Optimized processes, independent selection of the best ITAM solutions, maximizing the ROI on IT assets

View our services

ABOUT design for IT

Becoming an independent and trusted ITAM advisor delivering IT business value solutions

GLOBAL

Unlike others, we operate across the globe as one firm. All our partners around the world work as part of a single, well-coordinated team.
The structure of our organization enables us to be truly responsive on a global scale; moving through the barricades and other internal misalignments that often slow down other professional services firms.

Read More

SUCCESSFUL SERVICES

While others sit back and pinpoint high risks from the sideline, we will immediately select the right solutions and experts in order to help you to get you where you need to be with your organization. While many firms only tell you, what is wrong and may offer (sponsored) suggestions on courses of action, design for IT activates the technical and operational experts needed to implement solutions that will fix the problem(s).

Read More

PRICING

How can we deliver such high business value and remain very cost competitive? Beside fixed pricing contracts, we are not afraid of “profit sharing” agreements and then we will basically finance ourselves from the enormous cost-savings which we accomplish. Through continuous improvements, we believe in passing business value to our clients, not distributing IT within a highly inefficient vertical infrastructure.

Contact US

Owner

Marco Gravesteijn - Owner and Certified Software Asset Manager

Marco believes passionately that organizations should only pay for the IT resources they actually need and use. His network consists of almost 3.600 persons, 17 years of IT consulting experience. In his last and current role he uses his experience and knowledge for guidance to provide solutions in IT Asset Management. His long term goal is to act as a truly independent and as a trusted advisor and delivering business value solutions.

“ In Today’s rapidly changing global business environment, companies need to quickly adjust to market conditions while minimizing cost. Our independent and comprehensive ITAM services help organizations cut cost, reduce risk and drive business profit, concerning the biggest software vendors like SAP, Oracle, IBM, Adobe, VMWare, Microsoft, etc.”

“ By working with our clients and helping them to better understand their actual SAP licensing requirements; we can assist them attain enormous savings by reducing initial procurement expenses and ongoing maintenance costs and by being more aware of potential audit/compliance issues, such as indirect access, which is a point of the increasing number of extra audits by SAP during the forthcoming years.”

STRATEGY IS TO CREATE and CONNECT INDUSTRY LEADING SERVICE, YEARS OF EXPERIENCE

for example License Management Solutions, Asset Management for End User Organizations, Asset Management for SAM Tool Vendors, License Optimization, IP Licensing Service, Procurement Optimization, Distribution Channel Management, ICT Security and Compliance

News items

Friday, June 23, 2017

Stop Your Software Waste: ACT NOW!

Definition:  Any piece of software that has been deployed to a desktop but is not being run by the user. A title is determined to be ‘unused’ if it has not been run within the past 90 days and ‘rarely used’ if it has not been run within the past 30 days. ‘Total waste’ is the combined sum of both.

US/UK waste all together is estimated to be at least in total: US$34 billion

Average waste per user: US$247 Average waste per business: US$7.4 million

KEY FINDINGS
One of the further key findings was: “Software Asset Managers tend to focus on ensuring license compliance. While this is good business, it may result in the organization acquiring more software than is necessary – costing the organization unnecessary expense and diverting resources that could be used elsewhere.
Given the data from one report, Software Asset Managers would be well-advised as a matter of policy to review the extent of unused software in their organization. Removing and repurposing unused software will reduce the need to acquire additional licenses during license true-ups with software vendors.”
1. Cost avoidance by reducing the volume of new license purchases It’s simple. When you reuse – you don’t need to buy more. Even at a conservative reclamation rate of 75% of unused software and a minimal purchase rate of 10% annually, purchase avoidance due to reuse of harvested software is estimated to be greater than US$182 per user.
2. Maintenance Reduction and Avoidance The typical rate for software maintenance costs is 20%. As such, companies are paying around US$45 per user on maintenance for software that isn’t being used.
3. Audit Risk Reduction Software vendors frequently audit their customers to ensure license compliance. Organizations that reclaim software as part of an established SAM (software asset management) program can ensure they are less likely to be over-deployed or over-licensed, thereby lessening the impact of vendor audits. 
Unused Software by Company Size Usage data shows that smaller companies have larger waste. As a company reaches a size of 20,000 users, they begin implementing software asset management and waste starts declining. As a company grows past 50,000 users, the waste levels out.
Unused Software by Industry Of the 149 companies included in one of the studies, they found variation by industry. While the majority reported 35-39% total waste, aviation and education topped the list at 47%.

Via a tailor-made Proof of Value (POV) or Proof of Concept (POC) Crayon will let you experience first-hand how design for IT’s SAM program optimizes software investments across all major vendors. You can see how to:

  • Defend against software audit risks
  • Identify assets across Mobile, Desktop, Datacenter & Cloud platforms
  • Optimize licensing for specialist vendors such as RedHat, SAP & Autodesk
  • Manage volume licensing for Microsoft, Adobe, Oracle, IBM and more
Tell us about your needs and we’ll create a POV or POC just for you and help build the business case for Software Asset Management within your organization.

SCCM is GREAT … but is it a contribution towards a Software Asset Management program?

At a Microsoft Ignite conference, various statistics were published, including:

1. More than 80,000 companies worldwide depend on SCCM

2. There are over 150 million devices being managed with SCCM

3. Five million new devices are being added every week

So, clearly, SCCM must be doing something right.

For those organizations that have spent time and money deploying SCCM, there is a temptation to think that they have Software Asset Management (SAM) ‘covered’. 
And indeed, SCCM can play a vital role in the successful management of the software assets across the organization. SCCM 2012 R3 and SCCM 2016 expanded into the mobile and virtual space, as well as improving Asset Intelligence (a type of software recognition) and making small improvements to the way license entitlements are recorded in the repository. 
At first glance, SCCM looks like a credible multiplatform SAM solution but real value comes from using its abilities to configure, deploy and remove software and security updates onto the network, facilitate remote PC diagnostic repair and manage user rights. However, it was not conceived as a SAM solution and SAM is not a core function, therefore, not surprisingly, SCCM falls short in a number of key SAM areas. 
STRENGTHS AND WEAKNESSES OF MICROSOFT SCCM
So let’s look at where SCCM excels and where it falls short. While SCCM is reasonably good at some tasks such as Windows hardware inventory and software file auditing, it is by no means a ‘complete’ Software Asset Management (SAM) solution.
That’s not to say SCCM is redundant or should be replaced. For those organizations that have already taken the trouble to deploy and configure SCCM (and who are happy with the results it is providing), it can make an important contribution towards overall SAM by providing audit information from the Windows portion of the estate.
But it is important to accept at best is only a component of a full SAM solution. To be truly effective, SCCM needs to be paired with other technologies that enable organizations to manage the assets and entitlements across the organization.

design for IT (dfIT) offers advice on how to address SCCM SAM weaknesses.

When it comes to building an effective SAM solution, organizations that have already deployed (or are considering deploying) Microsoft SCCM should not view the purchase of dfIT's SAM platform as an ‘either/ or’ decision. SCCM and design for IT are complementary solutions that work well together - SCCM is great at feeding dfIT's License Specialists with Windows inventory information.
Without design for IT, SCCM is still a great solution for configuring and deploying Windows software and tracking the deployment of Windows-based assets. But it is not a Software Asset Management solution. Understanding the software audit information and compliance reports in SCCM is a difficult task and is restricted to a small number of ‘gurus’ in the organization.
With multiple stakeholders from across the organization requiring tailored access to the SAM solution (e.g. input licensing information, review the licensing position, create management reports and understand the financial liabilities of the organization), design for IT opens up the world of asset information and ensures that SAM is no longer a silo responsibility but a true cross-organizational activity.
Gartner asserts "SAM is a discipline that should sit horizontally across these (IT) silos, providing oversight of the software asset lifecycle as different people and processes in IT and the business interact with it," Using an intuitive, friendly, purpose-built solution is essential to the success of any SAM program, and vital for the communication that inevitably comes out of a more comprehensive understanding of the software assets in your business.
Ultimately, adding design for IT SAM services to your SAM platform will drive down the cost of implementing and managing a SAM program, increase the availability of licenses and assets, reduce the risks associated with vendor software audits and deliver real-world cost-savings in new license expenditure.

