Compliance Management

An Inside Job: Employee Espionage and Negligence

Electronic information theft has been on the rise for some time. Whether the theft is focused on healthcare facilities, major department stores, banks, or even hardware stores (does a recent Home Depot e-payment theft come to mind?); the fact remains that in our digital society, electronic information can be, and far too often is, compromised. While black hat hackers gain ...

Read More »

Corralling SQL Server CALs

This is one of my favorite topics with clients.  It never fails that most clients I speak with have multiple SQL Server license types, which usually includes SQL Server CALs.  So what exactly is a SQL Server CAL, well I can tell you it has no relationship to a large four legged animal grazing in a field, but I will ...

Read More »

An Honest Discussion About the IBM License Metric Tool ILMT

Let’s be honest about something: The IBM License Metric Tool (ILMT) has gotten a lot of bad-press over the past several years. Some of that has been well deserved in terms of difficulty of installing and managing the tool, especially the earlier versions. Many customers would argue that, “we only run ILMT because IBM makes us.” Now that we have ...

Read More »

What Triggers a Software Audit and How to Prepare for the Inevitable?

One of the most common misconceptions we see from organizations is concern and confusion surrounding software licensing audits. The “concern” part is always valid as audits are a legal right your organization agreed to when buying the license and the consequences for non-compliance can be very high. It’s important to treat any request for a “self-assessment” or other audit demand ...

Read More »

How we built our SAM Tool RFP

In this article I hope to walk you through how to procure a Software Asset Management (SAM) tool using the Request For Proposal (RFP) method. I will discuss the following topics: 1. Definition of RFP 2. Why RFP 3. Features needed by each internal team 4. Core requirements vs supplemental features 5. Scoring each feature 6. Top priority publishers 7. ...

Read More »

An effective SAM practice is fought in the trenches

A plethora of online information is available to help companies prepare for a formal software audit. Of course, the best approach is to have a proactive Software Asset Management (SAM) program in place prior to an audit starting, but what if you don’t? Even with a proactive SAM program in place, audits can still bring surprises. So how do you ...

Read More »

Security Standards- PCI, SAS70/SSAE, AAA NAID

Security compliance requirements present complications for IT asset management professionals and their respective IT asset disposal vendors and data destruction service providers. In addition to federal and state regulatory requirements, industry stakeholders have introduced and have raised the bar to include more sophisticated and prescriptive measures to protect personal identifiable information (PII). Since some industry-created security standards have existed for ...

Read More »

Is a SAM Managed Service Right for You?

A Managed Service can be one way to increase the efficiency and cost-effectiveness of your SAM program. Could hiring a team of dedicated, seasoned SAM professionals lead to a more painless program? This article will review the basics of a SAM Managed Service: What is a Managed Service? What can it do for you? Is it worth the investment? In ...

Read More »

The Real Cost of Unused Software

1E recently published the fourth yearly software waste study (http://www.1e.com/blog/all_resources/the-hidden-cost-of-unused-software-2015/) which analyzed data from over 3.6m desktops across 150 companies. According to the 1E Financial Analyst team which compiled the study together, on average in the US, 37% of software is wasted – going unused on the machines it is installed on. That’s 37% of software which your company has ...

Read More »

Certification Integration, Quality, Compliance, and Security

By Eric Capps & Scott Venhaus – Arrow Value Recovery Risk management is critical to a sound Quality, Environmental, Health, Safety, and Security (QEHSS) program, and often we look to current or new certification standards to give us the systems or protocols we need to support risk management. Most companies leverage multiple standards as the risks they identify span the ...

Read More »