Ability to be the CMDB and Integrate into your ITSM and OSS Stack OR Feed and Enrich your Existing CMDB Technology.
CMDB Managed Solutions
Discovery, CMDB and Inventory
Primary or Federated CMDB
Service Aware Discovery
We can provide service aware discovery options across your network and service estate using multiple methods or take feeds from your existing discovery technologies.
Data Integrity Validation
Automated Checks and Anonymous Data Workflow Interface for manual checking is part of the standard service
Visualisation
Data Visualisation according to your business and chosen use cases.
Reporting
Relevant Compliance Reports Provided out of the Box
Pie-Row-Technic™ Dashboarding
Ability to quickly create and pivot within dashboards to create new views, informed by on-the-fly and real-world requirements. Following investigations users are provided the ability to save new visualisation as standard dashboards and views.
Integrations
Integrations to Element Managers, Network Management Tools, APM Tools, ITSM Stack, Flat Files, databases, data lakes. Standard and Non-Standard APIs supported.
Derived Attributes
Attribute data can be generated using programable functions, ensuring accurate data inputs based on user inputs, rather than being left to chance.
Associative Data
Predefine common reusable data once and associate where required, reducing inaccurate input and time. Also allows for single update to affect all associated CI’s.
Password of last resort
Generates and Manages a unique password for each device. Automatically configures the password on the device based on customer requirements (e.g. Break-glass or console password), utilising the NCCM Module.
Hardware Discovery
A comprehensive physical hardware discovery that includes model & card types. The discovered hardware database is also scanned by the Lifecycle management function for End-of-Life, End-of-Sale, and End-of-Service/Support analysis.
Software Discovery
The software, or operating system in use on a discovered device is automatically discovered for usage identification, patch management, and Vulnerability & Lifecycle, End-of-Life, End-of-Sale, and End-of-Service/Support analysis.
Network Relationship
Detailed topological views that graphically represent the network and services, through detailed discovery of device vLAN & Neighbour discovery process.