Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • Cookie Policy
  • Privacy Policy
  • {title}
Skip to content
Latest News ITAM & SAM: The foundations of modern cyber security Learn More
Certero
  • Products
    • CerteroX Command Center/AI
    • CerteroX ITAM
    • CerteroX SAM
    • CerteroX SaaS
    • CerteroX Cloud
  • Solutions
    • ITAMIT Asset Management
      • VisibilityVisibilityITAM Visibility
        • Visibility – Software & Applications
        • Visibility – Hardware Assets
        • Visibility – SNMP Devices
      • ObservabilityObservabilityITAM Observability
        • Observability – Software Usage
        • Observability – Network Devices
      • ManagementManagementIT Asset Management
        • Management – Services
        • Management – Asset Lifecycle
        • Management – ITSM & CMDB Integration
      • GovernanceGovernanceITAM Governance
        • Governance – Audit Management
    • SAMSoftware Asset Management
      • VisibilityVisibilitySAM Visibility
        • Visibility – Software Asset
        • Visibility – Software Licenses
      • ObservabilityObservabilitySAM Observability
        • Observability – Software Usage Analytics
        • Observability – Agreement Renewal
        • Observability – ELP & License Optimization
      • ManagementManagementSAM Management
        • Management – License Optimizations
        • Management – SAM Managed Services
        • Management – Software Lifecycle
      • GovernanceGovernanceSAM Governance
        • Governance – Policy Enforcement
        • Governance – Access Control
        • Governance – Audit Defense
    • SaaSSoftware as a Service
      • VisibilityVisibilitySaaS Visibility
        • Visibility – Shadow IT
      • ObservabilityObservabilitySaaS Observability
        • Observability – Monitoring
        • Observability – Agreement Renewal
      • ManagementManagementSaaS Management
        • Management – Access Governance
        • Management – Optimizations
      • GovernanceGovernanceSaaS Governance
        • Governance – Policy Enforcement
    • CloudCloud / Multi Cloud Management
      • VisibilityVisibilityCloud Visibility
        • Visibility – Resource Discovery
      • ObservabilityObservabilityCloud Observability
        • Observability – Usage Monitoring
        • Observability – Forecasting
      • ManagementManagementCloud Management
        • Management – Cost Optimization
        • Management – Usage Optimization
      • GovernanceGovernanceCloud Governance
        • Governance – Policy Enforcement
        • Governance – Budget Alerts
    • Command Center & AIFederated Reporting
      • VisibilityVisibility – Federated ViewAI Visibility
        • Federated Visibility
      • ObservabilityObservability – Federated ViewAI Observability
        • Federated Observability
      • ManagementManagement – Federated ViewAI Management
        • Executive Management
        • Federated Management
      • GovernanceGovernanceAI Governance
        • Federated Governance
    • Proud FinOps Foundation membersITAM, SAM, SaaS, Cloud, AI, FinOps and Shadow IT
  • Support
    • Blog
    • Documentation
    • Datasheet
  • About Us
    • About Us
    • Case Studies
    • Locations
  • Contact Us
  • Submit a Deal Reg
Customer Login Schedule a Demo
  • Products
    • CerteroX Command Center/AI
    • CerteroX ITAM
    • CerteroX SAM
    • CerteroX SaaS
    • CerteroX Cloud
  • Solutions
    • ITAMIT Asset Management
      • VisibilityVisibilityITAM Visibility
        • Visibility – Software & Applications
        • Visibility – Hardware Assets
        • Visibility – SNMP Devices
      • ObservabilityObservabilityITAM Observability
        • Observability – Software Usage
        • Observability – Network Devices
      • ManagementManagementIT Asset Management
        • Management – Services
        • Management – Asset Lifecycle
        • Management – ITSM & CMDB Integration
      • GovernanceGovernanceITAM Governance
        • Governance – Audit Management
    • SAMSoftware Asset Management
      • VisibilityVisibilitySAM Visibility
        • Visibility – Software Asset
        • Visibility – Software Licenses
      • ObservabilityObservabilitySAM Observability
        • Observability – Software Usage Analytics
        • Observability – Agreement Renewal
        • Observability – ELP & License Optimization
      • ManagementManagementSAM Management
        • Management – License Optimizations
        • Management – SAM Managed Services
        • Management – Software Lifecycle
      • GovernanceGovernanceSAM Governance
        • Governance – Policy Enforcement
        • Governance – Access Control
        • Governance – Audit Defense
    • SaaSSoftware as a Service
      • VisibilityVisibilitySaaS Visibility
        • Visibility – Shadow IT
      • ObservabilityObservabilitySaaS Observability
        • Observability – Monitoring
        • Observability – Agreement Renewal
      • ManagementManagementSaaS Management
        • Management – Access Governance
        • Management – Optimizations
      • GovernanceGovernanceSaaS Governance
        • Governance – Policy Enforcement
    • CloudCloud / Multi Cloud Management
      • VisibilityVisibilityCloud Visibility
        • Visibility – Resource Discovery
      • ObservabilityObservabilityCloud Observability
        • Observability – Usage Monitoring
        • Observability – Forecasting
      • ManagementManagementCloud Management
        • Management – Cost Optimization
        • Management – Usage Optimization
      • GovernanceGovernanceCloud Governance
        • Governance – Policy Enforcement
        • Governance – Budget Alerts
    • Command Center & AIFederated Reporting
      • VisibilityVisibility – Federated ViewAI Visibility
        • Federated Visibility
      • ObservabilityObservability – Federated ViewAI Observability
        • Federated Observability
      • ManagementManagement – Federated ViewAI Management
        • Executive Management
        • Federated Management
      • GovernanceGovernanceAI Governance
        • Federated Governance
    • Proud FinOps Foundation membersITAM, SAM, SaaS, Cloud, AI, FinOps and Shadow IT
  • Support
    • Blog
    • Documentation
    • Datasheet
  • About Us
    • About Us
    • Case Studies
    • Locations
  • Contact Us
  • Submit a Deal Reg
Customer Login Schedule a Demo
Software asset management

