Many people are aware of the benefits of implementing SAM in terms of cost savings and license compliance but not so many consider the beneficial impact on IT security. The necessary processes and information collected from a good SAM program will by definition provide the information you need to improve IT security overall.
By providing a detailed inventory of all the software in use throughout your organization, your IT security experts will be able to identify and deal with the threats posed by software that is:
- Unsupported due to manufacturer end of life
- Not patched or up to date
- Unauthorized – a frequent source of malware and viruses
- Redundant
- Legacy
SOURCE: certero.com
0 Comments