A CMDB Without Discovery Is Just a DatabaseTable of ContentsTrustworthy dataCMDB: Attribute validationDiscovery of unauthorized devices and applications A few examples: Change enablement evolution…
Virima’s Guide to Incorporating Agile Framework with ITIL 4Table of ContentsThe Seven Guiding Principles of ITIL 4 Start Where You AreAgile: Progress Iteratively with FeedbackOptimize …
What is Vulnerability Management?Table of ContentsLet’s see the various types of vulnerabilities and their causes: HardwareSoftwareNetworkPersonnelPhysical SiteOrganizational…
Introducing ViVID Service MapsTable of ContentsThe ViVID Difference Automated Infrastructure and Dependency MappingDynamic Service MapsITSM and Event Management IntegrationThe …
The Importance of IT Foundations for a Growing BusinessTable of ContentsThe Foundations of ITA Strong Configuration Management Foundation is EssentialEnable IT Environments to Evolve Safely …
Is 2020 the Year of the Configuration Management Database (CMDB)?Table of ContentsThe Promised Land. Are We There Yet?Virima CMDB Can Help You Get CloserCMDB Auto Discovery…
Global Entertainment Giant Selects Virima Over ServiceNowTable of ContentsThe ChallengeServiceNow and Virima: The PlayersProof-of-Concept Evaluation Evaluation Criteria #1 – DiscoveryEvaluation Criteria #2 …
ITIL4 and IT Operations ManagementTable of ContentsITIL4 FocusITOM Focus Understanding the Critical Aspects of Each Operating ModelAccording to ITIL4®Find out …
How ITOM is Relevant in a DevOps WorldTable of ContentsThe Mutual Relationship CMDB and ITOM: Functions in the IT EnvironmentA Real-world DevOps ExampleVirima: Your …