FAQ: What to know before you upgrade

Upgrading server memory is a balancing act. Between what you need now and what you’ll need in a year. Between the need for speed and the cost of those extra GBs. Get too much memory and you can, paradoxically, pay for it in cost and performance. Get too little and your users are slogging through gummy applications.

We’ve helped many organizations figure out what worked best for their server architecture, workload, and apps. During those conversations, we hear a lot of the same questions. Here are five of the big ones organizations ask when considering a server memory upgrade. Continue Reading…

Tags: , , ,