SlideShare a Scribd company logo
Strategies for Effective Hardware 
and Software Asset Management 
Michael Glanert 
ICT19S #CAWorld 
Systems Made Simple 
ITAM Practice Lead 
ca Intellicenter
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
Pro-actively managing IT assets and effectively planning for what’s next are not easy in increasingly complex IT environments. Hear about a government agency's journey to successful implementation of hardware and software asset management.Walk away with more in your toolbox to aid your own journey to building a sound strategic and tactical approach to IT Asset Management solutions from CA Technologies. 
Michael Glanert 
Systems Made Simple 
ITAM Practice Lead
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Today’s Objectives 
WHERE TO START 
THE HOLISTIC LIFECYCLE APPROACH 
MAKING DATA HIGHLY AVAILABLE TO STAKEHOLDERS 
PROACTIVE MANAGEMENT OF IT ASSETS 
TOOL AGNOSTIC STRATEGIC AND TACTICAL APPROACH 
MAINTAINABILITY OF THE REPOSITORY 
1 
2 
3 
4 
5 
6 
MEASURING SUCCESS 
7
4 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Strategic Planning 
Take a crawl, walk, run approach 
–Build upon small successes 
–Architect achievable deliverables 
Maintain weekly contact with the main sponsor 
Understand the stakeholders, the value of key partnerships and cross-functional collaborations 
Build a strong foundation 
Implement Go-Forward Implementation
5 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Understand the ITAM lifecycle 
Map the current process 
–Reduce Complexity 
–Play in the sandbox of others 
Map data attributes to be collected to the tool 
Start integration of procurement
6 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Integrate with key cross-functional organizations: 
–Procurement 
–Accounting and Finance 
–Change Management 
–Architecture and Build teams 
Configure the tool 
Start building models and asset records 
Document click-level instructions
7 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Start collecting entitlements 
Integrate automated discovery to ITAM 
Software normalization 
Hardware reconciliation 
Add dashboardingand reporting
8 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Asset Tagging –Barcode and RFID 
Evangelize ITAM and the achievements 
Integrate with CMDB 
IMACD 
Maintain ITAM Repository
9 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Software-Don’t deploy unless you already own it 
–If not purchase it 
–Track trend analysis of software usage 
–Perform bulk purchases at the beginning of the year 
–Perform proactive targeted license true-up each quarter 
–Hire license experts 
Maintain the ITAM repository 
IT Asset Disposal 
–SW license harvesting
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Maintain an ITAM Roadmap
11 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Lifecycle Approach 
Implementation of holistic and comprehensive lifecycle approach that integrates best practices 
Discovery Data for validation of deployed IT Assets 
PR 
PO 
Internal Approval cycle 
Invoice 
Quote 
Start of the ITAM Lifecycle 
Start of the CMDB Lifecycle
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Map Existing Process to ITAM Lifecycle
13 
© 2014 CA. ALL RIGHTS RESERVED. 
What Data? Where, How and When is it Obtained? 
Map Data Attributes in ITAM Repository 
Request 
Asset Family 
Asset Description 
Manufacturer 
Accounting Attributes 
Quantity 
Funding Reviewer 
Control Number 
Package Sequence # 
Comments 
Title 
Deliver to Location 
PR # 
Dispatch of PO to Vendor 
If New Buy Purchase 
Asset Family per unspsc 
Asset Class per unspsc 
Payee (preferred vendor) 
Manufacturer part # 
Model 
PO # 
PO Date 
PO Line # 
Buyer 
Unspsc code 
Unspsc description 
Cost 
Termination Date 
Ship To Location 
If Maintenance Purchase 
Level of Service 
Coverage 
Vendor Interaction 
Serial # 
Date Received 
Serial # validation 
Quantity validation 
Asset Taging 
Invoice # 
Invoice copy 
Date Paid 
Amount Paid 
HW 
Date Last Discovered 
Serial # 
Computer Name 
Discovered OS 
HW Vendor 
RAM 
Processor Type 
Processor Count 
Core Count 
Cluster yes-no 
MAC Address 
IP Address 
SW 
Computer Name 
Edition 
License Title 
Publisher 
Product Version
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Configuring the Tool 
Basic out-of-the-box set-up 
–Build Asset Family and Class 
–Screen design and layout 
–Add extended fields if necessary 
–Add Locations 
–Add Vendors 
–Add approved users 
–Define access roles 
–Tie to active directory
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Start Building Models and Asset Records
16 
© 2014 CA. ALL RIGHTS RESERVED. 
Start Building Models and Asset Records
17 
© 2014 CA. ALL RIGHTS RESERVED. 
