1. What is ITAM?

IT Asset Management (ITAM) is the governance practice of inventorying, optimizing and managing the complete lifecycle of all technology assets within an organization. These assets include hardware (servers, workstations, network equipment, mobile devices), software (on-premise licenses and SaaS subscriptions), associated contracts and cloud services.

ITAM covers every stage of an asset's lifecycle — from acquisition to decommissioning, including deployment, usage, maintenance and optimization. The goal is to ensure every technology asset delivers maximum value while minimizing costs, risks and compliance issues.

Contrary to common misconception, ITAM is not simply an IT inventory. It is a strategic discipline at the intersection of financial management, regulatory compliance, cybersecurity and operational optimization.

2. Why ITAM Has Become Essential in 2026

Several converging trends make ITAM more critical than ever in 2026:

Soaring software spending. Organizations spend an average of 30 to 40% of their IT budget on software licenses and SaaS subscriptions. Without ITAM, a significant portion is wasted on over-licensing, duplicates and unused subscriptions. Industry studies estimate that 25 to 30% of purchased software licenses are never used.

Increasingly frequent publisher audits. Microsoft, Oracle, SAP, Adobe and other major publishers are intensifying their compliance audit programs. An audit revealing under-licensing can generate penalties of hundreds of thousands — even millions — of dollars. ITAM, specifically SAM, is the best defense against this risk.

Licensing model complexity. Licensing models have become extremely complex: per-user, per-device, per-processor-core, subscription-based, consumption-based. Without rigorous tracking, it is virtually impossible to determine whether an organization is compliant.

Cloud and SaaS proliferation. Massive adoption of SaaS and cloud infrastructure (Azure, AWS, GCP) creates new ITAM challenges: shadow IT (unapproved software), zombie subscriptions, cloud resource overconsumption.

Cybersecurity requirements. An accurate asset inventory is the foundation of any cybersecurity strategy. You cannot protect what you do not know. Security frameworks (NIST, CIS Controls) place asset inventory management as control #1.

3. ITAM vs SAM: Understanding the Difference

The distinction between ITAM and SAM is essential for structuring your approach correctly:

ITAM (IT Asset Management) covers all technology assets — hardware, software, contracts, cloud services. It is the overarching governance framework for technology assets.

SAM (Software Asset Management) is a subset of ITAM specifically dedicated to software assets. SAM focuses on license compliance, software cost optimization and publisher audit risk prevention.

In practice, SAM is often the most urgent entry point for an ITAM program, as it addresses the most immediate financial risks (publisher audits) and savings opportunities (over-licensing). However, SAM without ITAM remains incomplete, as it does not cover hardware assets, vendor contracts and overall lifecycle optimization.

Nexus Conseils TI supports organizations in both practices through an integrated approach — starting with SAM when compliance is urgent, then expanding to full ITAM for sustainable governance.

4. ISO 19770: The International Standard

ISO 19770 is the international reference standard for software asset management. It comprises several complementary parts:

ISO 19770-1 defines the SAM processes that organizations should implement. It describes SAM maturity levels, from basic inventory through proactive optimization. This is the most important part for structuring your approach.

ISO 19770-2 defines SWID Tags (Software Identification Tags) — standardized identification tags enabling automatic software identification. SWID Tags significantly facilitate SAM inventory automation.

ISO 19770-5 provides common vocabulary and definitions to ensure consistent communication among all stakeholders.

Aligning your ITAM program with ISO 19770 offers concrete benefits: demonstrating SAM maturity during a publisher audit, structuring processes for long-term sustainability, and providing a common framework across IT, procurement and finance teams.

5. The 5 Core ITAM Processes

An effective ITAM program relies on five interconnected processes:

Process 1: Discovery (automated inventory). The starting point is establishing a comprehensive, automated inventory of all deployed technology assets — hardware and software — across the organization. Discovery tools scan the network to automatically identify connected hardware and installed software, including on-premise and cloud environments.

Process 2: Lifecycle management. Each asset follows a lifecycle: request, approval, acquisition, deployment, usage, maintenance, reallocation, decommissioning. ITAM structures and automates this cycle to ensure complete traceability and reliable budget planning.

Process 3: Compliance and ELP (Effective License Position). The ELP compares licenses owned (entitlements) against software actually deployed to determine compliance status: over-licensed (excess capacity = waste) or under-licensed (audit risk). The ELP must be calculated regularly for each major publisher (Microsoft, Oracle, SAP, Adobe).

