SlideShare a Scribd company logo
| @ema_research
CMDB in cloud times:
myths, mistakes, and
mastery
Valerie O’Connell
Research Director, Digital Service Execution
Enterprise Management Associates (EMA)
Sponsored by
| @ema_research 2
Watch the On-Demand Webinar
• CMDB in Cloud Times: Myths, Mistakes, and Mastery On-Demand
Webinar: https://info.enterprisemanagement.com/cmdb-in-cloud-
webinar-ss
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
© 2023 Enterprise Management Associates, Inc.
| @ema_research
| @ema_research
Featured Speaker
Valerie came to EMA with decades of senior-level
experience in the effective marketing of technology.
Her experience ranges from VP of product marketing
at what was then CA to a successful run as an
independent practitioner, serving industry giants such
as Microsoft and EMC, as well as cutting-edge
startups.
At EMA, Valerie leads the Digital Service Execution
practice, which encompasses intersections and
innovations across AIOps, asset management, end-
user experience, ITSM/ESM, and business context as
they interact to deliver excellence in digital service.
© 2023 Enterprise Management Associates, Inc. 3
Valerie O’Connell
Research Director
Digital Service Executions
EMA
| @ema_research
| @ema_research
Sponsor
© 2023 Enterprise Management Associates, Inc. 4
| @ema_research
| @ema_research
| @ema_research
CMDB – a disconnect between reputation and reality?
© 2023 Enterprise Management Associates, Inc. 5
(July 2023: 150 IT leaders in North America, EMEA, and APAC; mix of management levels and
industries: 1,000-20,000+ employees)
The purpose of this research:
get a view of the CMDB as practiced and planned today
EMA’s research over the past 5 years shows consistent findings.
Absence of current field research:
The topic is overshadowed by shinier trends
The reputation and perceived value are now
defined by a combination of myth, mistakes,
and anecdotal wisdom
Renewed interest driven by:
The challenges of hybrid IT and multi-cloud
Realistic evolution of CMDB expectations
and technologies to meet them.
| @ema_research
| @ema_research
Some bottom-line conclusions
© 2023 Enterprise Management Associates, Inc. 6
CMDB remains fundamental to IT service quality – and is on the rise.
CMDB 2001 is not CMDB 2023
The value CMDB delivers today maps to top IT initiatives…
(decrease in unplanned work/outages, increased IT productivity, and
improved service quality)
…using technology capabilities that weren’t generally available when ITIL
v2 introduced the notion of CMDB in 2001
(AI/ML, advanced automation, discovery and dependency mapping,
ability to handle large volumes of diverse data, and mainstream AIOps
make CMDB objectives workable)
| @ema_research
Clearly defined
expectations, goals,
objectives, scope, and
responsibilities
A plan for establishing
and maintaining data
accuracy and
completeness
Technology to
enable its health
Automation,
cross-functional
workflows, and
excellent discovery
and dependency
mapping
Skillset and staffing to
support its upkeep, as
well as management
backing
Stakeholder
involvement
Practical
processes
Advice from the field = attributes common to successful CMDB implementations
7
© 2023 Enterprise Management Associates, Inc. | @ema_research
| @ema_research
| @ema_research
A word about the research pool – Configuration tracking and some automation required
© 2023 Enterprise Management Associates, Inc. 8
| @ema_research
| @ema_research
Realistic expectations and enabling technologies underly a 90% CMDB success rate
© 2023 Enterprise Management Associates, Inc. 9
| @ema_research
| @ema_research
Cloud is not a CMDB killer
© 2023 Enterprise Management Associates, Inc. 10
Top value that CMDB delivers:
• Cloud-only and hybrid – performance
management
• On-prem + private cloud only – security
The top value of automation in CMDB:
• Cloud-only cited cost reduction
• Hybrid – data accuracy
• On-prem + private cloud – automation
for cross-functional workflows
Cloud-only organizations reported the highest reliance on CMDB alone, without other external sources, such as
spreadsheets. Hybrid organizations reported increasing use of CMDB at a rate of 75% vs. 55% average.
| @ema_research
| @ema_research
Why do you think people perceive
CMDB as having little value?
• Lack of understanding or experience
• Cost and complexity of upkeep
• Cloud and containers have made it obsolete
• It is too static to keep up with the dynamic
nature of IT
• Shift toward service-centric vs. component
approach
• It’s not accurate so it’s not used
Perceptions of CMDB
© 2023 Enterprise Management Associates, Inc. 11
100% of executives think that perceived low value is due to lack of understanding or experience
Those with the most direct experience have the higher valuation of CMDB
| @ema_research
| @ema_research
CMDB is identified with specific use cases – not with its larger, generic purpose
© 2023 Enterprise Management Associates, Inc. 12
| @ema_research
| @ema_research
Primary reasons for multiple CMDBs
Scalability for performance
Resilience – no single point of failure
Localized autonomy and regulations
There is no effective way to standardize
Number of CMDBs in use – why and how
© 2023 Enterprise Management Associates, Inc. 13
How are multiple sources or
CMDBs related?
34% Federated in a CMS
46% Independent, but share data
20% Completely separate
| @ema_research
| @ema_research
CMDB ownership
© 2023 Enterprise Management Associates, Inc. 14
Who should own CMDB?
Not surprisingly, each group thinks they should
