Service Intelligence Starts With Your CMDB

Share on linkedin
Share on facebook
Share on twitter
CMDB ITSM is important for gathering service intelligence

Pink Elephant is a global provider of conference, consulting, and training focused on ITIL and CMDB. Jan-Willem Middelburg is the regional director for the Asian Pacific Division of Pink Elephant, based in Kuala Lumpur, Malaysia. In a post at, Jan-Willem says this: “AI in ITSM equals ‘service intelligence’ — ITSM’s next frontier.”

He also says this. “For years, IT service providers, both insourced or outsourced have been collecting a wealth of data about infrastructure, services, and customer behavior. IT Service Management (ITSM) tools, Configuration Management Databases (CMDB), and IT Asset Management (ITAM) tools are literally swamped with terabytes of data that can tell a great deal about the organization and the services it provides. Whereas this used to be a cost center, more and more organizations realize that ITSM functions literally sit on a wealth of information. 

Service Intelligence is a structured attempt to unearth the value that is captured into these systems. What if you could predict the malfunction of services or identify future vulnerabilities in your IT infrastructure? Would that not be of great strategic value?”

In the same post, Jan-Willem cites an article that summarizes research from McKinsey & Company, “Achieving business impact with data.” That research discusses what McKinsey experts call the “insights value chain.”

Those experts say this: “Broadly speaking, capturing the most value from the wealth of potential data begins with excellence in identifying, capturing, and storing that data.” 

“The first two action areas—data collection and data refinement comprise the tech-heavy upstream activities. This is followed by the people and process-driven downstream activities of defining and adopting actions, as well as building the tools and governance that support sustained engagement around these insights-based activities, McKinsey adds, that those initial steps toward turning data into valuable insights.”

Get Your CMDB Ready for Service Intelligence

So, what’s it all mean?

It means your CMDB is critical to your efforts to evolve your IT estate and its management. Your CMDB is a primary repository of the data that drives ITSM, intelligent IT automation, service intelligence, and ultimately, the insights value chain at your business.

This means the data in your CMDB must be as accurate, complete, and up to date as possible. Which means the data sources that feed it must be all those things, too.

High-quality, high-value CMDB data starts with comprehensive, intelligently automated, and reliable discovery of every critical element of your IT estate. Your chosen discovery tools and processes must also monitor your environment and immediately flag all changes to it, both authorized and suspicious.

Your CMDB auto discovery, IT Asset Management (ITAM), ITSM, IT Operations Management (ITOM), and cyber security solutions must all integrate seamlessly with one another. Such integration, combined with intelligent automation, gives you the best chances to ensure the completeness, accuracy, and timeliness of the data feeding your CMDB.

Service intelligence is a worthwhile, achievable long-term goal. Maximizing the accuracy, completeness, and timeliness of your CMDB data is a solid first step toward that goal. It will also generate important short and medium-term benefits, including improvement of the overall management and security of your entire IT estate.

Virima: Your Partner for CMDB Excellence

Virima features can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users. Virima solutions are easy to use and configure, and designed to work well with each other. These and other features can help you and your IT management team maximize the quality and business value of your CMDB, and build a solid foundation for service intelligence.

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Share on linkedin
Share on facebook
Share on twitter

Subscribe to Our Newsletter

More to Explore

A digital certificate (which goes by many names such as SSL Certificate, Public Key Certificate, Identity Certificate) is used to provide a valid form of identification to applications, servers, devices or any other network components, by which people and machines…

In any kind of system, a vulnerability points to a “state of being exposed to the possibility of attack or harm.” In the age of information, we have - by the very nature of the way we share, store and…

IT Operations Management (ITOM) refers to the administration of technology and application requirements within an IT organization. Under the ITIL framework, ITOM’s objective is to monitor, control, and execute the routine tasks necessary to support an organization’s IT infrastructure.(Also, see…

CMDB service maps are visual depictions of hierarchical relationships among business services (sometimes also major applications) and their supporting Configuration Items (CIs). Because service maps can provide an instant bird’s eye view of critical dependencies and relationships, their utility lies…

Understanding the Configuration Management Database (CMDB) and its core functions is a critical aspect of service management. The CMDB forms the hub of numerous service management practices and provides a means of correlation needed to deliver business services successfully.   The…

Introduction  IT Asset Management (ITAM) and inventory management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets but focus on different things. Inventory management can exist…

IT Asset Management (ITAM) and configuration management are both useful practices that can benefit any organization using IT. Both of these practices are concerned with the management of IT assets, but focus on different things.Configuration management can exist without IT…

Some people think that an IT service desk is the same thing as an IT help desk. It isn't, as I'm going to explain. Sure, there are some similarities, but there are also many differences. Let's start by exploring what…

To understand the business value of service mapping, it’s important to shift to a service delivery mindset, rather than thinking about delivering infrastructure, equipment, software, and applications. Defining services is relatively simple if thought of as the commoditization of what’s…

Business service mapping – the area of configuration management that perplexes so many IT professionals, yet that which provides the highest value in Configuration Management Database (CMDB) projects. There are several major reasons IT gets stopped when it comes to…