Process 4: Cost optimization. Based on the ELP, ITAM identifies savings levers: removing unused licenses, consolidating duplicates, migrating to more advantageous licensing models, renegotiating contracts. Typical savings from a first ITAM initiative range from 15 to 30% of software spending.

Process 5: Governance and oversight. ITAM is not a one-time project but an ongoing practice. Governance includes defining roles and responsibilities, tracking dashboards, periodic reviews and integration with other organizational processes (procurement, finance, security, ITSM).

6. ITAM and CMDB: The ITIL Connection

ITAM integrates naturally within the ITIL (Information Technology Infrastructure Library) framework — the reference for IT service management (ITSM) best practices.

The primary integration point is the CMDB (Configuration Management Database) — the centralized database recording all Configuration Items (CIs) of an IT infrastructure and their relationships. ITAM feeds the CMDB with accurate, up-to-date data on hardware and software assets.

A reliable CMDB, fed by ITAM, improves all ITSM processes: incident management (rapid identification of affected assets), change management (impact assessment), problem management (root cause analysis) and capacity planning.

7. ITAM in the Cloud Era (Cloud Asset Management)

Cloud Asset Management (CAM) extends ITAM to cloud environments, addressing three specific challenges:

SaaS subscription management. Organizations use an average of 100 to 300 SaaS applications. CAM identifies unused subscriptions, functional duplicates and over-provisioned licenses (for example, Microsoft 365 E5 licenses assigned to users who only need E3).

IaaS/PaaS consumption optimization. On Azure, AWS or GCP, unused or oversized cloud resources represent an average of 25 to 35% of the bill. CAM implements FinOps — the discipline of cloud financial optimization.

Identity and access governance. CAM ensures only authorized users have access to cloud services, aligned with the organization's security and compliance policies.

8. How to Start an ITAM Program

Here is the approach recommended by Nexus Conseils TI, structured in four progressive stages:

Stage 1: Initial audit (4 to 8 weeks). Comprehensive inventory of hardware and software assets, review of contracts and licenses, identification of compliance risks and savings opportunities. This is the discovery phase.

Stage 2: SAM compliance (2 to 3 months). ELP calculation for each major publisher, identification of over-licensing and under-licensing, remediation plan to achieve compliance. This stage generates immediate savings and reduces audit risk.

Stage 3: Optimization (3 to 6 months). Contract renegotiation based on ITAM data, software portfolio consolidation, migration to optimized licensing models, lifecycle process implementation.

Stage 4: Sustainable governance (ongoing). Integration of ITAM into organizational processes, team training, dashboards, periodic reviews, maintaining ISO 19770 compliance.

9. The 5 Most Common Mistakes

Mistake #1: Confusing ITAM with inventory. An inventory is a snapshot in time. ITAM is an ongoing governance process. An inventory without update processes and governance loses its value within months.

Mistake #2: Ignoring cloud and SaaS assets. Many organizations limit ITAM to on-premise assets while the majority of new IT spending is cloud-based. Cloud Asset Management has become indispensable.

Mistake #3: Underestimating licensing complexity. Microsoft, Oracle and SAP licensing models are extraordinarily complex. Misinterpreting usage rights can transform an apparently compliant position into a major audit risk.

Mistake #4: Starting without executive sponsorship. ITAM spans multiple departments (IT, procurement, finance, legal). Without an executive sponsor (CIO, CFO), ITAM initiatives stall in priority conflicts.

Mistake #5: Trying to do everything in-house. SAM compliance and contract negotiation require specialized expertise and independence from publishers. An independent consulting firm brings the technical expertise and objectivity needed to defend the organization's interests.

10. What ROI to Expect from ITAM

The return on investment from ITAM is measurable across three dimensions:

Direct savings. Reducing over-licensing, consolidating duplicates and renegotiating contracts typically generate savings of 15 to 30% on software spending in the first year. For an organization spending $2 million on licenses, this represents $300,000 to $600,000 in savings.

Risks avoided. SAM compliance protects against publisher audit penalties, which can reach millions of dollars. For example, an Oracle audit revealing database under-licensing can generate a regularization bill exceeding one million dollars.

Operational efficiency. Mature ITAM improves budget planning, accelerates procurement, reduces incidents related to obsolete assets and supports strategic decision-making by providing reliable data on the technology estate.

Need expert support?

Free, no-obligation initial consultation with our IT governance experts.

Free consultation →