SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
05/26/2021
IT Service & Asset
Management Better Together
Webinar
Agenda
• Introductions
• From Cookie Monster, Burning Laptops
To Mystery Routers
• Common Pain Points
• ITSM & ITAM Together
• Combined Use Cases
• Key Benefits
• Q&A
Copyright © 2021 Ivanti. All rights reserved.
Phil Bowermaster Dave Martinez Mareike Fondufe
Do you have a
Cookie Monster
in your
organization?
Reactive Approach
BEFORE
• Incomplete asset list
and history​
• Easier for assets to
‘fall through the cracks’​
• Introduces risks and
security vulnerabilities
Proactive Approach
AFTER
• Better visibility on assets
and their history​
• Correlate with incident
information for ‘last touch’​
• Improved tracking and risk
management processes
Cookie
Monster
Do you suffer from
“Burning Laptop
Syndrome”?
Reactive Approach
BEFORE
• Staff resources spending
time on ‘one-off’
resolutions​
• Lack of visibility to all
possible replacement
devices​
• Potentially missing larger
vendor issues
Proactive Approach
AFTER
• Immediately identify as
warranty issue​
• Quickly get employee
productive​
• Quantify potential risk pool​
• Determine corrective
actions with vendor
Burning
Laptop
Syndrome
Copyright © 2021 Ivanti. All rights reserved.
Mysterious
Routers
Copyright © 2021 Ivanti. All rights reserved.
Reactive Approach
BEFORE
• Missing information
• Purchasing information
and assets not linked
• Vulnerable to cyber-
attacks
Proactive Approach
AFTER
• Asset Discovery and
Inventory
• Integrated Purchase and
Contract Management​
• Improved security
processes
Mysterious
Routers
POLL
What are you using
to track your IT
assets?
RESULT
43%
of organizations use
spreadsheets to track
their IT Assets
Copyright © 2021 Ivanti. All rights reserved.
Common Pain Points
Risk
• Lost or stolen assets
• Shadow IT
• Users don’t return
used equipment
• Security team
needs accurate
asset allocation
details
Productivity
• Refresh falling behind,
users frustrated with
old devices
• On-boarding new
employees is taking
too long
• Productivity loss due to
system downtime
Efficiency
• Tracking assets with
multiple spreadsheets,
no confidence in data
• Using basic discovery
solutions, but not
happy with results
• No integration of
purchasing and stock
information
Financial
• Over-buying software
to protect against
audits
• Executives unable to
forecast or plan
• No ability to link
contracts to assets, no
proactive notifications
when contracts are
expiring or renewing
IT Service and Asset
Management Together
Copyright © 2021 Ivanti. All rights reserved.
From Silo IT to Combined ITSM & ITAM
Logging Tickets
Re-keying Information Over
Checking Spreadsheets
Swivel Chair Management
SILOS
Proactive Remediation
Automated Processes
Audit Defense
One Platform
COMBINED
Empowering IT to be a Strategic Business Partner
Copyright © 2021 Ivanti. All rights reserved.
IT Asset
Management
IT Service
Management
Incident, Problem,
Change, Release
CMDB/AMDB
Request Catalog Users
Stock,
Product Catalog,
Contracts, Vendors
Copyright © 2021 Ivanti. All rights reserved.
Crawl – Walk – Run
Time
&
Effort
Value to business
Build
the foundation
Manage
the process
Optimize
for growth
Copyright © 2021 Ivanti. All rights reserved.
Empower Users
with Self Service
Reactive Approach
BEFORE
• Long response times & fulfillment
delays​
• Manual hand-offs and coordination​
• Unnecessary additional license
purchases
Proactive Approach
AFTER
• Self-service requests fulfilled
quickly and painless​
• Licenses reclaimed - IT budget
optimized​
• User productivity stays high
Copyright © 2021 Ivanti. All rights reserved.
Accelerate Incident
Management​
Reactive: “One-Off” Approach​
BEFORE
• Missing information that could help​
• Lower employee productivity with
long resolution times​
• Potential for missing lower cost
approaches
Proactive: Navigate the Landscape
AFTER
• Faster resolution times – see all
relevant asset information
• Take proactive approach with users​
• Check potential risk for incident type
Copyright © 2021 Ivanti. All rights reserved.
Proactively Manage
Problem Assets​
Reactive: “One-Off” Approach​
BEFORE
• Siloed problem data​
• Lower employee productivity with
long resolution times​
• Potential for missing lower cost
approaches
Proactive: Don’t Fix - Replace
AFTER
• Correlated problem and asset data​
• Take proactive approach with users​
• Change process for downloading
application (if warranted)
Copyright © 2021 Ivanti. All rights reserved.
Effective Change
Management​
Incomplete Insight
BEFORE
• Unclear view what licenses may
already be available​
• Risk from unknown add-on license
requirements​
• Potential for post-rollout ‘clean up’
More Successful Outcomes​
AFTER
• Identify licensing and configuration
risks early​
• Licenses reclaimed - IT budget
optimized​
• More successful emergency
changes
POLL
Do your service
management processes
automatically have
visibility into asset
information?
RESULTS
31%
No
43%
Sometimes
26%
Yes
BEFORE AFTER
Static data
Days
Silo information
Correlated service
and asset data
Minutes
Insights to take action
Copyright © 2021 Ivanti. All rights reserved.
IT Service & Asset
Management Together
Complete
Lifecycle
Visibility
Faster Incident
Response Time
Proactive
Remediation
Effective
Change
Management
Enhanced Self
Service
License
Optimization
Copyright © 2021 Ivanti. All rights reserved.
Expand from a solid foundation
Marketing
Finance
Legal
Copyright © 2021 Ivanti. All rights reserved.
See you
next time
Forrester –
Future of IT
Operations
Fix Incidents
before they
happen
JUNE 23
JUNE 3
Copyright © 2021 Ivanti. All rights reserved.

