Reference library

Glossary

A comprehensive glossary of all things IT management, asset lifecycle, and enterprise technology

16 terms

Device Lifecycle Management

Managing devices from procurement through deployment, maintenance, and eventual retirement or disposal. This holistic approach ensures devices deliver maximum value while minimizing total cost of ownership across the organization.

Endpoint Management

The centralized management and security of all endpoint devices connected to an organization's network. It ensures devices are properly configured, updated, and protected against security threats through unified policies.

Hardware Procurement Automation

Using automated systems to streamline the purchasing and delivery of IT hardware equipment. This automation reduces manual effort, accelerates procurement cycles, and ensures consistent policy compliance across all purchases.

Identity and Access Management (IAM)

Framework of policies and technologies ensuring the right individuals access the right resources. IAM systems manage digital identities and their access privileges, providing secure authentication and authorization across enterprise systems.

IT Asset Management (ITAM)

The process of tracking, managing, and optimizing an organization's IT assets throughout their entire lifecycle. ITAM enables organizations to make informed decisions about technology investments while ensuring compliance and reducing costs.

IT Asset Redeployment

Repurposing and reassigning IT assets to new users or purposes to maximize their value. This sustainable approach extends asset lifecycles, reduces electronic waste, and provides significant cost savings versus new purchases.

IT Asset Retrieval

The process of recovering company-owned IT equipment from employees, particularly remote workers. This is especially critical for distributed workforces, requiring efficient logistics, tracking systems, and clear return policies.

IT Offboarding

The secure process of revoking access and retrieving IT assets when employees leave the organization. It includes systematic access removal and proper handling of company-owned devices to ensure no security gaps remain.

IT Onboarding

The process of provisioning new employees with the technology resources they need to be productive. Effective IT onboarding ensures new hires have all necessary hardware, software, accounts, and access from day one.

IT Procurement

The strategic process of sourcing, purchasing, and acquiring IT hardware, software, and services. It involves vendor evaluation, contract negotiation, and ensuring acquisitions align with organizational needs and budget constraints.

Mobile Device Management (MDM)

Software solutions for securing, monitoring, and managing mobile devices used within an organization. MDM enables IT departments to enforce security policies, deploy applications, and remotely manage devices across multiple platforms.

SaaS Cost Optimization

Strategies and practices to reduce SaaS spending while maintaining necessary functionality and service levels. This includes identifying unused licenses, eliminating duplicate applications, and negotiating better vendor terms.

SaaS Management

The practice of managing, optimizing, and governing an organization's SaaS application portfolio. It addresses challenges like shadow IT, license waste, and security risks by providing visibility and control over the entire SaaS ecosystem.

Shadow IT

Technology solutions used within an organization without explicit IT department approval or knowledge. While often driven by productivity needs, shadow IT poses significant security, compliance, and cost risks that must be addressed.

Unified Endpoint Management (UEM)

A comprehensive approach to managing all endpoint devices from a single platform. UEM consolidates the management of diverse device types and operating systems, offering consistent security and management capabilities.

Zero-Touch Deployment

Automated device setup and configuration requiring minimal or no IT intervention. Devices ship directly to end users and configure themselves upon first boot, connecting to management systems automatically.