Contact Us Today! 330.628.3012|info@iaitam.org

Can Mega Data Breaches be Prevented? – What ITAM Can Learn from Target and Home Depot

Can Mega Data Breaches be Prevented? - What ITAM Can Learn from Target and Home Depot By Dan Ingouf & Jenny Schuchert, IAITAM As consumers, we are familiar with payment interface devices such as cash registers and point of sale (POS) terminals. We take our chosen items to the check-out, and if

By |2021-07-12T14:19:35-04:00December 27th, 2014|Disposal Management, ITAK|0 Comments

SAP Licensing and the SAM Lifecycle – The Challenges of SAM, ISO 19770-1 and SAP License Management

SAP Licensing and the SAM Lifecycle - The Challenges of SAM, ISO 19770-1 and SAP License Management By Brian E. Skiba, Snow Software Based on a previously published white paper from Snow Software SAP License Management and SAM All around the world, enterprises are realizing that they must employ Software Asset Management

By |2021-07-12T14:28:32-04:00December 20th, 2014|Compliance Management, ITAK|0 Comments

Keeping Your Electronic Data Safe – What You Need to Know About the Other Firewall

Keeping Your Electronic Data Safe - What You Need to Know About the Other Firewall By Vin Giordano, Brass Valley LLC It seems that every day there is news about a cyber-breach or data from a large retailer that has been compromised. There are ever more sophisticated cyber criminals and ever more

By |2021-07-12T14:19:36-04:00December 20th, 2014|Disposal Management, ITAK|0 Comments

Ending Dangerous Disposal Processes

Ending Dangerous Disposal Processes By IAITAM The clock is ticking for organizations: their electronic disposal practices are becoming everyone’s business. For many years, IAITAM has promoted proper disposal practices, educating and certifying IT Asset Managers who then created better practices within their companies. There have been many successes, with organizations better able to maximize

By |2021-07-12T14:19:36-04:00December 15th, 2014|Disposal Management, ITAK|0 Comments

Guidance for Selecting Training – Credentials Matter

Guidance for Selecting Training - Credentials Matter By IAITAM Editor’s Note: In IT Asset Management, everyone is our customer; the success of ITAM relies on the cooperation of many. Creditability is essential and is built through keeping our knowledge current and improving our skills. Training is a major source of knowledge and

By |2021-07-12T14:29:44-04:00December 14th, 2014|Communication and Education Management, ITAK|0 Comments

Acquisition – The Foundation for Software Compliancy – Take a Good Look at Asset Acquisition

Acquisition - The Foundation for Software Compliancy - Take a Good Look at Asset Acquisition By Rodney Penny, Health Care Service Good software compliancy and IT service asset tracking begin with knowing your entitlement numbers and knowing what hardware assets you have and where they are. The foundation for this information comes

By |2021-07-12T14:32:01-04:00November 28th, 2014|Acquisition Management, ITAK|0 Comments

A Value-based Approach to ITAM/SAM – Without Measurable Value, Why Continue ITAM?

A Value-based Approach to ITAM/SAM - Without Measurable Value, Why Continue ITAM? By Brett Husselbaugh, eTelligent Solutions, Inc. If you don’t know where you are going, how do you know when you have arrived? A simple and obvious question, yet that single question sums up many projects, including IT Asset Management (ITAM)

By |2021-07-12T14:16:35-04:00November 28th, 2014|ITAK, Program Management|0 Comments

Don’t Fear the Software Audit – Line up the People, Processes and Tools to be a Success

Don't Fear the Software Audit - Line up the People, Processes and Tools to be a Success By Daisy Adams, SIMITAR Over the past several years, organizations have become more reliant on software solutions for their core business functions and activities. Software licensing use rights and programs are constantly increasing in their

By |2021-07-12T14:28:33-04:00November 27th, 2014|Compliance Management, ITAK|0 Comments

Go to Top