With design for IT and SCCM working together, it’s a win-win situation.

At the core though, SCCM still provides great systems management capabilities. With dfIT's SAM services and some forethought, the continuing challenges of managing SCCM and Windows 10 updates can be automated and IT admins can get on with delivering business value.
design for IT leverage it's expertise in SAM and cloud consulting services to ensure that our clients software license estate is optimized for what an organization actually uses. This improves compliance, reduces audit exposure and lowers software spend. 
Are your tools helping with the following?
* Understanding if your current licensing model is the best fit for your actual business objectives, IT strategy and budget expectations?
* Understanding if your software licensing is optimized to maximize entitlements usage and compliance?
* Helping you understand if your licensing is consistent with your cloud strategy?

Monday, June 19, 2017

SAP’s Indirect Usage and Other Pitfalls.



SAP software is business critical and fully integrated creating licensing challenges that are truly unique to SAP.
How SAP Licenses Work
Software licensed by SAP has traditionally been purchased as a perpetual license that is valid without term restrictions. With a perpetual license, customers are entitled to use the licensed capabilities for an unlimited period of time. The following principles apply for SAP’s perpetual licenses:


• SAP does not license software by specific release or version.


• The software license alone does not provide the right to use future releases, this requires an additional maintenance contract that is paid for and maintained as per agreed terms and conditions.


• Customers can only use capabilities of the software that had been purchased and actually licensed even when additional functionality is available in software bundles.


• Subsequent license purchases are treated as separate business transactions in separate order forms and/or appendices and will have legally binding licensing terms.


• Applicable discounts are calculated based on the size of additional business transactions.


• Non-compliance or overuse of licenses are invoiced in accordance with the then current list of prices and can include back dated maintenance for the period of overuse calculated at the list price.


• SAP has internal promotions to allow exchange of entitlements for others as long as the software is not in use in its entirety. These promotions do not apply to all products. Current promotions cover products migrated to cloud services.


• Third party vendor licenses that are purchased through SAP are licensed under the Master Software License Agreement (MSLA) and are subject to the same licensing terms unless specific terms apply. In which case they will be detailed in the respective order forms.


• In case of swapping or converting existing license entitlements for new entitlements, the new maintenance base will be the cumulative sum of the net license fee after conversion credit and the previous maintenance base. SAP does not allow the new maintenance fee to be lower than the previous maintenance fee.
Available SAP Licensing Types
Packages


Package licenses entitle a customer to deploy and use specified software capabilities licensed as part of the package. A package license for a specific functionality or business process is subject to specific terms and use rights that are applicable to that package and most of the time can be licensed in more than one way for the same package.
Named Users


Every user accessing or utilizing one or more licensed package needs to have the appropriate named user license. SAP offers different named user categories and types that depend on the role of the individual user within the organization. Named user licenses are generally not tied to a specific package and are valid across all licensed packages. However, named users are only allowed access to packages based on the extent permitted by the licensed named user category and its respective use definition in the customer’s contract.




fig. 1: A good way to understand package and named user licensing is think of a house and key. A package is a house, once built it contains everything it needs to perform its function. The user license is the key that allows the assigned individual to access that house. Individuals will carry many keys to many different homes, and a single home will have a unique key for each individual accessing it.




In general, SAP offers the following user types:


• SAP Users • SAP Platform Users (See section “Indirect Access of SAP Software”) • SAP NetWeaver Users
Different user types have been offered by SAP over the years and customer specific user types will depend on customer specific contracts.


User Categories For each of the above user types, a number of user categories suited for different user roles are offered.


These types are related to a user’s function. For example:
• Professional User
• Limited Professional User (discontinued by SAP and not available anymore)
• Employee User
• Factory Floor User, etc.