own it
Executives think service should own it
Ownership differences
• DevOps ownership sees CMDB use
increasing at 80%
• ITOps ownership has many more uses of
AIOps in conjunction with CMDB than other
groups
• Service ownership is more likely to require ITIL
| @ema_research
CMDB
characteristics
| @ema_research
| @ema_research
CMDB characteristics/practices and planned improvements
© 2023 Enterprise Management Associates, Inc. 16
Areas of improvements:
Real-time discovery and alerting
Better integration with cloud platforms
DevOps and agile CI/CD support
Cross-functional workflow automation
Service mapping
IoT
AI/ML use for data quality
AI-assisted service and operations
Side note: Executives think there is much more
structure, standardization, and process in
place than do practitioners
| @ema_research
| @ema_research
Data, discovery, and service mapping are top areas for improvement for CMDB value
© 2023 Enterprise Management Associates, Inc. 17
| @ema_research
| @ema_research
Number of DDM solutions
Bidirectional
49% Unidirectional
35%
No DDM integration
16%
Service modeling is most successful when automation is a strategic, high priority
Discovery and dependency mapping (DDM) is critical to success/usefulness
© 2023 Enterprise Management Associates, Inc. 18
Does your CMDB include discovery and
dependency mapping (DDM) for application
and infrastructure interdependencies?
One
14% 2-4
54%
Too many
to count
10%
5-10
22%
| @ema_research
| @ema_research
Update frequency: 24% real time, 20% daily+, 41% weekly+, 10% monthly
© 2023 Enterprise Management Associates, Inc. 19
CMDB update is primarily…automated 35%, manual 10%, a mix of automated and manual 54%
The largest and smallest organizations
are the least likely to have real-time
updates; 2,500-10,000 employees most
likely to have real time
Real-time update correlates strongly
with advanced automation
65% of real time have bidirectional
DDM vs. 40%
There is no “right” frequency
| @ema_research
| @ema_research
Extra-CMDB tracking sources are also the most frequent causes of manual updating
© 2023 Enterprise Management Associates, Inc. 20
Average 3 per
respondent
CMDB update is primarily…automated 35%, manual 10%, a mix of automated and manual 54%
| @ema_research
CMDB technologies
| @ema_research
| @ema_research
Automation heads the CMDB dream team
© 2023 Enterprise Management Associates, Inc. 22
| @ema_research
| @ema_research
Service – troubleshooting and impact on MTTR
Ops – accuracy
Cloud – auditability
ITAM – cost reduction
Top value of automation by respondent team
Automation and CMDB
© 2023 Enterprise Management Associates, Inc. 23
Automation and high valuation of CMDB close correlation
CMDB use increasing at a higher rate when automation is
a high priority
High priority of automation correlates strongly with quality
of service, clearly defined CI scope, high level of service
modeling success, success rate with CMDB, and return on
CMDB investment relative to cost.
| @ema_research
| @ema_research
AI/ML use with CMDB – data leads by a mile
© 2023 Enterprise Management Associates, Inc. 24
Average of
four uses
named per
respondent
| @ema_research
| @ema_research
When ITOps owns CMDB there are many
more uses of AIOps
High priority of automation also correlates
strongly with AIOps use
High-value AIOps use with CMDB
© 2023 Enterprise Management Associates, Inc. 25
APAC much higher use for predictive
analysis and automated remediation than
NA or EMEA
EMEA = lower incidence of use across an
even range of cases
| @ema_research
CMDB uses and
values
| @ema_research
| @ema_research
CMDB impact on IT service – speed and effectiveness ties with reduced MTTR/disruptions
© 2023 Enterprise Management Associates, Inc. 27
| @ema_research
| @ema_research
60% of service respondents rate reduction
in MTTR as CMDB’s top value
Performance management ranked as the use of CMDB that delivers top value
© 2023 Enterprise Management Associates, Inc. 28
Sample Size = 157
| @ema_research
| @ema_research
Service quality and IT productivity are top CMDB values to organization –
and the top priorities for IT service and ITOps
© 2023 Enterprise Management Associates, Inc. 29
Improved service quality and increased IT
personnel productivity (less unplanned work)
are the top two goals of ITOps and ITSM in
three recent EMA research projects.
CMDB plays directly to current initiatives.
| @ema_research
| @ema_research
98% see CMDB as fundamental to IT service quality or critical:
half of the respondents view CMDB use as increasing and critical in cloud times
© 2023 Enterprise Management Associates, Inc. 30
| @ema_research
© 2023 Enterprise Management Associates, Inc. 31
CMDB summary thoughts
CMDB arose in ITSM with early
ITIL to be all things to all people
The technologies to meet the expectations didn’t exist and the
technology landscape drastically changed
The highest-value use cases are
not primarily ITSM, but DevOps
and ITOps
DevOps and ITOps own the
most progressive
implementations of CMDB
Challenges: high-velocity IT, proliferation of virtualized and cloud
services, ill-defined relationships between component, data quality
and semantics
Top benefits: fix service issues faster, reduce operational costs, cut
unplanned work, and reduce security risks
Make expectations consistent with ability to deliver: keep it simple and current
| @ema_research
| @ema_research
| @ema_research
The Report is Now Available!
Learn more and download:
https://bit.ly/445nbwL
© 2023 Enterprise Management Associates, Inc. 32

