AssetTrackingGuide
AssetTrackingGuide
TRACKING
eBOOK
A practical guide for tracking hardware
and other fixed assets
SOUND FAMILIAR? 4
ASSEMBLE TOOLS 21
Asset Database 21
Asset Tags 22
Barcode and RFID Scanners 23
Tags 23
Barcode and RFID Device Types 24
Asset Tracking Software 25
PERFORM AUDITS 35
Audit Types 35
Develop Scope and Schedule 35
Perform a Location Audit 36
ADVANCED TOPICS 37
Reconciling Data Exceptions 37
Use Advanced Shipping Notices (ASN) 37
Consider RFID 38
Integrate Your Tracking and Auto-Discovery Tools 39
TAKEAWAYS 40
CONTACT US 41
• CIO: “We failed another audit, and might pay huge fines.”
• CFO:“People are asking me for additional budget. How can I know if people are
effectively using the budget they already have?”
• Security: “We don’t know which devices have sensitive data nor where they are.”
• Asset Manager: “I can’t get our techs to update the repository when they close
tickets!”
• Asset Manager: ”How can I manage software when I can’t keep track of
hardware?”
If so, this document is for you. Inside you will find guidelines to build an enterprise
asset tracking solution that solves these problems and more. It’s intended for asset
managers responsible for achieving compliance, savings, availability, and security via
complete, current, and accurate asset data.
Too often, solutions are implemented before the problems are truly understood. Make sure
you and everyone else involved knows the problems you’re attempting to solve. Below you’ll
find a simple process, with examples, of how to identify and document requirements.
Start by making a list of the specific goals of the asset tracking solution that, if implemented,
delivery tangible value to the business. Invite all stakeholders to contribute to this list to
identify everyone’s goals.
User stories have a specific format that defines a role, action, and outcome. “As a [role], I
want to [action], so that I can [achieve an outcome].” This format makes it easy to know what
users will perform what functions and whether the system successfully meets the user criteria.
Best of all, user stories remove all the technical jargon which do nothing but to confuse
people.
A few examples of user stories can get you started in building your own list:
● As an accounts payable agent,I want to see all received assets for an order,
to know we paid only for assets we received.
Expressing your requirements this way will help you define success from a stakeholder’s
perspective. If these user stories come true, your asset tracking system is delivering value.
If not, your asset tracking system is an unnecessary cost.
The requirements from your stakeholder needs to be captured in one place for all to see. This
is important in ensuring goals are met, as well as to ease the administration of the technology
you deploy.
A Data Dictionarywill help you map your various reports to data fields and processes you
design. It ensures technical staff know how to configure tools, end users know how to test and
use the system, and that future changes to underlying technology don’t break things. We
typically use a spreadsheet to capture the data dictionary information. A template is provided
that you are free to use.
AMI offers a free example data dictionary that you are free to copy
A data dictionary will help you collaborate with the team to identify
what reports, data fields and processes are needed, and why.
Identify Required Reports
For each user story, c
onsider what reports are requiredto achieve the goal. Don’t
worry about specific details of the reports yet. Just imagine a report you would need to view
to achieve the a goal and give it a name and a simple description such as “See all assets
coming off warranty next year.” Later, we’ll flesh out the fields needed on these reports.
Consider using the example belowas a way to map your user stories to the reports.
Often, the same report can address more than one story.
Here’s an example of a report showing assets coming off warranty next year. It addresses
the user story, “As an asset manager, I need to see a list of all assets coming off warranty
next year so that I can keep all assets under warranty with the minimum budget.”
“See a list of all assets coming off warranty,” describes a report, which I’ve mocked up
below using Google Sheets.
In this mockup, I discover I need nine data fields. This will become essential to building the
master field list, which will come next.
Add your field list into your data dictionary.For each field, provide a unique name, a
label, a description, a data type, and any rules that apply to data in the field. This will ensure
everyone understands the purpose of each field to prevent duplicates.
Define Asset Life-Cycle States
Every field in your master field list must have data captured at some process in the asset life
cycle. To understand an asset’s life, we must list the states an asset can have from cradle to
grave. Understanding asset states will help us know where in the lifecycle our solution must
capture required data.
