Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Copyright 2006 Systems Alliance, Inc. All rights reserved. Systems Alliance is a trademark of Systems Alliance, Inc. All other trademarks and registered trademarks used herein are the property of their respective owners.
ITAM_WP_11_16_06
Table of Contents
Table of Contents.......................................................................................................................................... 2 Introduction ................................................................................................................................................... 3 The Case for IT Asset Management ............................................................................................................. 3 Procurement .............................................................................................................................................. 3 Deployment & Utilization ........................................................................................................................... 3 Decommission and Disposal ..................................................................................................................... 4 IT Asset Capability Maturity Model ............................................................................................................... 4 IT Asset Management More than an Inventory.......................................................................................... 5 Getting Started With IT Asset Management ................................................................................................. 6 IT Asset Management Effectiveness A Self Assessment .......................................................................... 8 Additional Benefits ........................................................................................................................................ 9 About Systems Alliance ................................................................................................................................ 9
www.systemsalliance.com
Page 2
Introduction
Five years ago, Meta Group reported U.S. corporations wasted $90 billion buying assets already owned, buying the wrong technology, and making lease payments on equipment already returned. Since then IT Asset Management has been increasingly identified as one of the keys to an effective IT operation. A recent Gartner report noted that 75 percent of companies are exposed to the risks of overspending on and sub-optimal use of IT assets and projects, that those companies committing a minimum of three percent of their IT operating budget to IT asset management programs and tools can expect a 25 percent reduction in the total cost of ownership. As the statistics above indicate, there is value to be gained through the effective management of IT assets. All too often though, the fact that IT assets arent being managed effectively, surfaces when a problem arises (e.g., a suspected impropriety creates the need for a reconciliation of invoice data with the assets on hand). Is your company one of the few currently realizing the benefits of effective IT asset management or are you waiting for a problem to spur you to action? In this white paper we provide a quick assessment tool that will help you determine if action is required and if so, how to get started.
Procurement
1. The absence of full life-cycle asset management processes aided and abetted efforts by client employees to engage in fraudulent activities. 2. The absence of reviews and controls around the procurement process enabled the purchase of hardware, software and consumables from spurious entities. 3. The failure to institute periodic pricing reviews hid the fact that asset costs were not in line with market pricing. 4. The failure to reconcile goods received against original purchase orders obscured the fact that components ordered were being replaced by lower-end components. 5. The absence of vendor invoice reviews inhibited the discovery of inconsistencies that would have raised flags months, if not years, sooner.
www.systemsalliance.com
Page 3
and upgrades and increased the time and effort required to provide desktop support to endusers.
Through 2008, 30 percent of large enterprises will experience at least one on-site software audit per year (0.7 probability), Gartner Prepare for Continued Software Audits in the Short Term, Jan 2006
Company Distribution
Source: Gartner Group
High
Utilizing cross-organizational and cross-discipline techniques to maximize asset value and minimize costs Tracking and realizing concrete savings Asset management integrated with back-end systems (e.g. HR, Finance, Help Desk) Leveraging cross-organizational information Formalized processes in place Policies and procedures are linked Asset discovery tool and centralized repository
20%
Reactive
Fire fighting mode Beginning to see policies defined and implemented Rudimentary process development No formalized process Disorganized approach to asset management
Chaotic
Low
www.systemsalliance.com
Page 4
Configuration Management
Application Development
Financials
Help Desk
Procure
Receive
Store
Capacity Management
The failure to manage IT assets through their complete lifecycle ( i.e., from requisition to retirement and disposal) increases the likelihood that a business is a) under utilizing and/or not using software and hardware assets that have been purchased, b) poorly managing vendor relationships and not maximizing organization-wide purchasing power, c) incurring unnecessary and/or inappropriate support expenses, d) incurring inappropriate lease and maintenance expenses, and/or e) using unlicensed software.
