ServiceNow Discovery – Is It Right for You?

Share on linkedin
Share on facebook
Share on twitter
IT Asset

ServiceNow Discovery may not be giving you everything you need. Keep reading to discover why.

Automated IT Discovery is a must-have to quickly find and identify infrastructure components and assist with compliance needs and audit device changes. Discovery’s data is critical to a Configuration Management Database (CMDB). It helps identify infrastructure devices, components, and software, including identifying infrastructure changes (approved and unapproved).

Typically organizations use discovery to:

  • Ensure hardware, software, and operating system components are documented
  • Ensure all changes are properly authorized via the change control process. (validates/audits approved changes)
  • Have a holistic, and transparent, view of infrastructure, and their components, within the enterprise
  • Enhance operational management processes (Request Management, Incident Management, Change Management, Release Management, Problem Management, Configuration Management, IT Asset Management, Software Asset Management, break-fix/IMAC, chargebacks, etc.)

ServiceNow is certainly a leader in IT Service Management (ITSM) which often translates into a belief that their Discovery is too. As discussed in my previous blog “ServiceNow Competitors – Are there any?”existing ServiceNow ITSM customers would be wise to explore other automated discovery solutions and not use ServiceNow’s ITSM market share as an indication of how well their Discovery works.

Just because an investment in ServiceNow ITSM was made, technology teams should not be absolved from seeking “best of breed” discovery options that will work with ServiceNow ITSM.

At Virima, we recommend understanding how the ServiceNow Discovery technology works prior to purchase, the requirement to manually fine-tune what it discovers, and whether its capabilities are worth the high expense of the solution.


IT Asset Discovery Fundamentals

Deploying and configuring IT asset discovery technologies can be difficult and time-consuming, especially if a solution offers limited discovery options. Agentless discovery is generally faster to deploy and can discover the broadest range of devices like servers and network infrastructure.

Installable agents are useful for desktops and laptops that get powered down and/or roam off the network but not all devices can take an agent. Any discovery solution should include both options because one size never fits all.

To ease the comparison, here are some other features to look for:

  • Scanner Type: Agent and Agentless.
  • Scan: Servers, desktops, Virtual, Network, Application, Database, Network, VPN, Mobile, Hand-held scanners, Printers, Medical Devices, Cloud.
  • Discover: Configurations, Software, OS Patches, Certificates, Relationships, Custom Attributes, Cloud Assets.
  • Supported OS: Windows, Mac, Linux, UNIX, Mobile.
  • Scanner Scheduling: Manual, scheduled, automated redundancy if a scan is not delivered.

Deployment and Support Ease

  • SaaS or On-premise
  • Web Interface
  • Out-of-box Deployment Ease
  • Self-install or automated deployment
  • Vendor implementation services
  • Middle server technology required (mid-server)
  • Online help files and knowledge base
  • Ability to call customer support
  • Servers can be hosted on virtual devices

ITSM Integration

  • Service Catalog
  • Request Management
  • Change Management
  • Incident Management
  • Problem Management
  • Configuration Management

Discovered Attributes

  • Device Name
  • Device Description
  • Device Type
  • Manufacturer
  • Model Description
  • Model Number
  • Manufacturer ID
  • Serial Number (if known)
  • Department
  • Location
  • Created On
  • Last Modified On
  • TCP/IP Address
  • MAC Address
  • Last User
  • Device Status

Discovery technologies, like ServiceNow Discovery, require a multitude of discovery servers to support the solution. For example, MID server, management server, discovery server. This is not the case with Virima as our web-based solution is designed for deployment ease.

Leveraging a virtual “relay” server that sits on-prem, our solution connects directly to a secure AWS cloud. This approach ensures the security of your data within your enterprise and within the cloud. Plus, unlike ServiceNow, Virima offers an installable IT Discovery agent for complete flexibility, while also offering dependency mapping out of the box.

As discovery solutions are considered, here are a few points that you too may want to include within the search for the ideal discovery tool for your enterprise:

  • The cost of discovery technology deployment. (discovery servers, middle-ware technology needs, etc.)
  • Ability to leverage both agent and agentless discovery technologies
  • Understanding how data is transferred and secured outside of your enterprise
  • The ability to write custom discovery technologies (as required)
  • Understanding the breadth, and depth, of data collected
  • Does the solution require a cloud vs. on-prem deployment?
  • Does the solution provide features and product functionality beyond discovery?
  • Ease of integrating a CMDB and/or service management tool
  • Ease-of-use User Interface
  • Ease of data import, data integration, and deployment
  • Additional training and support costs
  • Understanding of professional service options and fees

It’s important to remember that the success and challenge of any discovery tool lies in its ability to capture the entire enterprise. This includes discovery, and transportation of data via network firewalls, Virtual Private Network (VPN) connections, Demilitarized Zone (DMZ) environments, and other isolated networks. This is critical to minimize the need to manually discovery, and manage, devices within your infrastructure.

And lastly, always compare solutions prior to acquisition. Features, functionality, overall capability, and price are all key factors when acquiring the discovery technology for your enterprise.


In Conclusion

As you continue your venture of discovering devices and components within your IT enterprise, remember this: It is best if you evaluate your options. Capture requirements devised by your stakeholders, validate what you captured, identify gaps, prioritize your immediate versus long term needs, assess the cost of purchasing and deploying the solution, and don’t forget reviewing the “ease of use” for both you and your stakeholders.

Now take these requirements and leverage them within your vendor discussions as the evaluation of three products occur. Why three? It will provide you with an objective perspective without it turning into an “analysis paralysis” initiative.

Upon completion, review your evaluation results with your stakeholders and gather their input/feedback. This will assure stakeholder support continues as they have a seat at the table.

Sure, ServiceNow is a juggernaut and their IT discovery works better than most. However, do its features and functionality really address the operational needs of your business and address the needs of your business stakeholders?


Virima: A Constant in IT Discovery Services

Are there better options at a more cost-effective price and total overall better value? Does the ease of deployment and usability make it operationally more effective? How does the total cost of ownership compare against other solutions?

All great questions for you to leverage and demonstrate that thought leadership has been applied within your decision-making process. And management likes that.

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users.

To see how Virima IT Discovery automates your CMDB into an operational, trustworthy, and actionable database, check out our subscriptions.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

.

Share on linkedin
Share on facebook
Share on twitter

Subscribe to Our Newsletter

More to Explore

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

Introduction  IT Asset Management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets but focus on different things. Inventory management can exist…

IT Asset Management (ITAM) and configuration management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets, but focus on different things.Configuration management can exist without IT…

Some people think that an IT service desk is the same thing as an IT help desk. It isn't, as I'm going to explain. Sure, there are some similarities, but there are also many differences. Let's start by exploring what…

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…