Below are some common asset life cycle stages. Consider these as a starting point to define
your asset lifecycle.
State/Sub-State Description
Ordering
Requested Someone has a need and requested to use a new asset
In Stock
Installing A received asset, awaiting to be configured for use (e.g. a laptop
imaged with appropriate software). Next stage would be ‘available’.
Repairing An asset sent to a vendor for repair. Once fixed, this asset will
be returned to your company (entering the ‘received’ state.)
Retiring An asset deemed ‘no longer of use’ to your company and ready
to be wiped of data (if applicable.)
State/Sub-State Description
Ready for Disposal An asset that has been wiped of data (if applicable) and ready to
be retired
In Use
In Use An asset in use by the end user
Retired
Donated An asset donated to another entity
Disposed An asset received and confirmed with an official certificate from the
disposal company. This asset is removed from the books, yet remains
as a record in the asset repository for reporting purposes.
Once you’ve identified and defined your life-cycle stages, you’re ready to assemble the tools
(e.g. tags, scanners, imports, tracking software, cmdb) to update your repository for each
asset life-cycle stage. Document this to ensure your people know how, and do, use a
common process to keep your repository up-to-date.
Identify Transitions Between States
Processes are the activities that change the state of an asset. These are the processes that
you must standardize and automate. Come to an agreement with your organization on
process names, and provide instructions for end users.
Use the data dictionary to show which process will update each field. Work with your stake-
holders to identify the most appropriate places to update these fields. Ensure that every field
is updated at least oncein the asset lifecycle.
Schedule regular feedsfrom these systems into your asset tracking database. This will
ensure you can share your asset information with the rest of the enterprise.
Don’t reinvent the wheel. To share asset data with other business systems, share the
foundational data as those systems.
Any other items you use but don’t track are Consumables. While extremely important,
consumable management is the subject of another document.
Focus only on high-value things at first.This can limit the scope of initial tracking solution
deployments, so that you can more easily train users and receive valuable feedback. Once
successfully with initial asset types, you can expand and mature your asset tracking process
with little risk.
Here are some typical definitions of assets and consumables in US enterprise IT.
Locations
To assign assets to a location, your data collectors should select items from a list of
existing locations. Do not permit end users to collect non-structured, random location data or
you will be unable to generate accurate reports.
Use existing Location data.Most organizations have a master location list defined in a
facilities system or elsewhere. Don’t reinvent your own location list, or you won’t be able
to easily share asset location information with other systems. If you have external master
location list, setup and automatic feed from that system so that your asset location list will
always remain in sync with the rest of the organization.
Use location codes.If possible, share location codes that uniquely identify location
records with the external system. This way location descriptions can change in the remote
system without changing the location hierarchy in your trackings system. You can also print
these as barcodes to make selecting locations easy for your data collectors.
Create a location list if needed. If you do not have an existing master location list, create
one. The location list needs to be as simple as possible while still achieving the business
goals. A flat list of location is where you should start. If reports require that you group
locations together, then considering building a location hierarchy. Consider the following
when building your location list.
● Reporting.If you need to group multiple locations together in your reports, consider
creating a location hierarchy. (e.b. two-level hierarchy State-> B
uilding)
● Data entry.Will users be able to select a correct location easily? - If you have
thousands of discrete locations, it will be challenging for your users to select the
right one. A hierarchy can help organize locations to make it easier for users to
select the location they need.
Categories
Categorize your assets to assist with reporting and data segmentation needs.
Create categories required for your reports. If you require a report listing all “IT assets,”
you can create a simple category called “IT asset.” However, if you need to run reports of
all laptops separate from servers, desktops, mobile devices, etc., then you need to create
additional categories so you can filter records in reports.
Protect access to data. Often organizations need to limit access to certain categories of
assets. Establish categories for your assets that enable you to grant permissions to
certain classes of assets to certain groups.
Categorization hierarchy.Like locations, start simple. Define a flat list of asset categories
need for reporting and data segmentation purposes. If necessary, you can define a
category hierarchy. For example, have a top-level category to separate IT assets from
Facility assets. Under each top-level category, define sub-classes.
