Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

3 Ways SAM Technology Can Augment Security

How IT and Security Can Work Together

By Kris Barker
Exclusives Feature Image
November 27, 2012

Network security has topped the enterprise IT priority list ever since networked computers hit the mainstream, and for good reason. According to PricewaterhouseCoopers, the average loss in brand value alone for companies experiencing data breaches ranges from $184 million to more than $330 million.

As companies continue to stockpile larger and larger amounts of personal information—and rely on technology to secure it—data breaches will become ever more commonplace and damaging to those companies that don't adopt airtight security practices. Growth in the security software market supports this hypothesis: Gartner estimates that security software revenue grew 7.5 percent last year to a whopping $17.7 billion.

While many of these security products focus on preventing external attacks or information leakage, IT executives might be surprised to learn that between 40 and 85 percent—depending on which study you believe—of IT security breaches originate from inside the company, whether malicious or unintended. Executives may be even more surprised to learn that technologies not commonly marketed as security products—sometimes already deployed within the enterprise—can do a great deal to help augment their security policies.

One such category of products is software asset management (SAM) tools, commonly implemented as a means of tracking the installation and usage of software within the organization. SAM technologies can be a valuable weapon within the security arsenal in a number of ways, among them:

1.      Identifying hacking tools and other programs that can be used in a malicious way.Unless desktops are completely locked down, it's all too easy for end users to introduce unauthorized or malicious software programs to the network environment. Many organizations choose to maintain a matrix of acceptable software applications, which they then compare to their software inventory reports to reveal unknown or suspicious installations. Likewise, if administrators know the executable name for a malicious app, they can use the SAM tool's discovery capability to pinpoint any machine(s) with that program installed. 

2.      Preventing the use of applications that are deemed a threat.Even the most carefully crafted and well communicated software usage policies often aren't enough to keep end users from running programs that put the enterprise at risk. That's why many companies turn to a SAM capability called "application control" for an extra layer of policy enforcement. SAM tools that offer application control allow administrators to block specific executables from being run by individuals, departments or all users, and can even report on attempts to launch applications that have been blocked.

3.      Examining software usage data to determine when, from where, and by whom an application was used.SAM tools can be a very powerful way to investigate known security breaches. Let's say a data breach took place between four and five o'clock on a Saturday morning. By analyzing software usage statistics on applications that facilitate access to the breached data, IT personnel can identify exactly which machines and users were running those applications during that timeframe.  

4.      Identifying and reducing the number of supported and patched applications.With new and more sophisticated security threats being reported at increasing rates, IT administrators scramble every day to stay on top of the latest vulnerabilities and fixes related to installed software. By analyzing the presence and usage of each installed application, companies can see where they have redundant and/or underutilized titles and reduce their application footprints. With fewer applications to support and patch, IT can significantly reduce the chances that an unknown or unaddressed security vulnerability will lead to catastrophe.  

Obviously it would be misleading to suggest that a SAM tool can replace or even match the capabilities of dedicated security software and policies. But such tools can certainly round out one's security posture by producing forensics related to software inventory and usage that traditional security products don't take into account. Furthermore, employing security as an added SAM benefit can be a useful strategy for securing executive sponsorship for investments in SAM technologies and best practices—and to help prove their value once implemented.  

KEYWORDS: cyber defense cyber security security as a service software as a service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kris8

Kris Barker is co-founder and CEO of Express Metrix, a 16-year veteran in the IT asset management market, focusing its efforts on computer inventory and software metering solutions. He is also a professional educator, with more than 10 years of experience teaching higher-education students Web development and software programming skills. The Express Metrix Express Software Manager for Citrix is certified Citrix Ready.Express Metrix enables heightened protection against failed compliance audits, IT overspending, inappropriate use of software, and the consequences of uninformed IT decisions. Winner of the SIIA's 2008 CODiE Award for "Best Asset Management Solution," Express Metrix solutions deliver vital information that allows for the efficient management of desktop hardware and software—freeing IT departments to focus on mission-critical operations and other strategic initiatives. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ransom-enews

    6 Ways Software Asset Management Can Help Minimize Security Risk

    See More
  • parking-lot-freepik

    3 ways video surveillance can boost parking lot security

    See More
  • hotel room

    3 ways to implement weapons detection technology for better hotel security

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing