SlideShare a Scribd company logo
Where is IT Asset
Management in ITIL?
Nicole Conboy, NCA
IT Service & Asset Management Consultant
NCA 2006 2
What is “IT Asset Management”?
 Inventory Collection
“What”
 Asset Tracking
“Where / Who”
 SW License Management
“How Used”
 IT Asset Management
“How Much”
 Configuration Management
“How Related”
1000 1000122
200
Net
Book
Value
Configuration
Items (CI’s)
?
NCA 2006 3
How do you do IT Asset Management?
Inventory Collection
 Snapshot of IT assets (wall to wall)
 Requires an inventory repository
 Use of scan tools will increase accuracy and efficiency
Asset Tracking
 Requires Change Management (or IMAC) to authorize changes and
notify asset data base administrator
 Requires an asset repository and scan tools/site visit to verify DB
 Requires user verification for accuracy (use Incident Management)
HW and/or SW IT Asset Management (full lifecycle management)
 Uses ITIL Incident, Change, Release, Configuration, Capacity,
Financial and Service Level Management processes
 Requires interface to Contract Management (Warranty, Maintenance)
 Understand TCO of IT Assets
 Requires accurate reports
NCA 2006 4
What about Software License and
Configuration Management?
Software License Management (metering and monitoring)
 Requires Asset DB, Metering/Monitoring tools, Discovery tools, DSL
 Uses ITIL Change, Financial, Capacity, Configuration and Release
Management processes
 Requires interface to Contract Management, Procurement
 Requires HW Asset tracking
Configuration Management
 Requires CMDB (with functionality to define relationships)
 Discovery tools will increase accuracy
 Uses NW diagrams and build information
 Includes documentation
 Requires Change and Release Management for accuracy
 Service Level Management will ensure success through continuous
improvement, SLA’s, UC’s and OLAs
NCA 2006 5
ITIL processes assisting with IT
Asset Management
Configuratio
n
Management
Plan and Identify CI’s, Control CMDB, Track CI Status through lifecycle
Audit/Verify CI Data, Produce reports
Change
Management
Authorizes changes to CI’s/assets
Financial
Management
for IT
Assists with determining budgets, depreciation methods
Allocates cost types to assets (CIs)
Uses HW/SW costs/details for use in cost models, plans, TCO
Release
Management
Orders HW/SW for release – maintains DSL and DHS
Maintains Documentation (licenses, contracts, procedures)
Capacity
Management
Determines correct capacity of resources (CI’s) for business (plans)
Monitor usage and allocate licenses accordingly
Incident
Management
Service Request = Standard Change, procedures to update CMDB
Report CI discrepancies
Service Level
Management
Define requirements, deliverables for IT Asset Services
Create SLA, UC, OLA
NCA 2006 6
ITIL’s Software Asset Management
book
 Assists with business case and benefits
 Provides guidance on implementation
 Identifies potential CI’s and attributes to track
 Describes license types
 Discusses tools
Not prescriptive!
Implementing
Asset/Configuration
Management
NCA 2006 8
Why invest in IT Asset or
Configuration Management?
 Legal compliance i.e. Sarbanes-Oxley, Privacy
 Software license compliance
 Assist high-availability
 Improve management of IT resources (people, tools)
 Increase user efficiency
 Reuse of assets/Recovery of lost assets
 Timely lease returns
 Relieve tax burdens
 Secure, timely product removal
 Address vendor challenges or invoice errors
 Improve warranty service
NCA 2006 9
Use a standard improvement method
Measurements
Implement
Plan
Assess
Vision High level business objectives and
requirements
Understand where you are - strengths/weaknesses
in people, processes, technology, investment
Where you want to be and target
timeframe
Activities to close gap to target
KPI’s to determine if the target was met
Continuous
Improvement
NCA 2006 10
Complexity
Payback
Mainframe
Desktop Software
Network
PDATelecom
Cable
Server
Cellular
Printer
Laptop
Select CI’s with the highest ROI
Docs
Wireless
NCA 2006 11
Use a phased approach
Inventory Collection
Asset Tracking
Configuration Management
HW Asset Management
SW Asset Management
SW License Management
by:
 Asset type
 Configuration Item
 Location
 Customer Group
 Service
NCA 2006 12
Don’t forget the CSF’s!
 People
 Process Manager, Configuration Librarian, SME’s,
training, ownership, roles and responsibilities, etc.
 Processes
 Configuration, Change, Financial, Release, Capacity,
Incident, Policies, Procedures, Work Instructions, etc.
 Technology
 CMDB, Scan tools, DSL, metering/monitoring tools, order
tools, etc.
 Information
 Data, reports, exceptions, audits, recommendations,
plans, etc.
NCA 2006 13
Additional tips for success
 Determine who owns the program (IT, Finance, Procurement?)
 Create Program Governance
 Establish a Process Owner/Process Manager
 Identify SME’s for each asset class and function in the lifecycle
 Manage the program with Key Performance Indicators (KPI’s)
 Include requirements in SLA’s, OLA’s and UC’s
 Promote understanding/compliance with policies, process, standards
 Standardize procedures to improve activities
 Ensure financial and audit controls are in place
 Assess, implement and integrate tools to enable the process
 Provide common and consistent interfaces for asset acquisition,
financial management and disposal across the organization
 Enable information to be easily accessible in a timely manner
 Reduce the cost of managing assets
 Establish a continuous improvement program to add value
 Keep it simple
NCA 2006 14
Thank You!
Nicole Conboy
Nicole Conboy & Associates
(416)203-1840
nconboy@sympatico.ca
NCA Partners:
Ahead Technology, Burntsand, Micromation Inc.,
Procept Associates, Tony Grice & Associates

