target audience: TECH BUYER Publication date: Dec 2020 - Document type: IDC Perspective - Doc Document number: # US47085320
How Cloud and Agile Software Obsolete Source Code Escrow
Table of Contents
-
Executive Snapshot
-
Figure: Executive Snapshot: How Much Is a False Sense of Security Worth?
-
-
Situation Overview
-
The Basics of Software Source Code Escrow
-
Before the Age of Escrow — A Typical Scenario
-
The Ubiquitous and Obligatory Escrow
-
The Devil Is in the Detail
-
Effective Escrows an Exception
-
Business Continuity Audit Findings — A Customer Example
-
-
Advice for the Technology Buyer
-
Ascertain Whether You Really Need the Source Code Escrow?
-
Figure: Selecting Escrow Candidates
-
Determine Whether You Are Prepared to Dedicate the Necessary Resources
-
-
Learn More
-
Related Research
-
Synopsis
-