Gartner IT and Software Asset Management Summit, Overview, September 18 - 20, 2006.
www.systemsalliance.com
Page 5
A sset T yp e
Asset
A c q u is itio n Cost D a te
M a in t Cost
C o n tra c t D a te s S ta rt End
Process/Step
Observations
Implications
Recommended Actions
Nm ae Gu ro p IP MC A MCAd s O n r A d re s we O S O Tp S ye W 0 2 3 2A 0 -0 -0 -E-C-2 A 3dM sR n A IO 4 4 Cd sO P e 0 y fe Nm K T 6 2 a e S -1 3 G u R D IP 1 .5 .3 .1M C0 1 2 7 5 MCAO C O Or T N roC E IT p re w R O W d w 2 0 ST ro s n l S in o s 0O P e sio a p R Nm KR K2A N RroC E IT DIP 1 .51 .5 .3A30 1021725 -8 -ECd CsO Or TR T N a e S IS3C N EG u R D E IT 0 20 .1M.60 -00 -0 -0 -E MCAO sOweP IO IO p C A 3C C O Wd wd0s2 T pfe ronsio a S inWs2w0S0 ro Piosl n l O 0 s y W T 6S -1 .3 2 4 C -0 -E -C74 3dMOR n A A 3 23 -2 5 4 re M R O N P oin o0 0P e s fea 0 4 Ain W W0o0 2fe sfea nsio in ro WS IS3C N E 4 C E IT D E IT.51 320 .603 10-00 -15755642MORCRNTAHNL G C R OWIOwd0s2w0 0PioPliosl n l K R 6WAT 6 T K2 S N R R D E IT D1 20 .1.3 2 0.10 21720-2 -A3 O3CM OOOET N O Y O P R TdNs2wd0sro0sronsfea a -1 SK -1 2 oin o0 P 0 s C C 0 .3 14 .3-020 -E -C-B -EC-6COC TA IOC O R R .5 2.5 3 -0 -0 -E -8 -A E AP P R IO 3 C TN WS4 00 5 C CE in ro R K CSN6T 4 2 C E IT D E IT.51 320 .103 10207556426EOACTCOO HNH G O YC R OWIOwd0s2w0 0PioPliosl n l IS WATKR-1 4 R D E IT D1 20 .6.3 2 0-07 -10 -1 -E-A31M CRNTA IOOO YC R O A IOTdNs2wd0sro0sronsfea a SKN E2 T -1 C C 0 .3 1 3 2 .10 -E -8 -B -6C-8COO TE T C N L G P P R in W W0o0 2fe sfea nsio R R .5 3.5 .3 -0 -B-A-A -A 0 AP RN N L O O T A oin o0 P 0 s N ON in ro WS -1S4 4T 7 3 C E IT D E IT.51 320 .103 03-10650-6-AA1 TC TC H OTG O YP YA IOOWIOwd0s2w0 0PioPliosl n l K W6WS2 2 R D E IT D1 20 .1.3 2 0.10 500-A-B 160 CCNA CT NO YN LC R TR TR TdNs2wd0sro0sronsfea a TK2-1 4-1 E E N EL O O OP N TK C C 0 .3 10 .3-150 -A-1265 -8C-4O T N O LN H G O C R IO in W W0o0 2fe sfea nsio R R .5 2.5 7 -B -B-A-A -A A C O TE H O C RG P A A oin o0 P 0 s 3 C C WS -1S2 7T O-4 2R D E IT D1 .51 320 .101 .40500-A-001 AETC TE MORGRG P R TR T Wd wd0s2w0 0PioPliosl n l K W4WS3 B 3 3E IT D E IT 20 .1.3 8 3-10 -10651-8-E -6C1N3 OTCLNOOT C A IO IO in W 2wd0s2fe sfea fea a TK4-1 2-L C C C 0 .3 1 .2 .1 208 -A-016 DC-B C C H CO YC YN P A N oinW0o0 ro0sronronsio R s oin P 0 s 0 TK R R .5 73 50 -B -B-A2 -4 A T C NO PL A IOO O N -A C O O E H O O N s WS -238 C E IT D E IT.51 380 2.3-100510-A-0-6 7A -0O MORORGIOO P R T N Wd wd0s2w0 0PioPliosl n l K T 02 R D E IT D1 20 .1.1 203 0 -00621-4-E-8 C C 3EONO PYC IOO A IO in W 2wd0s2fe sfea fea a 13 C 0 .3 13 .40.2-B-A-01 2E 1 T OTCM O A R T N R .5 8 2 -0 -E C -BC 5 N C HCL T A R 6 3 C P RO N W0o0 ro0sronronsio in P 0 s WS -1S3 O-4 K W7T B