
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Pocket CIO β The Guide to Successful IT Asset Management
About this book
Create and manage a clear working IT asset management strategy with this unique guide
Key Features
- A detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents.
- Includes in-depth discussion on how risk management has changed and the possible solutions needed to address the new normal
- A step-by-step ITAM manual for newbies as well as seasoned ITAM veterans
Book Description
This book is a detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents. It is a step-by-step IT Asset Management manual for the newbies as well as the seasoned ITAM veterans, providing a unique insight into asset management. It discusses how risk management has changed over time and the possible solutions needed to address the new normal. This book is your perfect guide to create holistic IT Asset Management and Software Asset Management programs that close the risk gaps, increases productivity and results in cost efficiencies. It allows the IT Asset Managers, Software Asset Managers, and/or the full ITAM program team to take a deep dive by using the templates offered in the guidebook. You will be aware of the specific roles and responsibilities for every aspect of IT Asset Management, Software Asset Management, and Software License Compliance Audit Response. By the end of this book, you will be well aware of what IT and Software Asset Management is all about and the different steps, processes, and roles required to truly master it.
What you will learn
- Close the hidden risk gaps created by IT assets (hardware and software)
- Create and manage a proactive ITAM and SAM program and policy
- A clear, concise explanation of what IT Asset Management and Software Asset Management is, the benefits, and results
- The best ways to manage a software audit and how to be prepared for one
- Considerations for selecting the best technology for a specific company including what questions should be asked at the onset
- Increasing ITAM program and project success with change management
Who this book is for
This book is intended for CIOs, VPs and CTOs of mid to large-sized enterprises and organizations. If you are dealing with changes such as mergers, acquisitions, divestitures, new products or services, cyber security, mandated regulations, expansion, and much more, this book will help you too.
]]>
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
What is SAM?
Software, license, contracts, money pit
- Reduced audit exposure and financial risk to the enterprise
- Reduced security risk from unauthorized software within the environment
- Minimized cybersecurity risk
- Improved budgeting process and financial controls
- Increased operational efficiency
Successful Implementation of SAM programs
The C-suite didn't buy it
- First year savings of up to 45% and ongoing annual savings of 15-30%
- 98% risk reduction from non-compliance with regulations such as SOX and PCI-DSS.
- 98% risk reduction from software licensing non-compliance, which could cost thousands of dollars, or millions, depending on the size of your enterprise.
- Operational efficiencies that help the organization become more competitive, profitable, productive, customer-focused and prepared for growth.
Reduced audit exposure and potential financial risk to the enterprise
- Leverage enterprise agreements
- License optimization (no more and no fewer licenses owned than required to meet contractual obligations)
- Reduced maintenance expenses
Reduced security risk from unauthorized software within the environment
Minimized cyber security risk (SAM + IT Security)
- Securely manage software assets and promote cybersecurity best practices
- Provide full transparency of IT assets across the enterprise to ensure a secure IT infrastructure that provides an effective defense against cyber attacks
- Protect the organization from data loss, employee downtime, and negative reputation resulting from data breaches
Improved budgeting process and financial controls
Table of contents
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Contributors
- Preface
- ITAM β It's Not Just IT's Problem or Function
- ITAM Strategy and Plan
- The New Risk Management
- What is SAM?
- Understanding and Surviving Software License Compliance Audits
- ITAM Tools β What Should You Look For?
- Increasing ITAM Program and Project Success Rates using Change Management
- Now What?