A named user license is the combination of user type and user category. It can be subject to special use or restriction for respective user category which will be defined in the contract. Definition of user roles and activities related to user types are stated in SAP’s software use rights document or respective contracts.


However, there are standard user categories that have specific user rights and can supercede one another depending on their category. Fig. 2 above demonstrates how the common user categories supercede each other based on thier license type. 








Navigating SAP-Specific Challenges
Lack of license measurement guidelines and tools:


Without specific guidelines on how to manage and control licenses, SAP software management tools do not cover the entire portfolio and address mostly named user optimization. This is a significant investment in the form of packages/engines that does not have complete coverage. Currently only 35% of packages/engines are measurable with accuracy. The remaining 65% are either indicators or inaccurate and require manual intervention or self-declaration by the customer.
Unclear and confusing licensing guidelines:


SAP's standard licensing guidelines can be used to understand basic licensing principles but they might not apply to individual customers. Every customer will have ad-hoc and customer specific licensing principles and generalization is near to impossible. Such customization also introduces the added complexity of requiring tailored measurement processes.
Customer specific & customized contracts:


Each contract has unique rights to use the software. The same software sold to two different customers will not be the same when it comes to how they can use it. It is important to understand license management from a contractual perspective. Misunderstanding of SAP License Audit Workbench (SLAW) as a software asset management tool: SLAW is a discovery tool used for the purposes of license management health checks. The tool covers named user review well, however it does not recommend optimization or any other aspect of software asset management. Customers should not misunderstand the tool to be sufficient for managing SAP licenses.
Significant costs & investment:


SAP caters to large enterprises who operate across multiple regions and continents. SAP covers all key business processes and the software’s modular nature allows customers to implement, customize and cater it to their specific requirements. SAP tends to be critical to a business in all respects that invests a significant part of its IT budget on innovation and “keeping the lights on”. This, along with skills required by specialists and technical teams, adds to the cost. The complexity, criticality and dependence leads a significant challenge for customers to be able to track license usage and spend. 
Why design for IT?


We believe in a holistic approach to license management that covers all aspects of SAP licensing, namely, but not limited to Named User Optimization & Engine/Package Measurement, Maintenance & Cost Analysis, Audit Preparation, Support and Defense, Indirect Access Review and Risk Assessment, Non-SAP Contracts, SYBASE, HYBRIS etc.
SAP Licensing is complex only in the myriad of possibilities it offers. 
However, within this complexity exists significant opportunity for optimization based on your specific configuration and performance goals. With the right SAP expertise you can do everything from scenario analysis on licensing possibilities to specific negotiation points to ensure you have the flexibility and integration requirements you need to grow and evolve. Take ownership of your SAP licensing future today! 



Wednesday, May 31, 2017

Total cost of ownership: Mac versus PC in the enterprise...


Debate over: Mac is less expensive than PC 




Over the past 10 years, Mac has risen in popularity with consumers thanks to its built-in security and overall ease of use. This rise in consumer demand for Mac is not lost on the enterprise as they are discovering the same benefits and choosing to deploy more Macs in their environments. 


This growing trend continues to be fueled by a younger, more tech-savvy workforce who grew using Apple products. When contemplating offering Macs to your workforce, the question of cost inevitably comes up. “Macs are great, but I can buy two PCs for the same price as one Mac,” is a common mentality within IT departments. 


However, when comparing the total cost of ownership associated with providing basic services, software, management and support, the outcome (surprising to some) favors Mac over PC. But how can this be since the upfront cost is more? 


Taking IBM VP Fletcher Previn’s presentation on this very topic one step further, we examine the numbers and put the Mac versus PC in the enterprise myths to bed.







Every computer on an enterprise network needs a set of basic services. In particular, power and internet must be available. That cost is essentially the same for both platforms. Most organizations will bind a computer to their directory, with the most popular being Microsoft Active Directory. 


The cost of a Client Access License (CAL) for Active Directory, is the same for Mac and PC. Macs can easily be bound to directory services, such as Active Directory, and can use directory credentials to log in and map network drives. 