More Related Content

What's hot

CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
Evergreen Systems
 
Fatca ready reckoner
Fatca ready reckonerFatca ready reckoner
EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
Jackie Luo
 
Configuration Management Maturity
Configuration Management MaturityConfiguration Management Maturity
Configuration Management Maturity
Michaël Danys
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
Jackie Luo
 
Clearpriority Operational Intelligence Platform
Clearpriority Operational Intelligence PlatformClearpriority Operational Intelligence Platform
Clearpriority Operational Intelligence Platform
Clearpriority
 

What's hot (6)

CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
CMDB - Strategic Role in IT Services - Configuration Management Moves Front a...
 
Fatca ready reckoner
Fatca ready reckonerFatca ready reckoner
Fatca ready reckoner
 
EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Configuration Management Maturity
Configuration Management MaturityConfiguration Management Maturity
Configuration Management Maturity
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
 
Clearpriority Operational Intelligence Platform
Clearpriority Operational Intelligence PlatformClearpriority Operational Intelligence Platform
Clearpriority Operational Intelligence Platform
 

Similar to Asset management for itsmf nicole conboy, nca

ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
jogemwind
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL Presentation
Ron Drew
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
RamPrasad Kurakula
 
MOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIAMOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIA
Daya Cipta Mandiri Solusi, PT
 
The Information Office
The Information OfficeThe Information Office
The Information Office
Mahesh Patwardhan
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
Mark S. Mahre
 
ITIL and Service Management
ITIL and Service ManagementITIL and Service Management
ITIL and Service Management
William Buddy Gillespie ITIL Certified
 
Solusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSMSolusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSM
Daya Cipta Mandiri Solusi, PT
 
Motadata ITSM DCMS
Motadata ITSM DCMSMotadata ITSM DCMS
Motadata ITSM DCMS
Fanky Christian
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
Antonio Rolle
 
Itilv3
Itilv3Itilv3
Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008
mhormech
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentation
mhormech
 
Itilv3
Itilv3Itilv3
Itilv3
renukac1010
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunum
alperdogu
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
ThirumalainambiMurug
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmt
paramalways
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet
 
About itil v3
About itil v3About itil v3
About itil v3
Abdulfattah Awajah
 
BMC Software_BMCITSM_TheCloudaction.pptx
BMC Software_BMCITSM_TheCloudaction.pptxBMC Software_BMCITSM_TheCloudaction.pptx
BMC Software_BMCITSM_TheCloudaction.pptx
Cloudaction
 

Similar to Asset management for itsmf nicole conboy, nca (20)

