Change Impact Analysis and CMDBs

David Cuthbertson, Robert Cowham
This webcast covers different ways to communicate complex risk and dependencies using impact forms and Visio visualisation amongst others. A key reason to implement a CMDB is to support improved impact and risk analysis for changes and incidents. In practice, many people find that lots of asset data doesn't help and a more focused CMDB and set of outputs is required.
Jul 27 2012
42 mins
Change Impact Analysis and CMDBs
Join us for this summit:
More from this community:

Data Center Management

Webinars and videos

  • Live and recorded (2245)
  • Upcoming (55)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • This webinar will discuss some of the latest deployments, trends, pricing and advances in the CDN market for commercial CDNs and telco/carrier CDN buildouts.

    Why you should Attend:
    - Learn the latest data on the size of the content delivery market for video.
    - Find out growth forecasts for both revenue and traffic volumes.
    - Hear about the market drivers and trends that will determine the future of the CDN market.
  • Extend the reach of your Service Desk to your Mobile Support Teams.

    Join us for the fifth in our six part FrontRange UK Webcast Series "Change is in your Hands" hosted by UK Solutions Consultant Peter Coote.

    We know that service desk technicians can’t always be tied to a desk.
    As needs arise, they may be travelling, working remotely or moving around your building completing assignments and solving problems for customers, often with reduced access to the service desk.
    With FrontRange™ HEAT Mobile Field Service there’s no reason for your technicians to go off the grid when they’re on a service call.
    HEAT Mobile Field Service turns a handheld smart-phone into a mobile service desk client, allowing technicians to take the office with them wherever they go.

    Register today to hear how HEAT Mobile Field Service can:
    •Empower your technicians
    •Lower service costs
    •Improve response times

    Missed our LIVE webcast?
    Catch up with the rest of the series and more on the FrontRange BrightTALK Channel.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • How many logs files do you have?
    • Ever use them?
    • Wonder what they might contain?
    • Are they lying around unexploited, cropped or deleted to save space?
    • Do you ever try to exploit all the log data your systems produce?
    • Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?

    HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.

    In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
You might also like Promoted
  • Channel
  • Channel profile
Up Down
  • Best Practices In Delivering Physical Layer Services Recorded: Oct 18 2013 46 mins
    A well planned IT infrastructure is often compromised as soon as equipment in installed and connected up. Wiring looks like tangled spaghetti, performance is affected by damage, it takes ages to make changes and the only person who knows has left. But if you implemented best practice it could all be different! Bob Camerino from ITS is our guest speaker on what those best practices are. and how you move forward with a legacy infrastructure
  • IT documentation requirements in pharmaceutical / life science GMP environments Recorded: Sep 6 2013 44 mins
    The regulatory needs of GMP (Good Manufacturing Process) require documentation covering all aspects of manufacturing – including IT systems and infrastructure such as networks, servers, software, etc. Accurate, maintained IT documentation is a common weak point because of the complexity, but auditors don’t care when it comes to signing off compliance. In this webcast Bob Camerino of ITS will cover the typical scope and types of information covered by CDM (Compliance Documentation Management) and efficient methods of maintenance.
  • Mapping Networks For Day 3 Management Recorded: Jul 17 2013 47 mins
    Management techniques and processes are still lagging behind the technology, while network infrastructure is constantly evolving to meet increasing data volumes and mission criticality. It is no surprise that many companies see inconsistent performance, unplanned disruption and increasing project lead times – as increasing complexity often means longer planning cycles.

    For efficient day 3 operational management, the practical steps we will cover on infrastructure mapping techniques will help ensure there are no weak links (or wet string) in the data path from user to application.
  • Network and Applications - Understanding the Infrastructure Dependencies Recorded: Jan 17 2013 47 mins
    As networks, servers and applications all increase in complexity, how do you make it simpler and less costly to manage changes and improve performance? We’ll cover practical steps needed to develop the knowledge sets needed to support major transformation projects, as well as improving end to end IT management processes. Ideal for anyone who has found that mapping their IT infrastructure dependencies needs more than one white board!
  • Reducing Costs and Improving Service Delivery For the Physical Layer Recorded: Nov 30 2012 47 mins
    Nadeem Mohammed (Deffinity) and David Cuthbertson (Square Mile) will cover how a combination of workflow management and infrastructure documentation systems can dramatically impact the costs of managing changes at the physical layer. If you find the management of cabling and hardware changes requires an excessive amount of administration effort, site surveys and last minute coordination then you’ll find our webcast very useful. We’ll cover issues like supplier/outsource/team interfaces, project and services workflow, capacity management and improving agility to business changes. For data centres, offices, campus, branches, etc.
  • CCRM Techniques for Data Centres and Networks Recorded: Nov 14 2012 47 mins
    End user experience of IT systems depends on good change, configuration and release management (CCRM) techniques to be in place. But data centers, networks and physical infrastructure have CCRM issues just like application software development so what overlap is there? And how can new techniques like DevOps be applied beyond software development? Robert Cowham and David Cuthbertson will explain all.
  • How To Document Campus Infrastructure - Offices, Hospitals, Universities Recorded: Oct 19 2012 48 mins
    This webinar shows how you can efficiently document IT infrastructure spanning multiple buildings - such as hospitals, universities, offices, airports, factories, ports, etc. We will cover the initial data capture process and then the ongoing maintenance of cabling, rack, network and other documentation presentation formats. Ideal for those who recognise that accurate IT documentation reduces project times, change costs and service disruption.
  • Making Data Center Migration and Consolidation Projects Easier To Manage Recorded: Oct 2 2012 46 mins
    Reducing the data center footprint and cost efficiently implementing such projects is not simple, especially when dealing with the most critical IT components. Andre Belisle has planned and managed such projects in Canada with telco, finance and utilities and will highlight good practices that he has found work well. David Cuthbertson will cover how to get a baseline from which to manage the change activities.
  • Transforming Management Practices To Keep Pace With Data Center Technology Recorded: Aug 16 2012 42 mins
    IT technologies are changing faster than the process and practices – so expectations of improved services and cost reductions are often not realized. This presentation will cover some of the most common problems faced by organizations (both supplier and end user) and how to overcome them.
  • Change Impact Analysis and CMDBs Recorded: Jul 27 2012 42 mins
    This webcast covers different ways to communicate complex risk and dependencies using impact forms and Visio visualisation amongst others. A key reason to implement a CMDB is to support improved impact and risk analysis for changes and incidents. In practice, many people find that lots of asset data doesn't help and a more focused CMDB and set of outputs is required.
  • Improving Your Data Centre Management Techniques Recorded: Apr 26 2012 48 mins
    Without changing the way you manage the data centre, you won’t get the benefit of DCIM toolsets. So which comes first? tools, process changes or the people changes? This talk covers the issues that affect the efficient running of data centres beyond DCIM toolsets.
  • Automating Visio Diagrams For Enterprise Infrastructures Recorded: Dec 16 2011 44 mins
    Maintaining large numbers of Visio diagrams of complex IT environments is now possible using new automation techniques. We'll cover how to have overnight updates of racks, floor plans, networks, applciation service maps, etc. from an infrastructure configuration database.