The binding process can be done manually through imaging, or automated using a management system. Beyond power and a license for your directory service, you will also need to license other services required by your users to do their jobs. 


This is often a mail account, possibly cloud storage, access to a chat service, expense system, collaboration tools and more. The majority of these services have moved to the cloud and simply require modern web browser access. Since they are cloud-based, they work the same way for Mac as they do for PC, and vendors charge the same price regardless of platform. 


Next, users need access to software. Mac comes with most applications a user needs right out of the box: Safari web browser, Mail, Calendar, Contacts with Exchange support, and productivity apps like Keynote, Pages and Numbers. 


However, not everyone is comfortable with Apple’s built-in apps so most organizations choose to deploy Microsoft Office, which runs natively for macOS. At this point, the Apple cost stack grows a bit higher than the PC cost stack. 


Since introducing Office 365 a few years back, Microsoft has standardized the cost of Office on all platforms. Finally, in addition to the software required for all users, organizations need to consider distribution points for deploying software to their users. 


Distribution points can be in the form of cloud storage or local servers running a standard file share. Regardless, this is the same cost for Macs and PCs.







Macs typically cost more than PCs. As of January 2017, the cheapest laptop from Apple starts at $999 and goes up from there depending on needs. Apple’s strategy for Mac has always been to build computers with high-end specs that are designed to last a long time. 


PCs, on the other hand, can range wildly in price because vendors will offer lower-end specs for price-conscious buyers. Because of this, some PCs come in at half the cost of Mac. 


It can be tempting to stop the conversation here and simply say “our organization can’t afford Mac.” However, a deeper study of all the essential software required for security and deployments demonstrates how the uptick in cost for Macs is something of a mirage.






All Macs include a copy of macOS free of cost. Apple only builds one version of its desktop operating system, so there are no discrepancies in features and users gain a consistent experience. macOS can be bound to a domain (including Active Directory), is shipped with full disk encryption (called FileVault) and even protects against malware (utilizing XProtect) as soon as the device is turned on — with no additional software required. 


On the contrary, Windows 10 requires enterprise organizations to either add these features, purchase the “Pro” version, or both. Microsoft sells Windows 10 Pro for $199 or it can be purchased for a nominal cost from a hardware manufacturer. The Pro version is required to bind a PC to your domain and to get full disk encryption (called BitLocker). 


Additionally, most organizations add antivirus software on top of Windows to protect against malware and viruses that have plagued and continue to plague PCs. Finally, organizations need a method to deploy computers to new employees. 


Just like encryption and malware protection, Apple offers a solution that is built into macOS — known as the Device Enrollment Program (DEP). This program allows organizations to order Macs (and iOS devices) and have them flagged as corporate owned. When that device boots up for the first time, it checks the serial number with Apple’s database and forces enrollment of a corporate-owned device. 


From there, a management system can load additional applications and settings. This is a tremendous time and cost savings over traditional imaging. Windows 10 does not offer a comparable alternative to DEP, thus requiring organizations to spend time and money on an imaging solution to get a PC ready for a new user.






A management system is essential for both Macs and PCs in an enterprise environment. A proper desktop management system allows IT departments to deploy new devices, configure settings remotely, deploy and update software, gather extensive inventory and ensure security. 


Microsoft offers System Center Configuration Manager (SCCM) to manage Windows. This is the most popular management tool for Windows. Additionally, Microsoft also created Intune which expands SCCM capabilities by adding mobile device management (MDM). Most organizations purchase both tools from Microsoft to fully manage Windows. 


Once again, Apple is different. Apple builds a management framework (known as MDM) into iOS and macOS. design for IT and it's partners is able to leverage this framework, plus additional software installed to remotely manage Macs. dfIT provides immediate support for new macOS releases. Organizations can leverage Apple deployment programs and security tools to enjoy a complete ecosystem of Mac management capabilities. 


Organizations can even create a custom app catalog with Jamf Self Service and enable users to install IT-approved apps and settings on their Macs. Users are notified when new tools and content become available, empowering them to be as productive as possible.






