IT asset management News
December 19, 2014
The FBI pointed to North Korea as the culprit behind the Sony Pictures security breach, and reports hint the foreign government may have gotten inside help. Also on Searchlight: Yahoo CEO Marissa Mayer's flawed attempts to channel Steve Jobs; ...
September 30, 2014
Big data needs better questions; local data concierges might be the next information governance trend; and the downside of data: The Data Mill reports.
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
January 16, 2014
In this SearchCIO interview, Walgreens CFO Wade Miquelon talks about IT strategy and the difference between a good idea and capturing business value.
IT asset management Get Started
Bring yourself up to speed with our introductory content
Data currency is monetary value assigned to data so that it can be used as the unit of exchange in a transaction either as the sole payment or in combination with money. Continue Reading
A key risk indicator (KRI) is a metric for measuring the likelihood that the combined probability of an event and its consequence will exceed the organization's risk appetite and have a profoundly negative impact on an organization's ability to be ... Continue Reading
Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic goals. Continue Reading
Evaluate IT asset management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
To align configuration management and asset management processes, ITSM expert Derek Lonsdale says start with the data and use an integrated tool set. Continue Reading
IBM CIO Jeanette Horan is testing out role-based management for IT delivery, with job function the determining factor behind such programs as BYOD. Continue Reading
Shadow IT should be a serious concern for all CIOs in an age of self-service technology. Here's how to get a grip on it. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: I like the distributed model of IT360 like the central and probe model. • Improvements to My Organization: An example is...Continue Reading
We're able to see the most common issues and then automate them, reducing the number of helpdesk calls. However, the pricing model for add-on products could be improved.Powered by IT Central Station
Valuable Features: One of the biggest features is its flexibility. It has out of the box functionality (incident, problem, change, etc.) that can...Continue Reading
We've found the Service Desk and Workflow modules to be the most valuable features, but customer-specific tools customization needs improvement.Powered by IT Central Station
Valuable Features: The Service Desk module and the Workflow module, which is extremely powerful. • Room for Improvement: Graphical User...Continue Reading
Manage IT asset management
Learn to apply best practices and optimize your operations.
With more users turning to external IT platforms to meet business needs, IT professionals must take steps to start managing shadow IT. Continue Reading
Gartner's Doug Laney lays out six models CIOs can use to measure the value of corporate data right now. Continue Reading
Elevating data to asset status can pave the way for innovation and cultural change. Continue Reading
Problem Solve IT asset management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In part five of this webcast series, find out how to improve IT governance support at your company to mitigate shadow IT and improve IT-business collaboration. Continue Reading
CIO tip: Companies are getting serious about risk management plans -- and leaning on CIOs to help them. Continue Reading
IT asset management expert Barb Rembiesa explains how ITAM best practices like IT asset standardization and rationalization reduce IT security risk. Continue Reading