SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
IT Asset Management
A Three-tiered Approach
Andy Parker
Solutions Expert
LANDESK
§  Global Secure Proven Expertise in:-
§  Unified Endpoint Management
§  Secure Configuration Management
§  IT Service Management
§  IT Asset Management
§  Visionary and Leader in Gartner Magic Quadrants
The IT Asset Management Reality
of businesses don’t know if they have the right licenses78%
average true-up cost for companies over $50m revenue
$263,000
Percentage of companies audited in the last 24 months 37%
Number of Microsoft customers audited in 2013 30,000
Risk and Reward
At LANDESK We Believe ITAM is…
People
Technology
More than EndPoint, more than Premise
More than Licenses and Software
More than ITAM
More than Integrated
Important to I.T. and the Customer of I.T.
Important to LANDESK
A Three-tiered Approach
§  Asset Discovery
§  Asset Intelligence
§  Lifecycle Management
Tier One - Asset Discovery
§ Asset Scanning
§ Manual Input
§ Import Asset Data
All Assets Are Important
Vendor Visibility and Integration
Connectivity powers
IT Asset Management
Bring together asset data
across your environment.
Integrate, report and take
action across your Systems,
Mobile and ITSM tools.
Tier Two – Asset Intelligence
§ Asset Normalization
§ EULA Awareness
§ Asset Mapping
Software Asset Dashboard
Compliance Management – Out Of Compliance
Compliance Management – True Up Costs
Software Reclamation
License Optimization
Tier Three – Life Cycle Management
The impact of Off-Boarding
Most Rogue Ex-Employees Have Access
actually logged into accounts after leaving the company49%
retained access to confidential or highly confidential data45%
of Ex-employees are walking away with their passwords89%
still had access to accounts payable they
used when working for a previous company24%
Process Driven Asset Management
Contract Management
Asset Management Processes
Software
Audit and
Reconcile
Software
Catalog
Hardware
Catalog
Hardware
Disposal
Asset
Lifecycle
Contract
Management
Corporate
Governance
Supplier
Management
Asset
Repository
Hardware
Loss / Theft
Hardware
Refresh Cycle
Workspace,
Dashboard,
Alerting
Discovery &
Dependency
Hardware
Change
Software
Removal
ComplianceWarehouse
Stock Control
Hardware
Procurement
Hardware
Request
Software
Procurement
Software
Request
Software
Clawback
Software
Patching
Software
Change
Loan/Lease
Financial
Management
ITAM Maturity with LANDESK ITAM Suite
INSIGHT
Gain Asset
Intelligence
Discover
Consolidate
Start SLM
CONTROL
Achieve Asset
Control with Asset
Lifecycles
Connect to 3rdParty
vendor sites and
APIs
Introduce ITAM basic
principles
MANAGE
Comprehensive IT
Asset Management
though ITAM
Processes
Extend to mature
SAM & HAM best
practice and proven
management
processes
Extend Process-
Driven behaviour
LEAD
Integrate for Best
Practice Combined
ITAM & ITSM and
more
Financial Mgnt
Combine and
Integrate IT Asset
Management with IT
Service Management
for joined up,
measurable and
improvable IT
Combined
The LANDESK ITAM Solution
Asset Manager
Workspace
Software License
Monitoring
Software
Reclamation
Discover Hardware
& Software PurchasesUser Lifecycle
Automation
Third-party
Connectors
Asset
Management
Integrate, take action and
automate
Extend the value of your
systems management tool by
monitoring your assets through
their entire lifecycle and taking
action.
Thank You
Andy Parker
e: andy.parker@landesk.com
t: AndyRAParker

Weitere ähnliche Inhalte

Was ist angesagt?

Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
franc24
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
Len Moncrieffe
 

Was ist angesagt? (20)

IT Asset management presentation
IT Asset management presentationIT Asset management presentation
IT Asset management presentation
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
 
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016In2SAM Audit Defence_ITAM Review Amsterdam April 2016
In2SAM Audit Defence_ITAM Review Amsterdam April 2016
 
Managed IT Services: Overview, Importance, Business Benefits
Managed IT Services: Overview, Importance, Business BenefitsManaged IT Services: Overview, Importance, Business Benefits
Managed IT Services: Overview, Importance, Business Benefits
 
Benefits of Software Asset Management
Benefits of Software Asset ManagementBenefits of Software Asset Management
Benefits of Software Asset Management
 
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
 
Business Case For IT Asset Management
Business Case For IT Asset ManagementBusiness Case For IT Asset Management
Business Case For IT Asset Management
 
Responsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access ManagementResponsible User Empowerment: Enabling Privileged Access Management
Responsible User Empowerment: Enabling Privileged Access Management
 
Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day
 
Manage services presentation
Manage services presentationManage services presentation
Manage services presentation
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
ITAM Tools Day, November 2015 - Snow Software
ITAM Tools Day, November 2015 - Snow SoftwareITAM Tools Day, November 2015 - Snow Software
ITAM Tools Day, November 2015 - Snow Software
 
ITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - ConcordeITAM Tools Day, November 2015 - Concorde
ITAM Tools Day, November 2015 - Concorde
 
Presentation
PresentationPresentation
Presentation
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
IT Asset Management by Miradore
IT Asset Management by MiradoreIT Asset Management by Miradore
IT Asset Management by Miradore
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 

Andere mochten auch

Ibm tivoli storage area network manager a practical introduction sg246848
Ibm tivoli storage area network manager a practical introduction sg246848Ibm tivoli storage area network manager a practical introduction sg246848
Ibm tivoli storage area network manager a practical introduction sg246848
Banking at Ho Chi Minh city
 
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
taimoor iftikhar
 

Andere mochten auch (20)

Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
ITAM Review 2014 Salary Survey Results
ITAM Review 2014 Salary Survey Results ITAM Review 2014 Salary Survey Results
ITAM Review 2014 Salary Survey Results
 
BSc Applied Computing
BSc Applied ComputingBSc Applied Computing
BSc Applied Computing
 
Ibm tivoli storage area network manager a practical introduction sg246848
Ibm tivoli storage area network manager a practical introduction sg246848Ibm tivoli storage area network manager a practical introduction sg246848
Ibm tivoli storage area network manager a practical introduction sg246848
 
Storage Systems for High Scalable Systems Presentation
Storage Systems for High Scalable Systems PresentationStorage Systems for High Scalable Systems Presentation
Storage Systems for High Scalable Systems Presentation
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Introduction to near real time computing
Introduction to near real time computingIntroduction to near real time computing
Introduction to near real time computing
 
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
Disrete mathematics and_its application_by_rosen _7th edition_lecture_1
 
Theory of Computation
Theory of ComputationTheory of Computation
Theory of Computation
 
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset ManagerBMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
BMC Engage - ITAM 2015-2020: The Evolving Role of the IT Asset Manager
 
Storage Technologies
Storage TechnologiesStorage Technologies
Storage Technologies
 
E book-the evolution of storage technologies
E book-the evolution of storage technologiesE book-the evolution of storage technologies
E book-the evolution of storage technologies
 
network storage
network storagenetwork storage
network storage
 
Applications of computer graphics
Applications of computer graphicsApplications of computer graphics
Applications of computer graphics
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Lecture on graphics
Lecture on graphicsLecture on graphics
Lecture on graphics
 
Real Time Systems & RTOS
Real Time Systems & RTOSReal Time Systems & RTOS
Real Time Systems & RTOS
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overview
 
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
Integrating It Frameworks, Methodologies And Best Practices Into It Delivery ...
 
Introduction to compilers
Introduction to compilersIntroduction to compilers
Introduction to compilers
 

Ähnlich wie LANDESK ITAM Review Tools Day Presentation 2015

It asset management_wp
It asset management_wpIt asset management_wp
It asset management_wp
wardell henley
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 

Ähnlich wie LANDESK ITAM Review Tools Day Presentation 2015 (20)

How to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditHow to Best Prepare for a Software Audit
How to Best Prepare for a Software Audit
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Continous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRCContinous Audit and Controls with Brainwave GRC
Continous Audit and Controls with Brainwave GRC
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
It asset management_wp
It asset management_wpIt asset management_wp
It asset management_wp
 
