Flexera Blog

Stay in the know

Topics
SaaS Management FinOps IT Visibility IT Asset Management Product News Application Readiness Security Perspectives

SaaS Management

Strategies to monitor license utilization, rein in SaaS spend and free up resources

See All

Salesloft-Drift security incident and CASB “Drift” sightings
Navigating the SaaS security maze: Tips to protect your business
Governing the SaaS explosion: How to establish control and minimize risk

FinOps

Actionable advice to guide your enterprise cloud strategy

See All

3 ways to maximize Effective Savings Rate (ESR)  
Advance FinOps maturity through smarter cloud commitments
FinOps as code: Because you can’t git revert your cloud bill

IT Visibility

Comprehensive IT visibility across on-premises, SaaS and cloud

See All

Flexera 2026 IT priorities report: what business leaders need to know
Understanding data normalization: A comprehensive guide for IT visibility
Understanding End of Life (EOL) and End of Support (EOS): A comprehensive guide

IT Asset Management

IT asset management that makes the exponential manageable

See All

CMDB isn’t dead, it’s evolving: Why the IT Management Graph and CMDB must work together
Why audit readiness isn’t optional: The cost of being unprepared for vendor audits
Introducing the Jamf Adapter for Flexera One

IT Asset Management

Introducing the Jamf Adapter for Flexera One

Product News

Get the latest tips and updates about Flexera’s solutions

See All

What’s new at Flexera: October 2025

Product News

What’s new at Flexera: October 2025

What’s new at Flexera: September 2025

Product News

What’s new at Flexera: September 2025

What’s new at Flexera: August 2025

Product News

What’s new at Flexera: August 2025

Application Readiness

From security to package updates, get the latest on Application Readiness

See All

Windows 10 end of life is near: Is your application portfolio ready for Windows 11?
Elevate your packaging efficiency: Introducing ‘My Requests’ in AdminStudio
Back again—AdminStudio wins ComponentSource Top-25 Publisher award

Security

Protect your technology from cyber threats and vulnerabilities

See All

Decoding likely exploited vulnerabilities (LEV)— A new metric from NIST
4 lessons on software vulnerabilities from Verizon’s 2025 Data Breach Investigations Report
Cybersecurity on the brink: MITRE’s urgent appeal for continuous CVE coverage

Perspectives

Maximize your technology investments with the latest industry insights

See All

Tech at the Table 1×1: FinOps is the answer, what was the question?
Why exploitability matters in vulnerability management
Turn your impact into recognition: Enter the Technology Intelligence Awards