More Related Content

Similar to CMDB in Cloud Times: Myths, Mistakes, and Mastery

Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
Enterprise Management Associates
 
Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers
Enterprise Management Associates
 
Digital Transformation and the Speed of Business
Digital Transformation and the Speed of Business Digital Transformation and the Speed of Business
Digital Transformation and the Speed of Business
Enterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Enterprise Management Associates
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Enterprise Management Associates
 
The Future of Data Center Network Automation
The Future of Data Center Network AutomationThe Future of Data Center Network Automation
The Future of Data Center Network Automation
Enterprise Management Associates
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
Enterprise Management Associates
 
AI(work)Ops: A Research View of AIOps Implementations
AI(work)Ops: A Research View of AIOps Implementations AI(work)Ops: A Research View of AIOps Implementations
AI(work)Ops: A Research View of AIOps Implementations
Enterprise Management Associates
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Services
 
Fast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt DatabotsFast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt Databots
Enterprise Management Associates
 
ALM & CMS - Digital BA Priorities, Recommendations, Tools
ALM & CMS - Digital BA Priorities, Recommendations, ToolsALM & CMS - Digital BA Priorities, Recommendations, Tools
ALM & CMS - Digital BA Priorities, Recommendations, Tools
Mimi Ajayi, PMC
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
Enterprise Management Associates
 
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Enterprise Management Associates
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.
IBM
 
How Executives Can Evolve their Business with Cloud Managed Services
How Executives Can Evolve their Business with Cloud Managed ServicesHow Executives Can Evolve their Business with Cloud Managed Services
How Executives Can Evolve their Business with Cloud Managed Services
Cloud Managed Services Mastek
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
Enterprise Management Associates
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Enterprise Management Associates
 
Intro to ACE: Key strategies for Business Analytics Success
Intro to ACE: Key strategies for Business Analytics SuccessIntro to ACE: Key strategies for Business Analytics Success
Intro to ACE: Key strategies for Business Analytics Success
Julie Severance
 
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
Enterprise Management Associates
 
The Future of Automation: Insights from IDC and Precisely
The Future of Automation: Insights from IDC and PreciselyThe Future of Automation: Insights from IDC and Precisely
The Future of Automation: Insights from IDC and Precisely
redmondpulver
 

