ITAM Awareness Month Offerings are Open to ALL!
Thank you to the Sponsors
IAITAM would like to send out a huge, heart-felt THANK YOU to all the ITAM Awareness Month sponsors that were able to share their knowledge with the ITAM community during the month of December. Beginning Thursday, December 22, through the end of the month all ITAM Awareness Month offerings will be open for viewing.
For those participants who took advantage of the daily educational offerings on their sponsored day, please stay tuned to see who the lucky winners are. Announcements coming soon…
To view sponsored educational offerings, simply click the links below then log in, if not already.
New to IAITAM.org? Click here for New Customer Registration.
Normalized Inventory—the Common Foundation for SAM and Security
Normalized software inventory data, covering all devices and platforms across the IT estate, is the common foundation for both Software Asset Management (SAM) and Security. Software vulnerability management tools use this data to determine where known vulnerabilities exist in the environment so they can be remediated to reduce security risk. SAM tools use the normalized software data to drive rationalization and consolidation of the portfolio, remove unauthorized applications and determine license compliance positions. As software asset managers, you can provide this critical data to the security team while also reducing license compliance risk and the unbudgeted costs associated with audits.
Visit Flexera Software at www.flexerasoftware.com/SLO.
2016 Aspera Market Study: Global Practices of Strategic SAM – Insights from over 400 SAM Professionals
The 2016 Market Study will provide you with valuable insights from over 400 SAM professionals on how they are implementing Software Asset Management, what problems they are dealing with, and what key goals they are pursuing plus tips and tricks for your organization’s success with SAM.
Key insights include:
- Good SAM takes time
- SAM is mostly an in-house pursuit
- Most manage less than 50 vendors
- Don’t forget servers
- DACH is leading the world in SAM maturity
- 75% have been audited in the last 24 months
- Complexity and lack of resources are key blockers
- SAM tool adoption is limited
Visit Aspera at www.aspera.com.
Using Mobile Apps to Prevent Failed Audits
Using mobile apps to prevent failed audits enables tighter control from a business perspective and an easier process from an end-user perspective. The possible benefits that can be achieved are numerous, including:
- Rapid, accurate reading of barcoded data through the use of a barcode scanner attached to the user’s mobile device
- Timely data capture as users are immediately tracking their actions as they perform their tasks
- Consistent data capture through the use of a guided and controlled user interface, using drop-list selections, smart-scanning barcode fields, etc.
- Complete data capture for all mobile tasks by using one or more task-oriented mobile apps that force the end-user to follow a required process
Read this white paper and learn how to pass IT asset audits with flying colors!
Visit Mobile Reach at www.mobilereach.com.
Licensing Oracle Database Products
The webinar will cover software licensing for Oracle database products. Products covered include Enterprise Edition and SE2 databases. We will review the license metrics, rules and demonstrate how to achieve compliance for these products. An excellent way to prepare for your upcoming audit.
Visit Belarc at www.belarc.com.
Breach New Heights – The Role of ITAM in Preventing a Data Breach
The Office for Civil Rights in the US Department of Health and Human Services is deep in its Phase 2 HIPAA audits. It’s also continuing to assess multimillion dollar fines for improper data management of ePHI throughout the lifecycle of IT assets at healthcare facilities. Whether you work in the healthcare environment or any other industry that manages sensitive customer or user data, this session will provide information from industry leaders about how to set up proper controls and systems to prevent and respond to suspected data breaches.
Visit Cascade Asset Management, LLC at www.cascade-assets.com.
Data Destruction Demystified: Understanding D.O.D. Standards and Certifications
It is critical that every IT director and CIO institute a formal process that ensures all sensitive data contained on storage media is thoroughly erased and/or destroyed prior to disposal or reuse of the equipment.
In the Data Destruction Demystified white paper, Liquid Technology explains the importance of data destruction and which steps your organization should take to keep your data safe.
Visit Liquid Technology at LiquidTechnology.net.
Fonts? You mean I have to worry about compliance there too?