Models
When creating assets, your data collectors should select items from a list of existing
models (e.g. “Dell Latitude D610”). Pre-populate your database with all known models in
your organization to support fast and accurate data entry. If possible, integrate models from
aprocurement system to easily determine if you received what you bought. As with
locations, if you do not have an electronic system, create something simple to build your
list of unique models.
Users
Import user data from HR systems, active directory, PeopleSoft, SAP, or perhaps your
SSOprovider to ensure assets are assigned to known individuals. Import a unique user id
(e.g. abarcode on the user’s badge) for each user to make data collection and reconciliation
easier.
Import end user location data when available.Use the source system (e.g. PeopleSoft,
Active Directory, SAP) to identify each employee’s location. Then, import this data into your
tracking system on a regular schedule. Your tracking solution can use location data to filter
reports and limit access to records to reduce bandwidth and storage requirements. This
filtering will improve performance and increase accuracy on the employee’s data entry
devices.
Organizations
Your system should associate assets to organizational units(e.g. division, business unit,
cost center) if reporting requires it. This will help you develop accurate reportsacross
the organization. This is also required for proper charge back. Your administration will have
defined this data hierarchy. Maintain this in your tracking system.
Purchase Orders
Import purchase order data from an ERP into your asset tracking system to:
Purchase from a catalog when possible. When creating purchase orders, choose model
information from the same model catalog used by your asset system.
Procurement people don’t like catalogs.It slows them down. Often they can’t find the
product they want to purchase in the catalog. Often the product doesn’t exist in any catalog.
This means a purchase order line item doesn’t have a model understood by your asset
system.
Reconcile model exceptions before importing purchase order line items. Purchasing
people don’t like to order from catalogs. Often what a company buys is too complex to
categorize as a distinct line item in a catalog. What this means is, your asset system may
not know the model referred to by a specific line item. Ensure you have a process to identify
purchase order line items with unclear model information, and have an asset manager
assign the correct model before importing the line item into your tracking solution.
Assemble Tools
To review, you’ve identified goals, wrote requirements, developed reports, and defined the
triggers to update your asset repository.
Asset Database
Many products exist to store your asset information centrally, from off-the-shelf applications to
enterprise-class, IT management suites. We recommend choosing a product that scales as
you grow your solution and allows asset managers to review, validate and approve collected
data, before applying it to the database. You should be able to customize fields and forms,
perform robust search and export functions and use the product API to integrate with existing
systems.
● ServiceNow- The cloud-based ITIL software suite from ServiceNow is one of the
most popular choices on the market as of the writing of this letter. AMI has had great
experience working with the ServiceNow platform. It is powerful and very flexible,
which is also its shortcoming. You need to be careful with how you configure
ServiceNow as tthe platform does not guarantee data quality for you.
● HP Asset Manager- A long-time leader in the market, HP Asset Manager is the most
fully featured ITAM system on the market. It’s expensive to run and manage, though,
and often scary to new implement. That said, you can do extremely high-volume
asset management with HP Asset Manager, which is why it’s been around for so long.
● AMI AssetTrack- To manage hardware asset inventory without all the complications
of CMDB, AMI offers AssetTrack as a scalable, yet simple asset tracking database
that works seamlessly with AMI’s AssetTrack barcode and RFID software.
Asset Tags
Every asset must have a unique identifier for you to track it through your environment. This
“asset tag” must be readable using a barcode and/or RFID label, for the asset to be
automatically updated in the database. This improves speed and accuracy for collecting
your asset data.
You can certainly use the manufacturer’s serial number tags to uniquely identify your assets.
However:
● Serial number is often difficult to find and scan vendor serial numbers tags
● Vendors choose where to place these tags, not you
● Each vendor uses their ownserial number schemes
● Place tags on assets to easily scanand collect data as you receive them.
● Create a consistent serial number schemeacross all company assets.
● Improve accuracy when collecting databy scanning your own tags, known by
your tracking system.
Don’t print your own barcode labels. Pre-printed barcode labels cost less, are higher
quality, and are guaranteed to be unique. Self-printing labels is far more trouble than it’s
worth.
