SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Strategies for Effective Hardware 
and Software Asset Management 
Michael Glanert 
ICT19S #CAWorld 
Systems Made Simple 
ITAM Practice Lead 
ca Intellicenter
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
Pro-actively managing IT assets and effectively planning for what’s next are not easy in increasingly complex IT environments. Hear about a government agency's journey to successful implementation of hardware and software asset management.Walk away with more in your toolbox to aid your own journey to building a sound strategic and tactical approach to IT Asset Management solutions from CA Technologies. 
Michael Glanert 
Systems Made Simple 
ITAM Practice Lead
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Today’s Objectives 
WHERE TO START 
THE HOLISTIC LIFECYCLE APPROACH 
MAKING DATA HIGHLY AVAILABLE TO STAKEHOLDERS 
PROACTIVE MANAGEMENT OF IT ASSETS 
TOOL AGNOSTIC STRATEGIC AND TACTICAL APPROACH 
MAINTAINABILITY OF THE REPOSITORY 
1 
2 
3 
4 
5 
6 
MEASURING SUCCESS 
7
4 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Strategic Planning 
Take a crawl, walk, run approach 
–Build upon small successes 
–Architect achievable deliverables 
Maintain weekly contact with the main sponsor 
Understand the stakeholders, the value of key partnerships and cross-functional collaborations 
Build a strong foundation 
Implement Go-Forward Implementation
5 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Understand the ITAM lifecycle 
Map the current process 
–Reduce Complexity 
–Play in the sandbox of others 
Map data attributes to be collected to the tool 
Start integration of procurement
6 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Integrate with key cross-functional organizations: 
–Procurement 
–Accounting and Finance 
–Change Management 
–Architecture and Build teams 
Configure the tool 
Start building models and asset records 
Document click-level instructions
7 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Start collecting entitlements 
Integrate automated discovery to ITAM 
Software normalization 
Hardware reconciliation 
Add dashboardingand reporting
8 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Asset Tagging –Barcode and RFID 
Evangelize ITAM and the achievements 
Integrate with CMDB 
IMACD 
Maintain ITAM Repository
9 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tactical Execution 
Software-Don’t deploy unless you already own it 
–If not purchase it 
–Track trend analysis of software usage 
–Perform bulk purchases at the beginning of the year 
–Perform proactive targeted license true-up each quarter 
–Hire license experts 
Maintain the ITAM repository 
IT Asset Disposal 
–SW license harvesting
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Maintain an ITAM Roadmap
11 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Lifecycle Approach 
Implementation of holistic and comprehensive lifecycle approach that integrates best practices 
Discovery Data for validation of deployed IT Assets 
PR 
PO 
Internal Approval cycle 
Invoice 
Quote 
Start of the ITAM Lifecycle 
Start of the CMDB Lifecycle
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Map Existing Process to ITAM Lifecycle
13 
© 2014 CA. ALL RIGHTS RESERVED. 
What Data? Where, How and When is it Obtained? 
Map Data Attributes in ITAM Repository 
Request 
Asset Family 
Asset Description 
Manufacturer 
Accounting Attributes 
Quantity 
Funding Reviewer 
Control Number 
Package Sequence # 
Comments 
Title 
Deliver to Location 
PR # 
Dispatch of PO to Vendor 
If New Buy Purchase 
Asset Family per unspsc 
Asset Class per unspsc 
Payee (preferred vendor) 
Manufacturer part # 
Model 
PO # 
PO Date 
PO Line # 
Buyer 
Unspsc code 
Unspsc description 
Cost 
Termination Date 
Ship To Location 
If Maintenance Purchase 
Level of Service 
Coverage 
Vendor Interaction 
Serial # 
Date Received 
Serial # validation 
Quantity validation 
Asset Taging 
Invoice # 
Invoice copy 
Date Paid 
Amount Paid 
HW 
Date Last Discovered 
Serial # 
Computer Name 
Discovered OS 
HW Vendor 
RAM 
Processor Type 
Processor Count 
Core Count 
Cluster yes-no 
MAC Address 
IP Address 
SW 
Computer Name 
Edition 
License Title 
Publisher 
Product Version
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Configuring the Tool 
Basic out-of-the-box set-up 
–Build Asset Family and Class 
–Screen design and layout 
–Add extended fields if necessary 
–Add Locations 
–Add Vendors 
–Add approved users 
–Define access roles 
–Tie to active directory
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Start Building Models and Asset Records
16 
© 2014 CA. ALL RIGHTS RESERVED. 
Start Building Models and Asset Records
17 
© 2014 CA. ALL RIGHTS RESERVED. 
The Importance of the Cost Tab
18 