TK2-L O oin o0 s C R .2 51 D s Ain W W0o0 2fe sfea nsio in ro 0-6 -B 5 WS -LS -23T 4 5 C E IT D E IT.21 120 .2 2-00 -00 -1E -8 -0C-3COCOOOET N L G C R OWIOwd0s2w0 0PioPliosl n l K WO-413 1 R D E IT D1 80 2.3 2 0.2-0 -E 207566 9 MORCRNTAHN O Y O P R TdNs2wd0sro0sronsfea a TKWS8 B0 oin o0 P 0 s TK 2-1 C C 0 .1 .4.5 .3 1021D-E 1 3 O3CM TA IOC O R R .518 03 3 -0 -B-A-8 4 AP P R IO C TN 0 0 -8 C CE ro WS -2S8 4T 4 7 C E IT D E IT.51 320 .203 1020756659643M CRNTAHNH G O YC R OWIOwd0s2w0 0PioPliosl n l K W0WS5 3 R D E IT D1 20 .2.3 2 0.10 -10 -1 -0 -A3 OACTCOO IOOO YC R O A IOTdNs2wd0sro0sronsfea a TK1-1 1-1 T 0 TK C C 0 .3 12 .3-04 -E -8 -B -3C-7COO TE T C N L G P P R in W W0o0 2fe sfea nsio R R .5 0.5 1 -0 -B-A5 -A E AP RN N L O O 3 T A oin oin P 0 s N 5 ON ro WS -1S5 4T OB -1 0D E IT D1 .51 320 .101 .10500-8-B-AA0 TC TC H OTG O YP YA IOTR TdNs2wd0sro0sronsfea n l K W4WS7 B Y 0E IT D E IT 20 .2.3 8 0205-10650-3 36EC2NA NT NO YN LC R TR OWIOwd0s2w0 0PioPliosl a TK1-1 3-L C C C 0 .3 1 .2 .1-101-A-1964 -7C-FO T C O LN H G O C R IO in W W0o0 2fe sfea nsio R R R E N EL O O OP N 0 TK .5 13 4 -B -B-A-A -A A C O TE H O C RG P A A oin oin P 0 s C C ro WS -1S7 O-L -1 0-1 E IT D E IT.51 380 2.3105-10650-7-AA5 TC TC H OTG O YCYA IOTR TdNs2wd0s2fe sfeaiosl n l K W4WS B B Y R D E IT D1 20 .1.1 902 30500-A-B 062CF NA NT NO YN LP R TR OWIOwd0s2w0 0PioPl fea a TK3-L T Y 0 C C C 0 .3 1 1 .10.10 -A-1365 -FC A C O TE LN LC RG C A IO in W W0o0 ro0srons nsio E E N EHO O O N N 0 TK B OB R R .2 4.2 5-1 -B -B-A-A -9 -8O T C O H O G O P P A oin oin P 0 s C C .5 WS -LS -L -1 04 C E IT D E IT.21 1901 30.20 -10651-F-E-FCEN3E MORGRG P R TR T Wd wd0s2w0 0PioPliosl n l K WOBO-1 -1 R D E IT D1 80 2.3 .103 00500-A-0257A2 TC T OTCLNOOT C A IO IO in W 2wd0s2fe sfea fea a TKWYT Y4 B S0 C R s oin P 0 s 0 TK B 4 B C C 0 .1 .122 5-19 -A-006 -8C A C C H CO YC YN P A N oinW0o0 ro0sronronsio R R .215 .3 -B -B-A2 F -5O T N NO PL A IOO O N -9 O EHO O s .5 7 3 C C ON ro WS -LS -1 -1 5 8 C E IT D E IT.21 220 .203 00510-9-0F27A -2O MORORGIOO P R T N Wd wd0s2w0 0PioPliosl n l K WOBS4 2 R D E IT D1 90 .1.3 2 0.50 -00621-8-E-8 C C 3EONO PYC IOO A IO in W 2wd0s2fe sfea fea a TKWYT B4 oinW0o0 ro0srons nsio s oin P 0 s 0 TK4-1 C C 0 .3 15 9 -13 -A-0572 -5 C T OTCM L A R T N R R .5 33 .3 -B -0 -E -F E A N C HP OT A R 02 ON ro Wd wd0s2w0 0PioPliosl n l in W 2wd0s2fe sfea fea a oinW0o0 ro0srons nsio s oin P 0 s 0 WS -1S4 5T 6 3 C E IT D E IT.51 320 .503 11-00 -0 -0E -2C MOROR TR TR T N K W4WS8 1 R D E IT D1 20 .2.3 2 0.10 21721-5 -E-8O3CM O A IOO A IO TK4-1 2-1 TK C C 0 .3 1 .5 .3-020 -E -F 727738 B OC M O P IO R R .5 93 3 -0 -0 -E -8 A -AC 3P C R N C P A W6T OB -2 E IT D E IT.51 320 .101 .10217217A8DC-3COCO A IOTR T N K1-L B Y 0 D E IT D1 20 .5.3 8 1-004-E -0 -2 -E 3EMOROR TR O A IO S3 C 0 .3 1 .2 .1 216-00 -8 -0 -A O3CM M O P IO R 0 -E -8 -3 3 3P C A N 2 B Ws2w0 0PioPliosl n l in o0 2fe sfea fea a d0sro0srons nsio 0 s ro WS -1S8 K W5T TK2-1 C C R R Wd wd0 0 P in W 2w oin o0 s .5 33 20 -0 -0 7 C P N 9 R R .2 6-0 -0 -0 -E 2 -3C E 3P P R N 01B C P ON Ws2w0 0PioPliosl n l in o0 ro0sronsfea a d0s2fe sfea nsio 0 s ro WS -L -2 Y R D E IT D1 .51 380 2.14.1021728D-E 35 MOROR TR TR T N K T YB -1 E IT D E IT 20 .1.1 801 15-00 -0 -A E -4O3CM O A IOO A IO OB C C C 0 .3 11 .10203-E -8 -0-3 D3 -1COC M O A IO WS -1S3 OB 0 K W6T B TK1-L Wd wd0 0 P in W 2w oin o0 s .2 21 C .5 0-3 -3 ro WS -LS -L -2 Y1 C E IT D E IT.21 1804.10.10 -00 -0E 25 -8O3CMOR TR TR T N K WOBO-1 39 R D E IT D1 80 2.1 2.331621D-E -4 -1C MOR O A IOO A IO TKWYT 6 B S0 Wd wd0s2w0 0PioPliosl n l in W 2wd0s2fe sfea fea a oinW0o0 ro0srons nsio s oin P 0 s 0 TK B -1 B C C 0 .1 .11203 40 -E 21D3 738 A OC M O A IO R R .216 5-0 -0 -0 -0 -E E-AC 3P P P N C C N .5 0-4 ON WS -LS -1 -1 6 7 C E IT D E IT.21 1203 40.10 -00 -05728732 MOROR TR TR T N K WOB6T 2 R D E IT D1 80 2.3 .103 1921D-E -8 -AC-7COCO A IOO A IO TKWY 1 B S9 Wd wd0s2w0 0PioPliosl n l in W 2wd0s2fe sfea fea a oinW0o0 ro0sronronsio s oin P 0 s 0 TK3-1 C C 0 .1 .132 6-0 -0 -E 21-1-E-FO3CM M O P IO R R .515 .3 0 -0 -0E A 4 3P C R N C P A s 01 ro WS -1S1 S7 ON C E IT D E IT.51 320 .101 .1021728722736 MOROR TR TR T N K W6W6T A L R D E IT D1 20 .1.3 8 9-006-E -0 -A-E-8O3CM O A IOO A IO TK3-1 2-L Wd wd0s2w0 0PioPliosl n l in W 2wd0sro0sronsfea a oinW0o0 2fe sfea nsio s oin P 0 s 0 TK C C 0 .3 16 .1 212-00 -8 -0A -7C 4 OC M O P IO R R .5 4.2 10 -0 -0 -E -F 4 -EC 3P P A N 3 C C N p Ws2w0o0 2fe0sfessfea a s oin P a .5 2-0 -0 0 272 e 3 3C P IOT N C RO WS -1S7 O-1 3 C E IT D E IT.51 380 2S.10 -00rt-T-8O3CMOR TRtioIO S teWd wd0s2w0 0PioPliosl n l K W6WS N 5 R D E IT D1 20 .1.1 203 h 21721-7 -E 37 rmCO AcP IOT n TK2-L T L -F in oinW d0sro0sronronsio 0 TK A 4 C C 0 .3 19 .10 10o-0 -E -8 -EC MOR M O A R N R R .2 11 .36 3 -E -0 -04674 -0 CO PA O N A WS -LS -1 3 K WON 5 TK T L A4 C E IT D 1 .21 122.10 -00 -0 -0 -E -8 -0C MOR O A IOT N R D E IT 0 80 2.36 30 1021726747 3 O3CM R TR IO .1 .13 -0 -E -8 -E Wd wd0s2 0 ro Pio slio a in W 2w 0P fe sfea n l oin o0 0 srons s 0 CO P P A C ON C R .5 WS -1 3 KT 45 C E IT RD 1 .5 .3 .1 D0e1 2 7 7 re3 O C R O A IO s se t d a ta o s2 0 P fe s n l 0 2 3 3 0 fin e -0 q u ire R T a -0 -0 -E -8 3 C M O P d N Wd w 0 0 ro s io a in
W k #1 W k #2 W k #3 W k #4