Tags
Barcode systemsuse lasers or cameras to read barcode labels. These systems are
reliable and affordable but require line-of-site access to manually scan and read the labels.
Barcodes just work.They’ve been around for a long time, cost less than RFID, are
efficient to use with scanners, easy to establish a consistent barcoding scheme, and
excellent for scanning a single asset (where RFID could inadvertently scan multiple assets).
However, barcodes require a human being to perform line-of-sight scanning, which can be
less efficient in certain use cases.
RFID (Radio Frequency Identification)uses radio frequency to sense and read tags
within its field. Many RFID readers and tags exist, supporting a wide variety of sizes from a
few centimeters (NFC), to a loading dock door (Passive RFID), to hundreds of feet (Active
RFID).
RFID is a fast, accurate, automated approach for collecting lots of data, even for things
you can’t see. You can equip a data center with a fully automated RFID solution to track
assets down to a rack location. RFID technology is also an expensive (particularly hardware)
and complex solution, with a vast set of options. Do the math to determine if the cost will
save you money for the improved speed and accuracy for your data collection process.
Use pre-printed barcode labels from a professional barcode label
manufacturer. Self-printing leads to more inconsistencies and
errors, costing you time and money.
Learn more about tagging.For more information about choosing and implementing asset
tags, see A
MI’s Free Asset Tagging Guide.
Now that you’ve established your goals, requirements, lifecycle and tools, it is time to
establish a “baseline inventory”. Without this your database will not reflect what assets you
currently own and where they reside. Below are the steps for developing a baseline to keep
your database accurate and current. Document this and keep it simple and accessible for
your staff to easily follow the steps.
As a data collector:
1. Enter the room or cube to visually identify the assets to be inventoried.
2. Apply a unique asset tag to each asset. Make it easy to find and scan later.
Software such as AMI AssetTrackallows asset managers to review and approve collected
data before applying it to the database. You can also create and apply validation rules to
automate this publishing process.
Now that you’ve established your goals, requirements, lifecycle and tools, you can design an
automated asset tracking process. We’ll examine the core processesreceive, track and
dispose assetsto save your company time and money, know where your assets are, who’s
using them, and to protect yourself from assets lost downstream of your disposal process.
Receive Assets
Receiving is the most critical process in the asset management lifecycle: when you take
possession of, and are responsible for, the ownership of assets showing up at your dock.
Design this process to be simple, easy and accurate for your receiver to accept and record
assets.
Design Considerations
Some considerations for designing your receiving process:
Can you export purchase order information from your procurement system to a file?
And does it share the item catalog (used by your buyers) with your asset tracking system?
If so,import this into your procurement system to buy only what you needand pay only for
what you received.
Do your vendors ship assets with scannable serial numbers on the boxes?
If not, you’ll spend time opening boxes on the receiving dock, to scan barcodes on the
assets. A real time sink and perhaps time to work with a new vendor.
Receive Assets
AMI recommended steps to receive assets, using a mobile device, as they arrive on your
dock:
Step 1: Group received assets by purchase order (PO), then by model. This will
make it easyfor receivers to scan assets with a mobile device.
Step 2: Specify the purchase order number. If you imported PO data into your
receiving system, scan the PO number barcode or select it from a list of POs.
Otherwise, manually enterthe PO number.
Step 3: Specify receiving location. You should only have to do this once as
location information should remain on the form for each PO group. Ideally, use a
solution like AssetTrack that supports scanning location barcodes.
Step 4: Specify manufacturer and model.If you imported purchase order data that
includes model information, you can skip this step. However, without integration with
your purchasing system, your receiver will need to choose a model for the received
assets. Choosing the wrong model is a big source of pain for asset manager, so be
sure you train your receiving staff onhow to find and select the correct model for your
received assets.
Step 5: Scan the serial numbersfor all assets in the group. This will add the asset to
a ‘received’ list
After receiving all assets, you’ll want your asset manager to process this information. A
quality system allows receivers to upload mobile data directly to the server and into a queue.
Then, your asset manager can review, approve or change asset data, before committing it to
the database.