    Maintaining an infrastructure documentation portal has suddenly become easier for mutli-site, enterprise environments.
  • Practical Implementation of Software Asset Management (SAM) Recorded: Dec 6 2011 47 mins
    Join this software asset management (SAM) and service management webinar presented by the BCS Configuration Management Specialist Group. This session will cover the following key topics:

    •An understanding of the principles of SAM
    •How does SAM fit into Service Management
    •How to assess the starting point in your company.
    •How to move forward

    Your Presenters:
    Ian Preskett has many years of experience in IT. In the last 10 years Ian has specialized in SAM Process consultancy and, until recently, he was the SAM Process and Maturity Practice Manager for a large reseller of software. Ian’s philosophy is to ensure that SAM processes integrate with the service management processes to deliver highly effective SAM and reduce risk by maintaining software license compliance. Ian is keen to promote the value of SAM to the market place, and is a committee member of the BCS CMSG (Configuration Management Specialist Group).

    David Cuthbertson is Managing Director at Square Mile Systems. David has been focused for many years on developing and applying configuration management techniques to technical and service infrastructure. More recently he has been developing techniques and toolsets that link service management CMDBs to data centers, networks, storage and other environments. He is a regular speaker for both the BCS and ITSMF covering all aspects of configuration management from strategic to tactical implementations.
  • Core Infrastructure Build and Configuration Management Recorded: Jan 14 2011 46 mins
    This webcast looks at practical techniques to document complex host and network devices such as blades, Unix, network switches, etc. Automated deployment tools can help with the logical configuration, but much of the hardware build and planning is still done in spreadsheets, powerpoint and Visio.
  • Infrastructure Configuration Management - An Introduction Recorded: Dec 17 2010 47 mins
    As infrastructure complexity continues to increase, the risks and potential for disruption increase. This webcast looks at the emerging discipline of infrastructure configuration management.
  • Reducing Spreadsheet Chaos in Infrastructure Documentation Recorded: Sep 13 2010 46 mins
    Excel will always be used by IT teams to document their systems and environments, but it's flexibility also causes maintenance chaos. In this webcast we assess the benefits and drawbacks when compared to specialist infrastructure documentation toolsets.
  • Documenting Power Connectivity and Capacity In Data Centres Recorded: Aug 6 2010 47 mins
    Understanding power distribution in the data centre is becoming more difficult with the increasing complexity of server feeds. We will look at techniques needed for mission critical computing, that cover capacity and connectivity from the external feeds down to every IT component .
  • The Easy Way To Build a CMDB Recorded: Jun 7 2010 47 mins
    How to build a CMDB quickly from defining CIs, capturing data and then communicating dependencies to users. Examples covering business to IT component mapping, virtualisation and creation of Visio diagrams.
  • Integrating Excel, Visio with Data Center Management Toolsets Recorded: Apr 26 2010 48 mins
    How to link specialist data center management toolsets with Excel and Visio. Combining the flexibility of MS office tools with the accuracy and depth of data center management systems.
  • Data Center Capacity Management Recorded: Mar 26 2010 48 mins
    Techniques to manage and optimise data center resources, with examples of process and presentation. Covering space, power, cabling, connectivity and resource management.
IT Infrastructure Management and Documentation Techniques
How to implement improved practices and systems for enterprise environments covering data centres, networks, services etc.
You might also like Promoted
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Change Impact Analysis and CMDBs
  • Live at: Jul 27 2012 1:00 pm
  • Presented by: David Cuthbertson, Robert Cowham
  • From:
Your email has been sent.
or close
You must be logged in to email this