The Importance of the Cost Tab
18 
© 2014 CA. ALL RIGHTS RESERVED. 
Asset Tagging 
Barcode and RFID
19 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tools and Technology Building Blocks 
CA APM 
Reporting 
and 
Dashboards 
Discovery Tools 
Existing Spreadsheet and Procurement Data 
Deployed IT Assets 
ESAM 
Net License Position 
CA SAM 
Validation and True-up of active IT Assets 
Hardware Reconciliation 
SW Normalization 
CA IT Asset Manager 
HW and SW New Buy’s and Maintenance, Contracts 
HW and SW Purchase Data 
PO, COST, Warranty and Maintenance 
Termination Dates, Invoices (Entitlements) 
Knowledge of available Titles, Versions and SKU’s by License Pools 
Proactive SW License Legal Compliance Management of Use Rights
20 
© 2014 CA. ALL RIGHTS RESERVED. 
Software Normalization: Asset Viewer
21 
© 2014 CA. ALL RIGHTS RESERVED. 
Software Normalization
22 
© 2014 CA. ALL RIGHTS RESERVED. 
VM Environment
23 
© 2014 CA. ALL RIGHTS RESERVED. 
VM Environment
24 
© 2014 CA. ALL RIGHTS RESERVED. 
Effective Demand in CA Software Asset Manager
25 
© 2014 CA. ALL RIGHTS RESERVED. 
Hardware Reconciliation
26 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tools and Technology Building Blocks 
CA APM 
Reporting 
and 
Dashboards 
Discovery Tools 
Existing Spreadsheet and Procurement Data 
Deployed IT Assets 
ESAM 
Net License Position 
CA SAM 
Validation and True-up of active IT Assets 
Hardware Reconciliation 
SW Normalization 
CA IT Asset Manager 
HW and SW New Buy’s and Maintenance, Contracts 
HW and SW Purchase Data 
PO, COST, Warranty and Maintenance 
Termination Dates, Invoices (Entitlements) 
Knowledge of available Titles, Versions and SKU’s by License Pools 
Proactive SW License Legal Compliance Management of Use Rights
27 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Software Asset Manager to APM Table Structure 
CA-SAMDevice Object 
APM Reconciliation Field 
Database Field (Al_discovered_hardware) 
Device Key 
--- 
external_device_key 
Model 
System Model 
asset_model 
Network 
--- 
dns_name 
Storage (GB) 
Disk Space 
disk_space 
Name 
Host Name 
host_name 
Inventory Date 
LastRun Date 
last_run_date 
MAC Address 
MAC Address 
mac_address 
RAM (MB) 
Memory 
total_memory 
Operating System 
Operating System 
operating_system 
Installed CPUs 
Processor Count 
processor_count 
SPU speed(MHz) 
Processor Speed 
processorspeed 
Serial Number 
Serial Number 
serial_number 
Inventory Number 
BJQSAsset Tag 
asset_tag 
Asset Name 
--- 
--- 
Manufacturer 
System Vendor 
vendor_name 
Device Type 
System Type (?) 
SystemType (?) 
Data Source 
(?) 
external_source 
CPU Type 
Processor Type 
processor_type 
Last Logged-onUser 
--- 
login_id 
Import ID 
--- 
external_device_id 
Follow the Data: SAM to APM
28 
© 2014 CA. ALL RIGHTS RESERVED. 
Available Data From CA Software Asset Manager to APM
29 
© 2014 CA. ALL RIGHTS RESERVED. 
Dashboards and Reports
30 
© 2014 CA. ALL RIGHTS RESERVED. 
Dashboards and Reports
31 
© 2014 CA. ALL RIGHTS RESERVED. 
Addressing Client Challenges 
Business Objectives 
Business Challenges 
Solution Benefits 
Know what IT assets we have 
Unaware of available assets and software licenses 
Always know what IT assets are being used and available 
Manage IT assets effectively 
Organization over purchases IT assets 
Optimize the process for managing asset cost and distribution 
Proactively manage vendors 
Exposed to risks from license audits and auto-renewals 
Mitigate the risk of unmanaged contracts and unexpected audit 
Respond 
Optimize 
Identity
32 
© 2014 CA. ALL RIGHTS RESERVED. 
Asset Disposition
33 
© 2014 CA. ALL RIGHTS RESERVED. 
Maintaining the ITAM Repository 
Change Management, Architecture and Build Teams 
–Ensure you are receiving change tickets that impact ITAM 
–Change is your first line of defense to understand planned change 
–Discovery is a confirmation of the change
34 
© 2014 CA. ALL RIGHTS RESERVED. 
Importance of Selecting the Right ITAD Vendor 
IT Asset Disposal 
–Establish secure storage of IT assets 
–Establish a SW license harvest process 
–Understand what is reusable and ready for retirement 
–Establish an internal wipe and clean procedure 
–Establish a disposal process 
–Select an ITAD vendor 
–Draft a master service agreement and task order 
–Ensure you receive receipt reports 
–Ensure you receive a final disposition report 
–Attach final disposition to the asset records 
–Formally document the Disposal Process
35 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Management Cloud, please visit: 
http://bit.ly/1wEnPhz 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Management Cloud
36 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation

More Related Content

What's hot

Business Case For IT Asset Management
Business Case For IT Asset ManagementBusiness Case For IT Asset Management
Business Case For IT Asset Management
Samanage
 
Software Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHubSoftware Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHub
RichardNowack
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
Jade Global
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
sleterrier
 
The Bottom Line of Software Asset Management
The Bottom Line of Software Asset ManagementThe Bottom Line of Software Asset Management
The Bottom Line of Software Asset Management
hdicapitalarea
 
IT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, TrendIT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, Trend
Voyage Services Inc.
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
Priyanka Aash
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
Wahyu Primadi
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
Rob Akershoek
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
SkyCentral
 
Take Care | Enterprise Resource Planning Solution
Take Care | Enterprise Resource Planning SolutionTake Care | Enterprise Resource Planning Solution
Take Care | Enterprise Resource Planning Solution
Atsc Group
 
IT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNowIT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNow
Zenoss
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
SlideTeam
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
Razak Mohammed Ali
 
Wingate Systems - IT support services
Wingate Systems - IT support servicesWingate Systems - IT support services
Wingate Systems - IT support services
Narender Rayat
 
Managed it services
Managed it servicesManaged it services
Managed it services
Gss America
 
Service Mapping.pptx
Service Mapping.pptxService Mapping.pptx
Service Mapping.pptx
AshishChakravarty3
 
Oracle EPM Cloud for Midsize Customers
Oracle EPM Cloud for Midsize CustomersOracle EPM Cloud for Midsize Customers
Oracle EPM Cloud for Midsize Customers
Alithya
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
subtitle
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 

What's hot (20)

Business Case For IT Asset Management
Business Case For IT Asset ManagementBusiness Case For IT Asset Management
Business Case For IT Asset Management
 
Software Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHubSoftware Asset Management I Best Practices I NuggetHub
Software Asset Management I Best Practices I NuggetHub
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
The Bottom Line of Software Asset Management
The Bottom Line of Software Asset ManagementThe Bottom Line of Software Asset Management
The Bottom Line of Software Asset Management
 