The practice of hardware and software asset management is well known, yet still challenging – but what about other types of assets you aren’t yet managing that expose you to risk? Did you know 50% of creatives bring personal fonts into the workplace? This session will discuss why it’s crucial to include font management in your best practices; how you can become compliant with the T’s & C’s of your providers; and provide some guidance about how to handle this often overlooked challenge.
Visit Extensis at www.extensis.com.
Conquering Challenges and Changes in Autodesk Licensing
Everyone has experienced challenges with keeping up with their software licenses. In today’s market, it is even more difficult because of the rapidly changing licensing from all vendors but especially Autodesk. There are major changes in Autodesk licensing, upgrades and support. In this webinar, we will discuss the various license types for Autodesk and the pros and cons of each. We will point out strategies to help you optimize your license position when determining license levels with the new licensing types. Stand-alone, concurrent, perpetual, subscription, tokens… where does your company fit into this matrix?
This webinar is a must see for anyone managing Autodesk licensing regardless of where you are in your contract. This heads up will be valuable to anyone negotiating, purchasing or using Autodesk licenses.
Visit Open iT, Inc. at www.openit.com.
IT Asset Disposal: How Far Should You Go to Protect Your Assets?
When disposing of IT assets, how far does an organization have to go? How can you be sure that a particular asset has been securely and safely recycled, remarketed or destroyed? This article offers key questions to consider when vetting an outside provider for the task of IT asset disposal.
Visit Iron Mountain at www.ironmountain.com.
Knowing your ITAD Vendor
With technology use increasing and equipment being updated frequently, more technology is being disposed of. This has contributed to a surge of ITAD vendors in the marketplace. Choosing the right vendor to assist with decommissioning your IT Assets is critical. It is important to know your electronics will be properly recycled and your sensitive data will remain secure. Asking key questions and knowing information regarding their processes, security, certifications and remarketing is essential. This white paper will review the critical questions to ask and what information needs to known about your ITAD vendor.
Visit Dynamic Recycling at www.dynamicitad.com.
Increasing the Value and Effectiveness of your SAM Program with Automated Processes
This webinar examines how you can automate and streamline your SAM and ITAM processes, and how they align with ITSM processes to improve IT service delivery.
Topics of discussion include:
- employee self-service
- automated approvals
- software and hardware provisioning
- license harvesting
- invoice reconciliation
- and more.
Join us for this webinar to get new ideas and insights on how you can gain more value from your asset and license management program as it matures.
Visit Eracent at www.eracent.com.
Software Asset Management – Much More than Inventory
As an industry, Software Asset Management hasn’t really helped itself in the last ten years. For a start there’s a self-perpetuating confusion over terminology: Software Asset Management (SAM), Inventory, Software License Management, Compliance, Discovery, Application Management… they’re all the same thing really, right?
Well, no. In fact, definitely No.
But many so-called experts are guilty of hiding behind jargon or substituting clarity for confusion either to make themselves look more clever, or perhaps to sell you technology you don’t need.
This guide will break through the smoke and mirrors to demystify some of the terminology around Software Asset Management. In particular, it will highlight one of the main confusions – that Software Asset Management and Inventory are not the same thing.
Visit License Dashboard at www.licensedashboard.com.
Software Usage and Waste Report 2016
The new Software Usage and Waste Report from 1E offers an unprecedented insight into the modern enterprise desktop, and more information than ever before into how much the average business is squandering on unused software.
- The report builds on previous 1E studies into this area by increasing the number of participating devices to 4.6 million (an increase of one million), expanding the study to encompass 149 organizations and 16 different industries in all.
- It gives a snapshot of global, regional and industry specific waste levels.
- The study reveals, for the first time, those applications that are most widely deployed among the survey’s participating businesses, the applications most likely to go unused, and those costing businesses the most money.
- Last but not least, it provides guidance for enterprises looking to seize the financial opportunity implicit in the high waste levels.
Visit 1E at www.1e.com.
