<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>OTOM - ITAM xPerts</title>
	<atom:link href="https://www.xpertbook.de/category/otom/feed" rel="self" type="application/rss+xml" />
	<link>https://www.xpertbook.de</link>
	<description>IT Assetmanagment Hangout</description>
	<lastBuildDate>Sat, 14 Sep 2024 17:29:29 +0000</lastBuildDate>
	<language>de</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://i0.wp.com/www.xpertbook.de/wp-content/uploads/2017/07/cropped-ITAMfeatures.png?fit=32%2C32&#038;ssl=1</url>
	<title>OTOM - ITAM xPerts</title>
	<link>https://www.xpertbook.de</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">115756485</site>	<item>
		<title>ITAM 2.0: Die Evolution des IT Assetmanagements</title>
		<link>https://www.xpertbook.de/itam-2-0-die-evolution-des-it-asset-managements#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=itam-2-0-die-evolution-des-it-asset-managements</link>
					<comments>https://www.xpertbook.de/itam-2-0-die-evolution-des-it-asset-managements#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sun, 04 Jun 2023 10:49:50 +0000</pubDate>
				<category><![CDATA[Asset Tracking]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[ITSM]]></category>
		<category><![CDATA[OTAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<category><![CDATA[Configuration Management]]></category>
		<category><![CDATA[IT Assetmanagement]]></category>
		<category><![CDATA[SAM]]></category>
		<category><![CDATA[Software Asset Management]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=989</guid>

					<description><![CDATA[<p>Genaue Anlagendaten ermöglichen nicht nur eine bessere finanzielle Entscheidungsfindung, sondern unterstützen auch andere ITSM-Funktionen wie Incident Management, Problem Management und Change Management. So kann ITAM IT-Dienstleistern dabei helfen, Mitarbeitern und externen Kunden bessere IT-Services und -Support zu bieten, und Unternehmen dabei unterstützen, Technologie-Assets besser zu nutzen, um sich von der Konkurrenz abzuheben."</p>
<p>The post <a href="https://www.xpertbook.de/itam-2-0-die-evolution-des-it-asset-managements">ITAM 2.0: Die Evolution des IT Assetmanagements</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/itam-2-0-die-evolution-des-it-asset-managements/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">989</post-id>	</item>
		<item>
		<title>Take Security to the Next Level With the Top 5 CIS Critical Security Controls — The Leading IT Management Blog &#124; Ivanti</title>
		<link>https://www.xpertbook.de/take-security-to-the-next-level-with-the-top-5-cis-critical-security-controls-the-leading-it-management-blog-ivanti#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=take-security-to-the-next-level-with-the-top-5-cis-critical-security-controls-the-leading-it-management-blog-ivanti</link>
					<comments>https://www.xpertbook.de/take-security-to-the-next-level-with-the-top-5-cis-critical-security-controls-the-leading-it-management-blog-ivanti#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sun, 04 Mar 2018 17:50:10 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[ITSM]]></category>
		<category><![CDATA[OTOM]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=518</guid>

					<description><![CDATA[<p>Take Security to the Next Level With the Top 5 CIS Critical Security Controls — The Leading IT Management Blog &#124; IvantiTo make a focused security strategy your organization’s reality, you need a strong security framework. When Security and IT Operations teams work together to promote a focused security solution built on common processes and [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/take-security-to-the-next-level-with-the-top-5-cis-critical-security-controls-the-leading-it-management-blog-ivanti">Take Security to the Next Level With the Top 5 CIS Critical Security Controls — The Leading IT Management Blog | Ivanti</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/take-security-to-the-next-level-with-the-top-5-cis-critical-security-controls-the-leading-it-management-blog-ivanti/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">518</post-id>	</item>
		<item>
		<title>10 Things You Shouldn&#8217;t Include in Your Security Awareness Training Program — Spiceworks Community</title>
		<link>https://www.xpertbook.de/10-things-you-shouldnt-include-in-your-security-awareness-training-program-spiceworks-community#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-things-you-shouldnt-include-in-your-security-awareness-training-program-spiceworks-community</link>
					<comments>https://www.xpertbook.de/10-things-you-shouldnt-include-in-your-security-awareness-training-program-spiceworks-community#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sat, 03 Feb 2018 15:36:03 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[OTAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=476</guid>