IT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, TrendIT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, Trend
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 
Take Care | Enterprise Resource Planning Solution
Take Care | Enterprise Resource Planning SolutionTake Care | Enterprise Resource Planning Solution
Take Care | Enterprise Resource Planning Solution
 
IT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNowIT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNow
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
Wingate Systems - IT support services
Wingate Systems - IT support servicesWingate Systems - IT support services
Wingate Systems - IT support services
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Service Mapping.pptx
Service Mapping.pptxService Mapping.pptx
Service Mapping.pptx
 
Oracle EPM Cloud for Midsize Customers
Oracle EPM Cloud for Midsize CustomersOracle EPM Cloud for Midsize Customers
Oracle EPM Cloud for Midsize Customers
 
Service catalogue presentation
Service catalogue presentationService catalogue presentation
Service catalogue presentation
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 

Viewers also liked

Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
Dave Cornelius - Value Contributor-agility and innovation
 
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
Jon Stevens-Hall
 
Asset Management Presentation
Asset Management PresentationAsset Management Presentation
Asset Management Presentation
Neeraj Kumar
 
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementHands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
CA Technologies
 
Asset management manual
Asset management manualAsset management manual
Asset management manual
nvs24
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overviewThierry Brunet
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
CA Technologies
 
EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
Jackie Luo
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in Indiafranc24
 
Software Development Projects
Software Development ProjectsSoftware Development Projects
Software Development Projects
Carol Harstad
 
Asset management
Asset managementAsset management
Asset management
rob coulson
 
SAM Advantage Product Guide
SAM Advantage Product GuideSAM Advantage Product Guide
SAM Advantage Product Guide
Business Software Alliance
 
All About AssetWorks (Our Story)
All About AssetWorks (Our Story)All About AssetWorks (Our Story)
All About AssetWorks (Our Story)
AssetWorks
 
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
APNIC
 
Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
EssaysREasy
 
Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!
Cireson
 
Information and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in ComplexityInformation and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in Complexity
Albert Simard
 

Viewers also liked (17)

Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
 
Asset Management Presentation
Asset Management PresentationAsset Management Presentation
Asset Management Presentation
 
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementHands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
 
Asset management manual
Asset management manualAsset management manual
Asset management manual
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
 
Software Development Projects
Software Development ProjectsSoftware Development Projects
Software Development Projects
 
Asset management
Asset managementAsset management
Asset management
 
SAM Advantage Product Guide
SAM Advantage Product GuideSAM Advantage Product Guide
SAM Advantage Product Guide
 
All About AssetWorks (Our Story)
All About AssetWorks (Our Story)All About AssetWorks (Our Story)
All About AssetWorks (Our Story)
 
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
 
Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
 
Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!
 
Information and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in ComplexityInformation and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in Complexity
 

Similar to Strategies for Effective Hardware and Software Asset Management

Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
CA Technologies
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
CA Technologies
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep Dive
CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
CA Technologies
 
AMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground UpAMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground Up
Ivanti
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
Sandeep Bhatia
 
Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset Manager
CA Technologies
 
Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
CA Technologies
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Liz Warner
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Liz Warner
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld
 
Pre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the TrenchesPre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the Trenches
CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
CA Technologies
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
NextLabs, Inc.
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Technologies
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancialTim Hinkle
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
shaun_raghavan
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
shaun_raghavan
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsColloquium
 

Similar to Strategies for Effective Hardware and Software Asset Management (20)

Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep Dive
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
AMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground UpAMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground Up
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
 
Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset Manager
 
Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
Pre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the TrenchesPre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the Trenches
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS Solutions
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Strategies for Effective Hardware and Software Asset Management

