www . AmericanSecurityToday . com August 2021 - Edition 57
Finally , connecting ITAM with ITSM can provide insight into the applications installed throughout the organization , which can enhance software compliance practices .
This visibility enables IT to run reports on versioning and uti- lization , which can fuel more proactive operations .
Extracting this information can show whether unauthorized software is installed — poten- tially compromising the se- curity of agency hardware — or if there ’ s an overage of unli- censed software being used , which could result in increased expenses or worse : a security risk .
Using Automation to Mit- igate Risk
With access to a device ’ s inci- dent history paired with ad- ditional information , such as an expiring warranty or the absence of antivirus software , teams can more effectively identify and manage poten- tial security threats .
Automating how these risks
47