					<description><![CDATA[<p>If you want to succeed with your organization&#8217;s security awareness program, here are some of the top &#8222;faux-pas&#8220; you should be sure to avoid. Here are some of the errors we have seen over the years that you do not want to make. 1) AVOID: Singling out employees that click on a phishing link and… über [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/10-things-you-shouldnt-include-in-your-security-awareness-training-program-spiceworks-community">10 Things You Shouldn’t Include in Your Security Awareness Training Program — Spiceworks Community</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/10-things-you-shouldnt-include-in-your-security-awareness-training-program-spiceworks-community/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">476</post-id>	</item>
		<item>
		<title>Processor flaws cause Cyber Security panic, What can ITAM do to help? &#8211; first appeared on ITAMREVIEW</title>
		<link>https://www.xpertbook.de/processor-flaws-cause-cyber-security-panic-what-can-itam-do-to-help-first-appeared-on-itamreview#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=processor-flaws-cause-cyber-security-panic-what-can-itam-do-to-help-first-appeared-on-itamreview</link>
					<comments>https://www.xpertbook.de/processor-flaws-cause-cyber-security-panic-what-can-itam-do-to-help-first-appeared-on-itamreview#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 08:10:17 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[OTAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Discovery]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=497</guid>

					<description><![CDATA[<p>first appeared at THE ITAM REVIEW Jan 30th, 2018 · 0 Comment Spectre and Meltdown, two major CPU based vulnerabilities recently discovered by Google’s “Project Zero” team, have caused quite the stir over the first couple of weeks of 2018. Their ability to allow attackers to steal sensitive data from the memory of processors and [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/processor-flaws-cause-cyber-security-panic-what-can-itam-do-to-help-first-appeared-on-itamreview">Processor flaws cause Cyber Security panic, What can ITAM do to help? – first appeared on ITAMREVIEW</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/processor-flaws-cause-cyber-security-panic-what-can-itam-do-to-help-first-appeared-on-itamreview/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">497</post-id>	</item>
		<item>
		<title>Ransomware, The Cyberthreat That Keeps On Growing #Infographic — Visualistan</title>
		<link>https://www.xpertbook.de/ransomware-the-cyberthreat-that-keeps-on-growing-infographic-visualistan#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware-the-cyberthreat-that-keeps-on-growing-infographic-visualistan</link>
					<comments>https://www.xpertbook.de/ransomware-the-cyberthreat-that-keeps-on-growing-infographic-visualistan#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 07:12:14 +0000</pubDate>
				<category><![CDATA[Asset Tracking]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Infographics]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<category><![CDATA[Infographic]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spectre]]></category>
		<category><![CDATA[wannacry]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=492</guid>

					<description><![CDATA[<p>Ransomware is the cyberthreat that shows no signs of slowing down. The malicious malware has seen a resurgence in recent years, with 2016 dubbed ‘the year of Ransomware’ and the worldwide WannaCry and Petya/NotPetya attacks in 2017 that brought Ransomware into the mainstream arguably for the first time. über Ransomware, The Cyberthreat That Keeps On Growing [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/ransomware-the-cyberthreat-that-keeps-on-growing-infographic-visualistan">Ransomware, The Cyberthreat That Keeps On Growing #Infographic — Visualistan</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/ransomware-the-cyberthreat-that-keeps-on-growing-infographic-visualistan/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">492</post-id>	</item>
		<item>
		<title>Meltdown and Spectre: What you need to know! — The Leading IT Management Blog &#124; Ivanti</title>
		<link>https://www.xpertbook.de/meltdown-and-spectre-what-you-need-to-know-the-leading-it-management-blog-ivanti#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=meltdown-and-spectre-what-you-need-to-know-the-leading-it-management-blog-ivanti</link>
					<comments>https://www.xpertbook.de/meltdown-and-spectre-what-you-need-to-know-the-leading-it-management-blog-ivanti#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sat, 20 Jan 2018 16:09:27 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[ITSM]]></category>
		<category><![CDATA[OTOM]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Meltdown]]></category>
		<category><![CDATA[Spectre]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=482</guid>

