Please enable JavaScript.
Coggle requires JavaScript to display documents.
ITAM Review - ITAD Positioning (HAM Risk (Privacy & Regulatory…
ITAM Review - ITAD Positioning
HAM Risk
Subscription licensing reducing license audit risk
Hardware exploits
Meltdown
Spectre
Firmware faults
HPE SSD timebomb
Concern over state-sponsored spying (Huawei)
Intersection between hardware and software
Cisco switches
Right to Repair (John Deere)
Increasing focus on sustainability
Circular economy
Philanthropy
Low consumption economy
Buying hardware in a recession
Privacy & Regulatory Requirements
GDPR
HIPAA
CCPA
SHIELD
Chain of Custody
State actors
Guaranteed wipe of mobile devices
Morgan Stanley
IoT
GPU-based devices
Micro devices - Raspberry Pi, Arduino
ASICs
Industrial Device exploits
Remote Work
Device Logistics
Break/fix
Warranty info
Returns
Onboarding/Offboarding
Physical Security
Ability to track devices
Device ownership
Personal
Company
Hybrid
Internet as corp network
Foundations
Similarities with SAM
Hardware impacts on software compliance
Discovery is key
Requires clean normalised data
Continuous, real-time monitoring
Needs executive buy-in/champion
Differences
Importance of location
Devices that aren't end-user devices
Devices where agent-based discovery doesn't work
Reclaim is a physical process
Management of OEM license rights/imaging
Data destruction
Levels of Maturity
Executive Support
Definition of scope
HAM lifecycle
Reports and KPIs