Last week, a California-based Healthcare system was struck with a ransomware attack. There are lessons to take away from this attack, no matter the industry in which you work.
Providers, hospitals and medical device manufacturers can use the company’s Cyber Supply Chain Risk Management application to minimize software-based security risks.
ITAM and security should be aligned and go hand-in-hand.
A good ITAM program requires reliable inventory and discovery as its foundation. A good security program requires the same. The basis of any security program is recognizing your IT assets – hardware and software – so that you can secure them.
Eracent is pleased to announce the release of IT Management Center™ (ITMC) version 10.2.15. This version enhances Eracent’s Software Asset Management (SAM) functionality, expands Discovery coverage and improves product usability.