IT asset management


IT asset management (ITAM) is the set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. Assets include all elements of software and hardware that are found in the business environment.[1]


IT asset management (also called IT inventory management) is an important part of an organization's strategy. It usually involves gathering detailed hardware and software inventory information which is then used to make decisions about hardware and software purchases and redistribution. IT inventory management helps organizations manage their systems more effectively and saves time and money by avoiding unnecessary asset purchases and promoting the harvesting of existing resources. Organizations that develop and maintain an effective IT asset management program further minimize the incremental risks and related costs of advancing IT portfolio infrastructure projects based on old, incomplete and/or less accurate information.




Contents





  • 1 Hardware Asset Management


  • 2 Role of IT asset management in an organization


  • 3 IT Asset Disposition


  • 4 ISO


  • 5 Process


  • 6 See also


  • 7 References




Hardware Asset Management


Hardware asset management entails the management of the physical components of computers and computer networks, from acquisition through disposal. Common business practices include request and approval process, procurement management, life cycle management, redeployment and disposal management. A key component is capturing the financial information about the hardware life cycle which aids the organization in making business decisions based on meaningful and measurable financial objectives.


Software Asset Management is a similar process, focusing on software assets, including licenses, versions and installed endpoints.



Role of IT asset management in an organization


The IT Asset Management function is the primary point of accountability for the life-cycle management of information technology assets throughout the organization.


Included in this responsibility are development and maintenance of policies, standards, processes, systems and measurements that enable the organization to manage the IT Asset Portfolio with respect to risk, cost, control, IT Governance, compliance and business performance objectives as established by the business.


IT Asset Management uses integrated software solutions that work with all departments that are involved in the procurement, deployment, management and expense reporting of IT assets.



IT Asset Disposition


When assets need to be removed from the enterprise, they move through various disposition processes. Commonly they are handed over to an IT Asset Disposition vendor to be recycled or destroyed. Assets should be managed properly after going offline to ensure they do not get lost prior to reaching the vendor. The vendor of choice should then have secure procedures for tracking assets during the entire time of their possession. After proper disposal, the vendor provides a certificate of destruction with the serial numbers of assets they destroyed and recycled. The company should then verify the serial numbers on their certificate of destruction with the assets they know they handed over to the vendor. Tracking assets that are offline, prior to disposal, should be approached with the same efficiency and security as when those same assets are online. A good method for choosing a destruction vendor is to find a NAID certified company (USA) or an ADISA certified vendor (UK & Europe). They have a corporate responsibility to dispose of e-waste properly to ensure a healthy environment. Look into donation programs in your area.



ISO


The International Standards Organization (ISO) has a family of standards for IT Asset Management. The ISO 19770 family consists of 5 major parts,


  • 19770-1 is a process related standard which outlines best practices for IT Asset Management in an organization.[2] The latest revision dates to 2012 and breaks ITAM processes down into 4 tiers in a maturity matrix.

  • 19770-2 is a standard for machine encapsulation (in the form of an XML file known as a SWID tag) of inventory data – allowing users to easily identify what software is deployed on a given device. Initially published in 2009, this standard was revised in 2015.[3]

  • 19770-3 is a standard which provides a schema for machine encapsulation of entitlements and rights associated with software licenses.[4] The records (known as ENT’s) will describe all entitlements and rights attendant to a piece of software and the method for measurement of license/entitlement consumption. This standard was published in 2016.[5]

  • 19770-4 allows for standardized reporting of utilization of resources. This is crucial when considering complex data-centre license types and for management of cloud based software and hardware (SaaS and IaaS). 19770-4 was published in 2017.

  • 19770-5:2015 provides an overview of ITAM, which is the subject of the ISO/IEC 19770 family of standards, and defines related terms. ISO/IEC 19770-5:2015 is applicable to all types of organization (e.g. commercial enterprises, government agencies, non-profit organizations). A free copy of the overview and vocabulary is available.[6]


Process


ITAM business practices are process-driven and matured through iterative and focused improvements. Most successful ITAM programs are invasive to the organization, involving everyone at some level, such as end users (educating on compliance), budget managers (redeployment as a choice), IT service departments (providing information on warranties), and finance (invoice reconciliation, updates for fixed asset inventories).


IT asset management generally uses automation, to manage the discovery of assets, so inventory can be compared to license entitlements. Full business management of IT assets requires a repository of multiple types of information about the asset, as well as integration with other systems such as supply chain, help desk, procurement and HR systems and ITSM.


For small and medium-sized businesses, a solution might not have to be so robust as to influence many departments. However, IT assets still need to be tracked for risk management, accurate resource and budget allocation, and accountability of assets' whereabouts. A good solution for small businesses will enable them to search for assets they currently own, manage online and offline assets, and plan accurately for the future. These tasks, however, should be simple, secure and efficient because a small business IT professional's time is very valuable.



See also


  • Configuration management database

  • ISO/IEC 19770

  • License manager

  • Software licensing audit


References




  1. ^ "IT Asset Management (ITAM)". Gartner. 18 May 2013. Retrieved 2019-01-15. IT asset management (ITAM) provides an accurate account of technology asset lifecycle costs and risks to maximize the business value of technology strategy, architecture, funding, contractual and sourcing decisions..mw-parser-output cite.citationfont-style:inherit.mw-parser-output .citation qquotes:"""""""'""'".mw-parser-output .citation .cs1-lock-free abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .citation .cs1-lock-limited a,.mw-parser-output .citation .cs1-lock-registration abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .citation .cs1-lock-subscription abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registrationcolor:#555.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration spanborder-bottom:1px dotted;cursor:help.mw-parser-output .cs1-ws-icon abackground:url("//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Wikisource-logo.svg/12px-Wikisource-logo.svg.png")no-repeat;background-position:right .1em center.mw-parser-output code.cs1-codecolor:inherit;background:inherit;border:inherit;padding:inherit.mw-parser-output .cs1-hidden-errordisplay:none;font-size:100%.mw-parser-output .cs1-visible-errorfont-size:100%.mw-parser-output .cs1-maintdisplay:none;color:#33aa33;margin-left:0.3em.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-formatfont-size:95%.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-leftpadding-left:0.2em.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-rightpadding-right:0.2em


  2. ^ "ISO/IEC 19770-1:2017". International Organization for Standardization. Retrieved 2019-01-15. (Subscription required (help)). ISO/IEC 19770-1:2017 specifies requirements for an IT asset management system within the context of the organization.


  3. ^ "ISO/IEC 19770-2:2015". International Organization for Standardization. Retrieved 2019-01-15. (Subscription required (help)). ISO/IEC 19770-2:2015 establishes specifications for tagging software to optimize its identification and management.


  4. ^ "ISO/IEC 19770-3:2016". International Organization for Standardization. Retrieved 2019-01-15. (Subscription required (help)). ISO/IEC 19770-3:2016 establishes a set of terms and definitions which may be used when discussing software entitlements.


  5. ^ "Machine Learning, Blockchain, IoT and the future of ITAM". The ITAM Review. 1 February 2018. Retrieved 2019-01-15. The advent of -2 and -3 ISO/IEC 19770 tags means that, in the future, software entitlement and inventory records could be machine readable and fully automated.


  6. ^ "Publicly Available Standards". International Organization for Standardization. Retrieved 2019-01-15.









這個網誌中的熱門文章

How to read a connectionString WITH PROVIDER in .NET Core?

Museum of Modern and Contemporary Art of Trento and Rovereto

In R, how to develop a multiplot heatmap.2 figure showing key labels successfully