ITIL version 2: Foundation Training
ITIL version 2: Foundation TrainingITIL version 2: Foundation Training
ITIL version 2: Foundation Training
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL Presentation
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
 
MOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIAMOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIA
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
ClearCost Introduction 2015
ClearCost Introduction 2015ClearCost Introduction 2015
ClearCost Introduction 2015
 
ITIL and Service Management
ITIL and Service ManagementITIL and Service Management
ITIL and Service Management
 
Solusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSMSolusi Helpdesk ITSM dengan Motadata ITSM
Solusi Helpdesk ITSM dengan Motadata ITSM
 
Motadata ITSM DCMS
Motadata ITSM DCMSMotadata ITSM DCMS
Motadata ITSM DCMS
 
A Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli EnvironmentA Practical Guide to CMDB Deployment in a Tivoli Environment
A Practical Guide to CMDB Deployment in a Tivoli Environment
 
Itilv3
Itilv3Itilv3
Itilv3
 
Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentation
 
Itilv3
Itilv3Itilv3
Itilv3
 
ITIL Dolphin Sunum
ITIL Dolphin SunumITIL Dolphin Sunum
ITIL Dolphin Sunum
 
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.pptL2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
L2 - ITIL v3 - Overview, SV Strategy, SV Design.ppt
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmt
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
About itil v3
About itil v3About itil v3
About itil v3
 
BMC Software_BMCITSM_TheCloudaction.pptx
BMC Software_BMCITSM_TheCloudaction.pptxBMC Software_BMCITSM_TheCloudaction.pptx
BMC Software_BMCITSM_TheCloudaction.pptx
 

More from wardell henley

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
wardell henley
 
mita_overview.pdf
mita_overview.pdfmita_overview.pdf
mita_overview.pdf
wardell henley
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
wardell henley
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdf
wardell henley
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdf
wardell henley
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdf
wardell henley
 
Mn bfdsprivacy
Mn bfdsprivacyMn bfdsprivacy
Mn bfdsprivacy
wardell henley
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp
wardell henley
 
It security cert_508
It security cert_508It security cert_508
It security cert_508
wardell henley
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paper
wardell henley
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
wardell henley
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen
wardell henley
 
Soa security2
Soa security2Soa security2
Soa security2
wardell henley
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178
wardell henley
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
wardell henley
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
wardell henley
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandards
wardell henley
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
wardell henley
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Management
wardell henley
 
oracle EBS
oracle EBSoracle EBS
oracle EBS
wardell henley
 

More from wardell henley (20)

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
mita_overview.pdf
mita_overview.pdfmita_overview.pdf
mita_overview.pdf
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdf
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdf
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdf
 
Mn bfdsprivacy
Mn bfdsprivacyMn bfdsprivacy
Mn bfdsprivacy
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp
 
It security cert_508
It security cert_508It security cert_508
It security cert_508
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paper
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen
 
Soa security2
Soa security2Soa security2
Soa security2
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandards
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Management
 
oracle EBS
oracle EBSoracle EBS
oracle EBS
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Asset management for itsmf nicole conboy, nca

