Flexera Blog

Stay in the know

Topics
SaaS Management FinOps IT Visibility IT Asset Management Product News Application Readiness Security Perspectives

SaaS Management

Strategies to monitor license utilization, rein in SaaS spend and free up resources

See All

Salesloft-Drift security incident and CASB “Drift” sightings
Navigating the SaaS security maze: Tips to protect your business
Governing the SaaS explosion: How to establish control and minimize risk

FinOps

Actionable advice to guide your enterprise cloud strategy

See All

From complexity to clarity: How Flexera brings visibility to FinOps for AI
From complexity to control: How Flexera empowers FinOps for data clouds and PaaS
The FinOps automation framework: maximizing cloud investment value

IT Visibility

Comprehensive IT visibility across on-premises, SaaS and cloud

See All

Simplify IT Service Management with Flexera One + Jira Service Management
Flexera 2026 IT priorities report: what business leaders need to know
Understanding shadow IT: Examples, risks and management strategies

IT Asset Management

IT asset management that makes the exponential manageable

See All

CMDB isn’t dead, it’s evolving: Why the IT Management Graph and CMDB must work together
Why audit readiness isn’t optional: The cost of being unprepared for vendor audits
Introducing the Jamf Adapter for Flexera One

IT Asset Management

Introducing the Jamf Adapter for Flexera One

Product News

Get the latest tips and updates about Flexera’s solutions

See All

What’s new at Flexera: October 2025

Product News

What’s new at Flexera: October 2025

What’s new at Flexera: September 2025

Product News

What’s new at Flexera: September 2025

What’s new at Flexera: August 2025

Product News

What’s new at Flexera: August 2025

Application Readiness

From security to package updates, get the latest on Application Readiness

See All

Understanding application packaging: A comprehensive guide
Windows 10 end of life is near: Is your application portfolio ready for Windows 11?
Elevate your packaging efficiency: Introducing ‘My Requests’ in AdminStudio

Security

Protect your technology from cyber threats and vulnerabilities

See All

Decoding likely exploited vulnerabilities (LEV)— A new metric from NIST
4 lessons on software vulnerabilities from Verizon’s 2025 Data Breach Investigations Report
Cybersecurity on the brink: MITRE’s urgent appeal for continuous CVE coverage

Perspectives

Maximize your technology investments with the latest industry insights

See All

Tech at the Table, episode 2: Traditional ITAM will never be the same, it’s time to pivot to a new future
Tech at the Table, episode 1: FinOps is the answer, what was the question?
Why exploitability matters in vulnerability management