Create a SWOT analysis of your current or anticipated ITAM program.

Prog Home v3 Forums CAMP SPT Create a SWOT analysis of your current or anticipated ITAM program.

Viewing 15 posts - 106 through 120 (of 121 total)
  • Author
    Posts
  • #70825
    Musthaq Mohammed
    Participant

    S: We communicate
    W: Information is scattered
    O: Make an effort to bring all the information at one place
    T: Provide security to that gathered information

    #70861
    Michael Mariano
    Participant

    Strengths (Internal Positive Factors)
    Weaknesses (Internal Negative Factors)
    Opportunities (External Positive Factors)
    Threats (External Negative Factors)

    #70937
    Antonio Navas
    Participant

    Strengths: Clear processes starting to take shape.
    Weaknesses: Limited resources and not all roles defined yet.
    Opportunities: Cost savings, better visibility, and compliance.
    Threats: Lack of awareness and risk of shadow IT.

    #70945
    Robert Festoff
    Participant

    Strength is a committed Asset Management team who agrees on the processes
    Weakness is the lack of communication by management, we have to keep repeating ourselves
    Opportunities – We have alot of opportunities, need to limit access to the asset database
    threat – being undermined by upper management who think the rules don’t apply to them

    #71005
    Harshad Joshi
    Participant

    Na

    #71022
    John Olotu
    Participant

    .

    #71180
    Dan Cassidy
    Participant

    Strengths: strong team structure
    Weakness: short-staffed and spread too thin
    Opportunity: create a legitimate ITAM structure
    Weakness: buy-in from the rest of organization to invest into ITAM

    #71230
    David Saliem
    Participant

    Strengths—Our asset tagging and inventory are very accurate. We have a very strong system in place that the company is all on board with.
    Opportunities – The Potential for more advanced software to keep track of inventory and eliminate old procedures
    Weaknesses—We do not have proper standards for specific makes/models of hardware accessories. This allows users to custom-order some expensive, unnecessary items at times.
    Threats—There is no cost-charge system for users who lose items. Most users are unaware that there is no penalty for lost/damaged assets, so we are okay with that, but this is a significant looming threat.

    #71316
    Annatjie van
    Participant

    n/a

    #71355
    Victor Danao
    Participant

    Strengths: Improved compliance with licensing agreements and regulations.
    Weaknesses: Existing data may be scattered, outdated, or incomplete.
    Opportunities: Implement automation tools for real-time asset discovery and lifecycle management
    Threats: Software audits and potential fines from non-compliance.

    #71462
    Holly McInroy
    Participant

    S: Asset Identification, Vendor Management, Procurement
    W: All-encompassing business cases, Vendor Compliance
    O: Lifecycle Process
    T: Economic Environment, Political Interruption, Client/Customer Demand

    #71566
    John Paul Lorenzo
    Participant

    N/A

    #71625
    Adam Warner
    Participant

    Strength: Trust and buy-in from leadership, insight into current assets
    Weakness: Lack of enforcement methods, limited insight into non-asset areas
    Opportunities: Room for growth and communication with other divisions / KPA areas to improve mutual support
    Threats: some of program pieces are addressed in broad strokes already with potential lack of understanding to IT significance

    #71649
    Ana Arteaga
    Participant

    Strong team with good communications
    No one (1) purchase path
    Build a streamline process from scratch that will provide efficiency
    Too many layers involving outside agencies that control the contract negotiations

    #71717
    Darrin Dyches
    Participant

    strength – Wide range of experienced professionals
    weakness – Policies and procedures not adhered to throughout the broader company.
    opportunity – CRM tool and using it
    threat – Transfer of knowledge

Viewing 15 posts - 106 through 120 (of 121 total)
  • You must be logged in to reply to this topic.