All articles

CRN

Flexera Snags RightScale, Bringing Public Cloud into Its Asset Management Portfolio

The deal rounds out Flexera's capabilities as customers look to keep a handle on increasingly complex IT resources
Daily Herald

Flexera acquires California company

Flexera in Itasca announced today it has acquired RightScale, a company specializing in multi-cloud management and cost optimization
Forbes

Flexera Acquires RightScale - The Multi-Cloud Management Platform Company

Flexera, an IL-based software asset management (SAM) firm announced that it has acquired RightScale, one of the first multi-cloud management and cost optimization companies.
SiliconANGLE

Flexera acquires cloud management and cost optimization firm RightScale

Flexera says it wants to help enterprises keep a lid on their cloud spending, acquiring RightScale for an undisclosed price today to beef up its ability to do that.
ZD Net UK

Flexera acquires RightScale to combine software asset, cloud management

Flexera, a software asset management company, is acquiring cloud management firm RightScale in a deal that melds enterprise applications and cloud deployments.
Compare the Cloud

Shadow SaaS: The risks of employee software purchases

Confidential information – personally identifiable data, customer data, trade secrets – circulates like a bloodstream through enterprise applications. With security breaches making daily news and regulations like GDPR and Sarbanes-Oxley proliferating, bad data security practices can land organisations in court and ruin reputations.
ReadITQuik

Decoding SaaS Best Practices and Cloud Infrastructure Optimization

Arlo Gilbert, Vice President of Cloud Strategy, Flexera, speaks to ReadITQuik about the best approaches to SaaS management, optimal software and cloud infrastructure utilization and the rationale for acquiring Meta SaaS. Read on to learn about a new 3-part software buying framework, a two-step approach to shifting critical systems to the cloud and much more!
BetaNews

Three simple steps to improving security patching

The vulnerability scan results security departments issue to the operations teams typically contain hundreds of pages and thousands of vulnerabilities to address. It’s a massive list often containing some prioritization based on the criticality of the vulnerabilities observed; and for some more mature organizations, an assessment and opinion of the security team. Typically, operations teams care about security in the endpoints. But, their job is to guarantee uptime and user satisfaction, which often suffers when deploying patches requires reboots and application restarts. And then there’s the resource constraint issue, like the difficulty of prioritization in a world where everything seems to be urgent, the lack of visibility, questions around ownership and available time, and so on. It’s a tough ask to minimize the risk in the endpoints without a holistic, multi-departmental collaboration focused on specific risk policies and profiles.
IT Brief Australia

Five ways CIOs need to change to survive in a software driven world

Seven years ago, Marc Andreessen made his famous statement that software is eating the world. His cautionary, much-discussed advice on the back of this judgment was that every business needed to start acting like a software company in order to survive.

GDPR: Report

Continuous data security and GDPR compliance: 10 best practices

The GDPR is now in full effect. While enterprises have put in a lot of effort to be compliant as of 25 May 2018 when the regulation took effect, compliance with the GDPR isn’t a tick-box activity and so organisations need a comprehensive and ongoing approach to privacy management. They must also document how they collect, process and store personal data. In addition to the GDPR, security fundamentals are essential for other regulations too such as the Payment Card Industry (PCI) Data Security Standard, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001. Non-compliance has the potential to make the cost of failure far greater than it’s ever been.
Security Brief Australia

Automated Microsoft updates not enough to protect businesses - report

Flexera has released a report revealing desktop apps that pose the biggest risks, so IT can create a plan to prevent attacks.
Security Boulevard

Security Risks Created by SaaS (They Might Not Be What You Expect)

Software as a service (SaaS) is amazing, but it has created an entirely new set of challenges for security professionals. Although security leaders generally do deep diligence on vendors before putting sensitive data such as trade secrets and PII into a cloud-based application such as Salesforce, employees may be subverting these policies unintentionally. Employees subvert policies and security unintentionally by taking advantage of the interconnected APIs of SaaS applications.
Threat Post

Android Apps Are Sharing Screenshots, Video Recordings to Third Parties, Report Finds

Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge.
Mark Cuban Presents

A CEO's most important job

A startup CEO wears pretty much every hat possible, there's one responsibility that rises above the rest.
Channel Life AU

Breaking down the ASD’s “top four” strategies to mitigate cybersecurity incidents

The Australian Signals Directorate’s (ASD) “Essential 8” is an excellent, tried-and-true security guide, designed for Federal government and agencies, that is absolutely relevant to the security of all businesses.
CRN

CRN 2018 Women of the Channel Details

Cindy Grogan: Vice President of Global Channel and Strategic Alliances, Flexera
eSecurity Planet

10 Security Projects CISOs Should Consider: Gartner Analyst

And 10 they should have already done.
Mark Cuban Presents

Startups: The Ultimate Equalizer

Arlo has founded and sold multiple companies - beginning with one he started in college. 15 years of entrepreneurship later, and he's learned a thing or two about what it takes to build and sell startups.
Security Brief AU

Back to basics: 4 common sense steps to avoid a software attack

You’ve heard about the Equifax breach, the WannaCry attack and more. When they occurred, most security teams did a doublecheck on software security risks. But with the explosive growth of software vulnerabilities, one-time check-ins aren’t enough. Software breach risks need full-time attention.
PYMNTS

Microsoft To Bolster Small Businesses With First Bank of Nigeria

Microsoft is partnering with First Bank of Nigeria to provide support for small businesses in the country, reported in Nigerian outlet The Guardian on Monday (June 4).