Cherwell Discovery and Service Mapping
Virima delivers affordable, flexible, feature-rich and easy to deploy discovery and service mapping to Cherwell. Available as both SaaS and on prem, Virima’s deep discovery capabilities and automated dependency and relationship mapping gives Cherwell customers a leg up on their digital transformation by ending the chaos of managing and securing today’s dynamic, dispersed and complex IT estate.
Benefits of integrating Virima with Cherwell
Codeless integration and configuration
Integration to the Cherwell CMDB is 100% codeless and a breeze to configure through Virima’s web admin portal. There you choose from over 100 Virima blueprints to map to Cherwell objects (including custom objects), ID which discovery properties you want to synch, and choose asset-specific correlators to ensure nothing is ever duplicated.
Flexible Discovery options for hybrid IT
Discovery options include scheduling agentless IP-based scans with over 140 extendable probes as well as an installable agent for work-from-home and roaming PC’s. Additional discovery is performed via API integrations with popular hypervisor, cloud, network, storage and monitoring solutions.
Cherwell CMDB automation
Choosing which Virima discovered assets or updates to move to the Cherwell CMDB is also a snap. Simply view all assets and updates from a filterable list in Virima and select which to copy to the Cherwell CMDB. Business rules can be applied to automate moves to CMDB for a hands-free approach to keeping the CMDB current.
Data accuracy and accessibility matters
Within the Cherwell CMDB all synched assets and configuration properties are viewable from the Cherwell web client and desktop agent. New action links automatically appear in the Cherwell CMDB record providing ITSM users the ability to rescan the asset and view available Business Service Maps.
Business Service Maps
Business Service Maps (BSM) provide consumable views of automatically generated infrastructure relationships, application/service dependencies, network topologies and system communications. In a near-future release, BSM’s will include ViVID™ (Virima Visualized Impact Display) overlays of Cherwell open Incidents and pending/recently completed Changes. ViVID greatly decreases the time to perform impact analysis of planned changes and identify the root causes of service disruptions.
Virima Discovery and Service Mapping highlights
- Codeless integration, no Cherwell admin agent required
- Flexible auto-discovery for hybrid IT environment
- Keep your Cherwell CMDB accurate and up to date at all times
- Dynamic visualizations of hardware, application and service relationships, dependencies, and communications
- Faster impact and root cause analysis with ViVID Business Service Map overlays
- Enterprise functionality smartly priced for Cherwell customers
- Unleash your CMDB’s power to reduce MTTR and increase MTBF
Schedule a demo or request a 30-day full-featured trial today!
Customers looking for an affordable, feature-rich and easy to deploy Cherwell discovery and service mapping solution now have it with Virima. Virima helps end the chaos of managing and securing today’s dynamic, dispersed and complex IT estate.
Virima can tell you more things about more IT assets with greater accuracy than ever imagined and present the info in a variety of powerful, dynamic visualizations and reports.
Do you feel like CMDB (configuration management database) is a puzzle you can’t solve because there’s no automatic way to build and maintain it?
Whether your goal is to simply build and maintain a complete inventory of IT hardware, software and cloud assets or implement a full ITAM or ITSM program, Virima has you covered.
Do you know about all the components in your IT ecosystem? Do you know how they connect and interact with each other? Do you understand
The configuration data in your Configuration Management Database (CMDB) is some of the most complex data your company generates. With list after list of records
Make the IT Asset Security Circle Unbreakable Executive Overview Security vulnerabilities can lead to downtime that cost businesses billions of dollars each year, damaging reputations