Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.
+1 212 318 2000
Europe, Middle East, & Africa
+44 20 7330 7500
+65 6212 1000
International Data predicts worldwide small- and medium-size information technology spending will reach $509.6 billion in 2010, with the majority spent on hardware and software applications. Unfortunately, industry experts estimate that 30% of the budget for these IT assets is wasted due to mismanagement. What can small businesses do to plug the leaks?
1. Take stock of your full IT inventory. Many IT departments are paying maintenance and licensing fees for assets that are underused or simply forgotten. Estimates say that most buy excess licenses for 60% of their software portfolio. By using a centralized inventory management solution, you can automatically detect every piece of hardware and software on your network and see how much they’re used, then immediately eliminate unnecessary assets.
2. Avoid hefty software compliance fines. Organizations without a formal asset tracking system are noncompliant on approximately 30% of their software portfolio, and vendor audits are on the rise. (Gartner recently reported that more than half of all organizations had been audited by at least one software vendor in the last year.) Centralizing and automating your software license management will reduce compliance risk and save you big bucks in the long run.
3. Get control of PC power. Factoring in nights and weekends, most computers are in use less than 20% of the time. An automated power management tool will allow you to apply power usage rules tailored to your users’ work patterns, so their PCs are up and running when they’re in the office and are automatically shut down or in power-save mode when they’re not.
4. Protect against internal threats. Data leakage or privacy breaches can cripple an organization. Yet many businesses focus only on external threats, overlooking that information can also be compromised from the inside out. Find a device management tool that can lock out unauthorized devices, such as USB drives, cell phones, portable hard drives, and music players.
Vice-President, Product Strategy
Want to improve the way you run your business? Entrepreneurs, academics, and consultants from diverse industries offer practical advice on a variety of topics each business day.
To submit a tip for consideration, first check our archive of previous tips to make sure you're not repeating a tip someone has already contributed. Then send the tip to Small Business channel contributor Michelle Dammon Loyalka. Because of the volume of material she receives, she may not respond to each individual.