					<description><![CDATA[<p>Meltdown and Spectre: What you need to know! — The Leading IT Management Blog &#124; Ivanti Here we are at the start of 2018 with a significant security issue that has a known resolution ready to go. Sound familiar? Well it probably should because we started 2017 pretty much the same way. 1.317 weitere Wörter über [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/meltdown-and-spectre-what-you-need-to-know-the-leading-it-management-blog-ivanti">Meltdown and Spectre: What you need to know! — The Leading IT Management Blog | Ivanti</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/meltdown-and-spectre-what-you-need-to-know-the-leading-it-management-blog-ivanti/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">482</post-id>	</item>
		<item>
		<title>Transforming the Patching Process — Ivanti Blog</title>
		<link>https://www.xpertbook.de/transforming-the-patching-process-ivanti-blog#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=transforming-the-patching-process-ivanti-blog</link>
					<comments>https://www.xpertbook.de/transforming-the-patching-process-ivanti-blog#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sun, 24 Dec 2017 11:12:07 +0000</pubDate>
				<category><![CDATA[Asset Tracking]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=466</guid>

					<description><![CDATA[<p>The Future of Automated Patching Organizations are also using automated patching to scan for missing patches, discover and patch virtual servers and systems that are not continuously connected to the enterprise network (e.g., laptops), ensure patching is consistently applied across the enterprise, verify patching for auditors, and maintain compliance with the Payment Card Industry Data… über [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/transforming-the-patching-process-ivanti-blog">Transforming the Patching Process — Ivanti Blog</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/transforming-the-patching-process-ivanti-blog/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">466</post-id>	</item>
		<item>
		<title>The Ivanti Threat Thursday Update for December 7, 2017: A Skills Gap? Or a Skills Chasm? — Ivanti Blog</title>
		<link>https://www.xpertbook.de/the-ivanti-threat-thursday-update-for-december-7-2017-a-skills-gap-or-a-skills-chasm-ivanti-blog#utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-ivanti-threat-thursday-update-for-december-7-2017-a-skills-gap-or-a-skills-chasm-ivanti-blog</link>
					<comments>https://www.xpertbook.de/the-ivanti-threat-thursday-update-for-december-7-2017-a-skills-gap-or-a-skills-chasm-ivanti-blog#respond</comments>
		
		<dc:creator><![CDATA[Marc]]></dc:creator>
		<pubDate>Sat, 09 Dec 2017 08:00:01 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[ITAM]]></category>
		<category><![CDATA[OTOM]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">http://www.xpertbook.de/?p=456</guid>

					<description><![CDATA[<p>The Ivanti Threat Thursday Update for December 7, 2017: A Skills Gap? Or a Skills Chasm? — Ivanti BlogGreetings and welcome. This week, new survey results indicate the cybersecurity skills gap is persistent, tenacious, and likely growing. Got relevant opinions, reactions, and/or suggestions? … 944 weitere Wörter über The Ivanti Threat Thursday Update for December 7, [&#8230;]</p>
<p>The post <a href="https://www.xpertbook.de/the-ivanti-threat-thursday-update-for-december-7-2017-a-skills-gap-or-a-skills-chasm-ivanti-blog">The Ivanti Threat Thursday Update for December 7, 2017: A Skills Gap? Or a Skills Chasm? — Ivanti Blog</a> first appeared on <a href="https://www.xpertbook.de">ITAM xPerts</a>.</p>]]></description>
		
					<wfw:commentRss>https://www.xpertbook.de/the-ivanti-threat-thursday-update-for-december-7-2017-a-skills-gap-or-a-skills-chasm-ivanti-blog/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">456</post-id>	</item>
	</channel>
</rss>
