Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

No Desktop Left Behind: IT Asset Management is the New Imperative

by GTI Editors
September 13, 2013
in Cybersecurity
Reading Time: 3 mins read
A A
Share on FacebookShare on Twitter

If you’re anything like most of the population, you have more than a little trouble keeping track of your keys, wallet, and work ID, let alone your tablet, your work device, and your personal cell phone.  Now, imagine you’re an IT manager whose job it is to know where every asset in your company is – every cell phone, every lap top, every remaining desktop, innumerable servers, and a few thousand tokens to boot.

The mind boggles, doesn’t it?   For most, priority in IT asset management goes to things that move around like tokens, cell phones, and now tablets.  Servers get a high degree of protection too, since they are the lynchpin of any organization.  But IT managers seem to have classified desktops as fixed assets, like chairs, and unwittingly created a gaping security vulnerability.

Because desktops are always, well, on the desk, and not roaming about Capitol Hill, the perception is that they are sufficiently protected by firewalls.  But, as CA’s Nate Rushfinn points out that given the volume of attacks launched against US government networks on a per second basis “unmanaged PCs represent the largest threat to our security. Firewalls simply can’t keep up with the job of protecting our networks. ITAM may not be sexy, but it is the new imperative.”

Rushfinn goes on to elaborate why IT asset management is so vitally important to cybersecurity:

In IT asset management, one thing is not like another. Over time our management systems have evolved in separate silos. The tools that manage routers keep track of the routers. It’s the same with desktops. Desktop management software collects the software and hardware assets, but none of these systems communicate. So, when the CFO asks for a report of all IT assets, the IT manager answers, “It depends.”  He asks the CFO, “Do you want the desktops, the servers, or the network devices?” The CFO answers, “Yes!” meaning all of them, not realizing that there isn’t a single source that tracks all the assets.

That is the biggest tragedy of ITAM not being sexy—we miss out on the opportunity to have a management database of all our assets…

In ignoring, quite literally, the furniture, IT organizations are missing the mark in providing comprehensive level of cybersecurity.

Intrigued or ready to refute Rushfinn?  Why not hop on over to his blog here… to read his entire argument.

Tags: cybersecurityIT Asset ManagementITAM

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us