Skot Waldron
Ivanti
IAITAM Provider Member Ivanti breaks down barriers between IT and security so that Everywhere Work can thrive. Ivanti has created the first purpose-built technology platform for CIOs and CISOs – giving IT and security teams comprehensive software solutions that scale...
TechR2
IAITAM Provider Member At TechR2, we eradicate data on failed hard drives and other retired IT devices. Our patented systems for securely and thoroughly destroying data from hard drives, laptops, and any other data-bearing devices can ensure your organization is fully...
Full Circle Electronics
IAITAM Provider Member Full Circle Electronics is a leader in safe, secure, and sustainable electronics recycling, serving a diverse client base from small businesses to Fortune 1000 companies across the U.S. and Latin America. We extend the lifecycle of electronic...
Absolute Security
IAITAM Provider Member Absolute Security is partnered with more than 28 of the world’s leading endpoint device manufacturers, embedded in the firmware of 600 million devices, trusted by 21,000 global enterprises, and licensed across 14 million PC users. With the...
Sustainability: How Does Your Disposition Vendor’s Certifications Impact Your Environmental Footprint
Global e-Waste is growing exponentially every year!
Have you wondered how your disposition process is contributing to reducing this global burden and what does your ITAD vendor’s certifications e-Stewards and R2 mean to you?
Assessing ITAM Technology
Automation is all but a requirement to be able to manage environments at any sort of scale. Technology is a key part of building out our automation. It may not be the best approach to select a particular tool based on one recommendation. Once we bring a particular tool into our environment, it can be costly or all but impossible to step away from. Let’s look at how we can make our ITAM Tool selection process as effective as it can be.
Yes. You Can Get Fired for a Bad ITAD Process
A flawed IT Asset Disposition process isn’t just a slip-up; it’s a direct threat to your career. Join this webinar as we cover the top five critical indicators of risk in your ITAD process, offering best-in-class practices from national and global organizations like P&G, GSK, OhioHealth, and Visa to fortify your approach. If you’re connected to your organization’s ITAD efforts, don’t miss our expert insights on how to safeguard your position and ensure your ITAD practices are bulletproof.
Best Practices for BYOD: Maintaining Compliance and Keeping Your Data Safe
Bring your own device can be a great way to save budgetary dollars while also ensuring your end users have technology they are comfortable with. But who owns the software licenses and data on each asset? And what happens when the asset or the employee exits the organization? In this session, we’ll discuss necessary policies and best practices when implementing a BYOD program.
Workflow Automation and SAM
Workflow Automation is being embraced by organizations of all sizes because it offers clear benefits of reducing errors, increasing efficiency, improving consistency and collaboration, reducing costs, and enhancing data security. We will discuss how SAM can benefit from workflow automation with example workflows such as employee on-boarding and off-boarding; optimizing SaaS and Subscription software costs based on Usage; and supporting Cyber Security with SAM based security controls.
CentricsIT
IAITAM Provider Member At CentricsIT, our mission is simple: Repurpose Technology for a Better Planet. With more than 17 years of promoting a circular economy throughout the IT lifecycle, CentricsIT is a world-renowned leader in IT asset disposition and global IT...