Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

6 Ways Software Asset Management Can Help Minimize Security Risk

By Laura Ryder
ransom-enews
August 3, 2017

How are you reducing your IT security risks? Did you know that the global spending on security technology is forecast to reach $81.7 Billion in 2017, according to IDC?

No business wants to experience a security threat, especially following the NHS WannaCry attack in May 2017 which affected over 300,000 computer systems. However, the cost of this technology can often be off putting, despite 27% of organizations admitting to have suffered ransomware attacks. But with businesses requiring SAM (Software Asset Management) tools in order to manage and optimise licensing positions, this technology can also help to reduce security risks.

Here are the top six ways organizations can use SAM to help minimize security risk:

  1. Using Inventory to Identify Malicious Items
    To effectively maintain a robust security position, having an inventory of all software deployed across the business is a must. Utilizing this information on a regular basis enables the prevention of workers from using unauthorized software and identify any unknown and unapproved software. SAM tools also have the capability to maintain and detect blacklist tools; identifying rogue software, which can help reduce vulnerability levels.
  2. Preventing the Use of Risky Applications
    With visibility of the software deployed within the business, it becomes easier to prevent the use of suspect or malicious applications. Even with stringent usage policies in place for software usage, with organizations using portable storage and mobile devices, software can be installed behind a firewall. Using the information available from the discovery and inventory functionality, means companies can disable unacceptable programs, and access control ensures only authorized or selected users can access certain software.  
  3. Examine Usage Data if a Security Breach Happens
    SAM tools create an additional level of security for applications by providing a snapshot in real-time of which employees are accessing which programs. In the unfortunate situation that a security breach takes place, SAM functionality enables organizations to examine application usage data. This is essential for identifying when the suspect software was last used and who launched it to help solve the issue quicker.
  4. Promote Rationalization and Standardization
    SAM tools can identify any redundant or outdated software ensuring only necessary and required software remains available. By encouraging the rationalization and standardization of the number of unused software titles, organizations enable IT to support and patch fewer applications in a security risk, especially when only 50% of organizations have conducted staff training to help deal with these threats.
  5. Leverage Patch Management
    Utilising SAM to support patch management can support process efficiency and ensure the scope of target systems are complete and current, which becomes more crucial following a recent statistic that less than 25% of organizations are applying the latest security software patches within the first 24 hours of release. This will result in quicker reactions in the unfortunate event of a threat, resulting in time and cost savings, as well as ensuring all devices on the network are running the required security software.
  6. Anti-Virus Software Checks
    With access to a SRDB (Software Recognition Database), SAM tools enable organizations to perform anti-virus software checking notating computers which have no antivirus software installed. This results in the business being able to help reduce the number of risks in the future, by ensuring these computers are protected. 

 

Using SAM to Prevent Security Risks

Now is the time to fully leverage the benefits of SAM to prevent security risks. By bringing inventory and discovery capabilities into the mix, SAM strengthens security tools and processes, which can significantly improve an organization’s ability to protect data, software and systems, helping to reduce the operational risk. For some, it even helps identity those systems missing critical security and control solutions your organization prefers to have in place.

KEYWORDS: asset management ransomware security risk management security software

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Laura Ryder is the Content Marketing Manager at Certero Software. Certero is a specialist vendor and supplier of Software Asset Management, Enterprise Mobile Management, PC Power Management, and Password Reset products & solutions, complemented by world class services, including SAM Services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people working at shared desk

    5 ways HR leaders can help organizations mitigate insider risk

    See More
  • Network Maintenance Lowers Risk

    6 Ways Network Maintenance Can Lower Risk

    See More
  • risk-assessments-freepik1170x658v57026.jpg

    Dreading security risk assessments? 6 ways to make them better

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing