Contact Us Today! 330.628.3012|info@iaitam.org

Why SAM (Software Asset Management) is more relevant than ever in this changed world of ours!

Why SAM (Software Asset Management) is more relevant than ever in this changed world of ours! By Jan-Christian Björkly-Nordström A lot has changed since the bleak winter of 2020, some due directly or indirectly to the horrific pandemic. Some changes where perhaps already waiting in the wings, but put on hold or

By |2021-07-12T14:16:18-04:00April 22nd, 2021|ITAK, Program Management|0 Comments

Five Steps to Building an ITAD Program

Five Steps to Building an ITAD Program By Brooks Hoffman For most businesses, there’s a growing recognition that IT Asset Disposition (ITAD) isn’t just about managing e-waste. Organizations know that limiting data privacy risk, lowering Total Cost of Ownership (TCO), and ensuring sustainable business operations requires a complete lifecycle approach to managing

By |2021-07-12T14:19:18-04:00April 20th, 2021|Disposal Management, ITAK|0 Comments

Mutated SAM Approach

Mutated SAM Approach By Sateesh Theerthaala If an organization would like to gain and buy the use rights of a functionality (Licensor) solution provided by a computer coded or programmed or procedural operations or software that are licensed through intellectual property rights (IPR) which combinedly or independently leads to a business solution,

By |2021-07-12T14:28:10-04:00April 19th, 2021|Compliance Management, ITAK|0 Comments

Why Responsible Data Destruction is Essential for All Businesses

Why Responsible Data Destruction is Essential for All Businesses By John Shegerian Without exception, data destruction should be at the top of every business’ “things to plan” list. If a business has papers, storage devices, or electronic items that are no longer needed, they can’t just throw them away. You can’t ignore

By |2021-07-12T14:19:19-04:00April 19th, 2021|Disposal Management, ITAK|0 Comments

Bringing IT Asset Management and Cybersecurity closer

Bringing IT Asset Management and Cybersecurity closer By Daniel Galecki Before I talk about how to increase cooperation between ITAM and Cybersecurity, let me quickly set the background. What does Asset Management mean? The term Asset Management has different meaning to different people. When I tell my friends I am in “Asset

By |2021-07-12T14:28:11-04:00April 15th, 2021|Compliance Management, ITAK|0 Comments

ITAM Solution or a Social Network?

ITAM Solution or a Social Network? By Michael Dalke Are we building ITAM solutions or social networks within our companies? If we look at available social network definitions, we see common themes. Social networks are networks of interpersonal relationships. Said another way, people go to social networks to connect to other people.

By |2021-07-12T14:30:11-04:00April 2nd, 2021|Asset Identification, ITAK|0 Comments

3 Results That Build the Business Case for ITAM

3 Results That Build the Business Case for ITAM By Tom Watson Do you want a fast way to make your CIO or CFO yawn? Start talking about needing budget for process improvements, such as moving from spreadsheets to cloud software for tracking hardware assets. While you and I know those process

By |2021-07-12T14:16:18-04:00October 1st, 2020|ITAK, Program Management|0 Comments

The Dynamic Landscape of Software Licensing

The Dynamic Landscape of Software Licensing By Tyler Schlief From the early days of boxed corporate applications and operating systems, software has proven to be a requirement for successful day-to-day operations within any organization. Since that time, how software is purchased and consumed has changed, and continues to do so as offerings

By |2021-07-12T14:28:11-04:00September 17th, 2020|Compliance Management, ITAK|0 Comments

Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets

Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets By Vivian Cullipher Rising supply chain attacks mean organizations must tread carefully when buying IT—even from trusted suppliers. Data erasure can help. While many cyber security threats seem to focus on network vulnerabilities, the reality is that your entire supply chain is

By |2021-07-12T14:19:19-04:00September 16th, 2020|Disposal Management, ITAK|0 Comments

Security Risk in Vendor Audit Conducted on Service Provider

Security Risk in Vendor Audit Conducted on Service Provider By Ludmila Kantova The risk of noncompliance with terms and conditions of license agreements is not the only risk Service Providers face during vendor audit. Software Asset Managers require deep knowledge of potential security risks when customer data is exposed to software vendor

By |2021-07-12T14:28:11-04:00August 18th, 2020|Compliance Management, ITAK|0 Comments

Go to Top