Receive Assets
Tracking assets allow you to know where your assets are and who’s using them as they flow
through your environment. This helps you reclaim, service, optimize or replace assets
efficiently. This also helps to maintain an accurate inventory to budget and plan effectively.
Deploy Assets
When deploying assets to end users, you’ll update the database with user and location
information. Also (as mentioned earlier), this is the best time to apply asset tags to the
equipment.
Move Assets
Assets move to new locations for many reasons:
● New assets get deployed from inventory
● Assets get replaced during a break/fix call
● Users and departments move to new locations
● Assets get refreshed (thus, replaced)
You should record when an asset moves to keep your database accurate and complete.
Otherwise, you must perform an elaborate and regular audit process of locations to know
where assets were moved to.
When moving assets, use mobile devices with scanners to track assets as they move:
1. Scan or enter the locationfor the new destination
2. Specify new user information
3. Save and upload the datato the server and into a queue for your asset manager
to review before applying these changes to the database
Check In
Assets that are returned to from the field must be checked into stockroom inventory.
Capture the stockroom location, the data, and choose the appropriate sub-state depending
on the stateof the returned assets.
Retire Assets
Assets that are done with useful life must be removed from your environment in a controlled
way. Always retire assets first prior to disposal, to ensure assets are processed according to
business policy.
Dispose Assets
Track assets you send to your disposal vendor so that you can compare to the disposal
report they send back. This is how you ensure your disposal vendor properly disposes
assets.This proves you disposed assets properly, shifting responsibility to the vendor for any
assets lost downstream of your disposal process. This will save money and reduce risk by
avoiding any fines.
No asset tracking solution will catch everything.Users grab monitors from unused desks.
Technicians deploy, move and dispose assets without using the tracking system to record
these stages. Performing regular audits, using a quality tracking system, allows you to quickly
correct errors and identify missing assets in your database due to human error or theft. This
will give you confidence that your asset database is ready to generate reports to make wise
business decisions.
Audit Types
There are different ways to audit your database.
● Spot audit- Visiting a location and searching for specific assets randomly selected by
audit software.
● Location audit- Scanning everything at a location to identify missing assets and
correct location information.
● Sample audit - Capturing all details for a random sample of assets to compare
data accuracy field-by-field
● New models, locations, assignees and cost centerscreated while collecting data
● Missing serial numbers or asset tagsrequired for every asset record
● Inconsistencies, such as assets received with no corresponding purchase order
● Changes to static data(e.g. model number, manufacturer, asset type). These fields
should not change unless they were entered incorrectly when received).
● Other fields, based on business rules specific for your organization
ASN files can be messy and often contain “excess” data. Examples include:
Consider RFID
Radio-Frequency Identification (RFID)is the use of radio waves to read and capture
information stored on a tag attached to an object. A tag can be read several feet away and
does not have to be within direct line-of-sight of the reader to be tracked. RFID eliminates
the need for human intervention. Considerations include:
● RFID tags don’t prevent theft.An end user can place their hand over the RFID
tag, to prevent it from being read by many door readers.
● Not all RFID are the same.Passive RFID tags have a shorter read range than
more expensive Active tags. There are many different sizes and shapes of passive
RFID tagsthat have different read ranges. Don’t expect to use any old tag on any old
asset. You need to do plenty of testing.
● The proper tags for the types of assets you want to track
● Any conflicts in certain frequency ranges
● Determine the number of fixed and mobile readers, antennae and installation
services
RFID technology will continue to mature, perhaps making this a mainstream solution.Mean-
while, checkout Microsoft BizTalk RFID and AMI AssetTrack to streamline RFIDimplementa-
tions.
Capturing assets using barcode or RFID tags, updates your repository for assets in the
warehouse and for assets not connected to the network. Auto discovery captures assets
that are connected to the network. Using tracking anddiscovery tools provides two data
sources to compare and fix exceptions. You can see which assets were scanned and which
were discovered. You’ll miss nothing.
Asset Management
International 2025 First Avenue
Suite 1212
Seattle, WA 98121
[email protected]
(877) 297-7618
amitracks.com
[email protected]