Blog

Java SE Licensing
The Software Bill of Materials (SBOM) and Java SE Licensing
The Software Bill of Materials for each application lists each component and library that makes up an application, including Java SE. Being able to get a detailed listing – in one place – of every application that utilizes Java SE will enable your SAM team to make the connection between Java installations and the applications that utilize Java.
How to Simplify Oracle Audits and Renewals in 2021
How to Simplify Oracle Audits and Renewals in 2021
With the expectation of an effective and successfully distributed vaccine for COVID-19, and the current height of stock market and real estate values, the new year could be promising for companies and individuals who struggled in 2020. Typically, the beginning of a new year is the perfect time for planning – New Year’s resolutions, business goals and Software Asset Management (SAM) strategies!
Managing the Financial Impact of Covid-19
Managing the Financial Impact of Covid-19
Several months ago when we rang in the New Year, little did we know that 2020 would present the unforeseen challenges of a worldwide pandemic. How can your IT and Software Asset Management program help cut expenses? Managing and optimizing your hardware and software assets is a great way to avoid unnecessary costs.
SAM Tool Solution
If You’re Underwhelmed with Your Current SAM Tool, Here’s the Solution!
Is your organization disenchanted with your SAM tool? If so, Eracent is ready to help. Whatever the reason your organization feels underwhelmed with your SAM tool, this situation may lead to an internal push to find a new solution. While the thought of replacing your SAM solution seems as challenging as moving a mountain, it can actually be relatively easy and painless.
Linkage Between Cybersecurity and ITAM
The Linkage Between Cybersecurity and ITAM
ITAM and security should be aligned and go hand-in-hand. A good ITAM program requires reliable inventory and discovery as its foundation. A good security program requires the same. The basis of any security program is recognizing your IT assets – hardware and software – so that you can secure them.
1 2 3