Book Image

Pocket CIO – The Guide to Successful IT Asset Management

By : Phara McLachlan
Book Image

Pocket CIO – The Guide to Successful IT Asset Management

By: Phara McLachlan

Overview of this book

This book is a detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents. It is a step-by-step IT Asset Management manual for the newbies as well as the seasoned ITAM veterans, providing a unique insight into asset management. It discusses how risk management has changed over time and the possible solutions needed to address the new normal. This book is your perfect guide to create holistic IT Asset Management and Software Asset Management programs that close the risk gaps, increases productivity and results in cost efficiencies. It allows the IT Asset Managers, Software Asset Managers, and/or the full ITAM program team to take a deep dive by using the templates offered in the guidebook. You will be aware of the specific roles and responsibilities for every aspect of IT Asset Management, Software Asset Management, and Software License Compliance Audit Response. By the end of this book, you will be well aware of what IT and Software Asset Management is all about and the different steps, processes, and roles required to truly master it.
Table of Contents (13 chapters)
Title Page
Dedication
Packt Upsell
Contributors
Preface

Key benefits of ITAM


Success in ITAM requires development of road maps, business cases, practical metrics, time lines, and accountability. Control of IT hardware and software asset costs throughout their life cycles is essential to success.

There are nine key benefits that are derived from ITAM; you should expect all of these outcomes, depending on the scope of your ITAM goals:

  • Accountability for assets, services, and their costs
  • A road map to best practices
  • Practical steps to reach all relevant compliance requirements
  • Timely and accurate assessments of future asset needs to meet business and technology initiatives
  • An improved position of strength for managing vendors and contracts
  • Consistent and proactive software and license management
  • Reduced support costs
  • Ability to proactively manage service-level agreements (SLAs)
  • Reduced security risk by highlighting vulnerabilities on unsupported software and noncompliant software instances