Jennifer Munson
Top 10 Predictions for SAM in 2050
10 predictions for how SAM might look like in the year 2050
How Can Organizations Keep Pace with Ever-Evolving User and Business Needs Without Losing Control Over Who Has Access to their Most Sensitive Data?
Even the most sophisticated organizations have struggled to accurately track and recover remote devices quickly, safely and efficiently at scale
TWO CLICKS AWAY FROM GETTING F*CK#D
The SEC’s cybersecurity whistleblower program means an organization’s IT asset disposition (ITAD) program is just two clicks away from being exposed.
Why Secure Data Destruction Matters: Moving Beyond Destroying Storage Devices
Secure data destruction is vital in our tech world. Organizations should use data destruction software for transparency, audit trails & sustainability
Stop Counting IT Assets and Start Managing Them
Managing IT assets effectively requires a robust and accurate tracking method. This article is a guide to achieving success.
Leveraging Your On premise Investment in the Cloud
Understand how to leverage your on premise software licenses and minimize costs, while making a smooth transition to cloud or hybrid cloud.
Treating Recycling and Data Security as a Brand Equity Issue
Poor ITAD practices risk brand equity when corporate irresponsibility, even accidental errors, can quickly and irreversibly sour consumer perceptions.
Mainframe Savings in the Enterprise
The mainframe may be old and ready for retirement, but some good years remain. And with them, some good software savings.
Why your Cybersecurity Organization is Relying More on IT Asset Management
IT Asset Management practice is getting more involved with Cybersecurity programs. This article explore why this need is increasing.
Third Parties and Software Asset Management
Third parties are having an increasing impact on the SAM equation. Learn the how and why and dive into some of the concerns and benefits they bring.