Tom Watson

Tom Watson is the founder & CEO of AMI, an industry leader in hardware asset management. AMI is the creator of the popular AssetTrack software and consulting services used by leading enterprise hardware asset managers.

Controls that Ensure Accuracy of Asset Inventory

The SEC defines controls as specific policies, procedures, and activities designed to meet an objective. In ITAM, maintaining an accurate and reliable inventory of IT assets is crucial, though often challenging.

Digital License Danger: Protect Your Microsoft Enterprise Licenses

Digital License Danger: Protect Your Microsoft Enterprise Licenses

Are your Microsoft enterprise licenses at risk of being exploited? Discover the hidden dangers of digital licenses embedded in your IT assets, even after data wiping. A Microsoft Authorized Refurbisher can safeguard your enterprise licenses and ensure compliance. Learn the critical steps to relicense your devices, erase digital footprints, and avoid unexpected charges. We’ll share three takeaways on how to maintain control during the ITAD process to avoid financial and legal repercussions.

Best Practices for Recovering Assets from Remote Workers

Best Practices for Recovering Assets from Remote Workers

With an ever-growing remote workforce, recovering assets from remote workers is a constant challenge. Learn about the importance of policy, processes and systems you need to have in place in order to optimize asset recovery rates and minimize risks. We’ll consider the repercussions of letting employees keep outdated equipment, ranging from security, environmental, reputational and social risks. Hear a case study showcasing a successful equipment recovery program. Discover how refurbishment and donation practices can elevate your organization. Join us in fostering a planet- and people-friendly approach to the reverse supply chain.

GreenTek Solutions, LLC

IAITAM Provider Member GreenTek Solutions is a mission-driven ITAD company that defies industry norms with its unwavering professionalism, innovation, flexibility, and transparency. We prioritize data security, sustainability, and digital equity, advocating for the...

Data Destruction: Protecting the World and Fighting New Threat Vectors

Data Destruction: Protecting the World and Fighting New Threat Vectors

Corporate and client data is proliferated globally for multi-national companies. Learn how to perform data destruction abroad while considering regulatory and operational differences. Learn how to protect against new threat vectors that are challenging the global enterprise. Through case studies, learn how some companies have have protected there data abroad.