Seven Practices To Improve IT Asset Logistics

Do you know where all your company’s IT assets are? If not, you’re not alone – many businesses find it difficult to track down every phone, computer, or software license. IT asset tracking is an essential process for any organization looking to manage its technology resources efficiently. By establishing and following standardized procedures, your team can ensure that all devices and software are accounted for, and that important data is protected. In this blog post, we will outline some of the best practices in IT asset logistics so that you can create a system that works best for your organization. 

IT asset logistics is the process of tracking, monitoring, updating, and securing assets throughout their lifecycle. This includes locating and identifying assets, recording and tracking changes to asset data, and maintaining security and control over assets.  

The main goal of IT asset logistics is to ensure that organizations have a clear understanding of where all their assets are always. This helps to improve efficiency, reduce costs, and minimize the risk of lost or stolen assets.  

For an organization to implement an effective IT asset logistics solution, there are several key requirements that must be met: 

1. IT Asset Tracking Software: First and foremost, an organization needs appropriate IT asset tracking software. This software should be able to track every asset in the organization’s inventory, from laptops and smartphones to software licenses and cloud service subscriptions.

2. IT Asset Database: The IT asset tracking software should maintain a central database of all assets in the organization. This database should include detailed information about each asset, such as its make, model, serial number, and location. Not only does it provide a centralized repository for all data, but that data can also then be used to generate reports, conduct analysis, and track change over time. The asset database should be updated regularly to ensure that it is accurate and up to date. Additionally, the database should be accessible to authorized users only. This will help to ensure that sensitive information about assets is not compromised.

3. Device Tracking: The tracking software should be able to track the location of each physical device in real-time. This information can then be used to generate alerts if a device is moved without authorization, or if it goes missing. Additionally, the software should allow users to set up geo-fences so that they can be notified if a device enters or leaves a specified area. In some cases, it may also be necessary to attach tags to the IT device. These tags may use GPS or other technology to provide real-time locations for the IT devices, which can be useful for keeping track of high-value items or for monitoring device movements in real-time. Another common method is to use barcodes or RFID tags that can be affixed to devices and read using a handheld scanner. This data can be used to track the location of devices and keep inventory records up to date.

4. Reporting and Analytics: The reporting and analytics features of IT asset tracking software are key for understanding how assets are being used, where they are located, and other data points. These reports can be used to improve operational efficiency and optimize the utilization of assets. 

For example, a report on IT asset usage can help to identify which assets are being used most frequently and which ones are sitting idle. This information can then be used to make decisions about how to best allocate resources. Additionally, reports on asset location can help to ensure that assets are being used in the most efficient way possible. If an asset is constantly being moved from one location to another, it may be time to consider investing in additional units so that the asset can be used more efficiently.

5. Integration: Finally, IT asset logistics software should be able to integrate with other business systems. This includes ERP, CRM, accounting systems, monitoring and security systems, and shipping and procurement services. Integration allows organizations to automatically share data between different business processes and improve overall visibility into their operations. Integration is key when it comes to effective IT asset logistics. All too often, organizations silo their information, making it difficult to get a holistic view of their technology resources. By integrating your IT asset tracking system with other tools and processes, you can ensure that everyone is on the same page and that important data is not lost in the shuffle.

6. Automation: There are two ways to use automation to improve the accuracy and efficiency of IT asset logistics. The first is to automate the data collection process. This can be done in several ways, such as with barcodes or RFID tags, which are scanned by a handheld device. This data can then be used to track the location of devices and keep inventory records up to date. Secondly, you can use automated alerts to notify the appropriate personnel if a device is moved without authorization, goes missing so that your employees can take corrective action immediately.

7. Standardization: The last and most important aspects of IT asset logistics is to establish standardized procedures. This will ensure that all devices and software are accounted for, and that important data is protected. By following a set of standardized procedures, your team can improve communication and collaboration, and make sure that everyone is on the same page. Additionally, standardized procedures will help to ensure that your tracking system is able to scale as your organization grows. 

IT asset logistics is a critical process for any organization that relies on physical assets. By implementing an effective asset tracking solution, businesses can improve efficiency, reduce costs, and minimize the risk of lost or stolen assets. For more information on asset tracking, please contact us at sales@montra.io! 

