Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business Resilience

How IT leaders can balance software needs with limited budgets

By Josh Mullis
Piggy bank tipped over

Image via Unsplash

August 28, 2024

Compared to previous years, IT SaaS app usage and spending are up in 2024. IT teams showed the highest average SaaS portfolio growth for 2 years running while spending is expected to grow by 15-20% annually, according to a recent report from Gartner. However, IT leaders should not expect their budgets to increase to meet this demand. In reality, most IT teams are juggling tight budgets due to a shaky economy and the challenges faced by the tech sector. 

So how can IT leaders effectively balance budget constraints with the ever-growing need for software applications, and make the right choices for their organization? To navigate these challenges and effectively manage SaaS portfolios within tightened IT budgets, IT leaders need to consider three key aspects: identifying friction points, analyzing usage patterns and making strategic investment decisions. By focusing on these areas, IT leaders can ensure that their software investments align with the organization’s needs and provide the best possible value.

Applications that remove friction

Each application has a different use case and addresses different employee concerns. So how do IT leaders figure out what app is best? They can start by looking at unknown and known points of friction for employees. 

For engineers, tooling plays a huge role in their day-to-day tasks and ability to get things done. If IT leaders know that help tickets get bottlenecked because engineers aren’t able to easily prioritize them, investing in software that can remove that blocker will benefit the organization as a whole. 

In some cases, employees will opt for outside applications — resulting in shadow IT —  use because the applications solve a friction point for them. When asking someone what video meeting platform they like most, they likely have a strong answer and reasons to back up why they prefer it (or why they don’t). However, purchasing a license for everyone’s personal preference simply doesn’t make sense financially. 

To assess preferred software applications, evaluating usage is a good way to understand what applications are providing the most value. If an application is being underutilized, there is likely a good reason that IT leaders should account for.

Worst performers and top shadow IT applications

For IT leaders looking to solve employee needs but not sure where to start, shadow IT is a friend. In 2023, 48% of software applications were categorized as shadow IT, nearly half of an organization’s SaaS portfolio. Evaluating which app licenses are going unused and which unlicensed apps are affecting the tech stack can help IT leaders understand the high-level needs and desires of their employees. Back to the video platform example: if an organization has licenses for one but a competing platform is showing higher levels of usage through shadow IT, it’s worth considering a license switch. 

Getting the best bang for the buck 

Arguably one of the most important aspects of fulfilling software needs with a tightened IT budget: is there a positive return on investment, and is the company paying a fair price? 

When it comes to SaaS procurement and renewing licenses, leaders often fall victim to quick renewals rather than truly assessing price and competitors — some of which might be more cost-effective. There’s a strong chance that an uninformed renewal results in a higher cost and lower ROI. Removing auto-renewals and looking at data regularly can reduce the chances of overpaying for software that isn’t being used or is too costly. 

Navigating IT budget constraints while meeting the organization’s software needs requires a strategic approach. IT leaders must focus on identifying friction points, analyzing usage patterns and making strategic investment decisions. Balancing limited budgets with software requirements is indeed a challenge, but by adopting a proactive and data-driven approach, IT leaders can optimize their SaaS portfolios and maximize value, both financially and tactically, for their organizations.

KEYWORDS: application security IT IT budget IT leader security business strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Josh mullis headshot

Josh Mullis (CISSP) is the Head of InfoSec at Productiv. Image courtesy of Mullis

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0819-5G-Feat-slide_900px

    Foundational excellence: How a ‘Connected Government’ strategy can support IT needs

    See More
  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More
  • 5 mins with julian waits

    5 minutes with Julian Waits - How Security Operations Center leaders can create a culture of growth

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing