AST *Fully Interactive* Magazine | Page 47

www . AmericanSecurityToday . com August 2021 - Edition 57

Finally , connecting ITAM with ITSM can provide insight into the applications installed throughout the organization , which can enhance software compliance practices .

This visibility enables IT to run reports on versioning and uti- lization , which can fuel more proactive operations .

Extracting this information can show whether unauthorized software is installed poten- tially compromising the se- curity of agency hardware or if there s an overage of unli- censed software being used , which could result in increased expenses or worse : a security risk .

Using Automation to Mit- igate Risk

With access to a device s inci- dent history paired with ad- ditional information , such as an expiring warranty or the absence of antivirus software , teams can more effectively identify and manage poten- tial security threats .

Automating how these risks

47