With i-doit you document your entire IT landscape in a clear and central manner. Taking the recorded data, you set up Configuration Management in the form of a fully-fledged CMDB. But i-doit can do much more!
With one single tool, you cover many special options. Your daily routine becomes much easier.
IT documentation as basis
Every company supports their processes with Information Technology. One subtask of operations is documentation. IT documentation is more than just configuration data. It is the foundation for knowledge and serves as tool for the whole organization. Based on that knowledge i-doit supports you with many useful applications.
More than just documentation
With i-doit you cover many use cases of your IT Service Management. Besides the pure IT documentation, the system offers all functionalities of a full-fledged CMDB. It supports your business processes, daily administrative tasks and provides you a full overview of your IT at any time.
IP Address Management (IPAM) is responsible for the central management, monitoring and distribution of IP addresses. In small networks, you will quickly recognize the importance of this task. You avoid address conflicts within a network by using the central management of all IP addresses in i-doit. In addition, you find all relevant data in no time thanks to the central data storage.
Another positive effect of IPAM: You use existing data for automation as well as for the generation of reports. i-doit offers numerous IPAM functionalities. It assists in assigning and monitoring:
- Management of networks, subnets and supernets
- Management of static and dynamic address pools
- Support of IPv4 and IPv6 addresses
- Check on availability of IP addresses before assignment
- Direct triggering of actions from GUI
- Integration with discovery tools
- Integration with monitoring software for the configuration of checks directly from the CMDB and transfer of live status
- Triggering of automated actions (automation, runbooks) by means of the Events add-on
Special challenges can be expected for migrating to IPv6 and IoT projects. You should consider automation of processes for these use cases with high frequency of change. i-doit supports you as solid platform here as well. By means of the API add-on your own scripts as well as software from third-parties will be connected quickly. The tools adjust to the individual workflows of your IT organization.
Complete view of IMAC/R/D process chain
IMAC stands for “Install, Move, Add, Change” and describes the process chain that repeats in every IT organization every day. Often you find abbreviations like IMAC/R (Remove) or IMAC/D (Dispose). With this term, the (always necessary) disposal of devices is added to the process chain. Thus IMAC/R/D describes the lifecycle of all components of an IT organization.
In the course of these processes a lot of information is gained which has to be fed back into the IT documentation immediately. In order to make that more comfortable for IT administrators in daily business i-doit supports them with a series of functions.
We have thoroughly analyzed the procedures along the process chain with our development partners. In doing so add-ons have been built for many special activities. These add-ons simplify the update of data in i-doit.
Locating the hardware in i-doit is a simple exercise: Select the location from the list and save. Spaces, workplaces and racks can be used to exactly define the location. As a result, you have rack plans, floor plans and a hierarchical overview of your assets.
For the installation of Software i-doit supports you in several ways:
On the one hand, by controlling the automatic rollout using the Events add-ons.
This is preferred for the automation of scripts and vendor software like Ansible, Docker or proprietary software.
On the other hand, Software and License Management is supported by importing software information from discovery tools like e.g. Check_MK oder JDisc.
The bigger an organization the more often people or hardware moves. In order to optimally support this routine task, we have developed an extra Removal add-on which covers exactly these activities. People, workplaces and related equipment can be related to a new space with only few mouse clicks in the CMDB.
The handover of additional assets to people needs immediate documentation, so that everything can be found afterwards. In i-doit you do the assignment of components to people in a simple and intuitive way. There is an index of different roles. It contains e.g. owner, user, administrator or external maintenance partner. This table can also be reported on.
Every IT landscape changes constantly. In order to completely document this i-doit supports changes of existing configurations in several ways. The complete tracking of the life cycle is possible. In addition, a log reliably records every data modification.
A simple solution for a structured Change Management is the usage of tasks of the Workflow add-on which also sends out automatic notifications. The RfC add-on of our partner don’t.panic covers ITIL® Change Management.
Finally i-doit becomes the central point of IT Service Management with high process integration because of many add-ons of our partners.
By using the CMDB explorer you recognize dependencies, the so-called service trees. They can be further analyzed with the Analysis add-on. It offers the possibilities of “What-if analysis” (impact analysis). You identify the impact of changes immediately before they are implemented.
Similar to the purchase and installation of IT components the removal or disposal must be documented, too. These procedures must be recorded consistently and traceably. Hard disks cannot be disposed easily because of data protection reasons. In order to facilitate the additional documentation effort i-doit offers support in the form of a Disposal add-on of our Partner donamic.
Information Security Management
An Information Security Management System (ISMS) is not a software. It is a system consisting of rules and directives. These are applied for the purpose of controlling and maintaining the security of processed data. The officially valid definition of an Information Security Management System can be found in the ISO standard 27001.
i-doit supports your establishment of an ISMS. This happens – simply said – because of the documentation of your IT landscape. When creating the CMDB you identify a lot of information relevant for the ISMS. You store information about assets, asset groups and also IT Services. You complete the data with responsible persons, their rights and their roles.
This is information that is required in the context of building an ISMS. Thus, you have a stable fundament with your CMDB already where you can build your Information Security Management on. In order for you to perfectly meet the requirements of ISO 27001 we recommend the ISMS add-on. It enriches the standard functionalities of i-doit to fulfill the requirements of the standard.
