Blog

Solution Study: Microsoft Cloud and Server Cost Optimisation – Formula 1 Procurement Strategy

Procurement, SAM, and IT teams may work seamlessly, but Microsoft continually shifts the playing field. It’s like racing in the rain—the track becomes slippery, and control can be lost. Microsoft often changes terms to its advantage, which is a common challenge in the renewal and negotiation process. How to handle both existing and planned conversionsRead more

Case Study: How Can an IT Procurement Maturity Assessment Drive Strategic Improvement?

Understanding IT procurement maturity is key to optimizing processes, ensuring compliance, and aligning procurement with business goals. This case study explores how to conduct a structured IT procurement maturity assessment, highlighting essential steps, common challenges, and best practices. We will examine how to select the right framework, assess current maturity levels, and translate findings intoRead more

Panel Discussion: Staying Relevant – How Can SAM Evolve to Deliver Business Value in the Age of AI and Automation?

As automation and AI technologies redefine IT operations, Software Asset Management must move beyond compliance and cost control to stay relevant. The future of SAM lies in enabling smarter decision-making, improving software usage, and contributing directly to business outcomes. But what does that transformation require — in terms of tools, mindset, and skills? This panelRead more

Tech Take: The Certero Platform – Your World, Unified.

This is the Certero Platform and it is designed to remove the barriers to information that businesses need, at the pace that they need it. This is enterprise-level, single-pane-of-glass visibility of your entire IT infrastructure, not limited by a single purpose. It’s ITAM, SAM, SaaS optimization & Cloud FinOps intelligence, unified. It’s the art ofRead more

Challenge Your Peers Round Table 11: How Is SAM Evolving to Support Cybersecurity Priorities?

How to extend SAM capabilities to support vulnerability and risk management? How to leverage SAM tools for detecting outdated or unauthorized software? How to align SAM and cybersecurity teams for more effective collaboration? How to use software data insights to strengthen your organization’s security posture?Read more

14 | Automation Café: How to Automate SAM Processes End-to-End?

How to integrate demand management, IT procurement, and contract management into a fully automated SAM workflow? How can middleware tools improve efficiency by reducing manual efforts? How to identify the important steps to transition from manual SAM processes to a fully automated and scalable solution?Read more

7 | Tool Café: How to Maximize ITAM and FinOps and Leverage Technology for Cost Optimization and Compliance?

What kind of information can you expect from your ITAM tool? How to know whether you can fulfill the information requirements? How to ensure that the data in the tool is correct? Read more

Solution Study: The True Value of Independent Support – How to Remove the Dependance on Vendor Roadmaps?

In this presentation, we will explore the real benefits of independent support and maintenance, including how it removes reliance on vendor roadmaps and allows businesses to focus on what truly matters to them. How can independent maintenance benefit your organization beyond vendor dependencies? How can you address security and governance challenges while gaining control overRead more

Challenge Your Peers Round Table 7: Is It Really the End? Managing Software Asset Lifecycles and Cybersecurity Risk

How to accurately determine whether a software or system is truly End-of-Life (EOL) or End-of-Support (EOS)? How to ensure data quality and reliability when identifying outdated versions still in use within an organization? How to align cybersecurity teams, IT departments, and asset managers to develop a unified approach to handling EOL/EOS risks? How to moveRead more

Challenge Your Peers Round Table 10: Is It Really Shadow IT or Just Untracked SaaS?

How can companies accurately identify whether a SaaS application is Shadow IT or an externally managed service? What technical solutions exist to detect and differentiate Shadow IT from approved but untracked applications? How do organizational structures (e.g., global vs. local IT) impact the visibility and control of SaaS usage? How can companies prevent misidentifying externalRead more