© 2014 CA. ALL RIGHTS RESERVED. 
Asset Tagging 
Barcode and RFID
19 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tools and Technology Building Blocks 
CA APM 
Reporting 
and 
Dashboards 
Discovery Tools 
Existing Spreadsheet and Procurement Data 
Deployed IT Assets 
ESAM 
Net License Position 
CA SAM 
Validation and True-up of active IT Assets 
Hardware Reconciliation 
SW Normalization 
CA IT Asset Manager 
HW and SW New Buy’s and Maintenance, Contracts 
HW and SW Purchase Data 
PO, COST, Warranty and Maintenance 
Termination Dates, Invoices (Entitlements) 
Knowledge of available Titles, Versions and SKU’s by License Pools 
Proactive SW License Legal Compliance Management of Use Rights
20 
© 2014 CA. ALL RIGHTS RESERVED. 
Software Normalization: Asset Viewer
21 
© 2014 CA. ALL RIGHTS RESERVED. 
Software Normalization
22 
© 2014 CA. ALL RIGHTS RESERVED. 
VM Environment
23 
© 2014 CA. ALL RIGHTS RESERVED. 
VM Environment
24 
© 2014 CA. ALL RIGHTS RESERVED. 
Effective Demand in CA Software Asset Manager
25 
© 2014 CA. ALL RIGHTS RESERVED. 
Hardware Reconciliation
26 
© 2014 CA. ALL RIGHTS RESERVED. 
ITAM Tools and Technology Building Blocks 
CA APM 
Reporting 
and 
Dashboards 
Discovery Tools 
Existing Spreadsheet and Procurement Data 
Deployed IT Assets 
ESAM 
Net License Position 
CA SAM 
Validation and True-up of active IT Assets 
Hardware Reconciliation 
SW Normalization 
CA IT Asset Manager 
HW and SW New Buy’s and Maintenance, Contracts 
HW and SW Purchase Data 
PO, COST, Warranty and Maintenance 
Termination Dates, Invoices (Entitlements) 
Knowledge of available Titles, Versions and SKU’s by License Pools 
Proactive SW License Legal Compliance Management of Use Rights
27 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Software Asset Manager to APM Table Structure 
CA-SAMDevice Object 
APM Reconciliation Field 
Database Field (Al_discovered_hardware) 
Device Key 
--- 
external_device_key 
Model 
System Model 
asset_model 
Network 
--- 
dns_name 
Storage (GB) 
Disk Space 
disk_space 
Name 
Host Name 
host_name 
Inventory Date 
LastRun Date 
last_run_date 
MAC Address 
MAC Address 
mac_address 
RAM (MB) 
Memory 
total_memory 
Operating System 
Operating System 
operating_system 
Installed CPUs 
Processor Count 
processor_count 
SPU speed(MHz) 
Processor Speed 
processorspeed 
Serial Number 
Serial Number 
serial_number 
Inventory Number 
BJQSAsset Tag 
asset_tag 
Asset Name 
--- 
--- 
Manufacturer 
System Vendor 
vendor_name 
Device Type 
System Type (?) 
SystemType (?) 
Data Source 
(?) 
external_source 
CPU Type 
Processor Type 
processor_type 
Last Logged-onUser 
--- 
login_id 
Import ID 
--- 
external_device_id 
Follow the Data: SAM to APM
28 
© 2014 CA. ALL RIGHTS RESERVED. 
Available Data From CA Software Asset Manager to APM
29 
© 2014 CA. ALL RIGHTS RESERVED. 
Dashboards and Reports
30 
© 2014 CA. ALL RIGHTS RESERVED. 
Dashboards and Reports
31 
© 2014 CA. ALL RIGHTS RESERVED. 
Addressing Client Challenges 
Business Objectives 
Business Challenges 
Solution Benefits 
Know what IT assets we have 
Unaware of available assets and software licenses 
Always know what IT assets are being used and available 
Manage IT assets effectively 
Organization over purchases IT assets 
Optimize the process for managing asset cost and distribution 
Proactively manage vendors 
Exposed to risks from license audits and auto-renewals 
Mitigate the risk of unmanaged contracts and unexpected audit 
Respond 
Optimize 
Identity
32 
© 2014 CA. ALL RIGHTS RESERVED. 
Asset Disposition
33 
© 2014 CA. ALL RIGHTS RESERVED. 
Maintaining the ITAM Repository 
Change Management, Architecture and Build Teams 
–Ensure you are receiving change tickets that impact ITAM 
–Change is your first line of defense to understand planned change 
–Discovery is a confirmation of the change
34 
© 2014 CA. ALL RIGHTS RESERVED. 
Importance of Selecting the Right ITAD Vendor 
IT Asset Disposal 
–Establish secure storage of IT assets 
–Establish a SW license harvest process 
–Understand what is reusable and ready for retirement 
–Establish an internal wipe and clean procedure 
–Establish a disposal process 
–Select an ITAD vendor 
–Draft a master service agreement and task order 
–Ensure you receive receipt reports 
–Ensure you receive a final disposition report 
–Attach final disposition to the asset records 
–Formally document the Disposal Process
35 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Management Cloud, please visit: 
http://bit.ly/1wEnPhz 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Management Cloud
36 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. 
Terms of this Presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
franc24
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
Desmond Devendran
 