Is the Microsoft Products and Services Agreement (MPSA) right for you?

Dan Whitefield, Consultant, CerteroOriginally posted in February 2017, revised in December 2019. …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Benefits of a Self-service App-store: From Reducing Shadow IT to Enhancing IT Security

Your IT to-do list may be long and include many tasks that …

Find out more

Daniel Whitefield6 Min Read

Software asset management

Understanding Software Licensing Terminology

Do you understand software licensing terminology? If you have been tasked with …

Find out more

Daniel Whitefield3 Min Read

Software asset management

The Benefits of a Bring Your Own Device (BYOD) Policy

What are the benefits of implementing a BYOD policy? Basically the benefits …

Find out more

Daniel Whitefield3 Min Read

Software asset management

The Challenges of EMM

What is EMM? EMM is the acronym for Enterprise Mobile Management as …

Find out more

Daniel Whitefield3 Min Read

Managed servicesSoftware asset management

Understanding a Baseline Review

What is a baseline review? How can you achieve an ELP? One …

Find out more

Daniel Whitefield3 Min Read

Software asset management

SAM in the Datacenter

How can you manage datacenter software assets? Why is SAM important? Many …

Find out more

Daniel Whitefield3 Min Read

Software asset management

The Trouble with Microsoft 365 Licensing

Dan Whitefield, Consultant, CerteroDecember 2019. What are the benefits of Microsoft 365 …

Find out more

Daniel Whitefield4 Min Read

Software asset management

Mobile Device Management (MDM) Software is a Real Blind Spot

What is MDM software? What does mobile device management mean for organizations? …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Building a business case for Software Asset Management

How can you build a SAM business case? There are a number …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Defending Against a Software Audit: What You Need to Know

What do you know when hit with a software audit? With the …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Windows Server 2016 and Microsoft Licensing Changes

What changes have there been to Windows Server 2016 and Microsoft licensing? …

Find out more

Daniel Whitefield3 Min Read

Software asset management

What is Jailbreak Detection and why is it critical for your organization?

It is estimated that 9% of all iPhones are Jailbroken, with similar …

Find out more

Daniel Whitefield4 Min Read

Software asset management

Building a SAM Function Within your Organization

How can you build a SAM function in your organization? What are …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Software and Virtualization Licensing: The Hidden Risks

What are the hidden risks when it comes to virtualization licensing? Server …

Find out more

Daniel Whitefield3 Min Read

Software asset management

Software Use Rights 101: The Different Scenarios

What are software use rights? The right to use your software derives …

Find out more

Daniel Whitefield2 Min Read

Software asset management

Building a Business Case for a Software License Optimization Program

Looking to build a business case for a SLO program? Building a …

Find out more

Daniel Whitefield3 Min Read

Newer posts
← Previous Page1 Page2
Load More
Certero Logo

Keep Up To Date With The Latest Updates

Sign up to our mailing list by entering your email.



