Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Do Your Change Management Tools Alert You to Unplanned Changes?

Virima Technologies accomplishment: CMDB Change Management

Change Management is great – funneling changes through a common set of processes to ensure the proper reviews occur and your CMDB is updated; however, how do you know what your change management process is missing? It’s the proverbial question: How do you know what you don’t know? The answer: Seek another point of view. Do your IT Discovery Tools alert you to unplanned changes? If not, then you may need some new tools.

IT Discovery Can Show You What Change Management Missed

If you have decent change management, then your CMDB will generate a picture of your current IT environment and reflect any planned changes that have moved through your normal processes. How do you know, however, if your CMDB is accurate or if someone has been sneaking changes through the back door unnoticed? How do you know the planned changes were actually done as approved?

Last minute work-arounds are often left undocumented. Discovery tools can provide you an independent investigation of your IT environment – reporting what they see, not just what they expect. A comparison of the as-observed picture from your discovery tools and the as-expected picture from your CMDB can shine a light into the shadows, so you can see your IT environment clearly.

Multiple Points of View Give You More Pieces to the Puzzle

Discovery tools can be focused on a variety of different facets of your IT environment, from polling of network devices to software inventories to user access of online services. Each type of discovery provides a unique point of view of your environment, illuminating parts of the picture, which may not have been previously visible. Your IT environment is complex, with many hiding places. Using discovery to look at the environment from different angles reveals more pieces to the puzzle.

Comparing Pictures Is How You Will Learn the Most from Change Management

The real value of discovery can be unlocked by combining individual points of view, from different discovery tools, into a comprehensive perspective, and then comparing that picture to what you already know from your CMDB and change management systems. Some of the insights about your IT environment that you will gain from this include:

  • What has changed that wasn’t previously known to you?
  • What is new in the environment that wasn’t previously known to you?
  • What is missing either because it has been removed or isn’t working currently?
  • What has moved to a new location?
  • What is being used in a new way?
  • What still exists even though it was supposedly removed?

Each of these represents either an unplanned change or a planned change of which you weren’t aware and warrants further investigation. Without discovery to alert you to these changes, you will continue to be blind to them and suffer increased risk from the unknown-unknowns in your environment.

What Are You Waiting For?

Take action today and illuminate your IT environment with discovery capabilities. When combined with the visualization and analysis capabilities of Virima, you will have the information to see into your blind spots and reveal the big picture to interpret what you see with confidence and clarity.

Regardless of how good your change management processes are or how often you clean your CMDB data to keep it accurate, these capabilities on their own won’t reveal what you are missing. How do you know what you don’t know? When it comes to planned and unplanned changes, the answer is Discovery.

Learn more about how Discovery could have easily spared two global organizations from very costly security incidents here.

Virima is here to help. To get started,
contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…

The importance of discovery comes from what it provides to the users of the Configuration Management Database (CMDB): trustworthy data and greater speed to value. Without discovery, the CMDB database is built by feeds and data entry, which can lead to…

Your Next IT Discovery Tool ‘MUST’ Include Support for Multi-Cloud According to the predictions by Gartner, over 75% of midsize and large organizations will adopt a multi-cloud or hybrid IT strategy in 2021. Companies across the world are increasingly turning…

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

Are you planning a move to the cloud, or have you already made the move and now want to make the most of it? No matter which category you are in, you need the right technology and tools to get…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…