SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
15/06/2022
Microsoft Professional Support Services – is it all coming down to Unified Support?
As of July 1, 2022, Microsoft will no longer renew Premier Support contracts for existing enterprise customers. Many IT decision-makers are taking the discontinuation of Premier Support as an opportunity to review their strategy for purchasing support services for various Microsoft products.
In consulting, it is important to always keep your knowledge up to date and to improve and further develop procedures that have been tried and tested in practice. For this purpose, Complion organizes the so-called "Knowledge Friday".
A trendy term in recent years has been "digital sovereignty" - a term with different connotations in different contexts. In our article, we will describe these and work out what influence digital sovereignty has on large-scale software use.
Managed services are becoming increasingly important in IT. Software Asset Management as a Service (SAMaaS) is a relatively new field. What maturity level should a SAM organization have in order to purchase SAMaaS in a meaningful way?
Healthier and more environmentally conscious on the road with company bike leasing. Since the end of 2021, our employees have the opportunity to lease a bicycle of their choice (whether with or without a motor) at favorable conditions through our partner Bikeleasing.
Cost increases do not stop at support and maintenance fees for software. One way to reduce costs in the area of software support is to switch to so-called third-party providers, but this entails certain restrictions. This blog post examines the tension between the opportunities and risks of third-party support.
it-sa 365 Webinar 2022: Which information security standard is right for me?
Information security measures have become indispensable in today's world. Especially after the amendment of the German KRITIS Regulation 2021, more and more companies are forced to provide evidence of the functional capabilities of their information security systems. This is done by certifying the ISMS (i.e., information security) according to a recognized standard. The most widely used standards in Germany include the international standard ISO/IEC 27001 and the national standard BSI IT-Grundschutz - But which standard is suitable for your company?
From April 10 - 12, the 11th edition of Software Asset Management Strategies (SAMS for short) took place in Berlin. Complion was there with Stephanie Riesebeck, Frank Salz and Felix Baran. Read about our impressions below.
Everything safe, or what? Philosophy Lesson: Security through Obscurity
In our column "Everything secure, or what?" we regularly discuss individual components of a successful IT security architecture. Today, we want to get a little philosophical and discuss an IT security philosophy that, despite being widely refuted, continues to be mentioned in conversations, especially with IT security laypeople. We are talking about "Security through Obscurity", or STO. We'll discuss why the path of this philosophy often provides only apparent security in this blog post.
Mentoring, MBO and (internal) development at Complion
Bringing personal and professional development in line with corporate goals is the pinnacle of development perspectives for young and experienced management consultants alike. Only "when everyone wins" can successful, long-term collaboration and shared success be ensured. Read this article to find out how we bring this from theory into practice.
Shadow IT refers to IT systems and software products that are used by a company's functional areas alongside the official IT infrastructure and without the knowledge of the IT department. Shadow IT poses a significant risk potential in terms of IT compliance.
Every year, CISOs and CIOs have to negotiate a budget for IT security. If there are no incidents, the money was worth it. But how do you explain that to the board? In this blog post, we provide some strategies and background for successful "Battles of the Boardroom" that can help you as an IT executive.