Mais conteúdo relacionado

Mais procurados

IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)Laurence Tindall
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramIvanti
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance FrameworkSherri Booher
 
Configuration Management Maturity
Configuration Management MaturityConfiguration Management Maturity
Configuration Management MaturityMichaël Danys
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog OverviewChristopher Glennon
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Evergreen Systems
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsDam Frank
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process GuideFlevy.com Best Practices
 
Introduction To ITIL Slide Share
Introduction To ITIL Slide ShareIntroduction To ITIL Slide Share
Introduction To ITIL Slide Sharedwslaterjr
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementCA Technologies
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationIISGL
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management Alkesh Mishra
 
Asset management
Asset managementAsset management
Asset managementrob coulson
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 

Mais procurados (20)

IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)IT Asset Management (ITAM) - Hardware Asset Management (HAM)
IT Asset Management (ITAM) - Hardware Asset Management (HAM)
 
AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
Configuration Management Maturity
Configuration Management MaturityConfiguration Management Maturity
Configuration Management Maturity
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
ITSM and Service Catalog Overview
ITSM and Service Catalog OverviewITSM and Service Catalog Overview
ITSM and Service Catalog Overview
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
CMDB Building Blocks
CMDB Building BlocksCMDB Building Blocks
CMDB Building Blocks
 
It governance
It governanceIt governance
It governance
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
 
Introduction To ITIL Slide Share
Introduction To ITIL Slide ShareIntroduction To ITIL Slide Share
Introduction To ITIL Slide Share
 
What is IT Governance?
What is IT Governance?What is IT Governance?
What is IT Governance?
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset Management
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
ITIL Basic concepts
ITIL   Basic conceptsITIL   Basic concepts
ITIL Basic concepts
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management ITIL Foundation in IT Service Management
ITIL Foundation in IT Service Management
 
Asset management
Asset managementAsset management
Asset management
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 

Semelhante a IT Service & Asset Management Better Together

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Know Your Assets, Know Your Business
Know Your Assets, Know Your BusinessKnow Your Assets, Know Your Business
Know Your Assets, Know Your BusinessIvanti
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017Smart ERP Solutions, Inc.
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy AutomationTufin
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIPrecisely
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT SolutionsJohn Maguire
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingEd Byrne
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016Dave Archer
 

Semelhante a IT Service & Asset Management Better Together (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Know Your Assets, Know Your Business
Know Your Assets, Know Your BusinessKnow Your Assets, Know Your Business
Know Your Assets, Know Your Business
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Proactive IT-Management
Proactive IT-ManagementProactive IT-Management
Proactive IT-Management
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROI
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud Computing
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
 

