Implement IT Asset Management

Create a proactive program that can respond to the dynamic nature of ITAM.

Unlock

This content requires an active subscription.

Access this content by logging in with your Info-Tech Research Group membership or contacting one of our representatives for assistance.

Speak With A Representative Sign In
or Call: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)

Your Challenge

  • Clients are troubled by high hardware and software life-cycle costs.
  • Software licensing audits are increasing in frequency and cost.
  • Insecure assets can result in the leak of sensitive data.
  • Asset managers and service desk managers do not know where to start.

Our Advice

Critical Insight

  • IT asset management (ITAM)’s real value doesn’t emerge from compliance; it comes from strengthening other IT services.
  • Proactive asset management can prevent an audit from happening.
  • Treat ITAM like a process, not a project.

Impact and Result

  • Develop an IT asset management standard operating procedure.
  • Draft a list of technical requirements for an ITAM solution to help generate a shortlist.
  • Save thousands on lost or stagnant equipment and costly data breaches.
  • Improve other processes by leveraging IT asset data.

Implement IT Asset Management

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should implement IT asset management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.


2

Design IT asset intake and maintenance processes

Define the storage, deployment, and maintenance processes of your hardware and software.

3

Design IT asset security and disposal processes

Define an asset security policy and workflows for asset disposal and recovery processes.

Info-Tech Academy

Coming Soon

A series of online courses designed to help your team master the 45 core IT processes.

Built around Info-Tech’s IT Management & Governance framework, the learning content in the Academy is practical, outcome-driven research delivered by top experts in the field.

45 courses. 9 certificates. 1 High Performing Team.

New to Info-Tech Academy? Click here to learn more

Expert Analyst Perspective

Video screengrab
Design IT asset procurement processes
Design IT asset intake and maintenance processes
Design IT asset security and disposal processes
Design IT contract and audit management processes

Onsite Workshop

Book Your Workshop

Onsite workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Define Scope and Procurement

The Purpose

  • Define scope and procurement.

Key Benefits Achieved

  • Scope aligned to business goals.
  • Procurement workflows for hardware and software.

Activities:
Outputs

1.1

Define assets in your organization.

  • Reporting requirements
  • Asset management goals

1.2

Define ITAM roles and responsibilities.

  • RACI chart

1.3

Define standards for hardware procurement.

  • Hardware procurement workflow

1.4

Define standards for software procurement.

  • Software procurement workflow

Module 2: Manage Usage Lifecycle

The Purpose

Define workflows that manage intake through to maintenance.

Key Benefits Achieved

Workflows and asset standards identified.

Activities:
Outputs

2.1

Draft workflows for hardware receiving, inventory, and tracking.

  • Target-state output for hardware inventory

2.2

Draft workflows for software receiving, inventory, and tracking.

  • Target-state output for software inventory

2.3

Draft workflows for hardware deployment and maintenance.

  • Target-state output for hardware deployment and maintenance

2.4

Draft workflows for software deployment and maintenance.

  • Target-state output for software deployment and maintenance

Module 3: Protect Against Data Loss

The Purpose

Establish a strategy to keep your assets and data secure through the end of their life cycle.

Key Benefits Achieved

Designed and completed:

  • Asset Security Policy
  • Asset Disposal Strategy

Activities:
Outputs

3.1

Develop asset security policy.

  • Asset Security Policy

3.2

Define policies, processes, and workflows for hardware disposal/recovery.

  • Hardware Disposal Workflow

3.3

Define policies, processes, and workflows for software retirement/harvest.

  • Software Disposal Workflow

Module 4: Develop the Roadmap

The Purpose

Instill proactive contract management and develop implementation timeline.

Key Benefits Achieved

Designed and completed:

  • Audit defense strategy
  • ITAM roadmap

Activities:
Outputs

4.1

Define contract management processes.

  • Contract Management Policy

4.2

Develop audit management processes.

  • Audit Defense Policy

4.3

Develop an asset management roadmap.

  • Asset Management Roadmap

4.4

Develop a communications plan.

  • ITAM Communication Plan