Contact Us Today! 330.628.3012|info@iaitam.org

Are Weak Processes Dooming ITAM? – A Fresh Perspective on Finding Weaknesses to Stop Repeating Mistakes

Are Weak Processes Dooming ITAM? - A Fresh Perspective on Finding Weaknesses to Stop Repeating Mistakes By Kevin Panteli You are one of the fortunate ones. You work for an organization that recognizes the importance and value of an ITAM program.  You have a dedicated team of resources and your budget has

By |2021-07-12T14:16:32-04:00April 21st, 2015|ITAK, Program Management|0 Comments

FTC as Data Security Watch Dogs – Data Security Enforcement on the Rise

FTC as Data Security Watch Dogs - Data Security Enforcement on the Rise By Matthew MacLean Unfortunately, 2014 was another banner year for data breach incidents, resulting in numerous class actions and government investigations. Data security protection was thought to be coming from the Department of Homeland Security, in the form of

By |2021-07-12T14:19:32-04:00April 20th, 2015|Disposal Management, ITAK|0 Comments

Empowering People, Process and Technology – Case Study of a Successful Game Changer in ITAM Data Quality and Affordability

Empowering People, Process and Technology - Case Study of a Successful Game Changer in ITAM Data Quality and Affordability By John McConnell & Karen Bryant In today’s world, IT hardware assets in every company are multiplying quickly, and the compliance requirements are multiplying just as fast. To keep up with this evolving

By |2021-07-12T14:13:37-04:00April 19th, 2015|Documentation Management, ITAK|0 Comments

ITAM People Management – ITAM Experiences Highlight the Importance of Hiring the Right People

ITAM People Management - ITAM Experiences Highlight the Importance of Hiring the Right People By Elie Baho Struggling with constant changes in your company? Do you have a hard time knowing what your colleagues actually do and what applications they use? The easy answer to this would be to get either a

By |2021-07-12T14:16:33-04:00April 18th, 2015|ITAK, Program Management|0 Comments

A Practical Guide to Audit-Readiness – Seven Tactical Actions that Deliver Results

A Practical Guide to Audit-Readiness - Seven Tactical Actions that Deliver Results By Sandy Fletcher In the various versions of the story of Snow White, the beautiful Snow White is brought several gifts from an old peddler who is actually the Queen in disguise – A lacy corset that causes her to

By |2021-07-12T14:28:31-04:00April 18th, 2015|Compliance Management, ITAK|0 Comments

Managing Office 365 ProPlus Compliance – Transitioning to User Based Subscriptions

Managing Office 365 ProPlus Compliance - Transitioning to User Based Subscriptions By John Grubb The vast majority of enterprise customers I speak with these days are very interested in Microsoft’s Office 365 offering, many are already in the process of evaluation or deployment, or have already deployed it. Office 365 is a

By |2021-07-12T14:28:31-04:00April 17th, 2015|Compliance Management, ITAK|0 Comments

IT Lifecycle Management – Avoiding Potential Loss of Control

IT Lifecycle Management - Avoiding Potential Loss of Control By Jeffrey Dean, Arrow Electronics According to the Department of Justice, the term “breach” as it relates to data “is used to include the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons

By |2021-07-12T14:19:32-04:00April 17th, 2015|Disposal Management, ITAK|0 Comments

Managing your Reverse Logistics Risks – Understanding Compliance Program Fundamentals

Managing your Reverse Logistics Risks - Understanding Compliance Program Fundamentals By Eric Capps In a world where poor management of IT assets has taken center stage in the public eye, it is more important than ever to fully understand our risk exposure and develop innovative ways to manage these risks. From the

By |2021-07-12T14:19:33-04:00April 16th, 2015|Disposal Management, ITAK|0 Comments

Invoice Verification – What and Why? – Consider this Foundational Practice for Proactive ITAM

Invoice Verification - What and Why? - Consider this Foundational Practice for Proactive ITAM By Sherry Irwin, Technology Asset Management, Inc. Disclaimer: Specific content, while representative of industry practices, is provided as example only and should be modified for your organization. The Challenge Invoices are the means by which vendors collect payments

By |2021-07-12T14:14:12-04:00April 15th, 2015|Financial Management, ITAK|0 Comments

Measurement for SAM – Practical Techniques to Optimize Software Efficiency

Measurement for SAM - Practical Techniques to Optimize Software Efficiency By Phil Hames People talk about lean processes and efficiency with regard to IT but in reality there is confusion about what this actually means. There tends to be a focus on effectiveness or “get the job done” for most IT professionals

By |2021-07-12T14:16:33-04:00April 14th, 2015|ITAK, Program Management|0 Comments

Go to Top