Consumer Credit Counselling Service


With an IT estate of 900+ PCs spread across 11 different sites in the UK, the IT team at the Consumer Credit Counselling Service were struggling to get to grips with their disparate IT estate.

They needed to understand exactly what software and hardware assets they had throughout the organisation, where these were located, how they were being used and whether their software licensing was compliant with different vendors' schemes. Furthermore they could no longer afford to waste time and resource in inefficient software installation processes.

CCC looked to CTMS to install Frontrange Discovery and to provide valuable product training and expertise to enable them to increase efficiency and ensure software compliance.

 

Blue Fin

Since installing Frontrange DSM, Bluefin is using it extensively. With a mixture of ‘thick’ and ‘thin’ PC clients where users access their applications via Citrix, the IT Team is able to exert more control over the environment than ever before.

Each install is managed centrally but deployed on site via a recycled server hosting DSM which contributes to the low cost of ownership.

DSM allows a small IT team to tightly manage application deployments. 

 

The Telegraph Group

The Telegraph Group, a British newspaper publisher, had never tracked its software usage. When an executive asked if his company was in compliance with software licensing agreements, nobody could answer.

So the Telegraph Group began a software asset management (SAM) endeavour, with the help of SAM partner CTMS, to inventory its software usage and licenses and develop policies to maximise the ongoing value of software assets. Although the SAM process uncovered under-licensing of software, the total amount (U.S.$150,000) was more than offset by areas in which the company was over-licensed (totalling $200,000). New policies to centralise purchases (gaining purchasing discounts) and pool unused licenses will potentially save the Telegraph Group $180,000 per year. Furthermore, in doing so, Telegraph executives also gain the comfort of knowing they are in full licensing compliance.

 

QinetiQ

CTMS was selected by DERA to create a deployment plan for Frontrange Discovery for 12,000 PCs over 60 sites, within two months to aid the division of the network for the two new separate organisations.

The Corporate Network Security Officer said, 'For any company trying to meet the current security standards, knowing what and where it is on your network is essential. Frontrange Discovery was an invaluable aid in that security process.

The unexpected benefits provided a swift return on investment and the Corporate Infrastructure Manager summed up his view of Frontrange Discovery with, 'putting IT Management back on the top of infrastructure'.

 

Gloucestershire County Council

The Council is now able to automatically track and audit all of its network-attached assets along with non networked products such as mobile phones and RSA tokens. Newly attached assets are identified and managed from the main Frontrange Discovery console, as are deletions.

Using the organisational structure created within Active Directory and linked as part of the configuration management database to xAssets, all assets are now easily identifiable and have additional information including the last Frontrange Discovery audit date and the last user logon information. “The system is able to answer any questions we ask of it,” says Greg Parsons, Capita's Change Manager who works closely with Gloucestershire County Council.

“The central concept of the Configuration Management Database means that all the audit and inventory tools feed information into each other so we can capture information on which assets are being used, where and when, and monitor when upgrades, licenses or other changes are required.” The Council’s Head of ICT, Dave Badham, said, “Gloucestershire County Council is pleased with the overall approach to the system and xAssets has proved to be a useful tool that has enabled ICT to streamline their asset management and configuration processes.”

 

1000 characters left