Similar to CMDB in Cloud Times: Myths, Mistakes, and Mastery (20)

Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
 
Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers Why Core IT Automation Matters to Your Customers
Why Core IT Automation Matters to Your Customers
 
Digital Transformation and the Speed of Business
Digital Transformation and the Speed of Business Digital Transformation and the Speed of Business
Digital Transformation and the Speed of Business
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
 
The Future of Data Center Network Automation
The Future of Data Center Network AutomationThe Future of Data Center Network Automation
The Future of Data Center Network Automation
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
AI(work)Ops: A Research View of AIOps Implementations
AI(work)Ops: A Research View of AIOps Implementations AI(work)Ops: A Research View of AIOps Implementations
AI(work)Ops: A Research View of AIOps Implementations
 
IBM Global Technology Services: Partnering for Better Business Outcomes
IBM Global Technology Services:  Partnering for Better Business OutcomesIBM Global Technology Services:  Partnering for Better Business Outcomes
IBM Global Technology Services: Partnering for Better Business Outcomes
 
Fast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt DatabotsFast Track AIOps Automation with Prebuilt Databots
Fast Track AIOps Automation with Prebuilt Databots
 
ALM & CMS - Digital BA Priorities, Recommendations, Tools
ALM & CMS - Digital BA Priorities, Recommendations, ToolsALM & CMS - Digital BA Priorities, Recommendations, Tools
ALM & CMS - Digital BA Priorities, Recommendations, Tools
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
Optimizing Cloud and Multi-Cloud Once You’re There: Solutions to the Toughest...
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.
 
How Executives Can Evolve their Business with Cloud Managed Services
How Executives Can Evolve their Business with Cloud Managed ServicesHow Executives Can Evolve their Business with Cloud Managed Services
How Executives Can Evolve their Business with Cloud Managed Services
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
Take Charge of Your Cloud Migrations with Dependency Mapping, Inventory and U...
 
Intro to ACE: Key strategies for Business Analytics Success
Intro to ACE: Key strategies for Business Analytics SuccessIntro to ACE: Key strategies for Business Analytics Success
Intro to ACE: Key strategies for Business Analytics Success
 
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
 
The Future of Automation: Insights from IDC and Precisely
The Future of Automation: Insights from IDC and PreciselyThe Future of Automation: Insights from IDC and Precisely
The Future of Automation: Insights from IDC and Precisely
 

More from Enterprise Management Associates

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Enterprise Management Associates
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Enterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Enterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
Enterprise Management Associates
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Enterprise Management Associates
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