Implementing access and security controls across your applications
Implementing access and security controls across your applicationsImplementing access and security controls across your applications
Implementing access and security controls across your applications
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 
Brainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA eventBrainwave GRC - Continuous Audit and Controls at ISACA event
Brainwave GRC - Continuous Audit and Controls at ISACA event
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
AMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground UpAMB100: Ivanti Asset Management Suite from the Ground Up
AMB100: Ivanti Asset Management Suite from the Ground Up
 
Advanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBMAdvanced Analytics for Asset Management with IBM
Advanced Analytics for Asset Management with IBM
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 

Mehr von Martin Thompson

Mehr von Martin Thompson (20)

Wisdom UK 2019: Building the ultimate HAM sandwich - David Foxen
Wisdom UK 2019: Building the ultimate HAM sandwich - David FoxenWisdom UK 2019: Building the ultimate HAM sandwich - David Foxen
Wisdom UK 2019: Building the ultimate HAM sandwich - David Foxen
 
2019 Salary and Skills Survey by The ITAM Review
2019 Salary and Skills Survey by The ITAM Review 2019 Salary and Skills Survey by The ITAM Review
2019 Salary and Skills Survey by The ITAM Review
 
2017 ITAM Review Salary Survey
2017 ITAM Review Salary Survey2017 ITAM Review Salary Survey
2017 ITAM Review Salary Survey
 
Australia Conference 2018_News that shook the itam world in 2018 with resources
Australia Conference 2018_News that shook the itam world in 2018 with resourcesAustralia Conference 2018_News that shook the itam world in 2018 with resources
Australia Conference 2018_News that shook the itam world in 2018 with resources
 
Australia Conference 2018_What you need to think about when implementing micr...
Australia Conference 2018_What you need to think about when implementing micr...Australia Conference 2018_What you need to think about when implementing micr...
Australia Conference 2018_What you need to think about when implementing micr...
 
Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...
 
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
Australia Conference 2018_Taming the multi-cloud hydra – innovate with confid...
 
Australia Conference 2018_SAM Soufflé: 1 part Tool & 2 parts People = A recip...
Australia Conference 2018_SAM Soufflé: 1 part Tool & 2 parts People = A recip...Australia Conference 2018_SAM Soufflé: 1 part Tool & 2 parts People = A recip...
Australia Conference 2018_SAM Soufflé: 1 part Tool & 2 parts People = A recip...
 
Australia Conference 2018_Process Meh
Australia Conference 2018_Process MehAustralia Conference 2018_Process Meh
Australia Conference 2018_Process Meh
 
Australia Conference 2018_Making ITAM Stick – a blue print for organizational...
Australia Conference 2018_Making ITAM Stick – a blue print for organizational...Australia Conference 2018_Making ITAM Stick – a blue print for organizational...
Australia Conference 2018_Making ITAM Stick – a blue print for organizational...
 
Australia Conference 2018_ITAM in 2023 - where is your role heading
Australia Conference 2018_ITAM in 2023 - where is your role heading Australia Conference 2018_ITAM in 2023 - where is your role heading
Australia Conference 2018_ITAM in 2023 - where is your role heading
 
Australia Conference 2018_ISO 19770 – How it’s changed and how it can benefit...
Australia Conference 2018_ISO 19770 – How it’s changed and how it can benefit...Australia Conference 2018_ISO 19770 – How it’s changed and how it can benefit...
Australia Conference 2018_ISO 19770 – How it’s changed and how it can benefit...
 
Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...
 
Australia Conference 2018_How to be a SaaS manager – tools, people and proces...
Australia Conference 2018_How to be a SaaS manager – tools, people and proces...Australia Conference 2018_How to be a SaaS manager – tools, people and proces...
Australia Conference 2018_How to be a SaaS manager – tools, people and proces...
 
Australia Conference 2018_Getting the best from ibm license metric tool (ilmt...
Australia Conference 2018_Getting the best from ibm license metric tool (ilmt...Australia Conference 2018_Getting the best from ibm license metric tool (ilmt...
Australia Conference 2018_Getting the best from ibm license metric tool (ilmt...
 
Australia Conference 2018_Cloud won't manage itself - a strategic opportunity...
Australia Conference 2018_Cloud won't manage itself - a strategic opportunity...Australia Conference 2018_Cloud won't manage itself - a strategic opportunity...
Australia Conference 2018_Cloud won't manage itself - a strategic opportunity...
 
