3 Keys to Optimizing SaaS in Today’s Environment

The explosion of employees working from home has accelerated the use of SaaS. Learn how Asset Management teams can optimize SaaS spend while reducing risk. Gain visibility into known and shadow SaaS Optimize SaaS—rightsize, reharvest and rationalize Reduce the risks of SaaS

Read more

Hardware Asset Management: The Power of One Platform

A discussion on how the management of hardware assets on one platform with Security, Risk, and Application Management can improve visibility and communication and speed time to full resolution, as compared to a swivel chair process on multiple systems/platforms.

Read more

Delivering Software Assets to User Constraints: An IT Perspective

The purpose of this lesson is to educate business leaders of IT constraints starting when a user requests a software asset, to delivery, to retirement of the software asset in medium to large enterprise environments. Upon the completion of this session, business managers will understand the constraints on managing the software delivery to the users and managing the software asset throughout its lifecycle.

Read more

Why ITAM Matters – Building a Solid IT Asset Management Foundation

Let’s get back to ITAM basics understand what it is (and isn’t) and why it’s more relevant in the enterprise now more than ever before. You will learn: -What ITAM is and its 2 major objectives -The top 6 concerns for why Executives care about ITAM -Why Gartner says ITAM is 80% process and 20% tool -Why Discovery alone is not ITAM This is a product-agnostic approach to creating the solid foundation for a successful ITAM journey. Whether you’re in Phase 1 of your asset journey or have already launched an ITAM solution, you will have a better understanding of […]

Read more

Turning Dreams Into Digital Businesses

Digital transformation is not simply about technology—it requires business leaders to C Level managers to reinvent their core and re-imagine their future and embrace a different way of bringing together people, data, and processes with emphasis on security woven into the foundation of their journey to create value for their customers.

Read more

Overcoming the Pitfalls of Doing it Yourself

Many corporations try to “DIY” ITAD, from data erasure to auctions to recycling. But the risks of old assets are not for the faint of heart, and few corporations have implemented the best practices internally to eliminate those risks. What do you need to establish to do-it-yourself?

Read more

The Role of ITAD in Data Security

With the increased emphasis on data security, ensuring that your organization has a developed ITAD program in place can play an important role in meeting data security compliance obligations. Whether it be GDPR or CCPA, every organization will need to take a holistic approach to their data security including ensuring that there is an ITAD program in place that plays a part in helping to mitigate any potential risks associated with the IT Asset Disposition process.

Read more

Turning Dysfunctional ITAM into World Class Solutions

This sessions reviews techniques for implementing ITAM/CMDB solutions using processes, standards and governance in order to develop well supported solutions no matter what the platform.

Read more

On Being like ‘Goldilocks’ for Your ITAM Policy Management!

One of the keys to a Best in Class ITAM Program that runs smoothly and delivers realized value across the enterprise is Policy Management. Where do we begin? Which process areas? Who is the audience? How comprehensive? How implemented? How monitored and enforced? How do we address emerging technologies? Some companies get carried away and lost in minutia, others drop the ball. The key – Not too much, not too little, but “just the right fit” for your organization. Come to learn! Come to share!

Read more

Microsoft’s approach on how to build your Governance program to mitigate Risk and drive improved Software Lifecycle Management

Microsoft has taken a strong approach in mitigating risk with third-Party Software used internally. This session will show you how you can do the same with Governance processes, policy, and Software Lifecycle Management. See how this program not only protects Microsoft but also potentially protects you.

Read more