IAITAM Members Only 2015 ACE
The Spring 2015 ACE in San Diego is only a few weeks away. Have you created your schedule from the list of presenters?
If you haven’t booked your room reservations as of yet, remember the IAITAM block at the Hilton is full and we have a secondary location at the DoubleTree secured for nightly accommodations though the $189 room rate is not guaranteed as we get closer to the event, so book TODAY! Details to book room below:
DOUBLETREE, SAN DIEGO MISSION VALLEY
7450 Hazard Center Drive
San Diego, CA 92109 USA
Web: www.doubletree.com or click here to make reservations online
Room Rate: $189/night for standard room
Government Per Diem must show ID upon check-in
We are in the final stages of accepting proposals for the Fall ACE of 2015 in Dublin, Ireland on September 1st & 2nd, 2015. Please be sure to get your speaker proposals in quickly so that you will be considered on the first round – and remember – speakers get complimentary admittance to the entire event!
For questions or additional information on this or any IAITAM ACE event, reach out to your IAITAM Member Service representative today at firstname.lastname@example.org or call +1.330.628.3012.
Final registration for the Spring ACE is underway.
Hurry or you’ll miss the Only US-based ITAM event of the year!
Register now for the either Spring 2015 ACE in San Diego, April 28- 30, 2015 or Dublin, Ireland on September 1st & 2nd, 2015!
ITAM Road Show – IAITAM is Bringing ITAM to a City Near You!
Registrations for the ITAM Road Shows are filling up! The ITAM Road Shows are a series of 1-day educational sessions at a location near you in 2015! Join IAITAM’s team of asset management experts addressing the issues pertinent to initiating, building and enhancing your organization’s asset management program.
DATES / LOCATIONS
Chicago, IL: May 11th
Little Rock AR: May 13th
Kansas City, KS: May 15th
Hartford, CT: May 18th
Raleigh-Durham, NC: May 20th
Denver, CO: May 22nd
San Jose, CA: May 27th
Austin, TX: May 29th
Chicago, IL: Sept. 21st
Little Rock AR: Sept. 23rd
Kansas City, KS: Sept. 28th
Hartford, CT: Sept. 30th
Raleigh-Durham, NC: Oct. 2nd
Denver, CO: Oct. 5th
San Jose, CA: Oct. 7th
Austin, TX: Oct. 9th
Sample Topics Include:
Look at what’s forthcoming in the Scoop.IT newsletters or the IAITAM mobile app. Download today by searching IAITAM in the App Store or on Google Play. Please submit any topic or speaker suggestions for 2015 to IMUG@iaitam.org.
|April||Live at the IAITAM Spring ACE||Join IAITAM in a rousing game of Jeopardy featuring a guest panel of IAITAM Fellows as they attempt another bid for the IAITAM Jeopardy crown!||Part two of the session includes a special presentation by IAITAM instructors and open forum discussion on today’s trends. If you would like to submit a question for the panel, do so at IMUG@iaitam.org today!|
|May||12th – TBD||19th – Ask the Fellows
Submit your Questions for this session now at IMUG@iaitam.org to have it included in the session
|26th – Guest speaker from License Dashboard|
If you’d like to listen in on past recordings, just visit the IAITAM website to listen in to previous month’s recordings at this webpage (you must first log into the site with your Member ID): Strategic Information for IT Asset Managers
IAITAM Members can register for one or all and participate in none or all monthly. For questions or to suggest a speaker or topic for the IMUGs, please email email@example.com.
Member’s Monthly Article:
The Importance of BYOD Policies
Lessons from Capitol Hill
BYOD is a commonly understood abbreviation for a business practice known by most organizations around the world. Even in an organization where the practice has not been implemented, BYOD costs and benefits have been compared to determine if the practice fits with the organization’s goals.
The US State Department seems to be the exception where no determination was made. Former Secretary of State Hillary Clinton was using her personal email address to conduct State Department work on personal devices. These devices even included a private server. In light of recent events on Capitol Hill and in the media, and without any political bias, there are lessons to be learned from the actions of Mrs. Clinton as well as the State Department. These lessons shine a spot light on BYOD best practices and why they are important.
Lesson 1: BYOD policies and the use of personal devices should be clearly defined by the organization and communicated. It may seem simple to create a clear policy for BYOD policy within an organization, but the importance of that precision cannot be understated. The policy needs to plainly and explicitly detail the role or lack of role for personal devices with organizational data. Policies are the controls to behavior for employees and the language has to reduce the risk of confusion and misunderstanding.
Of course, a well-written policy that no knows about is not going to control employee behavior. Communicating the policy and its importance to the organization are absolutely essential actions.
Lesson 2: Remember why BYOD became a trend in the first place. With end users becoming more comfortable and reliant on technology, they develop preferences that influence how they wish to interact with work data. These preferences ignited organizational executives with the idea of potential savings on technology while increasing end user productivity at the same time by allowing employees to utilize their own technology. The BYOD trend grew based on this set of goals.
However, some implementations have lost the spirit of those goals. For instance, if rules and standards are too limiting, end users will either abandon the idea entirely or find ways around the current BYOD policy. The rules designed to improve data security may actually create a chaotic, uncontrolled environment. The lesson to learn is to ensure that the BYOD program makes it easy for end users to work and access organization data while maintaining data security and integrity.
Lesson 3: Personal and organization data must be kept separate. This final point touches on the single largest concern of end users which is privacy. By allowing their personal devices to become a part of the BYOD program, they relinquish some control over who has access and what they have access to. BYOD strategies that keep personal and organizational data separate protect end user privacy and respect personal data. At the same time, employees can still access and modify or delete any organizational data. This approach generally leads to a higher adoption rate for the BYOD program and ensures that there are fewer instances where noncompliance becomes an issue.