 

12 Cyber-Readiness Strategies #5 and #6

If you’re like most IT professionals, you’re always looking for ways to improve your organization’s cyber-readiness. And rightly so: the stakes are high, and the threats are constantly evolving. In the 2020 Thales Data Threat Report, 49% of US companies have already experienced a data breach. Is your business ready to handle a targeted cyber-attack? But where do you start? 

Our 12 Cyber-Readiness Strategies is a great place to get started. In our continuing series on making certain your organization is cyber-ready, we have already covered developing a cyber-readiness plan, establishing policies, keeping software up to date, and requiring multi-factor authentication. 

This time we are covering Backup and Cybersecurity Compliance. 

Backup and compliance are two key areas that can make a big difference in your organization’s overall cyber-readiness. Having a robust backup process in place is crucial to maintain continuity of operations in the event of an incident. And ensuring that your organization is compliant with relevant cybersecurity regulations can help prevent costly fines and penalties. 

We will take a closer look at why these two areas are so important and offer some practical tips on how to get going. So let’s get started! 

5. Back Up Everything Valuable 

Backup may not immediately come to mind when thinking about cybersecurity. But when your company eventually experiences a cyber breach – and it is when not if – you will be happy you have backups of all your critical data. Data is the lifeblood of every business. Unfortunately, the risks and threats to the protection, privacy, and usability of that data are endless. 

Why Is Backup Important for Cyber-readiness? 

When it comes to cybersecurity, backup is one of the most important measures you can take. After all, if your data is lost or stolen, it can be difficult – if not impossible – to get it back. 

By implementing a reliable backup process, you can make certain that your data is always safe and secure. And if disaster does strike, you will be able to quickly restore your systems and get back up and running. 

 What Other Benefits Do Backups Provide? 

In addition to the security benefit, there are other benefits to implementing a backup strategy, including: 

  • Compliance with regulations: Many regulatory frameworks require organizations to maintain a certain level of data security. A reliable backup solution can help you meet these requirements. 
  • Minimized downtime: If your systems are lost or damaged, a backup solution can help you get up and running quickly. 
  • Reduced costs: By backing up your data, you can minimize the cost of data loss or corruption. 

How to Get Started with Backup 

There are a variety of backup solutions available, so it’s important to choose one that fits your needs. Here are a few things to keep in mind when selecting a backup solution: 

  • Choose a solution that is scalable, so it can grow with your organization. 
  • Protect your backups with separate login credentials 
  • Work with your IT partner to configure the solution and test it thoroughly. 
6. Don’t Neglect Compliance

In addition to backup, compliance is another key factor in cyber-readiness strategy. Compliance can help protect your organization from potential fines and penalties, and it can also help you reduce your risk of a cyber-attack. 

Maintaining cybersecurity compliance is mandatory for many organizations. While navigating and satisfying the obligations can be complicated and stressful, achieving compliance is a critical component of having a cyber-ready business. 

How Is Compliance Important to Cyber-readiness? 

There are cyber compliance regulations that apply to businesses in multiple industries, including the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), and the NIST Cybersecurity Framework (CSF). Security and privacy are integral elements of compliance and privacy frameworks such as the General Data Privacy Regulation (GDPR) and the California Consumer Privacy Act (CCPA) should be considered as part of your compliance journey. 

Cybersecurity Compliance can be a complex and daunting task, but it’s important to remember that there are many resources available to help you. Here are a few steps to get started: 

  • Familiarize yourself with the regulations that apply to your industry 
  • Develop a compliance plan that outlines how you will meet the requirements 
  • Implement security controls to help you comply with the regulations 
  • Train your employees on cyber compliance requirements 

Conclusion 

Cybersecurity is one of the most important issues businesses face today. Cyber threats are on the rise, and businesses need to take steps to protect themselves. A backup and compliance strategy are two of the twelve components we believe to be essential to making your business cyber-ready. By implementing these solutions, your business can protect its data, ensure compliance with regulations, and mitigate the risk of cyber-attacks. 

Learn More 

Want to learn more about cyber-readiness for your business? Montra can help! Please contact us. We are happy to help you become more effective and keep your IT operation safe and secure. 

Five Easy Steps to Great Employee IT Onboarding

Contrary to common belief, the employee onboarding process isn’t just for HR. Most modern businesses are heavily reliant on IT infrastructure for client and team communication, employee and task management, and productivity. 