Australia Conference 2018_Can itam be agile?
Australia Conference 2018_Can itam be agile?Australia Conference 2018_Can itam be agile?
Australia Conference 2018_Can itam be agile?
 
Australia Conference 2018_Building trust, reputation & budget within itam acc...
Australia Conference 2018_Building trust, reputation & budget within itam acc...Australia Conference 2018_Building trust, reputation & budget within itam acc...
Australia Conference 2018_Building trust, reputation & budget within itam acc...
 
Australia Conference 2018_Boost up your oracle audit defence
Australia Conference 2018_Boost up your oracle audit defenceAustralia Conference 2018_Boost up your oracle audit defence
Australia Conference 2018_Boost up your oracle audit defence
 
AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...AUS Conference 2018_All change - aligning sam with your data centre change pr...
AUS Conference 2018_All change - aligning sam with your data centre change pr...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

LANDESK ITAM Review Tools Day Presentation 2015

  • 1. IT Asset Management A Three-tiered Approach Andy Parker Solutions Expert
  • 2. LANDESK §  Global Secure Proven Expertise in:- §  Unified Endpoint Management §  Secure Configuration Management §  IT Service Management §  IT Asset Management §  Visionary and Leader in Gartner Magic Quadrants
  • 3. The IT Asset Management Reality of businesses don’t know if they have the right licenses78% average true-up cost for companies over $50m revenue $263,000 Percentage of companies audited in the last 24 months 37% Number of Microsoft customers audited in 2013 30,000
  • 5. At LANDESK We Believe ITAM is… People Technology More than EndPoint, more than Premise More than Licenses and Software More than ITAM More than Integrated Important to I.T. and the Customer of I.T. Important to LANDESK
  • 6. A Three-tiered Approach §  Asset Discovery §  Asset Intelligence §  Lifecycle Management
  • 7. Tier One - Asset Discovery § Asset Scanning § Manual Input § Import Asset Data
  • 8. All Assets Are Important
  • 9. Vendor Visibility and Integration Connectivity powers IT Asset Management Bring together asset data across your environment. Integrate, report and take action across your Systems, Mobile and ITSM tools.
  • 10. Tier Two – Asset Intelligence § Asset Normalization § EULA Awareness § Asset Mapping
  • 12. Compliance Management – Out Of Compliance
  • 13. Compliance Management – True Up Costs
  • 16. Tier Three – Life Cycle Management
  • 17. The impact of Off-Boarding Most Rogue Ex-Employees Have Access actually logged into accounts after leaving the company49% retained access to confidential or highly confidential data45% of Ex-employees are walking away with their passwords89% still had access to accounts payable they used when working for a previous company24%
  • 18. Process Driven Asset Management
  • 20. Asset Management Processes Software Audit and Reconcile Software Catalog Hardware Catalog Hardware Disposal Asset Lifecycle Contract Management Corporate Governance Supplier Management Asset Repository Hardware Loss / Theft Hardware Refresh Cycle Workspace, Dashboard, Alerting Discovery & Dependency Hardware Change Software Removal ComplianceWarehouse Stock Control Hardware Procurement Hardware Request Software Procurement Software Request Software Clawback Software Patching Software Change Loan/Lease Financial Management
  • 21. ITAM Maturity with LANDESK ITAM Suite INSIGHT Gain Asset Intelligence Discover Consolidate Start SLM CONTROL Achieve Asset Control with Asset Lifecycles Connect to 3rdParty vendor sites and APIs Introduce ITAM basic principles MANAGE Comprehensive IT Asset Management though ITAM Processes Extend to mature SAM & HAM best practice and proven management processes Extend Process- Driven behaviour LEAD Integrate for Best Practice Combined ITAM & ITSM and more Financial Mgnt Combine and Integrate IT Asset Management with IT Service Management for joined up, measurable and improvable IT Combined
  • 22. The LANDESK ITAM Solution Asset Manager Workspace Software License Monitoring Software Reclamation Discover Hardware & Software PurchasesUser Lifecycle Automation Third-party Connectors Asset Management Integrate, take action and automate Extend the value of your systems management tool by monitoring your assets through their entire lifecycle and taking action.
  • 23. Thank You Andy Parker e: andy.parker@landesk.com t: AndyRAParker