There are four key factors in the ownership, management and exploitation of application software assets –
Requirements – defining and quantifying the organization’s true requirements for an application. Organizations will purchase MS Office™ Professional for the entire network simply because they have no tools to quantify how many users only require Office Standard.
License ownership – If an organization has had decentralized software purchasing, then locating and documenting actual licenses can be the most challenging aspect of taking full control of software assets.
Inventory – how many copies are actually installed? This is critical – top quality inventory is a cornerstone of software asset optimization.
Usage – how many of the deployed copies are actually used. A PC sitting unused on a desk is highly visible. A copy of an application sitting unused on a hard disk is invisible and unnoticed.
We regard an organization as having fully optimized its software assets when all four factors are in sync.
Colin Bartram
About the Author
Colin Bartram is VP Technology with Vector Networks Technology Group. He has been involved in the evolution of IT asset management since its inception in the 1980s, holding positions primarily in marketing and product management. Further information regarding Vector Networks can be found here.
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
TLDR. ITAM Forum has the opportunity to join the Linux Foundation as a stand-alone, self-funded project. This article covers a) What’s happening b) Why I think it’s a great move for the ITAM Forum and c) ...
From 1st November 2025, Microsoft will remove all tiered pricing for Online Services under the Enterprise Agreement. This means all customers renewing or purchasing new Online Services after this date, will receive standard level A pricing ...
I delivered our “Managing AI as an Asset” training course the day before the Wisdom conference last week. Thank you to those who attended and provided feedback. It will be available on the LISA platform before ...
Since the ITAM Forum has been working in strategic partnership with the FinOps Foundation, I’ve come to admire the Crawl, Walk, Run approach to best practices, as it allows improvements and recommendations to meet the organisation ...
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
Managing AI in the enterprise is a team sport. In this article, I want to explore specifically what ITAM brings to the table as we enter the AI era. As I’ve mentioned in previous articles on ...