Despite this, IT onboarding is often mishandled during the employee onboarding process. This negatively impacts both the business and the new employee by: 

  • delaying fully productive work 
  • creating security and compliance risks 
  • exposing confidential data
  • negatively impacting an employee’s perception of their new company 

While the consequences of overlooking IT onboarding can be ominous, nailing your IT onboarding process can be straightforward. You just need the right process and access to tools that can facilitate the process. 

When you make a new hire, your new employee will rely on a handful of devices and applications to successfully complete their job. IT onboarding creates a uniform process to ensure that all required technology is properly set up and new hires are well-trained on the tools they will use 

Why IT Onboarding Is So Important 

New employees at modern companies need to use devices and software to be successful in their roles. IT onboarding is important to help new hires: 

  • Familiarize themselves with your technology stack. New hires may be overwhelmed by the amount of technology they’ll need to use to be successful in their role. A comprehensive IT onboarding experience can help them become familiar with the tools, software, and processes before they jump into their day-to-day responsibilities. 
  • Set up required credentials. Between software for the job, communication applications, and security programs, new employees have many services they will need to access. IT onboarding provides an opportunity for new hires to receive all their credentials while getting assistance from IT. 
  • Learn about privacy and security. When you hire new employees, you grant them access to confidential information about the company. Providing a clear overview of cybersecurity and privacy practices in IT onboarding helps new hires understand how to navigate and protect sensitive information. 
  • Feel confident in their ability to use provided technology. Not only should new hires familiarize themselves with their new technology, but they also need to feel confident in their abilities to use it in order to complete the requirements of their role. A robust IT onboarding program ensures all new employees learn the ins and outs of the necessary technology. 

Making Certain IT Onboarding Goes Smoothly 

The following IT employee onboarding steps can be used to prioritize the tasks required to ensure that your IT onboarding goes smoothly. 

No matter how experienced new hires are with technology, setting up effective IT onboarding processes can help new employees feel welcome in your company, build their confidence in your organization, and boost their productivity. 

Here are the basics of IT employee onboarding best practices: 

1. Gather All Required Information About the New Hire 

Each new hire will require different types of technology to be successful in their position, depending on the role and industry. Once the candidate officially accepts their offer, send relevant information to the IT department so they know what technology to prepare for the new employee. You will want: 

  • New Hire Name(s) (first, last, middle, or nickname, if applicable) 
  • Contact information (prior to their start date) 
  • Job title 
  • Department 
  • Start date 
  • IT resources they’ll need access to
  • Type of device(s) they’ll need 

Getting all the necessary information on a new hire before they start will save IT from needing to make changes later. Where possible, verifying the information with the new hire is very helpful. 

2. Order and Setup Technology Before Their First Day 

Equipped with information about the new hire, the IT can order and set up all the tech equipment before the new employee’s first day. IT may have extra computers and equipment waiting to be assigned to new employees, or they may need lead time to order new systems. 

A typical list of devices and other technology includes: 

  • Laptop or Desktop 
  • Monitor 
  • Docking station 
  • Mouse 
  • Keyboard 
  • Cables 
  • Company cell phone 

Arriving on the first day to a desk setup – or arriving at their house if they will work remotely – with all the necessary resources can positively impact a new hire’s onboarding experience. It spares the new hire from scrambling to gather the right tools to accomplish work in a timely manner. 

3. Create Accounts for All Applicable Software and Tools 

As with setting up devices, you will need to create accounts for all the software and tools that a new hire will need in their position. This includes their device accounts, email, and all other applications they will use. Other applications could include file services like Dropbox, productivity tools like Trello or Asana, and analytics tools like PowerBI and Tableau.  

You could utilize a single-sign-on system such as Okta or Microsoft SSO, to provision user accounts more easily across multiple applications. Multi-factor authentication (MFA) should be a requirement on any account used for critical business processes or critical business data – including their machine, email, and any other high-value services. 

You will typically need management approvals through this entire process also. Done poorly, this could be a tedious manual process, or it could be nearly automatic. A directory service can expedite this process through a simplified interface that allows you to assign users to groups and automatically provision them to resources using only a few checkboxes. 

Once all these credentials are created, they need to be given to the new hire on the first day – or the first week at the latest. In days before hybrid work, the credentials might be written on a sticky note. Now the credentials should be passed securely to a personal email account in a multi-step process. 

4. Schedule 1:1 IT Onboarding Session 

On the new employee’s first day, schedule time for a one-on-one or small group IT onboarding training session to walk through all the devices and accounts they need to know how to navigate. 