  • 1. Strategies for Effective Hardware and Software Asset Management Michael Glanert ICT19S #CAWorld Systems Made Simple ITAM Practice Lead ca Intellicenter
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract Pro-actively managing IT assets and effectively planning for what’s next are not easy in increasingly complex IT environments. Hear about a government agency's journey to successful implementation of hardware and software asset management.Walk away with more in your toolbox to aid your own journey to building a sound strategic and tactical approach to IT Asset Management solutions from CA Technologies. Michael Glanert Systems Made Simple ITAM Practice Lead
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Today’s Objectives WHERE TO START THE HOLISTIC LIFECYCLE APPROACH MAKING DATA HIGHLY AVAILABLE TO STAKEHOLDERS PROACTIVE MANAGEMENT OF IT ASSETS TOOL AGNOSTIC STRATEGIC AND TACTICAL APPROACH MAINTAINABILITY OF THE REPOSITORY 1 2 3 4 5 6 MEASURING SUCCESS 7
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. ITAM Strategic Planning Take a crawl, walk, run approach –Build upon small successes –Architect achievable deliverables Maintain weekly contact with the main sponsor Understand the stakeholders, the value of key partnerships and cross-functional collaborations Build a strong foundation Implement Go-Forward Implementation
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Understand the ITAM lifecycle Map the current process –Reduce Complexity –Play in the sandbox of others Map data attributes to be collected to the tool Start integration of procurement
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Integrate with key cross-functional organizations: –Procurement –Accounting and Finance –Change Management –Architecture and Build teams Configure the tool Start building models and asset records Document click-level instructions
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Start collecting entitlements Integrate automated discovery to ITAM Software normalization Hardware reconciliation Add dashboardingand reporting
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Asset Tagging –Barcode and RFID Evangelize ITAM and the achievements Integrate with CMDB IMACD Maintain ITAM Repository
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Software-Don’t deploy unless you already own it –If not purchase it –Track trend analysis of software usage –Perform bulk purchases at the beginning of the year –Perform proactive targeted license true-up each quarter –Hire license experts Maintain the ITAM repository IT Asset Disposal –SW license harvesting
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Maintain an ITAM Roadmap
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. ITAM Lifecycle Approach Implementation of holistic and comprehensive lifecycle approach that integrates best practices Discovery Data for validation of deployed IT Assets PR PO Internal Approval cycle Invoice Quote Start of the ITAM Lifecycle Start of the CMDB Lifecycle
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Map Existing Process to ITAM Lifecycle
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. What Data? Where, How and When is it Obtained? Map Data Attributes in ITAM Repository Request Asset Family Asset Description Manufacturer Accounting Attributes Quantity Funding Reviewer Control Number Package Sequence # Comments Title Deliver to Location PR # Dispatch of PO to Vendor If New Buy Purchase Asset Family per unspsc Asset Class per unspsc Payee (preferred vendor) Manufacturer part # Model PO # PO Date PO Line # Buyer Unspsc code Unspsc description Cost Termination Date Ship To Location If Maintenance Purchase Level of Service Coverage Vendor Interaction Serial # Date Received Serial # validation Quantity validation Asset Taging Invoice # Invoice copy Date Paid Amount Paid HW Date Last Discovered Serial # Computer Name Discovered OS HW Vendor RAM Processor Type Processor Count Core Count Cluster yes-no MAC Address IP Address SW Computer Name Edition License Title Publisher Product Version
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Configuring the Tool Basic out-of-the-box set-up –Build Asset Family and Class –Screen design and layout –Add extended fields if necessary –Add Locations –Add Vendors –Add approved users –Define access roles –Tie to active directory
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. Start Building Models and Asset Records
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. Start Building Models and Asset Records
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. The Importance of the Cost Tab
