In the following article, Rishi Simbudyal from Teqtivity explains why ITAM is so critical to cyber security, and why cybersecurity professionals need ITAM more than ever. According to IBM’s Cost of a Data Breach Report, the ...
In the following article, Rishi Simbudyal from Teqtivity explains why ITAM is so critical to cyber security, and why cybersecurity professionals need ITAM more than ever. According to IBM’s Cost of a Data Breach Report, the ...
News of a new Broadcom deal rarely arrives with great fanfare. The November 2023 VMware acquisition provoked open worry online ...
The Software Licensing of Robots
Robots are increasingly present in our day-to-day lives. If you thought licensing servers was difficult, imagine licensing devices of higher complexity that walk around and interact with the virtual and the physical world.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum.
In the following article, Rishi Simbudyal from Teqtivity explains why ITAM is so critical to cyber security, and why cybersecurity professionals need ITAM more than ever. According to IBM’s Cost of a Data Breach Report, the ...
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum.
In the following article, Rishi Simbudyal from Teqtivity explains why ITAM is so critical to cyber security, and why cybersecurity professionals need ITAM more than ever. According to IBM’s Cost of a Data Breach Report, the ...
A reader writes. “What is the industry standard way of calculating ITAM accuracy?” I’m not sure about the ‘industry standard’ way, but I’ll share techniques I’ve used in the past, hopefully others can chip in their ...
Quick Guide to Mobile Device Management (MDM) Part 2 of 2
Recap We previously looked at what exactly mobile device management (MDM) is and the types of solutions available to organisations. In part two we dive deeper into MDM including how MDM can help support mobile devices, ...
Martin Thompson and I were recently commissioned to write an overview of options for Hardware Asset Tagging for a client. The client has kindly let us share our report for the benefit of the ITAM Review ...
Quick Guide to Mobile Device Management (MDM) Part 1 of 2
Mobile devices are increasing in popularity within organisations. With so many mobile device types and options currently on the market, organisations are spoilt for choice when choosing what tablet their employees can use, or what mobile ...
This is part two of a two-part series on environment recognition. See part one here. ‘Modern SAM requires ‘Environment Recognition’ as much as ‘Software Recognition’. In my last article I explored the concept of ‘environment recognition’. ...
The most common challenge we face when starting a new software / IT asset management project is obtaining reliable data on exactly how many assets we’re dealing with. Lack of visibility is the biggest challenge. In ...
ISACA has this month released news of more than 40 customisable IT audit/assurance programmes, which have been developed to help IT auditors who are facing increasing challenges brought about by “Bring Your Own Device” (BYOD) trends that ...
This article has been contributed by Stephen Midgley, Vice President Global Marketing at Absolute Software. In this article Stephen explains how to securely navigate the BYOD landscape. Recent research into mobile device deployment in the ...
I have been investigating technology that might enable a company to develop a ‘Bring Your Own Device (BYOD)’ policy or more advanced management of company owned tablets and mobile devices. The days of one or two corporate ...
I recently stumbled across this unique way of ensuring hard drives are destroyed. You might call it ‘labour intensive’, but at least you get to see the job done onsite and ensure no data leaks. Perhaps ...