IAITAM Specials

IAITAM Best Practice Library

IAITAM Best Practice Library

Price: $1,650.00
Save 40% with Corporate or Provider Level Memberships
Save 25% for Individual Level Memberships
*Use your personal promo code to receive instant discount on registration.

Purchase Library Now

Product Description:

IAITAM’s Best Practice Library (IBPL), the ITAM Practitioner’s Guide to an IT Asset Management Program, represents the collective knowledge and experiences of the entire IT Asset Management industry. This twelve volume set consists of thirteen books packed full of knowledge, workflows, templates and whitepapers for each of the twelve Key Process Areas (KPAs).

There are twelve volumes addressing the twelve Key Process Areas (KPA’s):

  • Acquisition Management
  • Asset Identification
  • Communication and Education
  • Compliance Management
  • Disposal Management
  • Documentation Management
  • Financial Management
  • Legislation Management
  • Policy Management
  • Program Management
  • Project Management
  • Vendor Management

A Best Practice Library couldn’t be called practical without including industry standards and regulations. The IBPL addresses standards such as ISO’s 19770 and the UK-OGC’s ITIL, and regulations such as Sarbanes-Oxley and HIPAA.

Unlike other standards, the IAITAM Best Practice Library addresses not just the what, but more importantly, the why and the how. The why enables the IT Asset Manager to educate and justify the improvements to the organization’s ITAM processes and the how provides the IT Asset Manager with a practical implementation guide that is easily modified to the organization’s unique environment. Further supporting the how, each volume contains templates and workflows that can easily be customized to meet the organization’s ITAM program.

Order as a full set or individual volumes. Individual volumes come with the corresponding templates and workflows on CD so that they may be tailored to any organization. Order online  or fax your completed Order Form to +1.330.628.3289.

Included with the IBPL full set:

Volume 1:
IAITAM Best Practice BluePrint

The IAITAM Best Practice BluePrint (BP2) is a process-oriented framework and the initial volume of the IAITAM Best Practice Library based upon the collective knowledge and practices that have proven most successful by the IT Asset Management (ITAM) profession. The BP2 provides an informational guide for the organization seeking to implement an IT Asset Management program.

View Table of Contents

Volume 2:
Program Management Book 1 & 2

The Program Process is the centralized area for managing the information throughout all phases of the IT Asset Management program. ITAM must be developed and maintained as an on-going, centralized program without an end, thus ensuring that all relevant activities are integrated, processes are established, strategies, mission statements, objectives, measurements and prioritizations occur in a coordinated fashion.

This volume is not available for purchase or member benefit outside of the full IAITAM Best Practice Library

Volume 3:
Policy Management

Policy Management is a critical success factor for any IT asset management program. Policies need to be clearly defined, understandable and enforced. As a best practice, IAITAM has identified more than thirty policy areas that relate directly to IT asset management and must be defined for any organization. Once defined, the policies must be accessible and presented in a way that employees can readily understand what is required and why it is beneficial for the organization.

View Table of Contents

Volume 4:
Communication & Education

Communication & Education Managementwill require many people directly supporting the program and the entire organization when it comes to awareness and understanding of policy. Proactive change management requires planning and communicating for change, followed by the necessary training to ensure that the adoption of these new policies are successful and that employees truly understand how to use the new processes. Departments within the organization in the past have been able to operate rather autonomously, each dependent on the other for the success of the overall business strategy but not dependent on one another for the function of the individual department. Information Technology has changed this business model forever. The good news is that this is possible with a strategic plan for communication and education.

View Table of Contents

Volume 5:
Project Management

Project Management can be defined as an organized and managed set of activities that results in the achievement of a unique and well-defined end-result or work product or deliverable. Resources are mobilized and deployed to perform the activities in a controlled fashion. A project, implicitly and by definition, has a start and an end. Therefore, a project differs from recurring operational activities that may be performed many times repeatedly in a typical corporate environment. The Project Management process area defines those characteristics of a project team that are essential to successfully conducting the initiatives that are needed to meet the goals of the ITAM.

View Table of Contents

Volume 6:
Documentation Management

Document Management encompasses management capability for all IT asset-related documents throughout most of their life-cycle, from request and acquisition onward. This discipline includes management of contracts, proof of purchases, and all software licenses including certificates of authenticity (“COAs”).

View Table of Contents

Volume 7:
Financial Management

Financial Management is a key part of not only your asset management program but affects departments across your corporate enterprise. Financial IT Asset Management is the backbone to savings within your IT Asset Management program from budgeting to invoice reconciliation. Financial IT Asset Management includes many operationally recurring functions: budgeting, fixed asset reconciliation, chargeback, invoice reconciliation, forecasting, financial audit preparation, and billing. In addition to these, the Financial IT Asset Management discipline must support a strategic view of IT spending.

View Table of Contents

Volume 8:
Compliance & Legislation

Compliance and Legislation Management is the focal point for risk avoidance and audit response. As part of this PA, the organization prepares to respond, responds to compliance events, performs periodic internal asset discoveries and ultimately settles non-compliance matters.

View Table of Contents

Volume 9:
Vendor Management

Vendor Management defines attributes of maturity in how well you are communicating with, leveraging and negotiating with your vendors. Structural strategies for success include assigning vendor managers internally, following a documented communication protocol and building a library of interactions. Business strategies for lease-versus-buy, outsource-versus-retain, and global consolidation are encompassed in these processes.

View Table of Contents

Volume 10:
Acquisition Management

Acquisition Managementis the gatekeeper for the application of all IT asset management strategies determined by your organization, including policies, standards and life-cycle processes. Effective IT acquisition process empowers the rest of your IT asset program by applying process, determining pathways for exceptions and generating the initial records for the IT assets before acquisition is even complete.

View Table of Contents

Volume 11:
Asset Identification

Asset Identification encompasses the activities that uniquely identify and validate the physical presence of IT assets. It is a key enabler of many related activities in the Software Life-cycle, Hardware Life-cycle, IT Acquisition and Documentation Management Process Areas. Unique physical identification tags on the outside of the IT asset associate that label with a particular IT asset, which may not have meaning outside of the organization.

View Table of Contents

Volume 12:
Disposal Management

Disposal Management is the procedure for properly removing assets from your environment. A mature disposal process will allow your enterprise to avoid costly storage of unused assets, mitigate risk associated with disposal, reallocation of software, security of information maintained before the disposal process, while increasing return on investment.

View Table of Contents

Library also includes:

  • CD containing IBPL templates and workflows that may be tailored to any organization
  • IBPL KPA Relationships and Dependencies poster, an at-a-glance overview of how each KPA impacts the others.
Purchase Complete IBPL Library Now