Martin Thompson and I were recently commissioned to write an overview of options for Hardware Asset Tagging for a client. The client has kindly let us share our report for the benefit of the ITAM Review community. Thanks to Michael Smith, Practice Area and Delivery Manager, Inventory Group at American Appraisal for his peer review and contributions to this guide. If you have any other information to add to this guide about Asset Tagging please contact us or leave a comment, thanks, David.
By David Foxen and Martin Thompson, The ITAM Review.
Whilst hardware is becoming increasingly commoditized at the desk side level; in the datacentre server, storage, network and infrastructure hardware assets still require significant capital investment and extensive maintenance cost for any organization. Additionally, asset loss, business or workflow interruptions and data breaches remain a serious risk. Tracking and managing these assets in the datacentre as efficiently as possible is critical to business operations and maximum return on investment.
Asset Tagging, and the corollary activity of associating accurate data to the asset tag, is a practice for managing and reconciling ownership, location and configuration of hardware assets. This short paper outlines key approaches to Asset Tagging, some considerations for implementations and strengths and weaknesses of each methodology.
Overall, depending on the unique requirements of organizations, barcodes with embedded RFID are the most robust and efficient method to asset tag.
Asset Tagging is the main process for identifying and managing hardware assets. Asset Tagging has come a long way from simply adding a sticker highlighting the machine name, user and location. There are now a number of different options organisations have for tagging their assets:
Approach
|
Explanation |
Strengths |
Weaknesses |
Conclusion |
Barcoding with RFID | Asset tag with a both a barcode and RFID solution. Asset tags are available as a security tag. | – Secure- Quick- Mature system- Efficient- Real or near real time data collection capability | – Requires new ITAM processes- Requires management of asset database- Requires new hardware and software- Relatively high cost- Radio spectrum usages vary worldwide | Scanner and software required.Best option for efficient Asset ManagementWorks best in a controlled, limited environment |
Manual asset tags | Creating internal labels and naming conventions | – Low cost option | – Manual- Time consuming- Quality of labels typically is low- Immature- Room for error- Process variances between locations introduce uncertainty | Manual task. Time consuming and resource intensiveLow quality tags not durable |
Barcoding only | Adding asset tags with unique barcodes | – Reasonably Secure – Can report to inventory/database – Enables better management- Relatively low cost |
– No RFID, so less secure – Requires management of asset database – Updated ITAM processes- Requires labour intensive manual scanning of individual assets after deployed. |
Good option, but not as good as barcodes with RFIDWorks well in a distributed, less controlled environment |
Serial Numbers | Asset tagging via hardware serial number. Manual entry to database required | – Uses unique serial number identified by vendor- Better management than manual asset tags | – Still manual- S/N’s can rub off- Not all serial numbers are barcoded and subject to human error when input manually- Serial numbers are not always accessible on deployed assets- Doesn’t help manage assets location
– Prone to duplicates / vendor errors
|
Not sophisticated enough, prone to errorSerial number is not a good primary key for databases because of the inconsistent formats and structure between manufacturers. |
RFID and barcoding (as one solution).
Serial numbers are often duplicated, damaged or not available during the inventory process. The format of the serial number varies widely by manufacturer, which is not conducive to a database key identifier. Serial number collection is prone to human error and interpretation. Serial numbers often have special non-alpha or non-numeric characters (#, -, %). While the serial number is a key data point for all assets, it should not be used as the standard data point for tracking and reporting purposes in isolation. Barcoding is the preferred route. This allows for a consistent, key identifier for all assets in a standard format. Bar coding also allows for a more controlled inventory. Tags can be tracked and assets visually confirmed as well as being captured within the inventory.
RFID asset tags are becoming more standard in the datacentre and server environment, and also with other assets that organisations don’t want to leave the premises. Overall, having an RFID and Barcoded asset tagging solution will bring greater management and security to hardware assets.
Passive
Passive RFID systems have the reader and reader antenna send a radio signal to the asset tag. The RFID tag then uses the transmitted signal to power on, and reflect energy back to the reader. This form of RFID system can operate in the low frequency (LF), high frequency (HF) or ultra-high frequency (UHF) radio bands.
