Latest ITAM News

Compliance Management

Certification Integration, Quality, Compliance, and Security

By Eric Capps & Scott Venhaus – Arrow Value Recovery Risk management is critical to a sound Quality, Environmental, Health, Safety, and Security (QEHSS) program, and often we look to current or new certification standards to give us the systems or protocols we need to support risk management. Most companies leverage multiple standards as the risks they identify span the ...

Read More »

Beyond Compliance – SAM and the CIO Agenda

What’s on the CIO agenda? The agenda of CIOs is packed, packed with requirements to make a company’s IT more reliant and available, more elastic and scalable, not to be forgotten more efficient, so all in all more business oriented and demand driven. Their company’s future may be at stake! And with new disruptive technologies, products, services and business models ...

Read More »

ILMT & IBM Passport Advantage Agreements – Are You at Risk?

Many companies are reactionary to software compliance; forgoing the process of monitoring and reporting on software position until the eventual time that they are placed under the pressures of an active audit. For customers that are part of an IBM audit for PVU-based software products, the sting of the experience can be painful and felt over the course of a ...

Read More »

The Cloud and SAM

I remember the first time I brought up software asset management (SAM) as a good opportunity to help clients and vendors have a better, more transparent relationship. It was a win-win: clients could optimize contracts and vendors could protect their intellectual property. But I was told it was a poor idea because cloud would change everything and make SAM disappear. ...

Read More »

The Future of Software Asset Management

Software asset compliance is achieved by legally acquiring and consuming a genuine copy of a software product according to copyright in accordance with the licensed term and conditions specified by the software publisher. Making sure such compliance remains active relies on: 1) documenting and implementing a strict acquisition process that requires approval and monitoring; 2) being able to assess consumption/usage; ...

Read More »

Information Security Certifications & Standards

On behalf of APMG-International [1], I look forward to presenting to IAITAM at its 2016 Spring ACE at New Orleans, when I’ll consider the widening range and uses of information security standards and certifications. In this piece, I’ll focus on InfoSec certifications: (note: the term credentialing is used less in the InfoSec arena, though that essentially describes the same thing, ...

Read More »

Software Audits: The Payoff of Planning Ahead

Software Audits: The Payoff of Planning Ahead By Chris Tittiger, CITAM, CSAM AUDITS DON’T HAVE TO BE SCARY. In fact with some basic planning, they can be relatively painless. Here are two simple strategies you can implement in your company to help mitigate your company’s risk during a software audit: 1. Negotiate the audit terms in your software contract. 2. ...

Read More »