ITAM Lost and Theft Policies Are More Important Than Ever: How to Create or Improve Policies

With so many IT assets outside of the office, unfortunate events like losing an asset or asset theft are likely to happen more often. Due to the increased risk, IT Asset Management (ITAM) Lost and Theft policies may need to be written, revised, or recommunicated.

By |2020-06-29T12:03:42-04:00June 29th, 2020|Treasure Chest|0 Comments

Cloud computing vs. edge computing

One of the hardest parts of IT asset acquisition is knowing which asset will best suit the organization. There are many options out there, and even though some may seem to work well with other organizations, it might not work best with yours. The best way to know what would work best is to research

By |2020-06-26T14:24:20-04:00June 26th, 2020|IAITAM News You Can Use|0 Comments

How artificial intelligence and machine learning are advancing ITAM

Check out this blog to learn more about how SHI’s 365 Cost Optimization Services use Artificial Intelligence and Machine Learning to help customers optimize their Microsoft and Office 365 cloud spend. Check Out the Full Article

By |2020-06-26T14:18:17-04:00June 26th, 2020|The "iN" Report|0 Comments

Worst Data Theft in CIA History Could Have Been Avoided

While ITAM does not directly deal with IT security practices, it supports the processes. Helping to protect data is what ITAM focuses on, and a major way to help is to meet with the IT team and figure out security processes and policies.

By |2020-06-18T11:12:06-04:00June 18th, 2020|IAITAM News You Can Use|0 Comments

South African Bank To Replace 12 Million Cards After Employees Stole Master Key

While organizations cannot always determine how employees are going to act, they can narrow down the chances of internal data leaks by limiting who has access to what data. Employees only need access to data that directly affects their responsibilities.

By |2020-06-16T10:48:24-04:00June 16th, 2020|IAITAM News You Can Use|0 Comments
Load More Posts