1 ITAM (IT Asset Management) Владимир РАЗУВАЕВ Руководитель Департамента бизнесконсалтинга
2 Why do you need software asset management 1 Decrease of risks Control 2 Savings 3
3 ITAM IT asset accounting
4 ITAM a place in IT management system Service Desk IT Governance User configuration data Location data Needs estimation data Data for negotiations with vendors/ suppliers manageability ITAM Investment Analysis ROI calculation data TCO calculation data Financial risks minimization IT Security Control of unauthorized devices Control of unauthorized applications installations/launch Decrease of legal risks
5 Short review of IT risks Category Description Example Technology Hardware or software is inoperable, unreliable or do meet business requirements Router failure Failure of the database server Safety Policy and rights Loss, damage or theft of the hardware or data, unauthorized access or use of data Lack of procedures and the politics causing misuse, impossibility of emergency recovery, noncompliance with the legislation Unauthorized access to a network via the web server Data leakage on CD, a flash cards, etc. Breaking of passwords Leakage of keys, activation codes, distribution kits Procedure of emergency restoration isn't documented and tested Unlicensed software use Installation of unnecessary or improper software Staff Human mistakes, dismissal of key employees Double purchase Incorrect accounting Lack of necessary skills Infrastructure Shutdown of external services (electric power, phone, Internet); refusal of key vendors Impossibility to use Impossibility to solve business problems by means of key applications
6 Assessment of legal risk Legal risk Number of Legality coefficient Average cost of the = * personal * software per user * computers rubles (maximum compensation) (incl. server software and business applications) 3 (twice payment to vendor within civil proceedings + 1 (legalization cost)) The legal risk of use of 10 "counterfeit" AutoCAD (Autodesk AutoCAD 2014 Commercial New SLM ML03): 10 * * = !
7 Structure of operational risk Difference between planned and actual use of IT assets Incomplete accounting of contract options The incomplete accounting of configuration changes, move and phasing-out of IT assets Incorrect management accounting of IT assets Lack of information for planning of purchases
8 SAM the main part of ITAM Software Asset Management The major task within IT assets management Software requires: qualitative identification recognition of bundles consistent license compliance verification upgrade/downgrade management version/release management standardization Different types of licenses upgrade/downgrade rules different usage scenarios/models (terminal, virtualization, SaaS etc.) Software has:
9 Main ITAM processes Management of requirements Phasing-out Budgeting Changes/manageme nt of lifecycle Purchase/manageme nt of suppliers Accounting/manag ement of contracts
10 ITAM step by step IT-asset management Discovery IP Devices Non IP devices Identification Software identification Hardware identification Verification Of licenses compliance Of physical location Management user-device-software contract information financial information workflow/business process
11 Discovery of deices Discovery of deices with IP Or own agent Asset Manager
12 Discovery of devices Discovery of devices not connected to LAN Agents are installed from the flash-drive Inventory ID
13 Software identification Registry Executable file WMI Software library Licenses Important!!! Discovery and identification of distributive copies
14 Hardware identification 1 inventory ID 2 PC name 3 responsible user job title 4 department/division/business 5
15 License compliance B Inventory DB Verification
16 Key processes Documentation Management Financial Management Covers document flow supporting IT asset lifecycle. Includes management of requirements, budgeting, forecasts, etc. Acquisition Management Compliance & Legislation Management Provides process of execution of purchases and correct accounting. Concerns providing of compliance with legislation, first of all in the field of copyright (software). Asset Identification Basis for the accounting and decision-making. Disposal Management
17 Requirements to the software Key requirements Management of the software Quality of the software recognition/identification Recognition/management of packages Addition of the software description Appointment/removal of licenses Software usage monitoring Storage of electronic copies of documentation Management of the hardware History logging Appointment of the unique identifier Statuses of life cycle General Interface of contracts management Interface of financial management Simplicity of integration KPI and Dashboard
18 What will the project give to you? The guaranteed economy of payments for licenses and support 7-25% per year. Ensuring compliance of purchased IT assets to the business requirements economy will be 7-15% of the IT assets budget. Optimization of IT assets usage structure classification and standardization savings at 4-10% of the IT assets budget. Assessment and minimization of legal/reputation risks providing a continuity of business. Reduction of operational expenses for implementation and maintenance of workplaces optimization of activity of the IT personnel. ROI 130% per year