In this meeting, IT will walk new hires through their company email and messaging apps, as well as some of the important security procedures. Consider scheduling enough time to walk through some of the technology available for general use at the office as well. 

5. Provide Training for Cybersecurity and Privacy 

All new employees should go through cybersecurity and data privacy training. The more they know, the less risk they present. Training will typically be provided in self-guided training modules on cybersecurity, data privacy, and other physical security topics such as clean desk policies, storing physical files, and locking computers and desks. 

You should have a data privacy agreement that new hires review and sign before completing their IT onboarding. This assures that all the confidential data that you provide employees remains private and covers the organization legally in case of a data breach. 

Cybersecurity training should continue through periodic training sessions. The frequency and content of this training is set by common cybersecurity compliance policies that likely apply to your organization. 

How Software Helps with IT Onboarding 

Having a defined and repeatable IT onboarding process will significantly reduce friction in your new hire’s onboarding. However, depending on the employee’s role and the extent to which your company makes use of software systems, important steps in the process can easily fall through the cracks. 

Any issues in your IT onboarding process may not become apparent until they have more serious implications for employee retention or cybersecurity. This is where onboarding software can assist you in putting in place structured, repeatable IT onboarding processes. 

Good IT onboarding software should be: 

  • Affordable, user-friendly, and simple to use 
  • Fully customizable, allowing you to build on the recommended steps in the IT onboarding process and develop templates that are a fit for your organization 
  • Cloud-based so your new hires can access the IT onboarding process wherever they are 
  • Workflow-enabled, making it easy for you to add team members to any onboarding process and easily track and complete IT onboarding checklist items 
  • Designed to seamlessly track devices with an asset management system, allowing you associate employees with the devices they will use in their work. 

Learn More 

Want to learn more about IT onboarding best practices, or are you interested in software that can help you automate your onboarding process more effectively? Please contact us. We are happy to help you become more effective at this part of your business. 

3 Reasons Why Microsoft Teams Matters

The shift to hybrid work has made Unified Communications as a Service (UCaaS) one of the fastest-growing technology sectors. In Q1 2021 the UCaaS user base grew by 46% from the first quarter of 2020 according to a recent Synergy Research Group report. 

UCaaS brings together voice and video calls, meetings, and messaging functionalities that a hybrid workforce requires on a platform that can be accessed from the cloud. It effectively delivers the collaboration and communication tools of their office to wherever they work. 

In looking at the UCaaS space, there is one product that is really shaking up the market right now. That is Microsoft Teams. We think there are three reasons for this: 

1. Teams is Now the Second Largest UCaaS App 

2. Identity for Teams is Deeply Integrated with Microsoft 365 

3. Built Like a Modern IT App, not an Aging Telecom System 

1. Teams is Now the Second Largest UCaaS App 

Microsoft Teams is the fastest-growing business application in Microsoft’s history. The usage of Teams has grown tremendously during the pandemic. As reported by the Business of Apps website, the daily active users for Teams expanded 894% during the first few months of the COVID-19 lockdown. 

Teams has rapidly established itself as the internal collaboration platform of preference for many businesses, becoming the new way to work for more than 145 million daily users. Many large organizations around the world are using Microsoft Teams: 124 organizations have more than 100,000 users of Teams, and nearly 3,000 organizations have over 10,000. 

In 2019 Microsoft’s Skype for Business had a negligible share of the UCaaS market. By integrating what is now called Teams Phone into Teams, it turns Teams into a powerful UCaaS platform for both internal and external communication. This has vaulted Microsoft’s UCaaS market position from outside the top five to number two in just 12 months, easily overtaking many established UCaaS providers. Included as part of the Microsoft 365 subscription, there’s no incremental cost for Teams Phone.  

For all these reasons, the growth of Teams Phone currently has no hindrances. 

2. Identity for Teams is Deeply Engrained with 365 

All of the Teams capabilities use the common user identity that is a part of Microsoft 365. This seemingly benign capability enables truly powerful unified communications experiences. 

This unified identify simplifies group work with multiple easy-to-use channels of communication from group chats to video seminars. Multiple teams groups can be set up in a click or two, organizing conversations – whether chat, voice, or video – to make them easier to follow, and notifications can be set to pop up on-screen. File sharing is also deeply integrated and the same identity that controls file access rights is also part of the Teams experience. 