Was ist angesagt? (20)

Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
SAP grc
SAP grc SAP grc
SAP grc
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
SAM Software Asset Management
SAM Software Asset ManagementSAM Software Asset Management
SAM Software Asset Management
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 

Andere mochten auch

IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
Jon Stevens-Hall
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet
 

Andere mochten auch (18)

Software Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in ActionSoftware Asset Management (SAM) Best Practice in Action
Software Asset Management (SAM) Best Practice in Action
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
IT Trends Set to Shape Software Asset Management (IBSMA SAM Summit June 2015)
 
Asset Management Presentation
Asset Management PresentationAsset Management Presentation
Asset Management Presentation
 
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset ManagementHands-On Lab: From Zero to Compliance Using CA Software Asset Management
Hands-On Lab: From Zero to Compliance Using CA Software Asset Management
 
Asset management manual
Asset management manualAsset management manual
Asset management manual
 
Thierry Brunet - IT best practices & frameworks overview
Thierry Brunet -  IT best practices & frameworks overviewThierry Brunet -  IT best practices & frameworks overview
Thierry Brunet - IT best practices & frameworks overview
 
Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager Increase Your Value: Upgrade CA IT Asset Manager
Increase Your Value: Upgrade CA IT Asset Manager
 
EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Software Development Projects
Software Development ProjectsSoftware Development Projects
Software Development Projects
 
Asset management
Asset managementAsset management
Asset management
 
SAM Advantage Product Guide
SAM Advantage Product GuideSAM Advantage Product Guide
SAM Advantage Product Guide
 
All About AssetWorks (Our Story)
All About AssetWorks (Our Story)All About AssetWorks (Our Story)
All About AssetWorks (Our Story)
 
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...Information Exchange Collaboration across Technical/Operational/Policy Bounda...
Information Exchange Collaboration across Technical/Operational/Policy Bounda...
 
Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
 
Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!Software Asset Management – Keeping track of what I’m licensed for!
Software Asset Management – Keeping track of what I’m licensed for!
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
Information and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in ComplexityInformation and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in Complexity
 

Ähnlich wie Strategies for Effective Hardware and Software Asset Management

18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
Tim Hinkle
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS Solutions
Colloquium
 

Ähnlich wie Strategies for Effective Hardware and Software Asset Management (20)

Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...Case Study:  Learn How Expeditors Uses APM as Both a Technology and Process T...
Case Study: Learn How Expeditors Uses APM as Both a Technology and Process T...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
Pre-Con Education: Zero to Compliance Using Software Asset Management Soluti...
 
CA Performance Management Deep Dive
CA Performance Management Deep DiveCA Performance Management Deep Dive
CA Performance Management Deep Dive
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
AMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground UpAMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground Up
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
 
Pre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset ManagerPre-con Education: A Day In The Life Of A Software Asset Manager
Pre-con Education: A Day In The Life Of A Software Asset Manager
 
Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
 
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
Service Assurance Constructs for Achieving Network Transformation by Sunku Ra...
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 
VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services VMworld 2013: Exploring Technology Trends within Financial Services
VMworld 2013: Exploring Technology Trends within Financial Services
 
