All articles
CRN
Flexera Snags RightScale, Bringing Public Cloud into Its Asset Management Portfolio
The deal rounds out Flexera's capabilities as customers look to keep a handle on increasingly complex IT resources
Daily Herald
Flexera acquires California company
Flexera in Itasca announced today it has acquired RightScale, a company specializing in multi-cloud management and cost optimization
Forbes
Flexera Acquires RightScale - The Multi-Cloud Management Platform Company
Flexera, an IL-based software asset management (SAM) firm announced that it has acquired RightScale, one of the first multi-cloud management and cost optimization companies.
SiliconANGLE
Flexera acquires cloud management and cost optimization firm RightScale
Flexera says it wants to help enterprises keep a lid on their cloud spending, acquiring RightScale for an undisclosed price today to beef up its ability to do that.
ZD Net UK
Flexera acquires RightScale to combine software asset, cloud management
Flexera, a software asset management company, is acquiring cloud management firm RightScale in a deal that melds enterprise applications and cloud deployments.
Compare the Cloud
Shadow SaaS: The risks of employee software purchases
Confidential information – personally identifiable data, customer data, trade secrets – circulates like a bloodstream through enterprise applications. With security breaches making daily news and regulations like GDPR and Sarbanes-Oxley proliferating, bad data security practices can land organisations in court and ruin reputations.
ReadITQuik
Decoding SaaS Best Practices and Cloud Infrastructure Optimization
Arlo Gilbert, Vice President of Cloud Strategy, Flexera, speaks to ReadITQuik about the best approaches to SaaS management, optimal software and cloud infrastructure utilization and the rationale for acquiring Meta SaaS. Read on to learn about a new 3-part software buying framework, a two-step approach to shifting critical systems to the cloud and much more!
BetaNews
Three simple steps to improving security patching
The vulnerability scan results security departments issue to the operations teams typically contain hundreds of pages and thousands of vulnerabilities to address. It’s a massive list often containing some prioritization based on the criticality of the vulnerabilities observed; and for some more mature organizations, an assessment and opinion of the security team. Typically, operations teams care about security in the endpoints. But, their job is to guarantee uptime and user satisfaction, which often suffers when deploying patches requires reboots and application restarts. And then there’s the resource constraint issue, like the difficulty of prioritization in a world where everything seems to be urgent, the lack of visibility, questions around ownership and available time, and so on. It’s a tough ask to minimize the risk in the endpoints without a holistic, multi-departmental collaboration focused on specific risk policies and profiles.
IT Brief Australia
Five ways CIOs need to change to survive in a software driven world
Seven years ago, Marc Andreessen made his famous statement that software is eating the world. His cautionary, much-discussed advice on the back of this judgment was that every business needed to start acting like a software company in order to survive.
GDPR: Report
Continuous data security and GDPR compliance: 10 best practices
The GDPR is now in full effect. While enterprises have put in a lot of effort to be compliant as of 25 May 2018 when the regulation took effect, compliance with the GDPR isn’t a tick-box activity and so organisations need a comprehensive and ongoing approach to privacy management. They must also document how they collect, process and store personal data. In addition to the GDPR, security fundamentals are essential for other regulations too such as the Payment Card Industry (PCI) Data Security Standard, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001. Non-compliance has the potential to make the cost of failure far greater than it’s ever been.
Security Brief Australia
Automated Microsoft updates not enough to protect businesses - report
Flexera has released a report revealing desktop apps that pose the biggest risks, so IT can create a plan to prevent attacks.
Security Boulevard
Security Risks Created by SaaS (They Might Not Be What You Expect)
Software as a service (SaaS) is amazing, but it has created an entirely new set of challenges for security professionals. Although security leaders generally do deep diligence on vendors before putting sensitive data such as trade secrets and PII into a cloud-based application such as Salesforce, employees may be subverting these policies unintentionally. Employees subvert policies and security unintentionally by taking advantage of the interconnected APIs of SaaS applications.
Threat Post
Android Apps Are Sharing Screenshots, Video Recordings to Third Parties, Report Finds
Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge.
Mark Cuban Presents
A CEO's most important job
A startup CEO wears pretty much every hat possible, there's one responsibility that rises above the rest.
Channel Life AU
Breaking down the ASD’s “top four” strategies to mitigate cybersecurity incidents
The Australian Signals Directorate’s (ASD) “Essential 8” is an excellent, tried-and-true security guide, designed for Federal government and agencies, that is absolutely relevant to the security of all businesses.
CRN
CRN 2018 Women of the Channel Details
Cindy Grogan: Vice President of Global Channel and Strategic Alliances, Flexera
eSecurity Planet
10 Security Projects CISOs Should Consider: Gartner Analyst
And 10 they should have already done.
Mark Cuban Presents
Startups: The Ultimate Equalizer
Arlo has founded and sold multiple companies - beginning with one he started in college. 15 years of entrepreneurship later, and he's learned a thing or two about what it takes to build and sell startups.
Security Brief AU
Back to basics: 4 common sense steps to avoid a software attack
You’ve heard about the Equifax breach, the WannaCry attack and more. When they occurred, most security teams did a doublecheck on software security risks. But with the explosive growth of software vulnerabilities, one-time check-ins aren’t enough. Software breach risks need full-time attention.
PYMNTS
Microsoft To Bolster Small Businesses With First Bank of Nigeria
Microsoft is partnering with First Bank of Nigeria to provide support for small businesses in the country, reported in Nigerian outlet The Guardian on Monday (June 4).