Contact Us Today! 330.628.3012|info@iaitam.org

IAITAM News Release – New EU Data Privacy Regulations

Thousands of American companies that do business in Europe directly or online with European customers will need to start reckoning with data privacy regulations enacted this month by the European Union (EU) that are due to go into full effect in just two years.

By |2020-11-24T10:29:01-05:00April 28th, 2016|News|0 Comments

What Triggers a Software Audit and How to Prepare for the Inevitable?

What Triggers a Software Audit and How to Prepare for the Inevitable? By Daryl Ullman One of the most common misconceptions we see from organizations is concern and confusion surrounding software licensing audits. The “concern” part is always valid as audits are a legal right your organization agreed to when buying the

By |2021-07-12T14:28:26-04:00April 27th, 2016|Compliance Management, ITAK|0 Comments

Data Wiping Best Practices – Good, Better, Best

Data Wiping Best Practices - Good, Better, Best By Samuel Peery Remove the Data, Remove the Risk The golden rule when it comes to data security when retiring hard drives is “remove the data, remove the risk.”  Another more useful way to look at this is that the sooner the data is

By |2021-07-12T14:19:29-04:00April 26th, 2016|Disposal Management, ITAK|0 Comments

5 Steps to Protect Your Data When Disposing of IT Assets

5 Steps to Protect Your Data When Disposing of IT Assets By Ivan Somyk When you get rid of your organization’s old electronic devices, it’s important to make sure you’re not also getting rid of valuable data. Here are a few steps to protect your data when you’re disposing of your old IT

By |2021-07-12T14:19:29-04:00April 11th, 2016|Disposal Management, ITAK|0 Comments

Are MDM and MAM software strong enough to protect smartphone?

Are MDM and MAM software strong enough to protect smartphone? By Ryan Laber Growth of bring-your-own-device (BYOD) policies in the late 2000s prompted many organizations to develop security protocols for employee-owned equipment. In response, software companies specializing in the securitization of mobile devices quickly gained acceptance. Today, 65 percent of enterprises have

By |2021-07-12T14:19:29-04:00April 6th, 2016|Disposal Management, ITAK|0 Comments

How we built our SAM Tool RFP

How we built our SAM Tool RFP By Aamer Trambu In this article I hope to walk you through how to procure a Software Asset Management (SAM) tool using the Request For Proposal (RFP) method. I will discuss the following topics: Definition of RFP Why RFP Features needed by each internal team

By |2021-07-12T14:28:26-04:00April 4th, 2016|Compliance Management, ITAK|0 Comments

Where Are the Cost Savings? – IT Asset Management

Where Are the Cost Savings? – IT Asset Management By Jason Christensen Even with IT spend projected to grow in 2016 and continue to increase over the next several years, pressure on organizations to reduce operational costs has never been greater. As a result, many businesses have turned to managing their hardware

By |2021-07-12T14:16:29-04:00April 3rd, 2016|ITAK, Program Management|0 Comments

Go to Top