“3 BYOD mistakes Hillary Clinton made, and how your BYOD policy can avoid them,” Bradley, Tony. 13 March, 2015,
This Month’s Featured Sponsors:
Aspera Technologies, Inc.: Aspera is a highly specialized provider of software asset management solutions to hundreds of enterprises worldwide, including more than 35 Fortune Global 500 companies. Since 2000, our award-winning software and services–including the SmartTrack license management technology–have been successfully implemented in international projects, representing diverse industries such as banking and finance, automotive, telecommunications, and pharmaceuticals. More information is available at www.aspera.com.
Discount Laptop Shop, LLC: Discount Laptop Shop is a leader in IT asset disposition and bulk computer sales. Recognized as the number one fastest growing Microsoft Authorized Refurbisher in the U.S., we have sold more than 1,000,000 desktop and laptops and helped keep more than 5,000,000 lbs of computers and components out of landfills. Dedicated to reducing the flow of e-waste into the environment, DLS acquires used and off-lease computers in bulk. Experts in secure data destruction, our customers rely on DLS to help convert aging IT into cash and DLS is proud to be a part of their corporate social responsibility programs. http://www.discountlaptopshop.com/
Emerset Consulting Group Inc.: Emerset: The Software Licensing Experts At Emerset Consulting Group we provide software licensing audit and renewal consulting services for enterprises that contain costs, avoid overspending, and align your software asset planning with your long term business strategy. With over 500 contracts negotiated and a new licensing contract or audit project closed each week by one of our clients, we are uniquely positioned to guide companies through the licensing, audit and renewal process. Our proven, hands-on approach saves our clients millions of dollars each year on licensing costs for Microsoft, Oracle, IBM and other software vendors, and helps them avoid future costs as their business evolves. Founded in 2004, our staff includes former licensing executives from the world’s largest software vendors, experienced contract negotiators and thought leaders in the industry. Our trusted methodology helps you achieve your IT business and technology roadmap without losing focus on compliance and financial restraints. http://www.emerset.com/
equigroup PTY LTD: WE ARE A TECHNOLOGY FLEET MANAGEMENT COMPANY Technology is a business investment not an overhead, and as such should deliver a solid return. Leading companies today are achieving economies of scale and significant benefits by managing their technology fleet as a whole and connecting silos of procurement, finance and IT. Technology Fleet Management is about lifecycle. From acquisition, to management, to retirement, the technology lifecycle delivers more business value when processes are connected. Our Technology Fleet Management delivers more business value to the lifecycle of your assets. Whatever the business priority, we create the solution. We help customers acquire manage and retire technology assets and combine industry leading finance, systems and services to deliver technology fleet management solutions that create value for our customers. Our mutual choice in partners recognizes the power of synergies in various international markets. Through our partnerships we are able to offer an enhanced range of financial products and support services to our clients, irrespective of size. Each of our partners is a well known and respected financial institution in markets where they operate, bringing to the relationship the same core values of equigroup; integrity, excellence, creativity and unity. This combined with the strength of an organisation that understands customer needs and has built its business on delivering superior outcomes means our customer’s success drives our success. http://www.equigroup.com
Eracent, Inc.: Eracent’s IT Management Center™ (ITMC) provides the comprehensive, accurate information that enables Meaning-Based IT Asset Management™. With Meaning-Based ITAM, you can make confident and effective decisions involving your organization’s network and asset base, supported by an unsurpassed level of current and historical data. ITMC’s real-time network data, software utilization details and asset lifecycle information supports multiple ITAM and SAM programs and processes, including: Software-based Infrastructure Cyber Security Software License Management and Optimization Employee Self-Service Process Automation Standards Management Service Management Cost Reduction http://www.eracent.com/
Flexera Software, LLC: Flexera Software helps application producers and enterprises increase application usage and the value they derive from their software. Our next-generation software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimized software investments and to future-proof businesses against the risks and costs of constantly changing technology. Over 80,000 customers turn to Flexera Software as a trusted and neutral source for the knowledge and expertise we have gained as the marketplace leader for over 25 years and for the automation and intelligence designed into our products. http://www.flexerasoftware.com
Sassafras Software, Inc.: Sassafras Software has been developing Software Asset Management (SAM) tools since 1989. For 20 years K2 – KeyAuditor & KeyServer has been a critical part of license compliance and cost reduction in some of the largest corporate, educational and government organizations worldwide. Sassafras enjoys broad support from software publishers, including many technical partners that rely exclusively on K2-KeyServer technology. Sassafras has been instrumental in driving industry standards for two decades. First as a coauthor of the LS-API specification in the 1990’s. More recently, John Tomeny was a coauthor of the ISO/IEC 19770-2 standard for software identification and currently serves as Convener of the working group developing the ISO/IEC 19770-3 standard for software entitlements. Mr. Tomeny has been recognized by the world’s leading IT/SAM professional associations. Among his recognitions, he was awarded the “IAITAM Fellow” designation – the highest level of professional recognition in the IT Asset Management industry. http://www.sassafras.com
Sims Recycling Solutions, Inc.: Sims Recycling Solutions, (www.SimsRecycling.com) is the global leader in electronics reuse and recycling. We have over 20 years’ experience in comprehensive IT asset disposition and mobile device refurbishment services. Sims provides disposal services for all types of retired electronic equipment to local, national and global customers in every business sector including data centers, healthcare, financial service and technical organizations. As part of Sims Metal Management Limited, the world’s largest publicly listed metal and electronics recycler, Sims Recycling Solutions has the global reach, expertise, and infrastructure to guarantee all devices are processed in a secure and environmentally responsible manner, so that compliance risks are eliminated. Sims international footprint of operations across 20 countries, enable us to offer a global scope of services on myriad local fronts. http://simsrecycling.com/