By the time we reach the final stack of the total cost of ownership model, you can see that Macs are already less expensive. Beyond basic services, hardware and software, and management tools, you also need to support your users. Support staff and help desk resources will always vary based on organizational demands. It has been anecdotally reported for a long time that Mac users require less support than their PC counterparts. 


Recently, IBM — who have deployed nearly 100,000 Macs in the past two years — have provided concrete data to support this claim. IBM reports that PC users drive twice the number of support calls versus Mac users. Plus, out of those tickets that are opened, only five percent of Mac users end up requiring an in-person visit. 


PC boasts a troublesome 27 percent of tickets that require IT visits. Additionally, IBM only staffs a fraction of IT staff to manage Macs compared to the number who are required to manage Windows. While these stats are for the largest Mac deployment in the enterprise, the trend applies to smaller organizations who add Macs to their environment.

Let’s recap those staggering findings 



While Mac hardware alone is more expensive than PCs, there are many more factors to consider when deploying Macs. 


Thanks to most core services moving to the cloud and becoming cross platform, the cost is now a wash between Mac and PC. 


Any organization serious about managing and securing Windows will need to add additional software and tools to the cost of their cheap PC, as opposed to having those features built into the operating system with Mac. 


Finally, when you add on the cost of management tools and support, the total cost of ownership gap can potentially be huge for an organization. 


In fact, IBM found they saved between $273 - $513 per Mac they deployed compared to PCs. 


As you can see, the debate is over when it comes to the actual cost of computers in your environment. If you’re ready to start taking Mac seriously and saving big dollars in the process, please contact us. 


If you’re still on the fence, learn more about computer choice programs and discover why employees value them now more than ever.

Tuesday, May 23, 2017

The Internet Of Things Is Changing IT Asset Management (ITAM/SAM)

The IoT (Internet of Things) is a hot topic right now. As the hyperbole resides and organizations look to actual deployment, it's worth considering the influence of the IoT may have on your Software Asset Management (and IT asset management) program.





























As you probably know, the concept of IoT stems from the rapidly growing number of internet-connected-devices that are being produced. In fact, it is estimated that it will be up to 50,1 billion IoT devices by 2020. That’s a lot of new devices and associated software that will need to be managed!

Particularly interesting is how licensing models for back-end applications and databases may change to support possible IoT scenarios. The number of potential users of software that makes these devices to function will rapidly increase.

Additionally, devices have traditionally been priced per unit, but it's predicted that in this future IoT landscape, homogenous devices may become priced by the software feature which is actually being consumed.

There are other complexities of IoT that will influence software asset management. As discussed, new types of software licenses for databases and middleware of these devices will need to be studied and understood.

In addition, new assets requiring software licenses are likely to be purchased by non-IT departments, meaning more teams will need to develop a proper understanding of software licensing management, or create new business and IT processes in order to support this extra shift.

SAM programs to manage software licenses are going to increase with the rise of IoT, as they did for mobile devices (MDM), remote users and transient connection.
How do you choose what to manage and what not to manage for IoT?

With the increased number of smart devices coming online, the question becomes what smart devices do we track and how do we track them? Many organisations are still figuring out how to implement ITAM with BYOD.


Therefore, an ITAM (SAM) solution for IoT might not be on the radar for many organisations; however, a strategy should be considered for the following reasons:
1. Control inventory

When assets are tracked, information about purchase dates, warranty, and lifecycle states help to control the inventory of the assets. Organisations must decide which smart devices should be tracked using an ITAM (SAM) solution. For example, should the ITAM solution track a smart light bulb? It might not make sense to track just one, but it could make sense to know how many smart light bulbs are owned and where they are installed.

Furthermore, if there is a software package that controls smart light bulbs, a relationship could be created linking the application to the light bulbs and to an associated software entitlement license. For IoT, I believe it is more practical to manage the contracts, licenses, and vendor information in the ITAM database versus tracking each smart device individually.