When working with clients, C o n d u ct c om p re h e ns ive a s s e t d is c o v e r y Systems Alliance often begins an IT asset management initiative with a rapid assessment and strategy phase that is focused on validating objectives, reviewing existing asset data and management processes, identifying shortfalls and developing a strategy for filling IT asset management related gaps. Additional byproducts of this stage are the development of a high-level process flow (if none exists) and the definition of short-term action steps.
2. Tool Evaluation and Selection: It would be a mistake to think that simply implementing a tool will enable a company to improve alignment of business and IT strategy, control IT purchases, avoid noncompliance, improve technology ROI and maximize operational efficiency. That said, automated tools are increasingly a key component of effective IT asset management programs. As an example, a CMDB (configuration management data base) is a core component of the asset management process as defined by ITIL (Information Technology Infrastructure Library). A number of commercially available tools have the ability to provide much of the data that would reside in a CMDB as described by ITIL. The key challenge companies face is the selection of a tool or tools
Evaluator:
Your Company Name: ____________________________________________ Requirements - Content Creation I. Functional Prepared by: Date:
The system shall have the ability to handle the broad array of AOPA content types, including: MS Office documents, Email, HTML documents, docum ents created through the Adobe InDesign Suite, Quark docum ents, and 1.1 Im age files. The system shall accom modate content created with AOPA client authoring tools and support current and previous releases of these tools, including MS Office applications such as W ord, Quark, the Adobe InDesign Suite, and HTML 1.2 editors such as GoLive. The system shall provide AOPA users with the ability to create, modify, and 1.3 delete content within the W CMS. The user interface shall be intuitive and content creation and maintenance m ust be easy to facilitate use by non-technical content authors. 1.4 The system shall facilitate the creation of web pages with a consistent look and 1.5 feel via tem plates and style sheets. The system supports cascading style sheets. 1.6 The system shall support multi-user authoring to accom modate AOPA's 1.7 collaborative authoring process. The system shall support the creation and m aintenance of m etadata to 1.8 maximize the search capabilities of AOPA users. The system shall enable the separation of content and presentation to facilitate 1.9 publishing of AOPA content to m ultiple form ats. Objects such as im ages, docum ents, and links are easily incorporated into 1.10 content.
