Learn the basics of IT asset lifecycle management.

IT Asset Lifecycle Management: The Ultimate Guide

If the phrase “IT asset lifecycle management” doesn’t fill your heart with fairy dust and an unknowable gladness, then go back to the darkness from whence you emerged. But if you feel a pleasurable shudder at the phrase, you’ll know that you’ve arrived at a practice that’s fundamentally beneficial to all aspects of your business.

So, here’s our unasked-for-yet-hopefully-useful ultimate guide to the joy that is IT asset lifecycle management. You’ll learn:

  • What it is.
  • Why it’s good for business.
  • Some best practices to get you started.

But first, let’s go over some definitions.

What’s an IT Asset?

We define an IT asset as company-owned information, hardware, or software that make up an IT ecosystem used for business purposes. You’re looking at:

  • Endpoints: Devices that connect to a network system, such as desktop or laptop computers and tablets, smartphones, or printers.
  • Network devices: Routers, switches, firewalls, wireless access points, and load balancers, which are not a thing we made up just now.
  • Servers in all the flavors: File, web, email, and application.
  • Software, software licenses, operating systems, and apps.
  • Cloud services and software-as-a-service stuff.
  • Digital assets such as data in any digital file form, e.g., images, documents, personal data, or videos.

Your happy family of IT assets takes care of a truckload of functions that keep your business doing its thing: Storage, control, display, data transmission, communications, and user management.

Now, it can get a bit sticky if you have a Bring Your Own Device (BYOD) policy, as your IT assets (company data and apps) are living on someone else’s IT asset (your employee’s personal device). But things like mobile application management and conditional access can solve that kind of problem.

What’s the IT Asset Lifecycle?

Every IT asset has a shelf life. Just like us, it has a journey from womb to sustainable willow eco-casket. Simplified, the lifecycle of an IT asset starts when you take control of it. It continues as you use it, and then ends when it has outlived its usefulness to you and you dispose of it humanely. Sad face.

What’s IT Asset Lifecycle Management (ITALM)?

ITALM is a methodology of developing and administering IT assets in a way that gets the best out of them throughout their lifecycle. It’s a chunky subset of IT asset management (ITAM) and its purpose is to maximize benefits to your business and minimize pesky risks.

A note to digital asset fans: Prepare for sadness, because we’re not covering digital asset lifecycle management here. That’s because managing the lifecycle of digital assets is a bit too special. Yes, you’re looking at a similar process, but it’s complexified by specialist management tasks such as distribution, retrieval, and archiving.

Explain Like I’m Five: What Actually Happens in ITALM?

Sure. When you’re ITALM-ing like a boss, you’re:

  • Making all your IT assets visible. For example, to make your mobile devices visible, you’ll use mobile device management. You need to know what assets you have in order to manage them.
  • Recording a whole ton of asset details - financials, age, licensing, serial numbers, etc.
  • Monitoring and tracking assets.
  • Deciding which policies and actions are required to manage those assets appropriately and then applying them.

Why Is ITALM Good for Business?

ITALM is a business superpower that blesses you with the policies, tools, and strategies to make sure that your IT assets are used in the most effective way possible for your business objectives. Having a robust ITALM system in place contributes positively to:

Business Planning
ITALM gives you accurate, real-time visibility of all your IT assets. Your CTO will love this (and you) because this gives you the power to plan more effectively. For instance, if you need to hire, like, 25 people next May, do you have enough devices for them all? ITALM tells guesswork to go swivel because you’ll check your IT asset register (the Holy Baloney of ITALM) and it’ll tell you that you’ve four spares begging to be used, but you’re gonna need to order 21 more from Devices’R’Us. You’ll have those devices ready and waiting for your new people, like you know what you’re doing.

Cost Saving and Forecasting
With your IT assets visible, you’ll know when they’re gonna die. And this means you can plan the funeral and more accurately forecast when you’re going to need some dollars for the replacements. You can also schedule maintenance and upgrades more accurately, and this not only makes your assets last longer but you’ll look really good too. And, with a central source of truth for your IT assets, you’ll eliminate duplicate purchasing as well as the risks and costs of shadow or maverick IT purchasing, where devices and licenses are bought by employees or departments without the knowledge of the IT peeps. ITALM makes asset planning and purchasing more controlled, transparent, and safe.

