Call Us +31 (0)20-4822603|info@itamsoft.com

ITAMSoft Blog

The latest posts about IT Asset Management, Servicedesk, SAM, Ransomware, Spyware and Malvertising

IAITAM EUROPEAN ACE 2018

2018-11-01T20:10:41+00:00November 7th, 2018|

Belarc is a sponsor and speaker at this event. Let's meet in Amsterdam! IAITAM ACE is the world’s leading ITAM conference where CIOs, COOs, CTOs, IT Asset Managers, IT Professionals, Finance Managers, Procurement Professionals, Compliance and Licensing Professionals and Legal Professionals come together to explore the latest in IT Asset Management and its impact on business [...]

Webinar Licensing Microsoft SQL Server and Windows Server (English)

2018-11-01T20:02:31+00:00November 7th, 2018|Tags: |

The webinar will cover software licensing for Microsoft SQL Server and Windows Server products. We will review the license metrics, rules and demonstrate how to achieve compliance with these products. This is an excellent way to prepare for your upcoming audit.

Using IT Asset Management to Help Manage Technology Risk

2018-10-04T21:31:58+00:00October 4th, 2018|Categories: General|

Written by Arvind on September 28, 2018 In modern digital businesses, technology plays a critical role in enabling competitive advantage, operational effectiveness and company success – but that also means that it is a big source of risk.  As the technology dependency grows, managing that risk becomes more critical than ever. IT Asset Management (ITAM) can be an [...]

Gartner IT Sourcing, Procurement, Vendor & Asset Management Summit

2018-02-13T16:41:41+00:00September 25th, 2018|Tags: |

Are you constantly challenged to understand and proactively meet continuously changing IT and business needs? Engaging with IT and business stakeholders and external providers for continuous collaboration is critical to identify and prioritize risks and opportunities to control costs and drive successful business initiatives. These engagements require you to mature your competencies, enhance processes for speed and agility, [...]

Analytics in Freshservice – Enabling Powerful Insights for the Service Desk

2018-06-27T12:23:56+00:00June 27th, 2018|Categories: General|

Written by Sanjeev NC on May 29, 2018 Service desk leaders are struggling with data today. It’s not because they don’t have data; it’s because they can’t draw meaningful insights from it. We realised something important in conversations with our customers.   Currently, they are dependant on expensive BI tools to build a report they want. BI tools [...]

Fileless Network Protection

2018-05-08T13:44:54+00:00May 8th, 2018|Categories: News|

Fileless network protection is a key element to device security and an important part of a layered security strategy. The days of protecting yourself from bad actors using a single AntiVirus (AV) solution are behind us. Attackers can easily avoid detection from signature based software. We discuss just a few of the techniques commonly employed by cyber [...]

Cryptocurrency Mining Protection

2018-03-29T13:57:24+00:00March 29th, 2018|Categories: News|

Cryptocurrency Mining Protection Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money. It is [...]

Trends in Tooling TinT 2018

2018-03-01T13:25:05+00:00March 22nd, 2018|

  Trends in Tooling (TinT) is the tooling congress that is being organized simultaneously with the Service Manager Day on 22 March 2018 in 1931 Congrescentrum 's-Hertogenbosch. The focus of the congress is on IT tooling. Streams such as Automation, Integration, Reporting and ITSM provide insight into what IT-tooling can do to enable IT organizations to [...]

Webinar: Cyber Security Myths and Reality

2018-02-13T16:21:04+00:00March 1st, 2018|

Why focus on potential zero day attacks, when the vast majority of successful attacks use known vulnerabilities?  This short presentation includes a brief analysis of a successful attack on the US Government and then describes a number of common cyber security myths and their real world solutions.  It ends by recommending a standard set of security [...]