W eight
Rating
Score
1.00
0 .00
1.00
0 .00
1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 10.00 N/A
Im port (both internal Name Required Product Features and external content), Storage, Categorization, eight and WSearch, Rating 2.1 Archiving. Title Evaluation Summary m ust integrate with Verity. 0 .00 2.2 The search capability 1 thru 5 Data1.00 LiveState Net 1.00 0 .00 Address 2.3 The search capability m ust span all AOPA content types. The system must provide the capability to m anage content related metadata. Protector Recovery Backup 1.00 0 .00 across User Initiated Backupthe support for backupThe system mustfunctionality that,administer m eta tag standards 2 the E (M) and restore provide the ability to if deemed 1.00 2.5 site. Phone appropriate, could be initiated by a user, thereby minimizing administrator intervention ifthe user to sort search The system shall provide AOPA internal users with a ability 0.50 results according to the following criteria: Relevance, Date, Author, and Content Fax needs to simply restore a single file. Type (e.g. e-newsletter, email, article, and press release). 2.4
1.00
0 .00
M.00 0
0 .00
E (M) Im age that results shall generate and display a full Incremental Backupthe ability to backup only filessearchhave changed since the lastgraphical view of the file 2 1.00 M (N) http (thumbnail) instead of just a file icon to decrease the tim e spent by AOPA users backup, thereby reducing the amount of data to backup. 2.7 to find a specific image. # Staff
2.8 computer type. M (E) M(N) Remote Backupthe ability to backup a usersAOPA contentwhen it is not connected to the office 2 A structured approach to categorization is provided to ensure consistency (e.g. 1.00 LAN, such as when they are working fromhome.2 use of pull down menus). 2.9 the Categorization capabilities shall include the ability to classify content by the
2.6
1.00
Outlook PST Backupdepending on the vendors implementation of the functionality, the ability to backup an Outlook PST file while it is in use, or to backup the file in an incremental fashion. This functionality reduces the risk that the file will be restored incorrectly and minimizes the size of the backup data. Synchronizationdefined as updating the backup imageATEGORY SCas changes are being for a client ORE: TOTAL C made to a data file.
III. Functional Requirements - Publishing
The list of AOPA content types used for categorization can be added, deleted, 2.10 and m odified by authorized AOPA users. The system shall support the syndication of content, including the distribution of 2.11 content with a hyperlink to the AOPA website. The system shall provide a reporting capability 2.12 2.13 The system shall control the usage of licensed digital assets.
E (M)
M(N)
The system shall enable personalization of the information presented on the 2.14 hom e page based on the users profile.
2 5
11.16
M(N)
N/A
0.00
Shared File Exclusionthe ability to recognize the same file across multiple clients and only save a single copy of a file, thereby reducing the amount of storage necessary and minimizing redundant files.
Weight: 1 = most important, 5 = least important
M (E)
N (M)
Rating: E = exceeds requirements, M = meets requirements, N = does not meet requirements; Where 2 ratings are presented, the first rating was selected by the majority
www.systemsalliance.com
Page 6
that meet the specific needs defined and are a fit for the company from a technology and operational perspective. A disciplined evaluation and selection process is critical to success. The use of proven request for proposal and product evaluation templates can often be used to expedite the process, facilitating the definition of detailed, client-specific requirements, the actual evaluation process, and the collection and summarization of vendor and tool evaluation results. Systems Alliance leverages a Delphi evaluation tool to help clients define the relative priority of various product requirements and to evaluate alternative products in consideration of those priorities.
3. Implementation Planning: It happens all the time. Companies do a rigorous job of tool evaluation and selection, but end up with an unsuccessful implementation. More often than not, the problem can be traced to issues in the implementation planning process. The keys to successful implementation planning for IT asset management are not unlike those for other projects.