Optimizing Usage
Because you can see how assets like software subscriptions or devices are actually used in real life, you can squeeze all the juicy goodness out of them, save costs, be more sustainable, or, double wowzer, all three. For example, with ITALM you’ll be able to:

  • Streamline and automate processes and workflows for each stage of a device’s lifecycle. An example: Device still hot out of the oven? Save hours of IT time by switching from manual to automated provisioning.
  • Optimize license usage: If only six of 1300 people are actually using that Quokka™ software that Javier in Logistics thought would be really cool, you can stop paying for that hefty 1300-person license right now.
  • Reduce energy consumption. With good, old-fashioned ITALM, you’ll be able to track energy usage down to the device level, giving you the insight to make planet/people/profit-friendly decisions. Retire energy-hungry endpoints? Change employee behavior? Improve device efficiency? Discover unused hardware that eats those electrons you’re paying for? Yes.

Compliance
If you’re cornered behind a rundown gas station at a creepy rest stop at midnight by the ISO 27001 gang, just show them your ITALM colors and you’ll be fine. That’s because, if you’re doing ITALM right, you’ll have done all the heavy lifting towards compliance with a ton of regulatory frameworks, including the big momma herself, ISO 27001.

That’s because ITALM is a mechanism for your Information Security Management System (ISMS), which is the foundational component of most compliance frameworks. Elements of ITALM protect the holy trinity of compliance: Confidentiality, integrity, and availability.

Data confidentiality means that only authorized humans can get their mitts on your data. Data integrity means that only authorized humans can make changes to the data. Data availability means that the data must be accessible to authorized people when they need it. It’s just access control, people, with a side-order of making sure things don’t break.

With robust ITALM in place, you’ll be able to protect the data living in your assets (and keep data available for the right people) by:

  • Encrypting files and devices
  • Enforcing passcodes and OS upgrades
  • Securely de-activating ancient devices
  • Preventing devices from connecting to unsecured wifi
  • Blocking access to unauthorized apps
  • Planning scheduled downtime rather than surprising everybody just when they’re about to press the “launch new product” button. 

OK, I’m Ready Now. What Are the Stages of IT Asset Lifecycle Management?

So glad you asked. To be real, lifecycle stages can have different names, depending on who you ask/read/pay/pray to, but the principles are the same. Here’s our version:

  1. Plan & Procure
  2. Prepare & Deploy
  3. Use & Maintain
  4. Dispose

1

Plan & Procure

Here’s where you bring new IT assets into your business, in line with your IT strategy and business goals. This could be as straightforward as buying a dozen corporate tablets or renewing a software license, or as complex as migrating your entire business to the cloud.

2

Prepare & Deploy

Got those shiny new assets? Time to prep them for use and release them into the wild. This could be as easy as zero-touch onboarding or as complicated as automating and testing a new quality monitoring system for your manufacturing plant that’s bigger than Idaho.

3

Use & Maintain

Use isn’t just any kind of use - nope, it’s authorized use, which is special. Here’s where that IT asset gets used to within an inch of its life, doing the job that it’s supposed to do.

Maintenance is bigger than a quick buffing of that laptop screen to remove the gross. It’s also about keeping that asset working, optimized, licensed, secured, and safe by monitoring and upgrading. And, don’t forget the dull but important things like safe storage, if the thing isn’t being used but it’s still in your inventory.

4

Dispose

There’s a Gandalf and a Sauron of IT asset disposal. Controlled disposal (Gandalf) is planned and gracefully executed, e.g., your IT strategy says that tablets with more than six birthdays will be taken out and shot or offboarded securely to green waste. Uncontrolled disposal (Sauron) is a nasty surprise, e.g., Naomi’s corporate laptop containing all that customer data is stolen from Sizzler’s again. Whatcha gonna do? Hint: You have a policy for that and it’s called Lock & Wipe.