One could also argue that smart light bulbs are not considered IT assets and should be managed by facilities’ systems. However, the line between facilities and IT becomes blurred when smart light bulbs are controlled by an application that requires a software license.

Gartner stated, “the IoT is not only about the introduction of different forms of networked devices into digital business moments; it is a transformational approach to viewing and implementing processing, analytics, storage and communications.”

2. Control access

Relationship management is an important part of an ITAM (SAM) strategy. Relationships are also very important in the context of IoT. Not only does an organisation need to know which devices to connect to their systems, they need to control access between IoT devices and other IoT entities, IT assets, applications, and people.












Access to systems and applications is provided using Identity and Access Management (IAM). However, traditional IAM solutions are not capable of dealing with the relationship and access requirements that come with IoT. Therefore, the Identity of Things (IDoT) is an extension of IAM that applies a unique identifier (UID) to IoT devices/objects, which allows you to control relationships and access between IoT and other entities inside and outside of your organisation.

Gartner says that “IT asset management (ITAM) and software asset management (SAM) systems have traditionally managed IT and software assets of all types. The IDoT will assume some functional characteristics of ITAM and SAM within or integrated with IAM architecture, or be linked to ITAM as attribute stores.”

3. Provide security

The National Cybersecurity Center of Excellence (NCCoE) is addressing IT asset management for the financial services sector.

“An effective IT asset management (ITAM) solution can tie together physical and virtual assets and provide management with a complete picture of what, where, and how assets are being used. ITAM will enhance visibility for security analysts, which will lead to better asset utilisation and security.”

IoT security is an evolving endeavour to provide security to all devices connected to the internet. Security experts have warned of the potential risk of large numbers of unsecured devices connecting to the Internet since the IoT concept was first proposed in the late 1990s.

Smart light bulbs in the home are a great way to save energy, and smart vacation settings turn lights on and off in different rooms to make it appear someone is home. Smart criminals, such as organised crime or cyber-criminals, could hack your system and learn your vacation programs, thus alerting them that you are on vacation.

They could then sell that information to street criminals informing them of who might be out of town in that criminal’s area. From this example, it is clear that organisations need to apply security to IoT devices so that access is denied to unauthorised users, devices, and malware.

According to Proofpoint, more than 25% of the botnet was made up of devices other than computers, including smart TVs, a refrigerator, and other household appliances.

ITAM/SAM will provide inventory information to a security system. Without the inventory information, an organisation might not be aware of existing connected IoT entities and their potential security risk. If you don’t have an inventory of all devices connected to the internet, then you don’t have a complete security solution. In my opinion, the lines between ITAM and security will continue to disappear; meaning, that one day, complete security solutions will not exist without an ITAM solution in place.

Computer systems as well as all their connected devices could be used against us if compromised by someone with malicious intent. IoT will force a fundamental change in how security is implemented by making inventory control and knowledge about the presence of connected entities a priority security requirement.

Organizations must now understand and take full control over their software asset management strategy, as optimizing SAM Today will ensure them to be prepared for the growing IT complexities of Tomorrow.

WHAT WE DO

LICENSE OPTIMIZATION
This is the ongoing process of proactively managing the software estate, throughout the software product lifecycle, to maximize utilization of assets, reduce costs and maintain license compliance.
ICT SECURITY AND COMPLIANCE
The intent of security is to manage risks and the extent of the loss after an incident.
LICENSE MANAGEMENT
In today’s environment, it is crucial to understand the End User License Agreement of the software that you have purchased.
IP LICENSE SERVICES
Creating an intellectual property management process that promotes physical inventory optimization and clarity in sales, purchasing and IP payment.
PROCUREMENT OPTIMIZATION
Improving purchasing and supply chain practices begins with a comprehensive eco-system review that evaluates vendors, buyers, resellers, etc.
ITA MANAGEMENT
The influx of IoT (Internet of Things) and connected devices will continue to introduce new demands on IT departments globally.

Contact

Design for IT b.v. Buizerdstraat 9, 4143 BA Leerdam, The Netherlands