"
Contact Us
/Blog/

Blog

26 May 2017

WannaCry About Quality Asset Data for Better IT Service Management?

By |May 26th, 2017|Categories: Enterprise Architecture, IT Asset Management, IT Service Management, Security|

Service Desk and IT Service Management (ITSM) solutions enable IT organizations to deliver services to the enterprise to ensure smooth business operations, improve employee productivity, protect against security attacks and maintain competitive advantage
23 May 2017

The Biggest Takeaway from the ‘WannaCry’ Ransomware Attack

By |May 23rd, 2017|Categories: IT Asset Management, IT Service Management, Security, Software Asset Management, Uncategorized|

Effective cybersecurity is mostly about having good actionable data to tell you where your highest priority vulnerabilities are.
7 May 2017

The Top 5 Things to Do at Knowledge17

By |May 7th, 2017|Categories: Enterprise Architecture, IT Asset Management, IT Service Management, Software Asset Management, Uncategorized|

With more than 14,000 people descending into Orlando for Knowledge17, it will be no surprise that for many it will be the first time. Personally, it will be a first for me as well and a worthwhile trip. In the midst of today’s digital world, it provides the unique opportunity to put that human interaction [...]

28 Apr 2017

Which Superhero Are You?

By |April 28th, 2017|Categories: IT Asset Management, IT Service Management, Software Asset Management, Technopedia|

Superman is known for his super-human strength. Spiderman is known not only for his super-human strength, but his reflexes, balance, and “spider-sense”. IT asset managers can be compared to Spiderman because of the multitude of solutions they provide to an organization. Which superhero are you? The 15th IAITAM Spring Annual Conference & Exhibition (ACE) kicks [...]

25 Apr 2017

How to Transition Federal Cybersecurity from Reactive to Proactive

By |April 25th, 2017|Categories: Federal, Security, Uncategorized|

When it comes to cybersecurity, it’s far better to know your risk early and well so you can manage it proactively and on your terms, as opposed to constantly playing catch-up and responding to vulnerabilities only after they’ve been exploited.