IT Asset Lifecycle Management and Best Practices in Real Life

As an example of ITALM in action, let’s look at how mobile device lifecycle management works in real life. We’re picking on this type of endpoint management not just because we have a helpful diagram, hand-drawn in oils by our Ignition artist-in-residence, but also because this is what we do for a living, so we know what we’re talking about. Our version of mobile device lifecycle management is called Laptop Logistics and here it is.

Let’s take a look at each stage of the IT asset lifecycle management process and the associated best practices to get you started.

ITALM Stage 1: Plan & Procure

Best Practice 1: Get Visibility of Your IT Assets

This is a biggie, as managing your IT asset lifecycles without actually knowing what assets you have and where they are is super difficult. For mobile endpoints like tablets and smartphones, your not-so-secret weapon is mobile device management. It’ll gather a detailed inventory of your current mobile devices, giving you visibility and central control over your fleet. This is the basis of your IT asset inventory and gives you the power to assign specific controls and policies to each device as well as monitor, track, and secure them.

Best Practice 2: Get Straight on Your Policies and Strategies

Before you start buying a new kit, make sure that:

  • Your IT strategy reflects your business strategy.
  • If you have an IT procurement strategy or green purchasing strategy, your purchases align with them.
  • You take note of your spare devices and decide your policy on how and when you re-use them.
  • You’ve had a social muffin with HR to understand more about what data, apps, and platforms new hires will need to access for their particular role.
  • You’ve drawn up an in-depth checklist for onboarding and offboarding new hires and soon-to-be-ex-hires securely. We’re talking about a mature checklist with responsibilities, accountabilities, and a timeline, not hieroglyphics scribbled on the back of your coworker’s neck.

ITALM Stage 2: Prepare & Deploy

It’s time to get those devices ready to play.  

Best Practice 3: Automated Onboarding

With user-driven automated onboarding - such as zero-touch onboarding and cloud single sign-on - new hires get access to the apps, data, and platforms they need on hour one of day one. But that’s not the best practice. The magic is in the security processes of onboarding– shipping straight from storage or the manufacturer, reducing data risk. A secure sign-in process is also key to ensuring that only authorized newbies have access to corporate data and apps. 

Best Practice 4: Spares Management

Sometimes a device lasts longer than the career of its user. That’s why spares management is a key ITALM best practice that keeps compliance managers especially ecstatic. The practice should include:

  • Shipping the spare back to a safe storage location. 
  • Physical cleaning.
  • Repairs and wiping data.
  • Safe storage.
  • Re-provisioning for a new hire.
  • Boxing up and shipping to said new hire.

ITALM Stage 3: Use & Maintain

Decent ITALM keeps those devices secure, provisioned, and working while it’s doing its thing for your business.

Best Practice 5: Monitoring, Tracking, and Reporting

Now that you have an IT asset registry (free with MDM!), use it to monitor your fleet. While your devices are in their in-use stage, it’s important to ensure they’re being used securely and appropriately. Your MDM dashboard will flag up potential security risks such as ancient OS or large file downloads.

ITALM Stage 4: Dispose

When your IT asset has come to the end of its useful life, it’s time to say, “It’s not you, it’s me” and dispose of it securely and, hopefully, ethically. 

Best Practice 6: Secure Offboarding

Close those SaaS accounts. Wipe or transfer that data. Remote lock the device if you’re that worried. Courier it back to you or your trusted someone to dispose of properly. De-activate and remove mobile app management from BYOD devices.

No-Tears ITALM Is Our Middle Name

All the cool kids are tackling ITALM because it’s a business asset that pays for itself a whole ton. Our IT asset lifecycle management services take care of your IT assets throughout, guess what, their lifecycle. If you’re thinking about giving ITALM a go, give us a call.

Ignition is Silicon Valley’s best (and friendliest) IT security, compliance, and support team. Call us now–chatting about IT support and cybersecurity is our favorite thing to do!

Get started!