Implement IT Asset Management

Create a proactive program that can respond to the dynamic nature of ITAM.

Onsite Workshop

Organizations that lack asset management will suffer long-term consequences of ad hoc processes and will have little insight into the business, which can lead to:

  • Unnecessary asset procurement
  • High security risk
  • Risk of a failed audit
  • Poor reputation for IT
  • Poor adherence to disposal regulations
  • Unused software
  • Supporting underused software
  • Residual value left on the table

A formidable asset management program can benefit numerous other areas of IT and the business through data collection and quality reporting. Benefits can include:

  • Proper hardware provisioning
  • Clear procurement protocol
  • Audit defense strategy
  • Secure data
  • Value gained from discarded assets
  • Elimination of shelfware and underused software
  • Communication plan for program implementation
  • IT gains favor in the business
  • Proactive demand forecasting thanks to accurate data and reporting

Module 1: Define Scope and Procurement

The Purpose

  • Define scope and procurement.

Key Benefits Achieved

  • Scope aligned to business goals.
  • Procurement workflows for hardware and software.

Activities: Outputs:
1.1 Define assets in your organization.
  • Reporting requirements
  • Asset management goals
1.2 Define ITAM roles and responsibilities.
  • RACI chart
1.3 Define standards for hardware procurement.
  • Hardware procurement workflow
1.4 Define standards for software procurement.
  • Software procurement workflow

Module 2: Manage Usage Lifecycle

The Purpose

Define workflows that manage intake through to maintenance.

Key Benefits Achieved

Workflows and asset standards identified.

Activities: Outputs:
2.1 Draft workflows for hardware receiving, inventory, and tracking.
  • Target-state output for hardware inventory
2.2 Draft workflows for software receiving, inventory, and tracking.
  • Target-state output for software inventory
2.3 Draft workflows for hardware deployment and maintenance.
  • Target-state output for hardware deployment and maintenance
2.4 Draft workflows for software deployment and maintenance.
  • Target-state output for software deployment and maintenance

Module 3: Protect Against Data Loss

The Purpose

Establish a strategy to keep your assets and data secure through the end of their life cycle.

Key Benefits Achieved

Designed and completed:

  • Asset Security Policy
  • Asset Disposal Strategy

Activities: Outputs:
3.1 Develop asset security policy.
  • Asset Security Policy
3.2 Define policies, processes, and workflows for hardware disposal/recovery.
  • Hardware Disposal Workflow
3.3 Define policies, processes, and workflows for software retirement/harvest.
  • Software Disposal Workflow

Module 4: Develop the Roadmap

The Purpose

Instill proactive contract management and develop implementation timeline.

Key Benefits Achieved

Designed and completed:

  • Audit defense strategy
  • ITAM roadmap

Activities: Outputs:
4.1 Define contract management processes.
  • Contract Management Policy
4.2 Develop audit management processes.
  • Audit Defense Policy
4.3 Develop an asset management roadmap.
  • Asset Management Roadmap
4.4 Develop a communications plan.
  • ITAM Communication Plan

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
GET HELP Contact Us
VL Methodology