With so many IT assets outside of the office, unfortunate events like losing an asset or asset theft are likely to happen more often. Due to the increased risk, IT Asset Management (ITAM) Lost and Theft policies may need to be written, revised, or recommunicated.
An area that can allow for many of these goals to be met is during the acquisition step of the IT asset lifecycle. Acquisitions can be a cost-savings area and it controls what is let into the IT asset environment, giving it the nickname, “the gatekeeper”.
Software seems to always be in the news and prevalent in people’s minds these days, but while this is a vital area to protect, hardware assets also need to be protected.