You walk the same path if “IT Baseline protection of BSI” is a topic for your organization. In this case the Baseline protection add-on or Baseline Protection 2 add-on ist the right extension for your i-doit installation.
Data Center Infrastructure Management
Managed service providers and providers of data centers rely on i-doit as the software covers many parts of the Data Center Infrastructure Management (DCIM). You can easily keep track of a big number of servers in your data center with i-doit.
i-doit not only allows the capture of hardware. For every single system the installed software is identified and related. The graphic display of all captured racks and the relations between the different components shows you a 360° view on your IT.
Rack space management
The integrated rack view shows you the visual presentation of the front and back of your racks for easy orientation. You can see which component is placed in which rack at any time. In addition, you can see in which slot it is put and which height units it needs.
Using the Floorplan add-ons, you document your spaces and position racks, USV etc. true to scale.
Maximum weight, power consumption, heat emission
The integrated reporting manager calculates the total weight und performance and clearly presents the data.
Overbooking of virtual hosts
The configuration of host systems and their reserves can be displayed visually and be reported. Clusters are also included.
The Document add-on enables the transfer of data from the CMDB to individually adaptable documents. Reporting to your customers and the charging is simplified. Formatted text parts can be filled fully automated with actual data from i-doit at defined times and can be stored in the desired output format.
Labelling with QR Codes
Another domain of i-doit: Individually configure and print barcodes and QR codes. Every important element for your service can be part of the documentation and be found easily down to the wire of a cable.
Direct link to i-doit
What is hidden behind the closed door? i-doit knows. With stick-on QR codes you see behind every locked door. Every object, every report and every i-doit page has its own address (URL) thanks to the nature of a web application. A sticker on the rack or the entrance door immediately provides the information who has to be called in case of emergency which key locks and who has access rights. Provided the gracefully built i-doit authorization system gives you insight!
Access permissions, physical security
It is also an important part of the DCIM to know who has access to which area and what role the person has in the company. In i-doit it is easily implemented. The Workflow add-on is another very simple possibility to traceably log access to security critical areas.
i-doit can cover many more use cases of the DCIM. Try it!
Many users use i-doit for the documentation of technical equipment even if it is not – in the classical sense – seen as IT. Because in principle the same processes apply to all assets, even if there is no microprocessor in them (yet).
The flexible data model of i-doit allows an individual adaption of the system based on your needs. The documentation of all kinds of assets is one of the core functionalities of the software. You apply these functions to the documentation – without extra investment.
The recording of the whole life cycle of every asset must be traceable and evaluable. It starts with the purchase and stops with the disposal.
Relations and dependencies
Almost every equipment and every device is connected to other technical components in different ways. These relations and the resulting dependencies should be documented and clearly identifiable.
Every asset holds connections to further documentation. This could be pictures, test reports, technical drawings or simply manuals. These relationships can be documented directly at the object in i-doit.
If an equipment needs to be exchanged or has an outage the responsibility for operations and maintenance must be quickly identifiable. This information is stored centrally and transparent in i-doit. Thus, the right contact persons are quickly identified.
The maintenance of all assets is a fundamental and recurring task which should not be missed by no means. With i-doit you have a specific warning and reporting system.
Not every employee of a company should have access to every piece of information – among other things for data protection reasons. The sophisticated authorization system of i-doit supports you. It enables a very detailed assignment of permissions und reliably controls the access to information of the system.
With these additional possibilities, you obtain a series of advantages:
- Localization …… takes place in the same spaces. You capture security relevant objects (e.g. fire alarm box, fire extinguisher, access controls etc.) in the same floor plans as the ones of the IT objects and other technical appliances.
- Interfaces …… have to be implemented only once. No matter if comparison of SAP data, integration with the directory or notification via e-mail: The effort for the creation and ongoing maintenance of the interfaces is only required once.
- Training period …… is reduced, because of your already experienced IT administrators, who can handle i-doit very well.
General data protection regulation (GDPR)
The General data protection regulation (GDPR) is the EU wide applicable directive for the collection and processing of personal data since May 28th, 2018. The regulations that are dictated by the GDPR are far-reaching. The new data protection directives influence also internal processes of companies.
Wherever personal data is stored or processed in a company, the GDPR applies. However, to implement the directive, it must be clearly traceable where this data is located, who is responsible for the data and – above all – who may or may not have access to it. A flawless IT documentation is almost indispensable here.
With the Data Privacy add-on of our Partner don’t.panic this documentation discipline is paid attention to.
Your benefit: You can continue to use your existing foundation data in i-doit. The implementation of additional tools is not necessary. If required the authorization system divides tasks for your teams. And the reporting system indicates clearly where corrections have to be carried out.
Licenses and Contracts
In addition to technical data you can capture and manage administration information in i-doit. You can document accounting information on purchase and depreciation as well as inventory data and you can add the connection to maintenance and service contracts, service certificates or software licenses.
i-doit supports the collection and linkage of the data to technical assets and applications and also the active measurement of license utilization. Both, a threshold warning as well as an on-time reminder on expiring contracts are included.
By means of the integrated report manager the data can be reported on demand or in regular intervals. Residual values can be calculated and passed on to other areas or processes.