Rethinking Information Technology Asset Management by Jeremy L. Boerger

Rethinking Information Technology Asset Management by Jeremy L. Boerger

Author:Jeremy L. Boerger
Language: eng
Format: epub
Publisher: Business Expert Press
Published: 2021-03-19T00:00:00+00:00


Identifying Data Customers and Critical Fields

There are only two questions driving our activity in this phase:

1. Who is asking for ITAM information?

2. What ITAM information are they asking for?

Earlier in this book, we identified IT Security as one data customer. ITSec is keenly interested in how well their vulnerability scanning tools are penetrating the environment. ITAM is in the best position to report on that data since ITAM needs to know its SSoT is penetrating the same environment. IT Service Management (ITSM) is another data customer discussed earlier in this book, since ITSM requires verified user and Asset Lifecycle data to efficiently deliver their services. IT Finance (ITFin) is a third, as they will be interested in the relationship between consumed and unconsumed assets in their quest to maximize ROI and minimize TCO.

These departments are among the easiest to communicate and collaborate with because the discovery process often involves the ITAM team asking these very same departments questions and probing them for answers. By relaying back verifiably accurate data that helps them, a mutually beneficial relationship can flourish.

We need to examine what types of data customers we are dealing with because their needs will determine our critical fields.

ITSec, ITSM and ITFin are examples of internal data customers we need to consider.

Software publishers and the license auditors they employ are external data customers. Publishers and auditors are outside of your organization and their interests are separate from your organization’s interests. Maybe parallel, like a good service provider should be, but let’s not kid ourselves.5

Because publishers and auditors are outside of your organization, you cannot just call them up and ask them about their audit details to find out what data they need from you. (As any veteran ITAM expert will tell you, that will instantly trigger an audit!) The good news is, these data customers have already told you exactly what details they will expect from you should an audit occur (and one will eventually). Those details are buried within the master agreements (MAs), end-user license agreements (EULAs), volume license agreements (VLAs), and other underpinning documentation.

MAs, EULAs, and VLAs are legally binding contracts describing the relationship between the software publisher and the software user. Somewhere in them, the ITAM team will find language describing the nature of the use rights granted to your organization by the publisher. Two of the most common use licenses (see Figure 5.1 and Figure 5.2 for example text) are user-based licensing and computer-based licensing or device licensing.6



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.