THE ITAM BLOG

Understanding The IT Asset Management Lifecycle

Author: Jeremy Boerger, The ITAM Coach​

UNDERSTANDING THE IT LIFECYCLE

Understanding The IT Asset Management Lifecycle

We, as an industry, do a pretty poor job of defining precisely what the IT asset management lifecycle looks like. Therefore, it’s incredibly difficult, if not impossible, to automate both the reporting and the processing of the asset lifecycle. Organizations have to rely on manual feedback on work orders and inventories to know what kind of hardware and software is actually being used. It’s a problem.

Instead, we should be defining IT asset management lifecycle stages in such a way that it’s clear what an asset is, and the asset can report back to our CMBD or asset MDR to tell us where it is in the lifecycle.

In my book, Rethinking IT Asset Management, I go into depth on the IT asset management lifecycle. The TL;DL (too long; didn’t read) version is below:

The 5 Step IT Asset Management Lifecycle

The 5 Step IT Asset Management Lifecycle

Step One – Procured

Also known as: Purchased, Acquired, Requested
Money, or the promise of money, has been paid for the possession of or right to use the asset.


Step Two – Inventoried

AKA: Delivered, Received, Processed, Making Ready
Asset has been physically received and is being made ready for use in the computing environment.


Step Three – Installed

AKA: In Use, Deployed, Implemented, Active
Asset is active in the computing environment.


Step Four – Recovered/

AKA: Returned, Fit for use, Recycled
Asset has been removed from the computing environment temporarily, with the intent it will be used again.


Step Five – Disposed

AKA: Retired, Lost/Stolen, Sold, Destroyed, Trashed, Removed From Service
Asset has been removed from the computing environment permanently and is no longer the property or concern of the organization.

You’ll notice something v particular about these definitions – they are mutually exclusive. That means something that is In Use can’t be in any other stage. For example, something that is Disposed can’t be on the shelf in inventory. It’s gone. Something that’s In Use can’t be sitting on the truck on its way to be delivered.

 

So, with these definitions in mind, can you craft data attributes that will signal to you or your CMDB that an asset is not where it was in the last cycle but in a new spot?

 

The IT Asset Management Lifecycle – Look For The Data Details

 

The short answer is this: there are certain details to look for that tell you where an asset is.

  • Installed: If an asset is installed, you should see it active on your network. People are logging into it, it has an IP address, it’s consuming power, it appears on network scans, etc.

 

  • Disposed: You should have a certification, receipt, or something else that shows your organization no longer has the asset in hand. If you have such a document, but the asset is behaving as if it’s installed, you have a problem and had better look into it!

 

  • Procured: It shouldn’t show up anywhere other than on a P.O. or tracking number. But if it acts like it is installed, then it is a good bet someone skipped a step.  And a skipped step could mean skipped protections and a cybersecurity threat.

 

  • Inventoried & Recovered:  This is the trickiest part. We know they’ve been purchased because we have documentation saying so. We know they haven’t been thrown away because we don’t have a document staying so. We know they aren’t deployed because they’re not showing active in the network. Therefore, the only place these devices should be is in your warehouse or staging area. And that should be an easy walk to look and find it.

 

What’s the point of this exercise? By reorganizing your hardware around this kind of an IT asset management lifecycle, you will know with a much higher degree of certainty what hardware is being used and what isn’t. Consequently, you’ll know what software needs to be licensed because it’s (almost always) running on the deployed hardware.

 

The benefit then is that as hardware comes in and out of service, you know which software licenses can be recovered and redeployed. And that’s the first step in optimizing your hardware and software expenditures.

 

Did you enjoy Understanding the IT Asset Management Lifecycle? Feel free to subscribe to my blog, and I’ll periodically send you more helpful content (case studies, too) to your inbox.

Share this Article

Jeremy Boerger<br><a class="itam-title">The ITAM Coach</a>

Jeremy Boerger
The ITAM Coach

Jeremy Boerger has over two decades of experience within the Information Technology sector. His signature Pragmatic ITAM Method is used by major manufacturing, healthcare, and global financial institutions. It enables them to Spend Less On Software Without Buying Less Software.

Categories

Categories

Recent Posts

Subscribe to my blog

Buy The Book:

Rethinking Technology Asset Management

If you’re a business leader or an IT
executive who is tired of hearing:
This is just the way ITAM is.
Then this book is for you. Buy here:


Screen Shot 2022-03-31 at 9.31.11 AM
Jeremy Boerger<br><a class="itam-title">The ITAM Coach</a>

Jeremy Boerger
The ITAM Coach

Jeremy Boerger has over two decades of experience within the Information Technology sector. His signature Pragmatic ITAM Method is used by major manufacturing, healthcare, and global financial institutions. It enables them to Spend Less On Software Without Buying Less Software.

Categories

Categories

Recent Posts

Recent Posts

Subscribe to my blog

Buy The Book:

Rethinking Technology Asset Management

If you’re a business leader or an IT
executive who is tired of hearing:
This is just the way ITAM is.
Then this book is for you. Buy here:


Screen Shot 2022-03-31 at 9.31.11 AM

CONTACT THE ITAM COACH

Schedule a call with me and find out if you could be managing your assets more efficiently with the tools you already have. There is no pressure or obligation.
(You may not even need me!)

Submit the form or:

mobile-logo-resized mobile-btn-resized-final
Boerger Consulting