The ITAM Review

News, reviews and resources for worldwide ITAM, SAM and Licensing professionals.

Tag: security

Articles

  • The business case for IT Asset Lifecycle Automation

    This article is a collaboration between AJ Witt of The ITAM Review and Paul King, Senior Consultant at DeskCenter Solutions. In it, we discuss how IT Asset Lifecycle Automation delivers business value, reduces the burden on IT, and delights your users. Executive Summary Digital Transformation...

  • Market Guide – Cloud Access Security Brokers (CASB)

    CASB vendors This month’s Market Guide looks at Cloud Access Security Brokers (CASB). These tools, usually maintained by network or security teams, are a key component in governing cloud deployments, particularly SaaS. Their purpose is to discover, monitor, control, and secure access...

  • Engaging IT Security Operations in your ITAM Programme

    This article is the third of a four part series by AJ Witt of ITAM Review written in collaboration with ServiceNow’s Ryan Wood-Taylor & Peter Beruk. The series outlines how a strategic ITAM practice will deliver enhanced business value through creation of strategic stakeholder...

  • Sophos Cloud Optix – you can’t secure what you can’t see

    Sophos, the British FTSE 250 security company, have launched a dedicated public cloud security product – Cloud Optix. Cloud Security As many benefits as the public cloud can provide, it can also offer an equal – perhaps greater – number of potential security threats. Managing...

  • Getting a head start with Internet of Things

    There are many new areas of technology being talked about these days and, as an ITAM manager, it isn’t always easy to fully understand what they are and how they will impact the world of IT asset management. Security as an ITAM stakeholder With the growing links between ITAM and...

  • Ticketmaster data breach – “it wasn’t me”

    The recent Ticketmaster breach is perhaps the first large-scale breach in our brave new GDPR-regulated world, and it warrants further analysis. As the dust has settled each party has spun the story in a different way, and there has been far more public disclosure of exactly what happened...

  • It is time to Talk (Talk) Security

    It seems with each passing day; we see another story of a cyber security breach. After doing some research, I found that each day, we, in fact, have nearly two. In research published by the Identity Theft Resource Center (ITRC), since 2005, there have been a total of 5029 breaches,...

  • Cybersecurity and unused Software

    ‘I don’t mean to suggest that dealing with cybersecurity challenges can always be overcome with effective IT Asset Management, but it certainly reduces the size of the hole that is probably already in your organization’ This article has been contributed by Peter Beruk...

FREE WHITE PAPER

An IT Asset Manager’s Introduction to Internet of Things