Network discovery and the CMDB
Particularly when introducing a CMDB, the question often arises: How do we move as efficiently as possible from our incomplete documentation to documentation that offers real added value for everyone involved? The larger the IT infrastructure, the greater the effort to capture all systems and assets and link them to all necessary information and relationships.
The solution: A discovery tool that captures the entire infrastructure and automatically transfers it to the CMDB.
Easy integration into existing processes
We know every company has different processes and requirements. Therefore, i-doit offers the possibility to be seamlessly integrated into them. If, for example, a newly procured system is created in the CMDB by the “Purchasing” department, this can be automatically completed by Discovery after the IT department has gone live. This ensures seamless collaboration between the departments with minimal documentation effort.
Discovery - The first step into IT documentation
Manually adding hundreds of assets to a new CMDB is not just seemingly a challenging task. We'll show you how a discovery solution can help. You'll learn how to make sense of network discovery and how it can help you get started with IT documentation.Get it now!
Automated documentation of systems, software and licenses
In addition to the initial recording of systems and information, the documentation must of course also be continuously maintained and thus kept up to date. Discovery jobs can be created completely individually in terms of time and thus executed regularly. The import into the CMDB can also be executed regularly and controlled granularly via profiles. Thus, a fully automated documentation system can be realized with a combination of CMDB and discovery tool.
Discovery supports license management
The consequences of over-licensing or under-licensing can range from additional costs to severe penalties imposed by manufacturers. A discovery tool helps you to detect deviations from the target. It automatically determines which licenses are used on the various systems and thus enables you to achieve greater transparency in your infrastructure. The use of a discovery solution is therefore highly recommended from a compliance and security perspective alone.
Discover unknown devices in the network
Many companies have them without even knowing it. Whether it’s a Raspberry Pie forgotten in the server rack, a virtual server running on a client in the background, or a printer still connected on the warehouse shelf. Often, devices are simply forgotten. These pose a strong security risk to the infrastructure because they are neither updated nor provided with security updates. With a discovery tool, these devices are easily identified and can be removed from the infrastructure.
Try i-doit pro
With i-doit pro, you not only build a central IT documentation.
You are also introducing a powerful tool that will save you time and money.
And i-doit pro can do much more.
Document every asset of your company.
Relate all assets in an ITIL-compliant CMDB.
Build a complete ISMS according to ISO 27001.
The basis for your business and IT processes and the setup of an ITSM.