Compliance Management

Beyond Compliance – SAM and the CIO Agenda

What’s on the CIO agenda? The agenda of CIOs is packed, packed with requirements to make a company’s IT more reliant and available, more elastic and scalable, not to be forgotten more efficient, so all in all more business oriented and demand driven. Their company’s future may be at stake! And with new disruptive technologies, products, services and business models ...

Read More »

ILMT & IBM Passport Advantage Agreements – Are You at Risk?

Many companies are reactionary to software compliance; forgoing the process of monitoring and reporting on software position until the eventual time that they are placed under the pressures of an active audit. For customers that are part of an IBM audit for PVU-based software products, the sting of the experience can be painful and felt over the course of a ...

Read More »

The Cloud and SAM

I remember the first time I brought up software asset management (SAM) as a good opportunity to help clients and vendors have a better, more transparent relationship. It was a win-win: clients could optimize contracts and vendors could protect their intellectual property. But I was told it was a poor idea because cloud would change everything and make SAM disappear. ...

Read More »

The Future of Software Asset Management

Software asset compliance is achieved by legally acquiring and consuming a genuine copy of a software product according to copyright in accordance with the licensed term and conditions specified by the software publisher. Making sure such compliance remains active relies on: 1) documenting and implementing a strict acquisition process that requires approval and monitoring; 2) being able to assess consumption/usage; ...

Read More »

Information Security Certifications & Standards

On behalf of APMG-International [1], I look forward to presenting to IAITAM at its 2016 Spring ACE at New Orleans, when I’ll consider the widening range and uses of information security standards and certifications. In this piece, I’ll focus on InfoSec certifications: (note: the term credentialing is used less in the InfoSec arena, though that essentially describes the same thing, ...

Read More »

Software Audits: The Payoff of Planning Ahead

Software Audits: The Payoff of Planning Ahead By Chris Tittiger, CITAM, CSAM AUDITS DON’T HAVE TO BE SCARY. In fact with some basic planning, they can be relatively painless. Here are two simple strategies you can implement in your company to help mitigate your company’s risk during a software audit: 1. Negotiate the audit terms in your software contract. 2. ...

Read More »

Managing Office 365 ProPlus Compliance – Transitioning to User Based Subscriptions

By John G. Grubb, SoftwareAdvocates ITAK V10 I4 The vast majority of enterprise customers I speak with these days are very interested in Microsoft’s Office 365 offering, many are already in the process of evaluation or deployment, or have already deployed it.  Office 365 is a subscription based productivity offering from Microsoft which does not offer the option to obtain ...

Read More »