Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Driving with One Hand: Using a Single Solution for IT Asset Management

By John Livingston
April 24, 2012

 

Dashboard
Single IT asset management solutions facilitate easier training, more secure devices and happier employees.

It’s a CIO’s nirvana: one robust tool for all device management needs.  But for many organizations it’s a stretch just to keep pace with the many form factors and operating systems that comprise most enterprise deployments today. Many CIOs have given up the dream of a single tool. Instead, they employ individual solutions to manage the three typical groups: PC, Mac and ultra-portable devices (iOS, tablets, smartphones, etc.). 

The result is predictable and expensive. Three purchase orders to buy three different management systems using triple the resources to deploy and install.  Then IT staff must be trained to use multiple technologies including the investment of countless hours manually merging a variety of data from various databases.  This type of fractured infrastructure ultimately forces CIOs to invest significant resources in processes and work that should really be automated.

So how did we get here? Much of our current reality can be attributed to the use of legacy systems that were already in place before enterprise deployments began to expand.  When these asset management systems were initially purchased, an employee typically had no choice.  When they arrived for their first day on the job, they had a PC computer and BlackBerry smartphone on their desk.

And these legacy IT asset management solutions were expensive, so when the first non-standard device showed up, it was simply easier to bolt on a stand-alone system specific to the form factor.

But that was then. Today IT departments are faced with a flood of new devices – many employee-owned.  Spurred on by trends like the Bring Your Own Device (BYOD) movement, the typical enterprise deployment is no longer typical and can include a long list of devices – including desktop computers, laptops, PCs, Macs, various tablets, iOS devices and a wide variety of smartphones. 

The result is that device types and operating systems can no longer be supported with individual asset management solutions.  It’s not cost effective, nor is it safe to spread management and security of these devices across multiple consoles.

 

Your 50,000 Mile Check-Up: Building For Tomorrow Today

I think we all agree that for most CIO’s, re-evaluating the company’s entire IT set-up isn’t realistic. Most of us don’t have the luxury – or the budget – to evaluate management systems and overhaul existing architecture. But employing a “block and tackle” approach where one device issue is resolved at a time is also not sustainable. 

Don’t build for today…build for tomorrow. What will be the IT reality in five years time?

Today asset management needs to be streamlined: one solution with one set of features for many different devices and operating systems. Even industry analyst firm Gartner has signaled that times have changed, recently renaming its PC Configuration Lifecycle Management Magic Quadrant to the Client Management Tools Magic Quadrant. In doing so, Gartner has formally recognized that non-PC devices have become a mainstay for most organizations. 

This shift is evident today with many asset management vendors scrambling to provide cross-platform capabilities – natively or as modular add-ons. It would not be surprising if – in the future – Gartner elects to integrate MDM capabilities into the existing Client Management Tools quadrant since this would provide IT with further consolidation and put them one step closer to “many devices – one solution”.

 

Protect the Driver AND the Car: Cater to Employees, Secure the Device

Managing multiple device types within a single system provides many benefits:

  • Data Integration: A single system allows you to reduce data and infrastructure fragmentation. For example, if you have separate systems for managing PCs and Macs, the only way you will have a single view of your deployment is to merge data from both systems into a stand-alone report. Since you’re doing this outside of either system, any anomaly in the data will require a manual check-back to the appropriate system to validate accuracy or to take the necessary action. 
  • Skill Set Consolidation:  One system means one training process for all IT team members. There are no longer silos of expertise by platform or operating system.
  • IT Spend Consolidation:  Using one asset management system allows you to purchase all of your licenses from one vendor.  This means you can take advantage of volume price discounts since you’ll be buying more licenses from a single source.

Life in the Fast Lane: Consumerization will Continue to Drive IT Decisions

Maybe it began when the CEO walked in with an iPad and told IT to make it work.  Or perhaps it was the coveted new hire who insisted on using an Android tablet to deliver their results.  Regardless of how it began, today many employees are calling the shots when it comes to the type of device they use when they’re working.  This will not change.

Design shifts have already occurred among typical consumer devices like iPads.  Display screens are enhanced, battery life is longer, peripheral support has expanded until it is at a par (or even exceeds) standard enterprise devices.  As the line between consumer and corporate devices continues to blur, it’s unlikely the trend will reverse. This is the model of the future, a drum beat that can’t be ignored.  Those organizations that embrace it will be prepared for the future. 

The road to nirvana doesn’t have to be a long or expensive ride.  With the proper roadmap and the right resources, CIOs can make good decisions money is saved, enterprise data is secured, and employees can be satisfied and productive.

 

Key Questions for Solution Planning:

As a CIO, these are the questions you should ask yourself as you evaluate IT Asset Management Systems and plan for the future:

  • What devices and operating systems do we currently support? What’s out there that isn’t on the list?
  • Do we use multiple asset management systems?  If so, how much does it cost to support and what is the ROI if we consolidate to a single system?  
  • If we currently use a single system, how easily can it incorporate new device types and operating systems?
  • How will the move to a single asset management system impact our IT resources?

Once you reach the point where you’re assessing solutions, also consider these questions:

  • How has the asset management solution evolved to provide multiple platform support? 
  • Is support for each operating system built natively or simply bolted on as an acquired technology?  This is important from a scalability perspective.  If the vendor needs to purchase a company to expand platform support then the solution may not be scalable.
  • Do you intend to support a BYOD policy? If so, does the new system support the policy?  This could include the ability to segregate personal data from corporate data including the security and control of corporately owned assets that may reside on an employee-owned device. 

 

Do you have any questions, comments, tips or best practices that you'd like to share with the industry? Email us! Send your feedback to Claire Meyer, Security's associate editor, at meyerc@bnpmedia.com 

KEYWORDS: enterprise IT management solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Livingston is the CEO of Absolute Software

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Need a Server? Ask Your IT for One of Their Unused Ones

    See More
  • Bot attacks cost fraud prevention security professionals a lot of money

    One in four enterprises say a single bot attack has cost them $500,000 or more in the past year

    See More
  • Using Asset Tracking for Security and Business

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing