Feeds

CMDB standards wrangle

'Big Six' shun top down approach

Internet Security Threat Report 2014

CMDB? That's Configuration Management Database in long-hand, and it is the tool through which IT managements can keep a handle on the increasing complex melange of applications, tools, utilities and the rest that go to make up the operational IT infrastructure of a business or organisation.

Service Oriented Architecture (SOA) in particular will be pretty hard to manage, especially when it comes to building the essential composite applications, without a repository of some sort that knows where every tool, utility and application component can be found, how it interacts with everything else, and what it needs to work.

Now the big names of IT infrastructures are circling around the growing CMDB sector. IBM recently announced the upcoming arrival of Tivoli Change and Configuration Management, while Computer Associates has MDB, and BMC offers Atrium.

HP is currently lagging behind in this area, with a roadmap pointing to 2008 for a CMDB offering to appear. These are now being joined by companies like Managed Objects which are, according to its CEO Siki Giunta, approaching the CMDB requirement from the top down rather than bottom up.

"There has been talk of standardisation in this area," she said, "but the 'Big Six' companies only want to talk about standardising the data model and the database. We say the more important element is the data built on top of the database - the processes and what you do with them."

Meetings to explore data model standardisation have been held, but Managed Objects has not been party to them. "We called them all, and they didn't want us there."

Managed Objects' implementation of the idea is called CMDB 360o and has over 60 points of integration that allows it to generate a fully federated CMDB from existing IT configuration data held in other databases. "We've always been open and we welcome any type of standardisation," Giunta said.

The company claims that the analytic tools incorporated into the system are capable of providing users with a full understanding of their IT infrastructure and the services that are affected by it. This points to the system offering advantages not only to users looking towards implementing SOA environments, but also those facing up to the problems of compliance management - both in terms of asset management issues relating to Sarbanes-Oxley and risk management in terms of Basel II.

Not surprisingly, large financial institutions form the majority of beta testers, and one factor here may be the claim that, though a typical installation will cost some $250,000, the return on the investment can be had in weeks rather than years. ®

Security for virtualized datacentres

More from The Register

next story
Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
Windows NEIN skipped, tech preview due out on Wednesday
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.