CMDB Managed Solutions

Discovery, CMDB and Inventory

icon

Primary or Federated CMDB

Ability to be the CMDB and Integrate into your ITSM and OSS Stack OR Feed and Enrich your Existing CMDB Technology.

icon

Service Aware Discovery

We can provide service aware discovery options across your network and service estate using multiple methods or take feeds from your existing discovery technologies.

icon

Data Integrity Validation

Automated Checks and Anonymous Data Workflow Interface for manual checking is part of the standard service

icon

Visualisation

Data Visualisation according to your business and chosen use cases.

icon

Reporting

Relevant Compliance Reports Provided out of the Box

icon

Pie-Row-Technic™ Dashboarding

Ability to quickly create and pivot within dashboards to create new views, informed by on-the-fly and real-world requirements. Following investigations users are provided the ability to save new visualisation as standard dashboards and views.

icon

Integrations

Integrations to Element Managers, Network Management Tools, APM Tools, ITSM Stack, Flat Files, databases, data lakes. Standard and Non-Standard APIs supported.

icon

Derived Attributes

Attribute data can be generated using programable functions, ensuring accurate data inputs based on user inputs, rather than being left to chance.

icon

Associative Data

Predefine common reusable data once and associate where required, reducing inaccurate input and time. Also allows for single update to affect all associated CI’s.

icon

Password of last resort

Generates and Manages a unique password for each device. Automatically configures the password on the device based on customer requirements (e.g. Break-glass or console password), utilising the NCCM Module.

icon

Hardware Discovery

A comprehensive physical hardware discovery that includes model & card types. The discovered hardware database is also scanned by the Lifecycle management function for End-of-Life, End-of-Sale, and End-of-Service/Support analysis.

icon

Software Discovery

The software, or operating system in use on a discovered device is automatically discovered for usage identification, patch management, and Vulnerability & Lifecycle, End-of-Life, End-of-Sale, and End-of-Service/Support analysis.

icon

Network Relationship

Detailed topological views that graphically represent the network and services, through detailed discovery of device vLAN & Neighbour discovery process.