Latest Research


Harness Configuration Management Superpowers

Create a configuration management practice that will provide ongoing value to the organization.

Book This Workshop

Without configuration management, organizations will struggle:

  • To mature their ITSM practice with a lack of access to data to inform planned changes or identify unsanctioned changes for incident and security events.
  • To calculate service-based costing for showbacks and chargebacks.

Having an effective configuration management practice will result in:

  • Confidence in the enterprise data for quick decision making and to inform all ITSM, IT finance, and enterprise architecture efforts.
  • Continual improvement in collecting and validating data with less effort and more accuracy.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Member Rating

9.0/10
Overall Impact

$71,499
Average $ Saved

30
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

Module 1: Configuration Management Strategy

The Purpose

  • Define the scope of your service configuration management project.
  • Design the program to meet specific stakeholders needs
  • Identify project and operational roles and responsibilities.

Key Benefits Achieved

  • Designed a sustainable approach to building a CMDB.

Activities: Outputs:
1.1 Introduction
1.2 Define challenges and goals.
1.3 Define and prioritize use cases.
1.4 Identify data needs to meet these goals.
  • Data and reporting use cases based on stakeholder requirements
1.5 Define roles and responsibilities.
  • Roles and responsibility matrix

Module 2: CMDB Data Structure

The Purpose

  • Build a data model around the desired use cases.
  • Identify the data sources for populating the CMDB.

Key Benefits Achieved

  • Identified which CIs and relationships will be captured in the CMDB.

Activities: Outputs:
2.1 Define and prioritize your services.
2.2 Evaluate CMDB default classifications.
2.3 Test configuration items against existing categories.
  • List of CI types and relationships to be added to default settings
2.4 Build a data model diagram.
  • CMDB data model diagram

Module 3: Processes

The Purpose

  • Define processes for how data will be maintained and accessed in the CMDB.
  • Develop an approach to validating configuration records.
  • Key Benefits Achieved

    • Built a right-sized approach to configuration record updates and data validation.

    Activities: Outputs:
    3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.
    • Documented processes and workflows
    3.2 Define practices for configuration baselines.
    3.3 Build a data validation and auditing plan.
    • Data validation and auditing plan

    Module 4: Communications & Roadmap

    The Purpose

  • Determine key metrics for configuration management.
  • Determine key metrics for supporting services.
  • Build out communications plan.
  • Key Benefits Achieved

    • Metrics program defined
    • Communications designed

    Activities: Outputs:
    4.1 Define key metrics for configuration management.
    4.2 Define metrics for supporting services.
    4.3 Build configuration management policies.
    • Policy for configuration management
    4.4 Create a communications plan.
    • Communications documents
    4.5 Build a roadmap
    • Roadmap for next steps
    Visit our IT Cost Optimization Center
    Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019