19 Realized projects Customer One of the largest banks of Russia. More than personal computers. Location Head office in Moscow. More than 160 branches in the Russian Federation Project terms The project was realized in 2010 in 7 months. The methodology of TCO and ROI calculation specialized for the company Project results The project was paid off within 9 months; index of return of investments 140% Software management processes are developed in compliance with ISO
20 Realized projects Заказчик Large production holding More than users Location Head office in Yekaterinburg 26 branches in Ural and nearby territorial subjects of the Russian Federation Project terms The project was realized in within 6 months Project results The concept of purchases centralization is adapted The economy of the software budget within the first year is more than 30%
21 Realized projects Customer One of the largest energy companies More than users Location Head office in Moscow More than 18 branches across all Russian Federation. Project terms The project was realized in 2012 within 6 months The cumulative cost of IT assets possession is reduced by 35% Project results Management of requirements is created and automated Optimization of server software is more than 25%
22 Realized projects Customer Branch of multinational corporation About 800 users Location Head office in Moscow. Representatives of the organization in 20 regions of Russia Project terms The project was realized in 2013 within 3 months Project results Optimization of Microsoft, Oracle, IBM, Symantec server licensing - Payback within a month since the end of the project; IT assets management is completely automated.
23 RGRK "Voice of Russia". General information General: RGRK "Voice of Russia" The broadcasting company, in Moscow PCs. 4 consecutive projects were realized: SAM - the main objective discovery of the structure of used software and implementation of SAM processes according to ISO HAM the main objective - implementation of hardware management processes and automation of hardware accounting. Automation of hardware location inventory the main objective is real time hardware tracking (comparison of hardware MAC addresses at network sockets) and display of the current situation on the building map (MS Sharepoint portal). Service Desk implementation the main objective automation of management processes incidents, configurations and changes..
24 RGRK "Voice of Russia". Solution Inventory of software and hardware configurations Automation of installations Software inventory data Software Management Hardware inventory data Данные SAM Management of incidents ZNO management Management of changes Resource and service model
25 LLC Rusvinil. Project purposes Formalization of basic Service Desk processes: Management of incidents; Management of problems; Management of changes; Management of releases. ITAM installation Distribution of the agens software to target personal computers; Inventory of the personal computers and software; Recognition of the software. Automation of Service Desk processes Formation of services and SLA catalog; Automation of Service Desk basic processes. Automation of Service Desk processes Connectors design; Adaptation of tabular forms; Development of the connector with possibility of schedule control.
26 PLATFORMS LLC Rusvinil. Solution Management of incidents Management of changes Management of demands Management of problems Management of releases and installation Software installation and providing of the hardware Statistics of incidents Configurations Management (CMDB) ITAM SAM HAM
27 Some statistics "70% of the organizations have 30% discrepancy between the actual number of the personal computer (discovered during inventory) and accounted quantity (data of management accounting)" Correct accounting allows to reduce a total cost of license contracts. Namely, difference in 10% between registered and real number of the personal computer allows to lower royalties and payments for technical support by 10% annually. "Average ROI (return of investments index) at implementation of SAM/ITAM is 131% annually" Return of investments is provided with economy of the IT budget: Compliance of purchases with real/reasonable business requirements is 12% from the average annual software budget Reuse of licenses brings % from the average annual software budget
28 Some statistics "Systematic management of IT assets life cycle will reduce the cost of each asset by 30% within the first year and by 5-10% within each following year". "Organizations practicing ITAM lower TCO by 15%". "Lack of proper ITAM practices may increase the total cost of property for hardware assets by 7-10% annually". "The cost of possession of the personal computer may be reduced approximately by 30% at implementation of ITAM". "50% of Helpdesk service operating time is spent on discovery of the user PC configuration".