CMDB in Cloud Times: Myths, Mistakes, and Mastery

  • 1. | @ema_research CMDB in cloud times: myths, mistakes, and mastery Valerie O’Connell Research Director, Digital Service Execution Enterprise Management Associates (EMA) Sponsored by
  • 2. | @ema_research 2 Watch the On-Demand Webinar • CMDB in Cloud Times: Myths, Mistakes, and Mastery On-Demand Webinar: https://info.enterprisemanagement.com/cmdb-in-cloud- webinar-ss • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch © 2023 Enterprise Management Associates, Inc.
  • 3. | @ema_research | @ema_research Featured Speaker Valerie came to EMA with decades of senior-level experience in the effective marketing of technology. Her experience ranges from VP of product marketing at what was then CA to a successful run as an independent practitioner, serving industry giants such as Microsoft and EMC, as well as cutting-edge startups. At EMA, Valerie leads the Digital Service Execution practice, which encompasses intersections and innovations across AIOps, asset management, end- user experience, ITSM/ESM, and business context as they interact to deliver excellence in digital service. © 2023 Enterprise Management Associates, Inc. 3 Valerie O’Connell Research Director Digital Service Executions EMA
  • 4. | @ema_research | @ema_research Sponsor © 2023 Enterprise Management Associates, Inc. 4 | @ema_research
  • 5. | @ema_research | @ema_research CMDB – a disconnect between reputation and reality? © 2023 Enterprise Management Associates, Inc. 5 (July 2023: 150 IT leaders in North America, EMEA, and APAC; mix of management levels and industries: 1,000-20,000+ employees) The purpose of this research: get a view of the CMDB as practiced and planned today EMA’s research over the past 5 years shows consistent findings. Absence of current field research: The topic is overshadowed by shinier trends The reputation and perceived value are now defined by a combination of myth, mistakes, and anecdotal wisdom Renewed interest driven by: The challenges of hybrid IT and multi-cloud Realistic evolution of CMDB expectations and technologies to meet them.
  • 6. | @ema_research | @ema_research Some bottom-line conclusions © 2023 Enterprise Management Associates, Inc. 6 CMDB remains fundamental to IT service quality – and is on the rise. CMDB 2001 is not CMDB 2023 The value CMDB delivers today maps to top IT initiatives… (decrease in unplanned work/outages, increased IT productivity, and improved service quality) …using technology capabilities that weren’t generally available when ITIL v2 introduced the notion of CMDB in 2001 (AI/ML, advanced automation, discovery and dependency mapping, ability to handle large volumes of diverse data, and mainstream AIOps make CMDB objectives workable)
  • 7. | @ema_research Clearly defined expectations, goals, objectives, scope, and responsibilities A plan for establishing and maintaining data accuracy and completeness Technology to enable its health Automation, cross-functional workflows, and excellent discovery and dependency mapping Skillset and staffing to support its upkeep, as well as management backing Stakeholder involvement Practical processes Advice from the field = attributes common to successful CMDB implementations 7 © 2023 Enterprise Management Associates, Inc. | @ema_research
  • 8. | @ema_research | @ema_research A word about the research pool – Configuration tracking and some automation required © 2023 Enterprise Management Associates, Inc. 8
  • 9. | @ema_research | @ema_research Realistic expectations and enabling technologies underly a 90% CMDB success rate © 2023 Enterprise Management Associates, Inc. 9
  • 10. | @ema_research | @ema_research Cloud is not a CMDB killer © 2023 Enterprise Management Associates, Inc. 10 Top value that CMDB delivers: • Cloud-only and hybrid – performance management • On-prem + private cloud only – security The top value of automation in CMDB: • Cloud-only cited cost reduction • Hybrid – data accuracy • On-prem + private cloud – automation for cross-functional workflows Cloud-only organizations reported the highest reliance on CMDB alone, without other external sources, such as spreadsheets. Hybrid organizations reported increasing use of CMDB at a rate of 75% vs. 55% average.
  • 11. | @ema_research | @ema_research Why do you think people perceive CMDB as having little value? • Lack of understanding or experience • Cost and complexity of upkeep • Cloud and containers have made it obsolete • It is too static to keep up with the dynamic nature of IT • Shift toward service-centric vs. component approach • It’s not accurate so it’s not used Perceptions of CMDB © 2023 Enterprise Management Associates, Inc. 11 100% of executives think that perceived low value is due to lack of understanding or experience Those with the most direct experience have the higher valuation of CMDB
  • 12. | @ema_research | @ema_research CMDB is identified with specific use cases – not with its larger, generic purpose © 2023 Enterprise Management Associates, Inc. 12
  • 13. | @ema_research | @ema_research Primary reasons for multiple CMDBs Scalability for performance Resilience – no single point of failure Localized autonomy and regulations There is no effective way to standardize Number of CMDBs in use – why and how © 2023 Enterprise Management Associates, Inc. 13 How are multiple sources or CMDBs related? 34% Federated in a CMS 46% Independent, but share data 20% Completely separate