Remote meetings that are as effective as being in-person 

  • PowerPoint Live in Microsoft Teams: Entirely new PowerPoint presenting experience exclusive to Microsoft Teams that benefits both presenters and attendees. As a presenter, you can lead meetings while having access to your speaker notes, slides, meeting chat, and participants. As attendees, you can view slides at your own pace and use Slide Translate to see the slides in your own language.
3. Built Like a Modern IT App, not an Aging Telecom System

Microsoft Teams is encroaching on the traditional territory of VoIP solution providers like Cisco, Avaya, and others. Microsoft partners are positioning Teams Phone as a way to replace an existing PBX system, or cut costs from more expensive VoIP providers. 

Built more like an IT Application than a telecom system, Teams make sit easy for your IT department and employees to work faster, smarter, and better together. Teams is designed with a simple and intuitive user interface, making it easy to learn for your employees. Administration of Teams is handled in an IT-friendly way that is familiar to IT professionals, who can often find traditional telephony services to be arcane and antiquated. 

This modern, IT-centric approach leads to some direct feature advantages for Teams Phone users. Calling, for instance, is integrated directly into the flow of devices and applications of modern workers. Enabling features such as: 

  • Easily transfer calls: Teams Phone now offers the ability for you to transfer a call from your computer to a mobile device or vice versa, without interrupting the call. 
  • Apple CarPlay: Apple CarPlay support for Teams enables users to join calls and meetings using your vehicle’s built-in controls or hands-free using Siri. 
  • “Better together” device experience: The “better together” experience means that Teams devices now complement each other, allowing users to answer a call, mute or unmute, and end the call on either the device or the Teams client. 
  • Spam call identification: Teams Phone uses advanced industry techniques to identify likely spam calls, allowing users to avoid unnecessary interruptions to your day by spam calls. 
  • Walkie-talkie for desk phones: Connect quickly with colleagues with a push-to-talk function available on desk phones. 

This IT centricity does not come at the expense of traditional telephony features and integrations including: 

  • Operator Connect: Operator Connect, enables customers to simply connect your operator-based public switched telephone network (PSTN) service into Teams with a managed experience, now extending the ability to enable PSTN calling in Teams to three great options. 
  • Teams Phone Calling Plans: Teams Phone Calling Plans offer a simple way to deploy calling in Teams without on-premises equipment, available in 33 markets. 
  • Bring Your Own Contact Center: Teams Phone integrates with your existing contact center solution, and Microsoft’s connected contact center program provides a new level of validation from rigorous third-party testing to ensure seamless and reliable integration. There are now 8 certified contact center solutions with an additional 14 in the certification process. 

For IT departments, Teams Phone eliminates complexity and cost of managing a legacy set of telephony systems and services from their operations. Replacing legacy on-premises phone systems with a UCaaS solution such as Teams Phone has a clear, strategic business advantage, but the transition to cloud-based telephony can be challenging. This is largely because the start point for many organizations is a disparate array of legacy on-premises hardware and a patchwork of carrier relationships across all their sites and countries. 

Need a Partner? 

Transitioning your company’s communication to Microsoft Teams Phone is relatively straightforward but enlisting a partner that has done it before can assure that you have a smooth and successful transition. Talk to us today to learn how your company can also take advantage of this modernization in communications. 

Device RMA Process Infographic

Journey to a Great RMA Process

When making and selling computers, phones, tablets, IoT, or other devices, you know that eventually some of your devices will get returned. Handling the returns in a systematic manner will help your company to keep your business running smoothly. Click to download our Device Return Materials Authorization Process Infographic for our view of what puts your company on a road to a better device RMA process

6 Steps to Great RMAs for Your Devices

If you are in the business of making and selling computers, phones, tablets, IoT, or other devices, you know that eventually some of your devices will get returned. If your devices are being used in critical applications for your customers, you know how hard it can be to process returns well. Handling the returns in a systematic manner will help your company to keep your business running smoothly while ensuring your customer satisfaction numbers do not take a hit. 

What is Return Materials Authorization? 

Return materials authorization (RMA) is part of the process of a customer returning a device back to the manufacturer to get the unit fixed or replaced. On the manufacturer’s side, it is processed by verifying the device returned properly and initiating appropriate actions to troubleshoot, repair, or reimage, the device. This process includes data collection, return eligibility verification, software troubleshooting, reimaging, or issuing a replacement. 

