Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar

Page created by Doris Hines
 
CONTINUE READING
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Best Practice with

 Secure Discovery & Dependency Mapping
 Misha Macinski, Pink Elephant EMEA

                                         Service-integrator
© Pink Elephant 2021                     van het jaar
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Introductions

    Misha Macinski
    Manager ITSM Technology

2
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
DID YOU KNOW?                       Pink Elephant organises the world’s
WORLDWIDE OVER                      largest GATHERING OF ITSM and ITIL
250,000                             dedicated PROFESSIONALS,
IT professionals have benefited     #1 event in the industry with over
from our expertise
                                    3,000
Pink Elephant is the                VISITORS
world’s #1 supplier of
ITIL® AND PRINCE2®                80 OUT OF THE FORTUNE 100
                                  are loyal customers of Pink Elephant

                                                                         3
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Pink’s Global Presence

                       •   United Kingdom    •   Canada   •   Hong Kong
                       •   The Netherlands   •   USA      •   Malaysia
                       •   South Africa      •   Mexico   •   Australia
© Pink Elephant 2021                                                      4
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Service Portfolio

                       CONSULTING
                                      Service Management                    EDUCATION
                                    IT Security & Governance                     Service Management
                                       Project Management                      IT Security & Governance
              IT SUPPORT & OUTSOURCING                                            Project Management
                        Full Outsourcing                                          Business Simulations
               Public, Private and Hybrid Cloud                                Online Learning Solutions
                    Managed Service Desk
                              IT RESOURCING                          TECHNOLOGY
                                    Permanent Recruitment,             Service Management Solutions, CMDB
                                    On Demand Resourcing,               Discovery and Dependency mapping,
                                Contracting, Professional Services      Secure and remote access, business
                                                                          intelligence and business process
                                                                                     automation.

© Pink Elephant 2021                                                                                          5
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Why Pink!
Trusted global leaders and authority in IT
Service Management

One-stop ITSM shop. From consultancy and
training to coaching and solutions

Over 40 years experience in Service
Management, over 10 years in tooling

Global Partners with the leaders in IT/ESM
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
EMEA Customers

7   © Pink Elephant 2021
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Best Practice

© Pink Elephant 2021   8
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
Theory First

   So, what exactly is a CI?
   Any component that needs to be managed in order to deliver an IT service.

   Hardware                           Software                            Information

 Includes management of the complete lifecycle of every CI.
 SACM ensures that CIs are identified, baseline, maintained and changes to them are controlled.

© Pink Elephant 2021                                                                              9
Best Practice with Secure Discovery & Dependency Mapping - Service-integrator van het jaar
SACM Purpose
             Ensure the assets required to          Email Service
             deliver services are properly
             controlled

                                                    Main Service
             Ensure accurate & reliable
             information about the configuration
             of services and the Cis that support
             them is available when and where it    Router
             is needed

             This includes information on how
                                                    Department
             configuration items are configured
             and the relationships between them

                                                    User

10   © Pink Elephant 2021
The unfortunate truth!
     A perfect CMDB is a bit like a Unicorn.
     Everyone knows what it looks like but no
     one has ever seen one.

11   © Pink Elephant 2021
Start off on the right foot

Be Selective
• Rollout One CI Type at a Time – Don’t Try to do it All at Once!
• Don’t capture the world – Find value (ITIL)

Be Realistic
• Can you

Be Pragmatic
• Should you
• Get started
                                                                    12
Costs of Discovery without Automation
     Company Infrastructure       Implementation Workload                  Maintenance Workload
     Services x 100               Each service needed approx. 6            Each device has approx. 35 attributes on it
     Physical Servers x 150       technicians to map the service to the    (Name, location, status, etc.)
     Virtual Servers x 300        required level of detail
                                                                           This means that there are 277,375 items of
     Server based Software x 75                                            connected data
     Network Kit x 300            So for 79 services that’s 6 people x 3
                                  hours for each service x 79 services
     Desktops / Laptops x 4000    which is                                 In addition there were more than 10,000
     iPads x 1000                                                          relationships to maintain
     iPhones x 1000                                                        §   Each week approx. 110 changes were made
     Desktop Software x 500                                                §   Each change affected on average 3 CI’s
                                                                           §   That means each month 1,320 CI’s were being
     Printers x 500                                                            altered

                                                 178
                                                                           §   That’s approx. 17% of the database

                                                           the
        Total = 7925 CIs              man days to populate
                                               CMDB
                                                                                     EVERY MONTH!

13   © Pink Elephant 2021
Tame the Unicorn

                           • Automate as much of CMDB discovery as possible
                           • Discover EVERY network CI and synchronise only
                             those you need
                           • Automatically gather CI data
                           • Automatically and continuously keep the CMDB
                             updated
                           • Understand the relationships between each CI for
                             Change management risk analysis
                           • Map out your critical business services to get
                             them under total change management control
                             AND keep them under control.
                           • Continuously Discover business services to ensure
                             no unapproved changes occur

© Pink Elephant 2021
Questions & Answers

15
Get in touch:
     www.pinkelephant.co.uk
     www.pinkacademy.nl

16
You can also read