Marty Johnstone
Proving Your ITAM Success: Creating Program Success Reports that Increase Awareness and Buy-In
Did you know that you should also include ITAM challenges and failures in your Program Success Reports? Executives want REAL data, not just information about what has gone well. Document what went wrong, why, and how you resolved or plan to resolve the issue. Over time, your Program Success Reports will not only prove program maturity, but also how you got there!
The future of ITAM – after A comes D – ITDM
ITAM is a management system concept, an overlay that allows organizations – if they follow the ISO/IEC 19770-1 standard – to manage asset-related risks. In the past people working in the ITAM field had a significant focus on contractual compliance or cost savings. To put things into perspective: This is a fraction of what ITAM can bring to the table. It is a perfect extension to other controls in an organization, e.g. related to IT operations, service management, security, controlling, and more.
Building a SAM Program from Scratch: The First 12 Months
Suppose a company with 5,000 employees has hired you to establish its Software Asset Management program. You are their first hire. So much needs to be done, and you are unsure where to start. However, with the right approach, you can build a program that meets your organization’s needs and positions you as a strategic asset in as little as 12 months.
Addressing E-Waste Through EPR Compliance
As global concern for the environment escalates and regulators take measures to tackle e-waste, particularly through the enactment of EPR laws.
Interdependence Between Asset and Configuration Management
This article highlights the interdependence between Asset Management and Configuration Management in maintaining accurate IT asset data.
Controls that Ensure Accuracy of Asset Inventory
The SEC defines controls as specific policies, procedures, and activities designed to meet an objective. In ITAM, maintaining an accurate and reliable inventory of IT assets is crucial, though often challenging.
Digital License Danger: Protect Your Microsoft Enterprise Licenses
Are your Microsoft enterprise licenses at risk of being exploited? Discover the hidden dangers of digital licenses embedded in your IT assets, even after data wiping. A Microsoft Authorized Refurbisher can safeguard your enterprise licenses and ensure compliance. Learn the critical steps to relicense your devices, erase digital footprints, and avoid unexpected charges. We’ll share three takeaways on how to maintain control during the ITAD process to avoid financial and legal repercussions.
Best Practices for Recovering Assets from Remote Workers
With an ever-growing remote workforce, recovering assets from remote workers is a constant challenge. Learn about the importance of policy, processes and systems you need to have in place in order to optimize asset recovery rates and minimize risks. We’ll consider the repercussions of letting employees keep outdated equipment, ranging from security, environmental, reputational and social risks. Hear a case study showcasing a successful equipment recovery program. Discover how refurbishment and donation practices can elevate your organization. Join us in fostering a planet- and people-friendly approach to the reverse supply chain.
Should You Remove Device Locks When Retiring IT Assets?
Consider the factors and benefits of removing device locks when retiring IT assets, such as financial gains and achieving environmental goals.