Latest ITAM News

Compliance Management

Software Licensing Compliance and Cost Optimization

Maintaining a balance between seemingly competing goals or circumstances is a common challenge in business management as well as life in general, and recognizing unbalance before it results in excessive losses frequently requires information gathering and assessment. Dangers lurk in many areas when too much attention is focused on one goal at the expense of losing perspective in management of ...

Read More »

Reduce Security Risk with SAM and Vulnerability Management

What Compliancy risks does your organization face, for its use of Software? How secure is the software you are running? How do you know all of the software your business uses? Is all of the software you are running properly licensed to the vendors who supply it? When it comes to risk, once it is identified, most leading companies try ...

Read More »

Changes to the IBM PPA – Understanding Your Risks

On Sept 1, 2014, IBM sent out a letter to its software customers about the IBM International Passport Advantage Agreement (PPA). Its purpose was to notify these customers about the recent changes made to its agreement governing IBM’s software licenses. The letter opened with the following: “IBM is pleased to announce some important enhancements to your IBM International Passport Advantage ...

Read More »

An Inside Job: Employee Espionage and Negligence

Electronic information theft has been on the rise for some time. Whether the theft is focused on healthcare facilities, major department stores, banks, or even hardware stores (does a recent Home Depot e-payment theft come to mind?); the fact remains that in our digital society, electronic information can be, and far too often is, compromised. While black hat hackers gain ...

Read More »

Corralling SQL Server CALs

This is one of my favorite topics with clients.  It never fails that most clients I speak with have multiple SQL Server license types, which usually includes SQL Server CALs.  So what exactly is a SQL Server CAL, well I can tell you it has no relationship to a large four legged animal grazing in a field, but I will ...

Read More »

An Honest Discussion About the IBM License Metric Tool ILMT

Let’s be honest about something: The IBM License Metric Tool (ILMT) has gotten a lot of bad-press over the past several years. Some of that has been well deserved in terms of difficulty of installing and managing the tool, especially the earlier versions. Many customers would argue that, “we only run ILMT because IBM makes us.” Now that we have ...

Read More »

What Triggers a Software Audit and How to Prepare for the Inevitable?

One of the most common misconceptions we see from organizations is concern and confusion surrounding software licensing audits. The “concern” part is always valid as audits are a legal right your organization agreed to when buying the license and the consequences for non-compliance can be very high. It’s important to treat any request for a “self-assessment” or other audit demand ...

Read More »

How we built our SAM Tool RFP

In this article I hope to walk you through how to procure a Software Asset Management (SAM) tool using the Request For Proposal (RFP) method. I will discuss the following topics: 1. Definition of RFP 2. Why RFP 3. Features needed by each internal team 4. Core requirements vs supplemental features 5. Scoring each feature 6. Top priority publishers 7. ...

Read More »

An effective SAM practice is fought in the trenches

A plethora of online information is available to help companies prepare for a formal software audit. Of course, the best approach is to have a proactive Software Asset Management (SAM) program in place prior to an audit starting, but what if you don’t? Even with a proactive SAM program in place, audits can still bring surprises. So how do you ...

Read More »

Security Standards- PCI, SAS70/SSAE, AAA NAID

Security compliance requirements present complications for IT asset management professionals and their respective IT asset disposal vendors and data destruction service providers. In addition to federal and state regulatory requirements, industry stakeholders have introduced and have raised the bar to include more sophisticated and prescriptive measures to protect personal identifiable information (PII). Since some industry-created security standards have existed for ...

Read More »