This article has been contributed by Matt Stacey at QMS International. Recent Survey Highlights Shift in Business Cyber-Security Efforts The figures of the global survey of ISO management standards showed that over 2,000 Information Security Management System ...
This article has been contributed by Mark Dobson, ITAD Specialist at NextUse. ITAD for Mobile Devices When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the company data stored ...
This article has been contributed by Eric Chiu of FisherITS Customers can still be fined for violating IBM’s Sub-Capacity licensing terms even after deploying the ILMT tool. This article takes a look at the areas on which organisations must ...
This article has been contributed by Bali Kuchipudi of SoftwareONE. How to establish accountability for cloud spend We all know that the cloud has vastly changed how we view our IT landscape, priorities and budgets. This ...
This article has been contributed by Jochen Hagenlocher, Head of SAM at a Fortune 100 Company, ITAM Review Professional of the year 2016, ISO/IEC 19770 WG21 member and SAM enthusiast. In this article Jochen outlines his ...
Increasingly, companies are considering outsourcing datacenter workloads to third-party hosted or cloud environments. Software publishers like Oracle are not only publishing guidance on how to count licenses that are installed in a third-party cloud environment, Oracle ...
This article has been contributed by Gilles Auchere, Business Development at Econocom and Board Director at Free ICT Europe. The unprecedented ransomware attack that started on 12th May was wholly predictable and a wakeup up call of ...
As IT and procurement communities are being surrounded by an army of SaaS, PaaS and IaaS sales teams, a potentially dangerous sentiment has grown that by shifting apps elsewhere and/or by paying subscription instead of owning ...
The Internet of Things revolution is fundamentally transforming businesses. The massive influx of IoT devices (all of which are basically computers) will save time and money and provide better value to customers, employees and other stakeholders. ...
Imagine this situation in two years-time from now. The ITAM manager for a large organization has been called to a board meeting. There has been a major data breach and a large amount of customer information ...