IT asset management (ITAM) is becoming more complex and challenging, as the definition of “IT assets” expands and evolves. We believe recent research from Gartner details many of these changes, and makes specific recommendations for addressing them.
If you were to build a fence around your house to keep out the wild animals, it would not make sense to leave a portion of that fence incomplete. In fact, any gap in your fence would invalidate the purpose …Read more
According to the dictionary, “agility” is defined as the ability to move quickly and easily. When this is applied to IT and software asset management (ITAM/SAM) it involves being prepared to respond quickly to business direction or technology changes and …Read more
With technological change accelerating at a rapid pace, businesses are always on the lookout for ways to gain a competitive advantage. Keeping an eye on upcoming tech trends is a must. But what trends will improve your asset management program, …Read more
We had some questions, and as expected, our Chief Technologist for EMEA, Simon Townsend, had some answers.
As a product expert with Ivanti, your travels frequently take you to conferences and expos, meetings / presentations with customers and prospects, product… Read more
Automation can make IT at your enterprise more secure, more efficient, and more valuable to your business. It can have personal benefits for you and your team as well.
Automation and Productivity
“Automation will change the daily work activities of …Read more
It’s a bird! It’s a plane! It’s Ivanti at the IAITAM 2017 Spring ACE Conference!
In just a few short weeks, we’ll get the chance to see each other’s inner superhero at the IAITAM 2017 Spring ACE Conference. …Read more
It’s been a busy news week. We announced on Wednesday, April 12, that we just acquired former Ivanti One partner, Concorde Solutions!
Based in Reading, U.K., Concorde helps manage complex software license agreements associated with products like those offered by
Sure, you’ve heard of and are probably dealing right now with “shadow IT”—users deploying unauthorized, insecure workarounds in response to processes and policies they don’t like or understand. But what are you doing about voodoo IT?
You may never …Read more