(248) 735-0648

A Configuration Management Database (CMDB) is a critical component of any IT organization. It provides a centralized data source to support multiple management functions. These functions include Service, Asset, Operations and Datacenter management. The data records in the CMDB represent what ITIL® calls Configuration Items (CI). These CIs are the IT assets, components and systems, which enable the business to deliver its products and services.

 

Based on data from hundreds of CMDB stand-ups and data quality initiatives, the top 5 assets types that Blazent commonly configures are:

 

  1. Servers: Because server failures can disrupt thousands of users, servers are naturally the top spot in a CMDB. Servers, such as mainframes or computing grids, are also relatively expensive, which is why asset managers track them so closely. At the other end of the server-cost spectrum are virtual servers; these must be tracked to limit their poliferation because new instances are so easy to spawn. This prolifieration can easily create a more complex environment, waste precious resources and require more virtual machine licenses.

 

  1. End-user computing (EUC): Desktop and laptop computers are expensive to support and directly impact the ability to deliver business services, which makes them a high-volume CI. They generate a relatively large number of service desk calls, typically requiring one administrator per 100 devices to manage configurations, provide patch management, ensure backups and manage security. Maintaining a stable and supportable configuration for a typical 3-year lifecycle is very challenging due to the sheer number of applications that must be patched and updated.

 

  1. Network Gear: Due to the increasing incidences of cyber-attacks, organizations are devoting more time and effort to the management of networking equipment, primarily routers that are publicly accessible. These devices must be regularly patched to prepare for and remain a step ahead of potential threats. Unauthorized wireless routers also pose a potentially serious threat to an organization. Because these devices are capable of masquerading as authorized devices, a CMDB can easily enable the detection of such duplicity via its governance processes.

 

  1. Installed Software: On both servers and client computers, installed software normally has a higher asset value than the hardware components. Besides having a direct impact on the delivery of the organization’s products and services, the asset’s value also justifies the cost of managing it. Software asset management systems usually include a database, but its focus is usually on entitlement and depreciation. The CMDB commonly supports the software asset lifecycle management, and can record instances of the software being actively used or when it is eligible for harvesting and reuse. This ensures the organization is receiving full value from the purchase or subscription.

 

  1. Groups/Users: IT Assets and components do not operate in isolation, they have dependencies between assets and users that the CMDB maps. An equally important user relationship is that of the “manager” of the asset if the organization outsources IT to Managed Service Providers. This is critical for accurate and transparent billing.

 

As organizations gain confidence in their CMDB, they normally increase the number of asset classes it records and maps. Many of Blazent’s most sophisticated customers maintain CMDB records for approximately 20 asset classes. Blazent builds confidence by ensuring that the CMDB contains only highly validated records.

 

You can learn more about Blazent’s best practice based approach to standing up a CMDB in our white paper here.