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. Asset Tagging Barcode and RFID
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tools and Technology Building Blocks CA APM Reporting and Dashboards Discovery Tools Existing Spreadsheet and Procurement Data Deployed IT Assets ESAM Net License Position CA SAM Validation and True-up of active IT Assets Hardware Reconciliation SW Normalization CA IT Asset Manager HW and SW New Buy’s and Maintenance, Contracts HW and SW Purchase Data PO, COST, Warranty and Maintenance Termination Dates, Invoices (Entitlements) Knowledge of available Titles, Versions and SKU’s by License Pools Proactive SW License Legal Compliance Management of Use Rights
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. Software Normalization: Asset Viewer
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. Software Normalization
  • 22. 22 © 2014 CA. ALL RIGHTS RESERVED. VM Environment
  • 23. 23 © 2014 CA. ALL RIGHTS RESERVED. VM Environment
  • 24. 24 © 2014 CA. ALL RIGHTS RESERVED. Effective Demand in CA Software Asset Manager
  • 25. 25 © 2014 CA. ALL RIGHTS RESERVED. Hardware Reconciliation
  • 26. 26 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tools and Technology Building Blocks CA APM Reporting and Dashboards Discovery Tools Existing Spreadsheet and Procurement Data Deployed IT Assets ESAM Net License Position CA SAM Validation and True-up of active IT Assets Hardware Reconciliation SW Normalization CA IT Asset Manager HW and SW New Buy’s and Maintenance, Contracts HW and SW Purchase Data PO, COST, Warranty and Maintenance Termination Dates, Invoices (Entitlements) Knowledge of available Titles, Versions and SKU’s by License Pools Proactive SW License Legal Compliance Management of Use Rights
  • 27. 27 © 2014 CA. ALL RIGHTS RESERVED. CA Software Asset Manager to APM Table Structure CA-SAMDevice Object APM Reconciliation Field Database Field (Al_discovered_hardware) Device Key --- external_device_key Model System Model asset_model Network --- dns_name Storage (GB) Disk Space disk_space Name Host Name host_name Inventory Date LastRun Date last_run_date MAC Address MAC Address mac_address RAM (MB) Memory total_memory Operating System Operating System operating_system Installed CPUs Processor Count processor_count SPU speed(MHz) Processor Speed processorspeed Serial Number Serial Number serial_number Inventory Number BJQSAsset Tag asset_tag Asset Name --- --- Manufacturer System Vendor vendor_name Device Type System Type (?) SystemType (?) Data Source (?) external_source CPU Type Processor Type processor_type Last Logged-onUser --- login_id Import ID --- external_device_id Follow the Data: SAM to APM
  • 28. 28 © 2014 CA. ALL RIGHTS RESERVED. Available Data From CA Software Asset Manager to APM
  • 29. 29 © 2014 CA. ALL RIGHTS RESERVED. Dashboards and Reports
  • 30. 30 © 2014 CA. ALL RIGHTS RESERVED. Dashboards and Reports
  • 31. 31 © 2014 CA. ALL RIGHTS RESERVED. Addressing Client Challenges Business Objectives Business Challenges Solution Benefits Know what IT assets we have Unaware of available assets and software licenses Always know what IT assets are being used and available Manage IT assets effectively Organization over purchases IT assets Optimize the process for managing asset cost and distribution Proactively manage vendors Exposed to risks from license audits and auto-renewals Mitigate the risk of unmanaged contracts and unexpected audit Respond Optimize Identity
  • 32. 32 © 2014 CA. ALL RIGHTS RESERVED. Asset Disposition
  • 33. 33 © 2014 CA. ALL RIGHTS RESERVED. Maintaining the ITAM Repository Change Management, Architecture and Build Teams –Ensure you are receiving change tickets that impact ITAM –Change is your first line of defense to understand planned change –Discovery is a confirmation of the change
  • 34. 34 © 2014 CA. ALL RIGHTS RESERVED. Importance of Selecting the Right ITAD Vendor IT Asset Disposal –Establish secure storage of IT assets –Establish a SW license harvest process –Understand what is reusable and ready for retirement –Establish an internal wipe and clean procedure –Establish a disposal process –Select an ITAD vendor –Draft a master service agreement and task order –Ensure you receive receipt reports –Ensure you receive a final disposition report –Attach final disposition to the asset records –Formally document the Disposal Process
  • 35. 35 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Management Cloud, please visit: http://bit.ly/1wEnPhz Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Management Cloud
  • 36. 36 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation