SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
05/26/2021
IT Service & Asset
Management Better Together
Webinar
Agenda
• Introductions
• From Cookie Monster, Burning Laptops
To Mystery Routers
• Common Pain Points
• ITSM & ITAM Together
• Combined Use Cases
• Key Benefits
• Q&A
Copyright © 2021 Ivanti. All rights reserved.
Phil Bowermaster Dave Martinez Mareike Fondufe
Do you have a
Cookie Monster
in your
organization?
Reactive Approach
BEFORE
• Incomplete asset list
and history​
• Easier for assets to
‘fall through the cracks’​
• Introduces risks and
security vulnerabilities
Proactive Approach
AFTER
• Better visibility on assets
and their history​
• Correlate with incident
information for ‘last touch’​
• Improved tracking and risk
management processes
Cookie
Monster
Do you suffer from
“Burning Laptop
Syndrome”?
Reactive Approach
BEFORE
• Staff resources spending
time on ‘one-off’
resolutions​
• Lack of visibility to all
possible replacement
devices​
• Potentially missing larger
vendor issues
Proactive Approach
AFTER
• Immediately identify as
warranty issue​
• Quickly get employee
productive​
• Quantify potential risk pool​
• Determine corrective
actions with vendor
Burning
Laptop
Syndrome
Copyright © 2021 Ivanti. All rights reserved.
Mysterious
Routers
Copyright © 2021 Ivanti. All rights reserved.
Reactive Approach
BEFORE
• Missing information
• Purchasing information
and assets not linked
• Vulnerable to cyber-
attacks
Proactive Approach
AFTER
• Asset Discovery and
Inventory
• Integrated Purchase and
Contract Management​
• Improved security
processes
Mysterious
Routers
POLL
What are you using
to track your IT
assets?
RESULT
43%
of organizations use
spreadsheets to track
their IT Assets
Copyright © 2021 Ivanti. All rights reserved.
Common Pain Points
Risk
• Lost or stolen assets
• Shadow IT
• Users don’t return
used equipment
• Security team
needs accurate
asset allocation
details
Productivity
• Refresh falling behind,
users frustrated with
old devices
• On-boarding new
employees is taking
too long
• Productivity loss due to
system downtime
Efficiency
• Tracking assets with
multiple spreadsheets,
no confidence in data
• Using basic discovery
solutions, but not
happy with results
• No integration of
purchasing and stock
information
Financial
• Over-buying software
to protect against
audits
• Executives unable to
forecast or plan
• No ability to link
contracts to assets, no
proactive notifications
when contracts are
expiring or renewing
IT Service and Asset
Management Together
Copyright © 2021 Ivanti. All rights reserved.
From Silo IT to Combined ITSM & ITAM
Logging Tickets
Re-keying Information Over
Checking Spreadsheets
Swivel Chair Management
SILOS
Proactive Remediation
Automated Processes
Audit Defense
One Platform
COMBINED
Empowering IT to be a Strategic Business Partner
Copyright © 2021 Ivanti. All rights reserved.
IT Asset
Management
IT Service
Management
Incident, Problem,
Change, Release
CMDB/AMDB
Request Catalog Users
Stock,
Product Catalog,
Contracts, Vendors
Copyright © 2021 Ivanti. All rights reserved.
Crawl – Walk – Run
Time
&
Effort
Value to business
Build
the foundation
Manage
the process
Optimize
for growth
Copyright © 2021 Ivanti. All rights reserved.
Empower Users
with Self Service
Reactive Approach
BEFORE
• Long response times & fulfillment
delays​
• Manual hand-offs and coordination​
• Unnecessary additional license
purchases
Proactive Approach
AFTER
• Self-service requests fulfilled
quickly and painless​
• Licenses reclaimed - IT budget
optimized​
• User productivity stays high
Copyright © 2021 Ivanti. All rights reserved.
Accelerate Incident
Management​
Reactive: “One-Off” Approach​
BEFORE
• Missing information that could help​
• Lower employee productivity with
long resolution times​
• Potential for missing lower cost
approaches
Proactive: Navigate the Landscape
AFTER
• Faster resolution times – see all
relevant asset information
• Take proactive approach with users​
• Check potential risk for incident type
Copyright © 2021 Ivanti. All rights reserved.
Proactively Manage
Problem Assets​
Reactive: “One-Off” Approach​
BEFORE
• Siloed problem data​
• Lower employee productivity with
long resolution times​
• Potential for missing lower cost
approaches
Proactive: Don’t Fix - Replace
AFTER
• Correlated problem and asset data​
• Take proactive approach with users​
• Change process for downloading
application (if warranted)
Copyright © 2021 Ivanti. All rights reserved.
Effective Change
Management​
Incomplete Insight
BEFORE
• Unclear view what licenses may
already be available​
• Risk from unknown add-on license
requirements​
• Potential for post-rollout ‘clean up’
More Successful Outcomes​
AFTER
• Identify licensing and configuration
risks early​
• Licenses reclaimed - IT budget
optimized​
• More successful emergency
changes
POLL
Do your service
management processes
automatically have
visibility into asset
information?
RESULTS
31%
No
43%
Sometimes
26%
Yes
BEFORE AFTER
Static data
Days
Silo information
Correlated service
and asset data
Minutes
Insights to take action
Copyright © 2021 Ivanti. All rights reserved.
IT Service & Asset
Management Together
Complete
Lifecycle
Visibility
Faster Incident
Response Time
Proactive
Remediation
Effective
Change
Management
Enhanced Self
Service
License
Optimization
Copyright © 2021 Ivanti. All rights reserved.
Expand from a solid foundation
Marketing
Finance
Legal
Copyright © 2021 Ivanti. All rights reserved.
See you
next time
Forrester –
Future of IT
Operations
Fix Incidents
before they
happen
JUNE 23
JUNE 3
Copyright © 2021 Ivanti. All rights reserved.

Mais conteúdo relacionado

Mais procurados

Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney DavisCydney Davis
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSRazak Mohammed Ali
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationScott Gombar
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSIvanti
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementCA Technologies
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader pptBimadRajSinha1
 
Managed IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation SlidesManaged IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation SlidesSlideTeam
 
OSS Service Assurance -Concept Presentation by Biju M Rr
OSS Service Assurance  -Concept Presentation by Biju M RrOSS Service Assurance  -Concept Presentation by Biju M Rr
OSS Service Assurance -Concept Presentation by Biju M RrBiju M R
 
ISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistIvan Piskunov
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 

Mais procurados (20)

Itam Presentation by Cydney Davis
Itam Presentation by Cydney DavisItam Presentation by Cydney Davis
Itam Presentation by Cydney Davis
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Information management
Information managementInformation management
Information management
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONS
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset Management
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
Managed IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation SlidesManaged IT Services Pricing Models And Strategies Powerpoint Presentation Slides
Managed IT Services Pricing Models And Strategies Powerpoint Presentation Slides
 
OSS Service Assurance -Concept Presentation by Biju M Rr
OSS Service Assurance  -Concept Presentation by Biju M RrOSS Service Assurance  -Concept Presentation by Biju M Rr
OSS Service Assurance -Concept Presentation by Biju M Rr
 
ITIL Process Map
ITIL Process MapITIL Process Map
ITIL Process Map
 
ISO 27001 (v2013) Checklist
ISO 27001 (v2013) ChecklistISO 27001 (v2013) Checklist
ISO 27001 (v2013) Checklist
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
It governance
It governanceIt governance
It governance
 
Managed Services Overview
Managed Services OverviewManaged Services Overview
Managed Services Overview
 
IT Service Desk
IT Service DeskIT Service Desk
IT Service Desk
 

Semelhante a IT Service & Asset Management Better Together

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Know Your Assets, Know Your Business
Know Your Assets, Know Your BusinessKnow Your Assets, Know Your Business
Know Your Assets, Know Your BusinessIvanti
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update ManagementQuest
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017Smart ERP Solutions, Inc.
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy AutomationTufin
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIPrecisely
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT SolutionsJohn Maguire
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingEd Byrne
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015Shannon Lietz
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016Dave Archer
 

Semelhante a IT Service & Asset Management Better Together (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Know Your Assets, Know Your Business
Know Your Assets, Know Your BusinessKnow Your Assets, Know Your Business
Know Your Assets, Know Your Business
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Effective Patch and Software Update Management
Effective Patch and Software Update ManagementEffective Patch and Software Update Management
Effective Patch and Software Update Management
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Proactive IT-Management
Proactive IT-ManagementProactive IT-Management
Proactive IT-Management
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
Justifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROIJustifying Capacity Management Efforts with Provable and Positive ROI
Justifying Capacity Management Efforts with Provable and Positive ROI
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
IT 2.0 and Cloud Computing
IT 2.0 and Cloud ComputingIT 2.0 and Cloud Computing
IT 2.0 and Cloud Computing
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
 