Pre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the TrenchesPre-Con Ed: Software Asset Management: Working in the Trenches
Pre-Con Ed: Software Asset Management: Working in the Trenches
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
18BC03_Discovery_Enables_Accurate_CMDB_Hinkle_DiscoverFinancial
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Monitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS SolutionsMonitoring IAAS & PAAS Solutions
Monitoring IAAS & PAAS Solutions
 

Mehr von CA Technologies

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Strategies for Effective Hardware and Software Asset Management

  • 1. Strategies for Effective Hardware and Software Asset Management Michael Glanert ICT19S #CAWorld Systems Made Simple ITAM Practice Lead ca Intellicenter
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract Pro-actively managing IT assets and effectively planning for what’s next are not easy in increasingly complex IT environments. Hear about a government agency's journey to successful implementation of hardware and software asset management.Walk away with more in your toolbox to aid your own journey to building a sound strategic and tactical approach to IT Asset Management solutions from CA Technologies. Michael Glanert Systems Made Simple ITAM Practice Lead
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Today’s Objectives WHERE TO START THE HOLISTIC LIFECYCLE APPROACH MAKING DATA HIGHLY AVAILABLE TO STAKEHOLDERS PROACTIVE MANAGEMENT OF IT ASSETS TOOL AGNOSTIC STRATEGIC AND TACTICAL APPROACH MAINTAINABILITY OF THE REPOSITORY 1 2 3 4 5 6 MEASURING SUCCESS 7
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. ITAM Strategic Planning Take a crawl, walk, run approach –Build upon small successes –Architect achievable deliverables Maintain weekly contact with the main sponsor Understand the stakeholders, the value of key partnerships and cross-functional collaborations Build a strong foundation Implement Go-Forward Implementation
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Understand the ITAM lifecycle Map the current process –Reduce Complexity –Play in the sandbox of others Map data attributes to be collected to the tool Start integration of procurement
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Integrate with key cross-functional organizations: –Procurement –Accounting and Finance –Change Management –Architecture and Build teams Configure the tool Start building models and asset records Document click-level instructions
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Start collecting entitlements Integrate automated discovery to ITAM Software normalization Hardware reconciliation Add dashboardingand reporting
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Asset Tagging –Barcode and RFID Evangelize ITAM and the achievements Integrate with CMDB IMACD Maintain ITAM Repository
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tactical Execution Software-Don’t deploy unless you already own it –If not purchase it –Track trend analysis of software usage –Perform bulk purchases at the beginning of the year –Perform proactive targeted license true-up each quarter –Hire license experts Maintain the ITAM repository IT Asset Disposal –SW license harvesting
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Maintain an ITAM Roadmap
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. ITAM Lifecycle Approach Implementation of holistic and comprehensive lifecycle approach that integrates best practices Discovery Data for validation of deployed IT Assets PR PO Internal Approval cycle Invoice Quote Start of the ITAM Lifecycle Start of the CMDB Lifecycle
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Map Existing Process to ITAM Lifecycle
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. What Data? Where, How and When is it Obtained? Map Data Attributes in ITAM Repository Request Asset Family Asset Description Manufacturer Accounting Attributes Quantity Funding Reviewer Control Number Package Sequence # Comments Title Deliver to Location PR # Dispatch of PO to Vendor If New Buy Purchase Asset Family per unspsc Asset Class per unspsc Payee (preferred vendor) Manufacturer part # Model PO # PO Date PO Line # Buyer Unspsc code Unspsc description Cost Termination Date Ship To Location If Maintenance Purchase Level of Service Coverage Vendor Interaction Serial # Date Received Serial # validation Quantity validation Asset Taging Invoice # Invoice copy Date Paid Amount Paid HW Date Last Discovered Serial # Computer Name Discovered OS HW Vendor RAM Processor Type Processor Count Core Count Cluster yes-no MAC Address IP Address SW Computer Name Edition License Title Publisher Product Version
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Configuring the Tool Basic out-of-the-box set-up –Build Asset Family and Class –Screen design and layout –Add extended fields if necessary –Add Locations –Add Vendors –Add approved users –Define access roles –Tie to active directory
