Risk Event Action Plan

Integrate IT risk management with business risk management by creating a paper trail for key risks.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

M&A Software Asset Maturity Assessment

This template will examine the maturity of your current M&A readiness and software asset management practices.

License Inventory

This tool will help during an M&A when creating a license inventory for both organizations. It will be critical to keep track of important license-related information,...

M&A Software Asset RACI Template

This template will help you assign responsibilities to staff on your cross functional audit team.

Don’t Allow Software Licensing to Derail Your M&A – Phase 3: Pre-Integration Planning

This phase of the blueprint, Don’t Allow Software Licensing to Derail Your M&A, will examine pre-integration planning processes from conducting an internal software...

Be Wary of Unwanted Windows 10 Updates

Many users are reporting unwanted updates to Windows 10 as Microsoft continues to drive adoption toward its newest OS platform.

Understand Common IT Contract Provisions to Negotiate More Effectively

Info-Tech’s guidance and insights will help you navigate the complex process of contract review and identify the key details necessary to maximize the protections for...
  • guided implementation icon

Controlled Vendor Communications Letter

Establish a single point of contact and create a communication vacuum to help leverage your negotiation position.

Vendor Communication Management Plan

Most SaaS purchases involve a broad range of stakeholders -- create and implement a plan to ensure effective communication throughout the negotiation process.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us