  • 14. | @ema_research | @ema_research CMDB ownership © 2023 Enterprise Management Associates, Inc. 14 Who should own CMDB? Not surprisingly, each group thinks they should own it Executives think service should own it Ownership differences • DevOps ownership sees CMDB use increasing at 80% • ITOps ownership has many more uses of AIOps in conjunction with CMDB than other groups • Service ownership is more likely to require ITIL
  • 16. | @ema_research | @ema_research CMDB characteristics/practices and planned improvements © 2023 Enterprise Management Associates, Inc. 16 Areas of improvements: Real-time discovery and alerting Better integration with cloud platforms DevOps and agile CI/CD support Cross-functional workflow automation Service mapping IoT AI/ML use for data quality AI-assisted service and operations Side note: Executives think there is much more structure, standardization, and process in place than do practitioners
  • 17. | @ema_research | @ema_research Data, discovery, and service mapping are top areas for improvement for CMDB value © 2023 Enterprise Management Associates, Inc. 17
  • 18. | @ema_research | @ema_research Number of DDM solutions Bidirectional 49% Unidirectional 35% No DDM integration 16% Service modeling is most successful when automation is a strategic, high priority Discovery and dependency mapping (DDM) is critical to success/usefulness © 2023 Enterprise Management Associates, Inc. 18 Does your CMDB include discovery and dependency mapping (DDM) for application and infrastructure interdependencies? One 14% 2-4 54% Too many to count 10% 5-10 22%
  • 19. | @ema_research | @ema_research Update frequency: 24% real time, 20% daily+, 41% weekly+, 10% monthly © 2023 Enterprise Management Associates, Inc. 19 CMDB update is primarily…automated 35%, manual 10%, a mix of automated and manual 54% The largest and smallest organizations are the least likely to have real-time updates; 2,500-10,000 employees most likely to have real time Real-time update correlates strongly with advanced automation 65% of real time have bidirectional DDM vs. 40% There is no “right” frequency
  • 20. | @ema_research | @ema_research Extra-CMDB tracking sources are also the most frequent causes of manual updating © 2023 Enterprise Management Associates, Inc. 20 Average 3 per respondent CMDB update is primarily…automated 35%, manual 10%, a mix of automated and manual 54%
  • 22. | @ema_research | @ema_research Automation heads the CMDB dream team © 2023 Enterprise Management Associates, Inc. 22
  • 23. | @ema_research | @ema_research Service – troubleshooting and impact on MTTR Ops – accuracy Cloud – auditability ITAM – cost reduction Top value of automation by respondent team Automation and CMDB © 2023 Enterprise Management Associates, Inc. 23 Automation and high valuation of CMDB close correlation CMDB use increasing at a higher rate when automation is a high priority High priority of automation correlates strongly with quality of service, clearly defined CI scope, high level of service modeling success, success rate with CMDB, and return on CMDB investment relative to cost.
  • 24. | @ema_research | @ema_research AI/ML use with CMDB – data leads by a mile © 2023 Enterprise Management Associates, Inc. 24 Average of four uses named per respondent
  • 25. | @ema_research | @ema_research When ITOps owns CMDB there are many more uses of AIOps High priority of automation also correlates strongly with AIOps use High-value AIOps use with CMDB © 2023 Enterprise Management Associates, Inc. 25 APAC much higher use for predictive analysis and automated remediation than NA or EMEA EMEA = lower incidence of use across an even range of cases
  • 27. | @ema_research | @ema_research CMDB impact on IT service – speed and effectiveness ties with reduced MTTR/disruptions © 2023 Enterprise Management Associates, Inc. 27
  • 28. | @ema_research | @ema_research 60% of service respondents rate reduction in MTTR as CMDB’s top value Performance management ranked as the use of CMDB that delivers top value © 2023 Enterprise Management Associates, Inc. 28 Sample Size = 157
  • 29. | @ema_research | @ema_research Service quality and IT productivity are top CMDB values to organization – and the top priorities for IT service and ITOps © 2023 Enterprise Management Associates, Inc. 29 Improved service quality and increased IT personnel productivity (less unplanned work) are the top two goals of ITOps and ITSM in three recent EMA research projects. CMDB plays directly to current initiatives.
  • 30. | @ema_research | @ema_research 98% see CMDB as fundamental to IT service quality or critical: half of the respondents view CMDB use as increasing and critical in cloud times © 2023 Enterprise Management Associates, Inc. 30
  • 31. | @ema_research © 2023 Enterprise Management Associates, Inc. 31 CMDB summary thoughts CMDB arose in ITSM with early ITIL to be all things to all people The technologies to meet the expectations didn’t exist and the technology landscape drastically changed The highest-value use cases are not primarily ITSM, but DevOps and ITOps DevOps and ITOps own the most progressive implementations of CMDB Challenges: high-velocity IT, proliferation of virtualized and cloud services, ill-defined relationships between component, data quality and semantics Top benefits: fix service issues faster, reduce operational costs, cut unplanned work, and reduce security risks Make expectations consistent with ability to deliver: keep it simple and current | @ema_research
  • 32. | @ema_research | @ema_research The Report is Now Available! Learn more and download: https://bit.ly/445nbwL © 2023 Enterprise Management Associates, Inc. 32