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. Start Building Models and Asset Records
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. Start Building Models and Asset Records
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. The Importance of the Cost Tab
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. Asset Tagging Barcode and RFID
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tools and Technology Building Blocks CA APM Reporting and Dashboards Discovery Tools Existing Spreadsheet and Procurement Data Deployed IT Assets ESAM Net License Position CA SAM Validation and True-up of active IT Assets Hardware Reconciliation SW Normalization CA IT Asset Manager HW and SW New Buy’s and Maintenance, Contracts HW and SW Purchase Data PO, COST, Warranty and Maintenance Termination Dates, Invoices (Entitlements) Knowledge of available Titles, Versions and SKU’s by License Pools Proactive SW License Legal Compliance Management of Use Rights
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. Software Normalization: Asset Viewer
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. Software Normalization
  • 22. 22 © 2014 CA. ALL RIGHTS RESERVED. VM Environment
  • 23. 23 © 2014 CA. ALL RIGHTS RESERVED. VM Environment
  • 24. 24 © 2014 CA. ALL RIGHTS RESERVED. Effective Demand in CA Software Asset Manager
  • 25. 25 © 2014 CA. ALL RIGHTS RESERVED. Hardware Reconciliation
  • 26. 26 © 2014 CA. ALL RIGHTS RESERVED. ITAM Tools and Technology Building Blocks CA APM Reporting and Dashboards Discovery Tools Existing Spreadsheet and Procurement Data Deployed IT Assets ESAM Net License Position CA SAM Validation and True-up of active IT Assets Hardware Reconciliation SW Normalization CA IT Asset Manager HW and SW New Buy’s and Maintenance, Contracts HW and SW Purchase Data PO, COST, Warranty and Maintenance Termination Dates, Invoices (Entitlements) Knowledge of available Titles, Versions and SKU’s by License Pools Proactive SW License Legal Compliance Management of Use Rights
  • 27. 27 © 2014 CA. ALL RIGHTS RESERVED. CA Software Asset Manager to APM Table Structure CA-SAMDevice Object APM Reconciliation Field Database Field (Al_discovered_hardware) Device Key --- external_device_key Model System Model asset_model Network --- dns_name Storage (GB) Disk Space disk_space Name Host Name host_name Inventory Date LastRun Date last_run_date MAC Address MAC Address mac_address RAM (MB) Memory total_memory Operating System Operating System operating_system Installed CPUs Processor Count processor_count SPU speed(MHz) Processor Speed processorspeed Serial Number Serial Number serial_number Inventory Number BJQSAsset Tag asset_tag Asset Name --- --- Manufacturer System Vendor vendor_name Device Type System Type (?) SystemType (?) Data Source (?) external_source CPU Type Processor Type processor_type Last Logged-onUser --- login_id Import ID --- external_device_id Follow the Data: SAM to APM
  • 28. 28 © 2014 CA. ALL RIGHTS RESERVED. Available Data From CA Software Asset Manager to APM
  • 29. 29 © 2014 CA. ALL RIGHTS RESERVED. Dashboards and Reports
  • 30. 30 © 2014 CA. ALL RIGHTS RESERVED. Dashboards and Reports
  • 31. 31 © 2014 CA. ALL RIGHTS RESERVED. Addressing Client Challenges Business Objectives Business Challenges Solution Benefits Know what IT assets we have Unaware of available assets and software licenses Always know what IT assets are being used and available Manage IT assets effectively Organization over purchases IT assets Optimize the process for managing asset cost and distribution Proactively manage vendors Exposed to risks from license audits and auto-renewals Mitigate the risk of unmanaged contracts and unexpected audit Respond Optimize Identity
  • 32. 32 © 2014 CA. ALL RIGHTS RESERVED. Asset Disposition
  • 33. 33 © 2014 CA. ALL RIGHTS RESERVED. Maintaining the ITAM Repository Change Management, Architecture and Build Teams –Ensure you are receiving change tickets that impact ITAM –Change is your first line of defense to understand planned change –Discovery is a confirmation of the change
  • 34. 34 © 2014 CA. ALL RIGHTS RESERVED. Importance of Selecting the Right ITAD Vendor IT Asset Disposal –Establish secure storage of IT assets –Establish a SW license harvest process –Understand what is reusable and ready for retirement –Establish an internal wipe and clean procedure –Establish a disposal process –Select an ITAD vendor –Draft a master service agreement and task order –Ensure you receive receipt reports –Ensure you receive a final disposition report –Attach final disposition to the asset records –Formally document the Disposal Process
  • 35. 35 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Management Cloud, please visit: http://bit.ly/1wEnPhz Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Management Cloud
  • 36. 36 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Content provided in this presentation has not been reviewed for accuracy and is based on information provided by CA Partners and Customers. Terms of this Presentation