Implement Hardware Asset Management

Build IT services value on the foundation of a proactive asset management program.

Onsite Workshop

Implementing hardware asset management without a plan can result in:

  • Inconsistent standards and unfinished processes.
  • Lack of dedicated resources to maintain the program.
  • Underutilized or inaccurate data.

Hardware asset management implementation planning leads to:

  • Cost savings.
  • More accurate planning and budgeting.
  • Accurate data on hardware capacity and lifecycles.
  • More efficient service delivery.

Module 1: Lay Foundations

The Purpose

  • Build the foundations for the program to succeed.

Key Benefits Achieved

  • Evaluation of current challenges and maturity level
  • Defined scope for HAM program
  • Defined roles and responsibilities
  • Identified metrics and reporting requirements

Activities: Outputs:
1.1 Outline hardware asset management challenges.
1.2 Conduct HAM maturity assessment.
  • HAM Maturity Assessment
1.3 Classify hardware assets to define scope of the program.
  • Classified hardware assets
1.4 Define responsibilities.
  • Job description templates
1.5 Use a RACI chart to determine roles.
  • RACI Chart
1.6 Identify HAM metrics and reporting requirements.

Module 2: Procure & Receive

The Purpose

  • Define processes for requesting, procuring, receiving, and deploying hardware.

Key Benefits Achieved

  • Defined standard and non-standard requests for hardware
  • Documented procurement, receiving, and deployment processes
  • Standardized asset tagging method

Activities: Outputs:
2.1 Identify IT asset procurement challenges.
2.2 Define standard hardware requests.
2.3 Document standard hardware request procedure.
2.4 Build a non-standard hardware request form.
  • Non-standard hardware request form
2.5 Make lease vs. buy decisions for hardware assets.
  • Procurement workflow
2.6 Document procurement workflow.
2.7 Select appropriate asset tagging method.
2.8 Design workflow for receiving and inventorying equipment.
  • Receiving and tagging workflow
2.9 Document the deployment workflow(s).
  • Deployment workflow

Module 3: Maintain & Dispose

The Purpose

  • Define processes and policies for managing, securing, and maintaining assets then disposing or redeploying them.

Key Benefits Achieved

  • Policies and processes for hardware maintenance and asset security
  • Documented workflows for hardware disposal and recovery/redeployment

Activities: Outputs:
3.1 Build a MAC policy, request form, and workflow.
  • User move workflow
3.2 Design process and policies for hardware maintenance, warranty, and support documentation handling.
3.3 Revise or create an asset security policy.
  • Asset security policy
3.4 Identify challenges with IT asset recovery and disposal and design hardware asset recovery and disposal workflows.
  • Asset disposition policy, recovery and disposal workflows

Module 4: Plan Implementation

The Purpose

  • Select tools, plan the hardware budget, then build a communication plan and roadmap to implement the project.

Key Benefits Achieved

  • Shortlist of ITAM tools
  • Hardware asset budget plan
  • Communication plan and HAM implementation roadmap

Activities: Outputs:
4.1 Generate a shortlist of ITAM tools that will meet requirements.
4.2 Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget.
  • HAM budget
4.3 Build HAM policies.
  • Additional HAM policies
4.4 Develop a communication plan.
  • HAM communication plan
4.5 Develop a HAM implementation roadmap.
  • HAM roadmap tool

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
GET HELP Contact Us
×
VL Methodology