Getting the IT Discovery Job Done

Share on linkedin
Share on facebook
Share on twitter
IT Discovery Agile Concept

Manual discovery of all IT assets is a time-consuming, cumbersome, error-prone job. And by the time it’s completed, assets may have been changed, added, or removed. A tool that automates many discovery processes is necessary to make the task both cost-effective and comprehensive.

What Are Existing Tools Good For?

Many contemporary tools are good at discovering the existing technologies in your data center, but may be less efficient, or possibly ineffectual when it comes to matching those assets with the people and business processes they serve. To achieve this objective, the tool must automate as much of the discovery as possible., Simultaneously, the tool must but also allow for the input, mapping, and organization of information gathered from those with “tribal knowledge” of how things really work.

Tools that provide scanning for network and security purposes are common, but typically don’t show the big picture. Data collected by these tools must be correlated to provide a better view of the enterprise-wide infrastructure, including the interrelationships among the various components and people who use those components.

And since these tools are usually deployed at the departmental level, it is often difficult for the discovery team to gain access, especially if they don’t know they exist in the first place. Unfortunately, turf wars are not uncommon in data center transformations.

Dependency Is Critical for Discovery

Tools can also miss dependencies. Scans may occur at the wrong time to catch an occasional communication flow, so it is important to let dependency mapping scans run over long periods or at different intervals.

And since an enterprise data center does not remain static during or after a discovery project, any tool should refresh the data on an ongoing basis. Likewise, the actual transformation doesn’t take place overnight so it’s critical that operations and support teams are aware of changes as they occur. The initial discovery of assets and relationships should dovetail into a thorough change management program.

Without a highly automated tool, a data center discovery process requires particular expertise and can consume considerable time and resources. This often results in the need for external consultants to perform the work, which can be expensive. And as with any manual/point-in-time discovery, the information is static while the data center remains dynamic.

In Conclusion

At the end of the day, IT organizations are held accountable to rapidly respond to and support the goals of the organization, delivering the best return on investment as they do so. 

A comprehensive, automatic discovery tool that keeps the IT inventory Configuration Management Database (CMDB) and relationship/dependency map up-to-date should be one of the lasting deliverables of any data center discovery.

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Share on linkedin
Share on facebook
Share on twitter

Subscribe to Our Newsletter

More to Explore

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

Introduction  IT Asset Management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets but focus on different things. Inventory management can exist…

IT Asset Management (ITAM) and configuration management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets, but focus on different things.Configuration management can exist without IT…

Some people think that an IT service desk is the same thing as an IT help desk. It isn't, as I'm going to explain. Sure, there are some similarities, but there are also many differences. Let's start by exploring what…

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…