Deskcenter News

Ensure GDPR data protection with a detailed IT and software asset management

The implementation of the EU General Data Protection Regulation (GDPR) is currently an issue in almost every company. Software Asset Management (SAM) supports companies in meeting the GDPR data protection, earmarking, data minimization and documentation requirements. The legislature granted two years of grace in order to transfer the GDPR data protection requirements into company processes. [...]
Take care of IT security

GDPR compliance through Software Asset Management

LANline | The EU General Data Protection Regulation (GDPR) makes the protection of personal data a company’s responsibility. This is because it is important to manage all data sets and systems on an ongoing basis. This can only be guaranteed if every IT asset is known and the software lifecycle of discovery, software distribution, and […]

Take care of GDPR at IT

The Backbone of the Digital Workplace

The digital workplace is no longer a dream, but has already become a reality. In addition to a fundamental change in the corporate culture, the right technologies, comprehensive IT infrastructure and IT lifecycle management are crucial for successful implementation.

use of digital workplace

How SAM supports GDPR principles

Software Asset Management as the foundation for implementing GDPR principles For a long time software asset management was seen as counting, weighing and measuring and was used to overcome the licence audit. The actual resulting added value was vastly under-estimated. On the one hand SAM prevents under-licensing and corporate risks using subsequent licensing. But homogeneous [...]
IT security and gdpr

IT Asset Management as an effective protection against cybercrime

How a complete Inventory can avoid cybercrime Cybercrime continue to increase and pose security problems to companies. Hackers can gain access to the corporate network through unauthorized hardware and software (keyword: Shadow-IT) and outdated patch and release status. For example, if you encrypt data, thus crippling entire companies, or stealing sensitive company data. This makes [...]
Take care of IT security

Evaluation of a software for client management – What to Consider!

Any scenarios that compromise the security of an IT infrastructure, which we often encounter in practice, are dangerous. They make it more difficult to evaluate a software for client management or a SAM tool. Let us continue to define which specific elements play an important role in this. 1. Evaluate software for client management by [...]
Mobile Monitoring with tablet