    By submitting your email you agree to our Terms & Conditions

    Locations

    UK & International

    Cedarwood 2, Kelvin Close, Birchwood, Warrington,WA3 7PB, United Kingdom

    T: +44 (0) 1925 868970

    North America

    77 West Wacker Drive, Suite 4500, Chicago, IL 60601, United States

    T: +1 312 985 7931

    APAC

    56 Berry Street, North Sydney NSW 2060, Australia

    T: +61 (02) 91335 2917

    ITAM

    • Application/Software Inventory
    • Asset Lifecycle Management
    • Audit Management
    • Cloud Asset Visibility
    • Hardware Asset Visibility
    • ITSM & CMDB Integration
    • License Reconciliation
    • Managed Services
    • Network Device Discovery
    • Software Usage Monitoring

    CLOUD

    • Cloud Budget Alerts
    • Cloud Cost Optimization
    • Cloud Forecasting
    • Cloud Usage Monitoring
    • Cloud Optimization Services
    • Cloud Policy Enforcement
    • Cloud Visibility

    Products

    • CerteroX ITAM
    • CerteroX SAM
    • CerteroX SaaS
    • CerteroX Cloud
    • CerteroX Command Center

    AI

    • AI Cost Optimization Services
    • Command Center Federated Governance
    • Command Center Federated Management
    • Shadow AI Detection

    SAAS Management

    • SaaS Access Governance
    • SaaS Agreement Renewal
    • SaaS Monitoring
    • SaaS Optimization
    • SaaS Policy Enforcement
    • Shadow IT Discovery

    SAM

    • Access Control
    • Agreement Renewals
    • ELP and License Optimization
    • Software License Visibility
    • Lifecycle Management
    • SAM Managed Services
    • Software Asset Visibility
    • Software Audit Service
    • Software Policy Enforcement
    • Software Usage Analytics

    Accreditations & Memberships

    FinOps Certified Platform Logo
    NQA Logo
    Cyber Essentials Certified Plus Logo
    FinOps Foundation General Member Logo
    The Linux Foundation Silver Member Logo
    Microsoft Partner Logo
    Oracle Partner Logo
    Customer Choice 2024 logo
    • Cookie Policy (UK)
    • Vulnerability Disclosure Policy
    • Privacy Policy
    Certero 2007 – 2026 © All rights reserved.
    Schedule a Demo
    • Home
    • Products
      • CerteroX ITAM
      • CerteroX SAM
      • CerteroX SaaS
      • CerteroX Cloud
      • CerteroX Command Center
    • Solutions
      • IT Asset Management
        • Hardware Asset Visibility
        • Application/Software Inventory
        • Network Device Discovery
        • Asset Lifecycle Management
        • Audit Management
        • ITSM & CMDB Integration
        • License Reconciliation
        • Managed Services
      • Software Asset Management
        • Software Asset Visibility
        • Software License Visibility
        • Software Audit Service
        • Software Usage Analytics
        • Software Usage Monitoring
        • Agreement Renewals
        • ELP and License Optimization
        • Lifecycle Management
        • Access Control
        • SAM Managed Services
        • Software License Optimization
        • Software Policy Enforcement
      • SaaS Management
        • Shadow IT Discovery
        • SaaS Monitoring
        • SaaS Agreement Renewal
        • SaaS Optimization
        • SaaS Access Governance
        • SaaS Policy Enforcement
      • Cloud Management
        • Cloud Visibility
        • Cloud Usage Monitoring
        • Cloud Forecasting
        • Cloud Cost Optimization
        • Cloud Budget Alerts
        • Cloud Optimization Services
        • Cloud Policy Enforcement
      • Command Center & AI
        • Shadow AI Detection
        • Command Center Federated Management
        • Command Center Executive Management
        • Command Center Federated Governance
    • Support
      • Blog
      • Datasheet
      • Documentation
    • About Us
      • About Us
      • Case Studies
      • Locations
    • Contact Us