Branislav Potocek

Experienced SAM & SLM Manager, currently working as VP of Operations for OpenLM.
Assessing ITAM Technology

Assessing ITAM Technology

Automation is all but a requirement to be able to manage environments at any sort of scale. Technology is a key part of building out our automation. It may not be the best approach to select a particular tool based on one recommendation. Once we bring a particular tool into our environment, it can be costly or all but impossible to step away from. Let’s look at how we can make our ITAM Tool selection process as effective as it can be.

Yes. You Can Get Fired for a Bad ITAD Process

Yes. You Can Get Fired for a Bad ITAD Process

A flawed IT Asset Disposition process isn’t just a slip-up; it’s a direct threat to your career. Join this webinar as we cover the top five critical indicators of risk in your ITAD process, offering best-in-class practices from national and global organizations like P&G, GSK, OhioHealth, and Visa to fortify your approach. If you’re connected to your organization’s ITAD efforts, don’t miss our expert insights on how to safeguard your position and ensure your ITAD practices are bulletproof.

Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe

Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies and best practices when implementing a BYOD program.

Workflow Automation and SAM

Workflow Automation and SAM

Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.

CentricsIT

IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT...

Unlocking Change Through Understanding Your Leadership Voice

Unlocking Change Through Understanding Your Leadership Voice

Can you imagine a team of self-aware people who knew how to communicate and could bring their best to the table every day? What would that do for culture and how we adapt to change? Teams and whole organizations can be transformed when everyone operates securely in their own voice and learns to value the voices of others

Dissecting an ITAD Service Agreement

Dissecting an ITAD Service Agreement

In this session, we’re going to talk about ITAD service agreements, which are really important for managing risks in businesses. We’ll dive into the details of these agreements, discuss what important things you should look for, and also point out what you should try to stay away from. This is all about understanding how these agreements work and how they can help protect a company.

Mobile Assets: Same Animal, Different Breed

“How do smartphones fit here? Are they harder to manage? Are there additional best practices for managing that hardware asset type?”. The short answer is it depends, laptops and desktops, depends… There is no “one size fits all” in ITAM