  • 1. Where is IT Asset Management in ITIL? Nicole Conboy, NCA IT Service & Asset Management Consultant
  • 2. NCA 2006 2 What is “IT Asset Management”?  Inventory Collection “What”  Asset Tracking “Where / Who”  SW License Management “How Used”  IT Asset Management “How Much”  Configuration Management “How Related” 1000 1000122 200 Net Book Value Configuration Items (CI’s) ?
  • 3. NCA 2006 3 How do you do IT Asset Management? Inventory Collection  Snapshot of IT assets (wall to wall)  Requires an inventory repository  Use of scan tools will increase accuracy and efficiency Asset Tracking  Requires Change Management (or IMAC) to authorize changes and notify asset data base administrator  Requires an asset repository and scan tools/site visit to verify DB  Requires user verification for accuracy (use Incident Management) HW and/or SW IT Asset Management (full lifecycle management)  Uses ITIL Incident, Change, Release, Configuration, Capacity, Financial and Service Level Management processes  Requires interface to Contract Management (Warranty, Maintenance)  Understand TCO of IT Assets  Requires accurate reports
  • 4. NCA 2006 4 What about Software License and Configuration Management? Software License Management (metering and monitoring)  Requires Asset DB, Metering/Monitoring tools, Discovery tools, DSL  Uses ITIL Change, Financial, Capacity, Configuration and Release Management processes  Requires interface to Contract Management, Procurement  Requires HW Asset tracking Configuration Management  Requires CMDB (with functionality to define relationships)  Discovery tools will increase accuracy  Uses NW diagrams and build information  Includes documentation  Requires Change and Release Management for accuracy  Service Level Management will ensure success through continuous improvement, SLA’s, UC’s and OLAs
  • 5. NCA 2006 5 ITIL processes assisting with IT Asset Management Configuratio n Management Plan and Identify CI’s, Control CMDB, Track CI Status through lifecycle Audit/Verify CI Data, Produce reports Change Management Authorizes changes to CI’s/assets Financial Management for IT Assists with determining budgets, depreciation methods Allocates cost types to assets (CIs) Uses HW/SW costs/details for use in cost models, plans, TCO Release Management Orders HW/SW for release – maintains DSL and DHS Maintains Documentation (licenses, contracts, procedures) Capacity Management Determines correct capacity of resources (CI’s) for business (plans) Monitor usage and allocate licenses accordingly Incident Management Service Request = Standard Change, procedures to update CMDB Report CI discrepancies Service Level Management Define requirements, deliverables for IT Asset Services Create SLA, UC, OLA
  • 6. NCA 2006 6 ITIL’s Software Asset Management book  Assists with business case and benefits  Provides guidance on implementation  Identifies potential CI’s and attributes to track  Describes license types  Discusses tools Not prescriptive!
  • 8. NCA 2006 8 Why invest in IT Asset or Configuration Management?  Legal compliance i.e. Sarbanes-Oxley, Privacy  Software license compliance  Assist high-availability  Improve management of IT resources (people, tools)  Increase user efficiency  Reuse of assets/Recovery of lost assets  Timely lease returns  Relieve tax burdens  Secure, timely product removal  Address vendor challenges or invoice errors  Improve warranty service
  • 9. NCA 2006 9 Use a standard improvement method Measurements Implement Plan Assess Vision High level business objectives and requirements Understand where you are - strengths/weaknesses in people, processes, technology, investment Where you want to be and target timeframe Activities to close gap to target KPI’s to determine if the target was met Continuous Improvement
  • 10. NCA 2006 10 Complexity Payback Mainframe Desktop Software Network PDATelecom Cable Server Cellular Printer Laptop Select CI’s with the highest ROI Docs Wireless
  • 11. NCA 2006 11 Use a phased approach Inventory Collection Asset Tracking Configuration Management HW Asset Management SW Asset Management SW License Management by:  Asset type  Configuration Item  Location  Customer Group  Service
  • 12. NCA 2006 12 Don’t forget the CSF’s!  People  Process Manager, Configuration Librarian, SME’s, training, ownership, roles and responsibilities, etc.  Processes  Configuration, Change, Financial, Release, Capacity, Incident, Policies, Procedures, Work Instructions, etc.  Technology  CMDB, Scan tools, DSL, metering/monitoring tools, order tools, etc.  Information  Data, reports, exceptions, audits, recommendations, plans, etc.
  • 13. NCA 2006 13 Additional tips for success  Determine who owns the program (IT, Finance, Procurement?)  Create Program Governance  Establish a Process Owner/Process Manager  Identify SME’s for each asset class and function in the lifecycle  Manage the program with Key Performance Indicators (KPI’s)  Include requirements in SLA’s, OLA’s and UC’s  Promote understanding/compliance with policies, process, standards  Standardize procedures to improve activities  Ensure financial and audit controls are in place  Assess, implement and integrate tools to enable the process  Provide common and consistent interfaces for asset acquisition, financial management and disposal across the organization  Enable information to be easily accessible in a timely manner  Reduce the cost of managing assets  Establish a continuous improvement program to add value  Keep it simple
  • 14. NCA 2006 14 Thank You! Nicole Conboy Nicole Conboy & Associates (416)203-1840 nconboy@sympatico.ca NCA Partners: Ahead Technology, Burntsand, Micromation Inc., Procept Associates, Tony Grice & Associates