Implement IT Asset Management

Create a proactive program that can respond to the dynamic nature of ITAM.

Onsite Workshop


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Organizations that lack asset management will suffer long-term consequences of ad hoc processes and will have little insight into the business, which can lead to:

  • Unnecessary asset procurement
  • High security risk
  • Risk of a failed audit
  • Poor reputation for IT
  • Poor adherence to disposal regulations
  • Unused software
  • Supporting underused software
  • Residual value left on the table

A formidable asset management program can benefit numerous other areas of IT and the business through data collection and quality reporting. Benefits can include:

  • Proper hardware provisioning
  • Clear procurement protocol
  • Audit defense strategy
  • Secure data
  • Value gained from discarded assets
  • Elimination of shelfware and underused software
  • Communication plan for program implementation
  • IT gains favor in the business
  • Proactive demand forecasting thanks to accurate data and reporting

Module 1: Define Scope and Procurement

The Purpose

  • Define scope and procurement.

Key Benefits Achieved

  • Scope aligned to business goals.
  • Procurement workflows for hardware and software.

Activities: Outputs:
1.1 Define assets in your organization.
  • Reporting requirements
  • Asset management goals
1.2 Define ITAM roles and responsibilities.
  • RACI chart
1.3 Define standards for hardware procurement.
  • Hardware procurement workflow
1.4 Define standards for software procurement.
  • Software procurement workflow

Module 2: Manage Usage Lifecycle

The Purpose

Define workflows that manage intake through to maintenance.

Key Benefits Achieved

Workflows and asset standards identified.

Activities: Outputs:
2.1 Draft workflows for hardware receiving, inventory, and tracking.
  • Target-state output for hardware inventory
2.2 Draft workflows for software receiving, inventory, and tracking.
  • Target-state output for software inventory
2.3 Draft workflows for hardware deployment and maintenance.
  • Target-state output for hardware deployment and maintenance
2.4 Draft workflows for software deployment and maintenance.
  • Target-state output for software deployment and maintenance

Module 3: Protect Against Data Loss

The Purpose

Establish a strategy to keep your assets and data secure through the end of their life cycle.

Key Benefits Achieved

Designed and completed:

  • Asset Security Policy
  • Asset Disposal Strategy

Activities: Outputs:
3.1 Develop asset security policy.
  • Asset Security Policy
3.2 Define policies, processes, and workflows for hardware disposal/recovery.
  • Hardware Disposal Workflow
3.3 Define policies, processes, and workflows for software retirement/harvest.
  • Software Disposal Workflow

Module 4: Develop the Roadmap

The Purpose

Instill proactive contract management and develop implementation timeline.

Key Benefits Achieved

Designed and completed:

  • Audit defense strategy
  • ITAM roadmap

Activities: Outputs:
4.1 Define contract management processes.
  • Contract Management Policy
4.2 Develop audit management processes.
  • Audit Defense Policy
4.3 Develop an asset management roadmap.
  • Asset Management Roadmap
4.4 Develop a communications plan.
  • ITAM Communication Plan

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

View Active Workshops
GET HELP Contact Us
VL Methodology