C a le n d a r D e p lo y m e n t ta s k s
W k#1 W k#2 W k#3 W k#4 W k#5 W k#6 W k#7 W k#8 W k#9 W k#10 W k#11W k#12
P r o je c t K ic k o f f
V a lid a t e p r o je c t c h a r t e r & p la n A s s e m b le p r o je c t t e a m
P r o c e s s D e f in it io n
Id e n t if y k e y p r o c e s s c o m p o n e n t s
D e f in in g s ta f f in g r e q u ir e m e n t s , R s a n d R s D e f in e p e r f o r m a n c e m e t r ic s
H a r d w a r e /S o ftw a re A c q u is itio n
L ic e n s e IT A M to o l
V a lid a t e h a r d w a r e r e q u ir e m e n t s A c q u ir e r e q u ir e d h a r d w a r e In s ta ll s o f t w a r e / h a r d w a r e
P r o je c t C o m p le t io n & S h u t - d o w n
P r o je c t M a n a g e m e n t C h e c k p o in t s
Clearly defined project objectives and deliverables help to focus the project team and assure expectations are aligned. Identification of the project sponsor and definition of the governance structure increase the likelihood that critical decisions will be made on a timely basis. The definition of tool acquisition, integration and implementation tasks provides those involved with a clear view of all tool specific activities and their interrelationships. Identifying and addressing related process changes helps assure operational as well as technology issues are being considered. The inclusion of communication and change management tasks in the plan addresses an often overlooked component of most every implementation effort (i.e. the people impacted). The definition of key resource requirements (e.g. staff, budget) assures the required commitment and level of investment are understood before the project is initiated. The chances for successful implementation of an IT Asset Management solution increase dramatically when the implementation plan meets each of the requirements listed above.
www.systemsalliance.com
Page 7
(Illustrative)
4. Deployment: While the implementation plan provides the roadmap for deployment, successful execution of the plan will Pull from DecomRequest Deploy Manage result in the deployment of the asset Inventory mission Upgrade management solution and the delivery of a roadmap for ongoing asset Procure Receive Store management in the form of process and tool documentation and training.
Requestor Web Enters in request data Requestor System Spreadsheet/Web Uploads line itemdata into request (optional) Approver(s) Web Enters in Approval Confirmation Web & E-Mail Acknowledges receipt, returns request ID System E-Mail Acknowledges Approval/Denial to all parties
Disposal
The documentation should provide detail for each process step including the role involved, the activity performed, the tool or interface used and the result produced.
Legend
ITRole Asset Interface Information Activity Repository
Figure 6
As noted in figure 6, an asset information repository is required to house asset specific information and facilitate asset related reporting.
Quick Assessment
Do you have an accurate inventory of IT assets (hardware and software)? Do you know where your IT assets are located? Do you monitor IT asset utilization levels? Do you know how much your IT assets cost and the specific business functions they support? Are you leveraging your purchasing power? Are the appropriate license and maintenance agreements in place? Are you getting the support you need? Are you paying only for the support you need? Are you accurately depreciating and amortizing your IT assets ? Are assets decommissioned and disposed of on a timely basis?
Yes
No
One or more no (or I dont know) answers could be an indication that you have some work to do.
www.systemsalliance.com
Page 8
Additional Benefits
If inhibiting fraudulent activity and reducing the potential downside of a BSA or SIIA audit are not benefit enough, implementing an IT asset management program can provide value in other ways. An effective IT asset management program can also: Facilitate the location of information about assets that enables the organization to secure those assets from threats and remediate vulnerabilities. Keep track of assets that must be turned in and properly disposed of so issues related to security, intellectual property rights, licensing compliance, regulatory concerns and environmental risks do not arise. Facilitate the provision of asset ownership, utilization and lifecycle maintenance information for use during contract negotiation and renewal discussions. Enable the identification of redundant and/or underutilized assets, helping to reduce overall IT costs. Enable the collection of asset usage information for use during budgeting, planning and cost-allocation processes. Facilitate the development of effective exit strategies for obsolete technologies.
To find out more about how your organization could benefit from IT Asset Management, contact ITAM@systemsalliance.com
www.systemsalliance.com
Page 9