BDNA 2016 State of the Enterprise Report – Breaking Away from the Vicious Vendor Audit Cycle
Vendor software and hardware audits have become so common in the enterprise IT landscape that they are beginning to be accepted as “business as usual.”
BDNA®, the leader in creating the most authoritative enterprise technology data, released a report that unveils realities of scrupulous license audit practices and common management missteps, including steps on how to avoid audits altogether. The report, Breaking Away from the Vicious Vendor Audit Cycle, is the latest installment of BDNA’s quarterly State of the Enterprise reports that examine trending issues and priorities in enterprise IT management.
Visit BDNA at www.bdna.com.
Mergers & Acquisitions: 5 Software Asset Risks
Many firms see acquisitions as a way to streamline operations and reduce costs, but corporate restructuring including mergers, acquisitions, and divestitures are riddled with software contract risks. This webinar will reveal 5 risks for Oracle customers involved in the M&A process. Oracle’s complex contracts are designed to limit licensing flexibility, and Oracle sales teams are trained to uncover and exploit any advantage to create leverage and drive up revenue. Not an Oracle customer? Don’t worry – this webinar is relevant to anyone undergoing a corporate restructure, even for non-Oracle users.
Visit Palisade Compliance at palisadecompliance.com.
Holistic Software Asset Management
With the evolution of technology, many companies have been forced to go into more and more software in order to optimize their processes. However, Software asset management as such remains unclear to them. In this presentation, we aim to understand which function SAM can have in an organization and what its relation is to a variety of interfacing processes (procurement, change management, IT service management, legal, …). We will also look into how we can avoid incompliancy situations while running a SAM program, with lessons learned from software license compliance reviews, and give some insights on the SAM trends in the market and their evolution.
Visit Deloitte at www.deloitte.com/be.
Overcoming the Challenges of ITAD Transportation
Transporting end-of-life IT assets securely, safely and economically can be a challenge. In this article, we offer recommendations for you, the carrier and the ITAD service provider to help make the transportation process go as smoothly as possible.
Visit Sipi Asset Recovery at www.sipiar.com.
Licensing Windows Server 2016
The DOM Licensing Guide for Windows Server 2016 clearly explains each change and outlines steps you can take now to minimize the impact on your organization.
Today’s ITAM Awareness Month offering brings you the Windows Server 2016 Licensing Guide.
Visit Directions on Microsoft at www.DirectionsonMicrosoft.com.
Changing the Definition of SAM
Anglepoint presents a fundamentally different view on Software Asset Management (SAM) than what the market has been preaching and shows how any organization, of any size, can benefit from a new perspective on what SAM is.
Visit Anglepoint at www.anglepoint.com.
SAM 101 and the Secret for Success
Are you new to Software Asset Management (SAM), or do you need a refresher? In this white paper, we will review the fundamentals of SAM – what it is, why it is important and industry best practices in terms of organizational structure, roles and responsibilities, processes, tools and communication. Finally, we will describe the secret to maintaining a successful and rewarding SAM program.
Visit Siwel Consulting at www.siwel.com.
ITAM Attainment Model
IT asset management (ITAM) and software asset management (SAM) are disciplines that have been around for over twenty years, though there are few organizations that have reached the highest level of attainment.
Join Patricia Adams, ITAM Evangelist, for this thirty-minute webinar to learn how you can transform or refine your approach to increasing ITAM maturity. During the webinar, we will provide characteristics of ITAM/SAM maturity from a people, process, and technology and business impact perspective.
Visit LANDesk at www.landesk.com.
Enhancing Cybersecurity through Process Coordination Gray Paper
ITAM naturally facilitates a presence for IT security teams to utilize that increases their data awareness within the organization. This data awareness is the key to a mature IT security program and best practice dictates the leveraging of existing resources. The coordination of ITAM and IT security processes enhances cybersecurity efforts within an organization.
Learn more in today’s ITAM Awareness Month educational offering from IAITAM. Simply stated, you can’t secure what you don’t know exists within your environment.
Visit IAITAM at iaitam.org.