As passive system ranges are limited by power, they typically have a range of 10m or less, possibly due to positioning and physical obstacles. Due to the fact passive tags do not require a power source or transmitter, and only require a tag chip and antenna, they are cheaper, smaller, and easier to manufacture than active tags. Passive tags should not be placed directly on metal surfaces unless there is foam backing on the tag as the metal may interfere with the return signal.
Passive tags can be packaged in many different ways. They can be sandwiched between an adhesive layer and a paper label to create smart RFID labels. Passive tags may also be embedded in a variety of devices or packages to make the tag resistant to extreme temperatures or harsh chemicals.
Active
In active RFID systems, tags have their own transmitter and power source. Usually, the power source is a battery (see BAP below). Active tags broadcast their own signal to transmit the information stored on their microchips.
Active RFID systems operate in the ultra-high frequency (UHF) band and offer quite a long range to around 100m. This form of active tag is used on valuable objects, such as laptops and mobile devices that need to be tracked over distance. Though the battery life spans have improved considerably, the battery will fail and the tag may ultimately need to be replaced depending on the life of the asset. Active tags will typically have a small rate of failure at initial deployment as well.
You can get active asset tags in two forms. Option one is a transponder (a solution that effectively ‘wakes up’ when it receives a radio transmission for a reader) and option two is beacons (real-time location service that tracks exactly where the asset is). Apart from the feature differences, beacons are not powered by the reader’s signal. They send and receive signals at set intervals instead, based on how often they are required to report back the intervals can be set as low as every few seconds.
BAP (Battery assisted passive systems)
BAP is a battery assisted passive tag, and is an asset tag that uses its own integrated power source. Other RFID solutions use energy from the RFIDs signal to power the asset tags chip. However, BAP tags do not have their own transmitters like other solutions.
Tracking RFID
There are two main methods (also best practice standards) for tracking assets that have an RFID solution:
Indoor RFID’s
Indoor RFID’s use passive systems that can be used over short distances in which the asset needs to be tracked. The asset can be tracked through a small number of known points within the location of the organisation, especially at entry/exit portals, and with an RFID system the asset is automatically monitored. This would be a good solution for desktops and servers. Mobile hand held readers or antennas mounted to carts also offers a sound and efficient way to scan in the RFID tags.
Active RFID provides superior performance where real-time tracking is required throughout a larger or more complex area, such as a large building with many floors, rooms and generally a bigger area. Battery powered active tags have far greater signal range, and certain features of the active RFID are cheaper which makes this a financially more attractive option.
Outdoor GPS Tracking
For assets that will leave the premises, the standard form of asset tracking is via GPS. There are combined RFID and GPS solutions available that provide visibility on assets location when it leaves the office. Such solutions can provide specialist software that help track assets that leave the premises in real-time data. This form of solution also helps with security as if an asset is stolen, data can be remotely wiped form the asset remotely.
These GPS & RFID systems can be configured to highlight key information that an organisation needs, so it’s quite customizable and relevant to any form of organisation.
Without Asset Tagging
Asset Management –
Security issues –
With standardised Asset Tagging
Short-term
There are a number of factors to consider when implementing a standardised asset tagging solution:
Long-term
Long-term considerations that must be addressed are:
Asset tagging has an effect on Hardware Asset Management (HAM), Software Asset Management (SAM) and Mobile Device Management (MDM) processes.
HAM;
SAM;
MDM;
Digital Asset Tagging – some organizations record the asset tag number of physical asset tags within the registry of systems or other logical place such as Active Directory to make retrieval possible via auto-discovery and network inventory systems. This also adds a further level of data verification against other data sources when fed into ITAM repositories or SAM tools.
Data Verification Processes – data verification is an important aspect of an Asset Tagging strategy. Industry best practice suggests verification of assets from at least two separate data points (for example checking the barcode and serial number). This is especially important in the Asset Disposal process whereby an accurate and verifiable chain of custody is required to mitigate data breaches and / or meet industry or government regulation.
Questions to consider?
Martin Thompson and I were recently commissioned to write an overview of options for Hardware Asset Tagging for a client. The client has kindly let us share our report for the benefit of the ITAM Review community. Thanks to Michael Smith, Practice Area and Delivery Manager, Inventory Group at American Appraisal for his peer review and contributions to this guide. If you have any other information to add to this guide about Asset Tagging please contact us or leave a comment, thanks, David.