29 Will be pleasured to answer your questions Vladimir RAZUVAEV Head of Business consulting Department
Quantifying ROI: Building the Business Case for IT and Software Asset Management Benefits of IT and Software Asset Management In today s increasingly competitive business environment, companies are realizing
BEST PRACTICES WHITE PAPER Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI Table of Contents INTRODUCTION...1
www.intellectme.com www.it-corner.net help desk logos are registered trademarks of Automate your help desk and asset management and improve your business efficiency - Reduce expenditure on HW and SW by
ITIL glossary and abbreviations English This glossary may be freely downloaded. See www.itil-officialsite.com/internationalactivities/itilglossaries.aspx for details of licence terms. 1 Acknowledgements
Processes 395 Integrating configuration management into existing processes 7.2 Integrating configuration management into existing processes To implement configuration management in a complex environment,
ITIL V3 Application Support Volume 1 Service Management For Application Support ITIL is a Registered Trade Mark and Community Trademark of the Office of Government and Commerce. This document may contain
MeasureIT Survey Questions (Complete Budget and Staffing) NOTE: Budget questions only - sections A, B, C, G Staffing questions only - sections A, D, E, F, G, H Section A: Primary Demographic Information
Outsourcing Workbook Page 1 Copyright 2008 Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording,
HIGH-SPEED, WEB-BASED INTEGRATED SERVICE MANAGEMENT SOFTWARE brochure Update Global Partners.qxd 30/9/09 16:44 Page 2 - Marval s next generation - Marval s of integrated next IT generation of integrated
Information Technology Outsourcing 2nd Edition Global Technology Audit Guide (GTAG ) 7 Information Technology Outsourcing 2nd Edition June 2012 GTAG Table of Contents Table of Contents...1 Executive Summary...2
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Checklist to Assess Security in IT Contracts Federal Agencies that outsource or contract IT services or solutions must determine if security is adequate in existing and new contracts. Executive Summary
Service Management Simplified TOPdesk develops, markets, implements and supports software which helps organisations to efficiently manage the services they provide. Our vision is to create a user-friendly
Configuration, Change, and Release Management Policies and Procedures Guide Table of Contents Section 1 Introducing Configuration, Change, and Release Management...5 1.1 Overview of Configuration, Change,
REQUEST FOR PROPOSAL No. 226 Applicant Tracking System This is a Request for Proposal ( RFP ) for the provision of the implementation of a hosted Applicant Tracking System ( ATS ) for the Office of the
Top 10 SIEM Implementer s Checklist Operationalizing Information Security Compliments of AccelOps www.accelops.com Table of Contents Executive Summary....................................................................
PUBLIC POWER CORPORATION S.A. INFORMATION TECHNOLOGY DIVISION CENTRAL SYSTEMS SUPPORT SECTION IT SYSTEMS SECURITY SUBSECTION PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS
Application Performance Monitoring/Management (APM) Request for Information (RFI) 28198-CH Issued: March 30, 2015 Responses Due: May 12, 2015 This is not a bid or proposal. This Request for Information
Semester: Title: Cloud computing - impact on business Project Period: September 2014- January 2015 Aalborg University Copenhagen A.C. Meyers Vænge 15 2450 København SV Semester Coordinator: Henning Olesen
Cloud Computing Tutorial CLOUD COMPUTINGTUTORIAL by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Cloud Computing Tutorial Cloud Computing provides us a means by which we can access the applications
Information Security Policy The purpose of this Policy is to describe the procedures and processes in place to ensure the secure and safe use of the federation s network and its resources and to protect