Mais de Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

Mais de Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Último

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

IT Service & Asset Management Better Together

  • 1. 05/26/2021 IT Service & Asset Management Better Together Webinar
  • 2. Agenda • Introductions • From Cookie Monster, Burning Laptops To Mystery Routers • Common Pain Points • ITSM & ITAM Together • Combined Use Cases • Key Benefits • Q&A
  • 3. Copyright © 2021 Ivanti. All rights reserved. Phil Bowermaster Dave Martinez Mareike Fondufe
  • 4. Do you have a Cookie Monster in your organization?
  • 5. Reactive Approach BEFORE • Incomplete asset list and history​ • Easier for assets to ‘fall through the cracks’​ • Introduces risks and security vulnerabilities Proactive Approach AFTER • Better visibility on assets and their history​ • Correlate with incident information for ‘last touch’​ • Improved tracking and risk management processes Cookie Monster
  • 6. Do you suffer from “Burning Laptop Syndrome”?
  • 7. Reactive Approach BEFORE • Staff resources spending time on ‘one-off’ resolutions​ • Lack of visibility to all possible replacement devices​ • Potentially missing larger vendor issues Proactive Approach AFTER • Immediately identify as warranty issue​ • Quickly get employee productive​ • Quantify potential risk pool​ • Determine corrective actions with vendor Burning Laptop Syndrome
  • 8. Copyright © 2021 Ivanti. All rights reserved. Mysterious Routers
  • 9. Copyright © 2021 Ivanti. All rights reserved. Reactive Approach BEFORE • Missing information • Purchasing information and assets not linked • Vulnerable to cyber- attacks Proactive Approach AFTER • Asset Discovery and Inventory • Integrated Purchase and Contract Management​ • Improved security processes Mysterious Routers
  • 10. POLL What are you using to track your IT assets?
  • 12. Copyright © 2021 Ivanti. All rights reserved. Common Pain Points Risk • Lost or stolen assets • Shadow IT • Users don’t return used equipment • Security team needs accurate asset allocation details Productivity • Refresh falling behind, users frustrated with old devices • On-boarding new employees is taking too long • Productivity loss due to system downtime Efficiency • Tracking assets with multiple spreadsheets, no confidence in data • Using basic discovery solutions, but not happy with results • No integration of purchasing and stock information Financial • Over-buying software to protect against audits • Executives unable to forecast or plan • No ability to link contracts to assets, no proactive notifications when contracts are expiring or renewing
  • 13. IT Service and Asset Management Together
  • 14. Copyright © 2021 Ivanti. All rights reserved. From Silo IT to Combined ITSM & ITAM Logging Tickets Re-keying Information Over Checking Spreadsheets Swivel Chair Management SILOS Proactive Remediation Automated Processes Audit Defense One Platform COMBINED Empowering IT to be a Strategic Business Partner
  • 15. Copyright © 2021 Ivanti. All rights reserved. IT Asset Management IT Service Management Incident, Problem, Change, Release CMDB/AMDB Request Catalog Users Stock, Product Catalog, Contracts, Vendors
  • 16. Copyright © 2021 Ivanti. All rights reserved. Crawl – Walk – Run Time & Effort Value to business Build the foundation Manage the process Optimize for growth
  • 17. Copyright © 2021 Ivanti. All rights reserved. Empower Users with Self Service Reactive Approach BEFORE • Long response times & fulfillment delays​ • Manual hand-offs and coordination​ • Unnecessary additional license purchases Proactive Approach AFTER • Self-service requests fulfilled quickly and painless​ • Licenses reclaimed - IT budget optimized​ • User productivity stays high
  • 18. Copyright © 2021 Ivanti. All rights reserved. Accelerate Incident Management​ Reactive: “One-Off” Approach​ BEFORE • Missing information that could help​ • Lower employee productivity with long resolution times​ • Potential for missing lower cost approaches Proactive: Navigate the Landscape AFTER • Faster resolution times – see all relevant asset information • Take proactive approach with users​ • Check potential risk for incident type
  • 19. Copyright © 2021 Ivanti. All rights reserved. Proactively Manage Problem Assets​ Reactive: “One-Off” Approach​ BEFORE • Siloed problem data​ • Lower employee productivity with long resolution times​ • Potential for missing lower cost approaches Proactive: Don’t Fix - Replace AFTER • Correlated problem and asset data​ • Take proactive approach with users​ • Change process for downloading application (if warranted)
  • 20. Copyright © 2021 Ivanti. All rights reserved. Effective Change Management​ Incomplete Insight BEFORE • Unclear view what licenses may already be available​ • Risk from unknown add-on license requirements​ • Potential for post-rollout ‘clean up’ More Successful Outcomes​ AFTER • Identify licensing and configuration risks early​ • Licenses reclaimed - IT budget optimized​ • More successful emergency changes
  • 21. POLL Do your service management processes automatically have visibility into asset information?
  • 23. BEFORE AFTER Static data Days Silo information Correlated service and asset data Minutes Insights to take action
  • 24. Copyright © 2021 Ivanti. All rights reserved. IT Service & Asset Management Together Complete Lifecycle Visibility Faster Incident Response Time Proactive Remediation Effective Change Management Enhanced Self Service License Optimization
  • 25. Copyright © 2021 Ivanti. All rights reserved. Expand from a solid foundation Marketing Finance Legal
  • 26. Copyright © 2021 Ivanti. All rights reserved. See you next time Forrester – Future of IT Operations Fix Incidents before they happen JUNE 23 JUNE 3
  • 27. Copyright © 2021 Ivanti. All rights reserved.