Published/updated: June 2006
by Dale Vile
Technology advances in some areas and commoditisation in others has led to a general proliferation in the number and type of components that must be supported by IT departments. In addition, components are continually being updated, re-deployed and combined in different ways, often without the involvement or knowledge of the IT function. It is also becoming increasingly more common for new equipment and software to enter the organisation independently of the IT department, through local procurement by business units and the introduction of personal technology by users at an individual level.
Online research study in which information was gathered from 2,630 respondents, predominantly ITC professionals from a mix of industries and company sizes, via a Web based questionnaire.
Organisations maintaining a more complete, accurate and up-to-date knowledge of the hardware and software installed within their business are better able to deliver an effective to service end users.
Maintaining that knowledge is a challenge, however, and often relies on regular auditing. Indeed, the research reveals a direct relationship between the quality of asset records and the frequency with which IT audits are conducted.
Despite these dependencies, many large organisations do not have automated auditing capability in place. These, along with the majority of smaller organisations, are still relying on ad hoc systems or resource intensive paper-based tracking.
ANALYSIS AND CONCLUSIONS
IT asset tracking in many organisations is still viewed as a chore. Very often, it is something that is done to keep accountants and auditors happy from a cost control and/or regulatory perspective. Anecdotal feedback suggests the link between knowledge of installed assets and the ability to deliver a more effective service to users is often not appreciated. This link makes sense, though, when we consider how much more efficient application rollout, preventative maintenance and help desk support can be when technical staff have deployment and configuration information immediately at hand.
What is not surprising, is the observation that keeping asset records up-to-date without frequent and effective auditing is a real challenge. With the highly dynamic nature of IT systems and equipment today, coupled with autonomous activity on the part of business units and individual users, relying on information capture at the point of deployment or change by the IT department is generally inadequate.
Against this background, automated solutions that electronically detect and capture the configuration of components on the network are becoming more important. Such capability is, in fact, a pre-requisite for the optimum delivery of IT services in all but the smallest environments.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
firstname.lastname@example.org or call +44 (0)1425 626501 / 620008
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about to deal with evolving requirements. ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more