Mais de Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

Mais de Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

IT Service & Asset Management Better Together

  • 1. 05/26/2021 IT Service & Asset Management Better Together Webinar
  • 2. Agenda • Introductions • From Cookie Monster, Burning Laptops To Mystery Routers • Common Pain Points • ITSM & ITAM Together • Combined Use Cases • Key Benefits • Q&A
  • 3. Copyright © 2021 Ivanti. All rights reserved. Phil Bowermaster Dave Martinez Mareike Fondufe
  • 4. Do you have a Cookie Monster in your organization?
  • 5. Reactive Approach BEFORE • Incomplete asset list and history​ • Easier for assets to ‘fall through the cracks’​ • Introduces risks and security vulnerabilities Proactive Approach AFTER • Better visibility on assets and their history​ • Correlate with incident information for ‘last touch’​ • Improved tracking and risk management processes Cookie Monster
  • 6. Do you suffer from “Burning Laptop Syndrome”?
  • 7. Reactive Approach BEFORE • Staff resources spending time on ‘one-off’ resolutions​ • Lack of visibility to all possible replacement devices​ • Potentially missing larger vendor issues Proactive Approach AFTER • Immediately identify as warranty issue​ • Quickly get employee productive​ • Quantify potential risk pool​ • Determine corrective actions with vendor Burning Laptop Syndrome
  • 8. Copyright © 2021 Ivanti. All rights reserved. Mysterious Routers
  • 9. Copyright © 2021 Ivanti. All rights reserved. Reactive Approach BEFORE • Missing information • Purchasing information and assets not linked • Vulnerable to cyber- attacks Proactive Approach AFTER • Asset Discovery and Inventory • Integrated Purchase and Contract Management​ • Improved security processes Mysterious Routers
  • 10. POLL What are you using to track your IT assets?
  • 12. Copyright © 2021 Ivanti. All rights reserved. Common Pain Points Risk • Lost or stolen assets • Shadow IT • Users don’t return used equipment • Security team needs accurate asset allocation details Productivity • Refresh falling behind, users frustrated with old devices • On-boarding new employees is taking too long • Productivity loss due to system downtime Efficiency • Tracking assets with multiple spreadsheets, no confidence in data • Using basic discovery solutions, but not happy with results • No integration of purchasing and stock information Financial • Over-buying software to protect against audits • Executives unable to forecast or plan • No ability to link contracts to assets, no proactive notifications when contracts are expiring or renewing
  • 13. IT Service and Asset Management Together
  • 14. Copyright © 2021 Ivanti. All rights reserved. From Silo IT to Combined ITSM & ITAM Logging Tickets Re-keying Information Over Checking Spreadsheets Swivel Chair Management SILOS Proactive Remediation Automated Processes Audit Defense One Platform COMBINED Empowering IT to be a Strategic Business Partner
  • 15. Copyright © 2021 Ivanti. All rights reserved. IT Asset Management IT Service Management Incident, Problem, Change, Release CMDB/AMDB Request Catalog Users Stock, Product Catalog, Contracts, Vendors
  • 16. Copyright © 2021 Ivanti. All rights reserved. Crawl – Walk – Run Time & Effort Value to business Build the foundation Manage the process Optimize for growth
  • 17. Copyright © 2021 Ivanti. All rights reserved. Empower Users with Self Service Reactive Approach BEFORE • Long response times & fulfillment delays​ • Manual hand-offs and coordination​ • Unnecessary additional license purchases Proactive Approach AFTER • Self-service requests fulfilled quickly and painless​ • Licenses reclaimed - IT budget optimized​ • User productivity stays high
  • 18. Copyright © 2021 Ivanti. All rights reserved. Accelerate Incident Management​ Reactive: “One-Off” Approach​ BEFORE • Missing information that could help​ • Lower employee productivity with long resolution times​ • Potential for missing lower cost approaches Proactive: Navigate the Landscape AFTER • Faster resolution times – see all relevant asset information • Take proactive approach with users​ • Check potential risk for incident type
  • 19. Copyright © 2021 Ivanti. All rights reserved. Proactively Manage Problem Assets​ Reactive: “One-Off” Approach​ BEFORE • Siloed problem data​ • Lower employee productivity with long resolution times​ • Potential for missing lower cost approaches Proactive: Don’t Fix - Replace AFTER • Correlated problem and asset data​ • Take proactive approach with users​ • Change process for downloading application (if warranted)
  • 20. Copyright © 2021 Ivanti. All rights reserved. Effective Change Management​ Incomplete Insight BEFORE • Unclear view what licenses may already be available​ • Risk from unknown add-on license requirements​ • Potential for post-rollout ‘clean up’ More Successful Outcomes​ AFTER • Identify licensing and configuration risks early​ • Licenses reclaimed - IT budget optimized​ • More successful emergency changes
  • 21. POLL Do your service management processes automatically have visibility into asset information?
  • 23. BEFORE AFTER Static data Days Silo information Correlated service and asset data Minutes Insights to take action
  • 24. Copyright © 2021 Ivanti. All rights reserved. IT Service & Asset Management Together Complete Lifecycle Visibility Faster Incident Response Time Proactive Remediation Effective Change Management Enhanced Self Service License Optimization
  • 25. Copyright © 2021 Ivanti. All rights reserved. Expand from a solid foundation Marketing Finance Legal
  • 26. Copyright © 2021 Ivanti. All rights reserved. See you next time Forrester – Future of IT Operations Fix Incidents before they happen JUNE 23 JUNE 3
  • 27. Copyright © 2021 Ivanti. All rights reserved.