Ultimately, an RMA process exists to make the return seamless to the customer and cost-effective for the manufacturer. However, not all RMA processes are created equal, and there benefits to understanding best practices for device RMAs is different than other product types. Without the right process in place, companies tend to spend an unnecessary amount of time on returns. A well-designed and automated process will help reduce the risks and increase the overall efficiency. 

It is also important to establish expectations for warranty terms, follow-up actions, and return policies. Implementing such a systematic process will also help in keeping track of the various defects across categories and suppliers while leading to quick resolution of issues. 

What is a Device and Why is the RMA Different? 

What we mean by a device is typically anything with a smart chip, some firmware or software, and the ability to communicate over the Internet. Devices are typically covered by warranties and the RMA process is primarily executed when some part or all the device stops working. This is as opposed to something like clothing, in which RMAs are typically executed for an unliked or defective item. The RMA process for devices is inherently more complex and includes data collection, warranty eligibility verification, cross-shipping of devices, and troubleshooting and repairing of returned devices. 

6 Best Practices for the Device RMA Process 

An effective device RMA process can improve the reputation of your company and keep your customers up and running when your devices are being used in important applications. With the right process in place, you will be ready when inevitable defects and returns occur, so your customers can be served quickly and cost-effectively. Here are some of the best practices that can be put in place to create an efficient device RMA process: 

1. RMAs Should Be Integrated to Customer Systems 

If you transact the rest of your business online, then you or your customer should be able to initiate an RMA online also. At a minimum, a good RMA process will include a platform that you or your customer can use to initiate an RMA. In the best case, your RMA process should be directly integrated into the systems and processes you already use. If you use Salesforce Service, for instance, you should be able to generate an RMA request from that application. Once the process has started, RMA updates should flow back to your system also. 

2. Make the RMA Simple to Track 

It must be an easy task for your and your customers to log and track the return requests. It is always good to keep the customer informed at each stage of the process. This makes the entire process clear, easy to track, and provides the customer with confidence in the process. 

Since most devices have serial numbers, your RMA process should use them. By also capturing accurate address information directly from a CRM, your RMA system should generate shipping labels and schedule a pickup of the device from the customer’s site. Efficiencies such as these eliminates time and possible errors that manual RMA processes routinely incur. 

3. Priority Returns Need Cross-Shipping 

When customers deploy your devices into mission-critical applications, they usually expect limited or no downtime when an RMA is being processed. This requires cross-shipping of a working device to the customer site to replace the RMA’d unit before it is shipped back. This may seem simple, but to execute this process well some important things need to happen: 1) the customer site information needs to be accurate; 2) return labels need to be included outbound, and 3) the RMA’d device should be able to fit in the box being used to ship the replacement unit. That requires accurate information about the field unit to get it right! 

4. Return Reasons Must Be Validated 

Your customers may have any number of reasons for returning a device. It may be a hardware issue, software issue, or it may be damaged from weather or third parties. However, as is often the case with complicated devices, the customer’s rationale for returning the device often does not match the actual condition of the device upon return. When the device arrives at the return center, workers must examine and boot the device to verify the return reason matches the actual issue. In best practices, both return reasons are logged for future reviews of the RMA process. 

5. Allow Manual Intervention 

Automation is great and most parts of an RMA process can be automated, but without human oversight at important steps in the process. It is easy to get the process out of control. Certain RMA processes allow the end-customer to initiate urgent returns without approval of the manufacturer. These kinds of returns require oversite during the process, if possible, and certainly after the process to make certain that the returns were truly needed. Inventory in the RMA system and in the warehouse can get off count quickly. Best practices require regular human inventory counts to look for discrepancies. 

6. Proactively Await the Returned Product 

Once a notification of a returned device or devices is in process, best practices have the return team preparing for the returned device(s) before arrival. This may include verifying parts inventory of known replacement parts, or for large returns, preparing space and time to process the returns en masse. If the devices include RFID tags or scannable marks, those IDs should be fed to the receiving system before they arrive to streamline the process and avoid exception handling. 

Download our Device Return Materials Authorization Process Infographic Here. 

Need a Partner to Help? 

Finding the answer to RMA management can seem daunting, but Montra is here to help. With our VIA DX Device Logistics software, you can automatically track and manage your devices from fulfillment to field repairs, to RMAs and warranty tracking. Talk to us today to learn how this invaluable tool and the team that backs it can help your business optimize and streamline the way you handle all the lifecycle processes for your devices.