A Configuration Management Database (CMDB) is the core of ITIL processes. CMDB is a database of information related to all the components of an information system; it contains information about the configuration items (CI) in the IT infrastructure. CIs can be hardware, software, personnel or documentation. As it relates to IT Asset Management, a CMDB is a comprehensive ‘map’ of your entire IT, helping you to keep track of the state of endpoint devices, software and data, useful to detection and response to security incidents.
The CMDB describes CIs using three configurable attributes: technical, ownership and relationship. In plain terms, the CMDB is like the index for the components in the IT environment, helping understand their attributes, relationships and configurations. A key success factor in implementing a CMDB is the ability to automatically discover information about the CIs and to track changes as they happen. CMDBs are important in IT decision making, allowing users to identify dependencies among processes, people, applications and IT infrastructure to find opportunities for change, faster resolution of incidents fewer errors and more.
Unlike a traditional database, the CMDB pulls in data from other sources in such a way that original sources retain control of said data. The CMDB can help you understand data in an organized way, examining it from a multitude of perspectives. According to the ITIL recommended specifications, there are four tasks involved in configuration management:
A CMDB may be accessed by many individuals, so many companies find it useful to make it more user-friendly by adopting a web interface.
An effective IT Asset Management program allows you to make the best use of your CMDB. Through the combination of people, processes and technology, you can create a more reliable and accurate CMDB.
In today’s mobile environment, many organizations struggle to see and control their IT assets. Attempting to manage this complexity with existing tools that rely on a network connection is nearly impossible. Absolute delivers the only always-connected IT asset management solution to help ensure endpoint visibility, to optimize lifecycle management and to prevent and remediate endpoint vulnerabilities.
To learn more about the current state of endpoint protection and asset management, download our whitepaper: The State of Endpoint Protection & Management or contact us for a free 30-day trial of Absolute.