When I purchased my first house with a garage, I decided that it was never going to be used for cars. The garage was going to be my workshop, my ‘man cave’, a place I could get my hands dirty. Then my Dad found out and said he had some tools I might enjoy. The box of tools that arrived a few days later sparked a passion for woodwork that I didn’t know I had. My Dad had sent me a box full of hand planes, a tool that’s used to shape wood using muscle power. Not only did it give me a great shoulder workout – it gave me a great respect for craftsmanship!
Now how does this correlate to Information Technology? At work we tend not to change or throw away tools that work. We also might not think about reviewing the tools that seem to do their job well. A hand plane isn’t going to change, but IT tools are constantly evolving.
How many IT management tools have been purchased and are used every day by operations staff? I have heard the number 75 a couple of times. Have a look at your password manager system (I hope you are using one) and count all the subsystems used to maintain or access the business application.
Your tool box is pretty full, isn’t it?
Now, your CEO or board doesn’t agree with your head count so you come up with ingenious ideas to automate tasks. Script, program, integrate – it’s going to be awesome! But where do you start?
A key takeaway from the book Team of Teams by General Stanley McChrystal is that you need to change how information is shared. This isn’t about streamlining one or two jobs, but creating a better Information Technology Asset Management system as a whole.
How about letting the endpoint team know about the network configuration? Or ensuring the network team understands the endpoint context or running services? Or how about allowing the security team to get real-time updates on very specific location details for high value systems, plus critical path awareness of endpoints connecting?
All this is possible today. This is real device visibility and control. My belief is that the only way to get full device visibility is by leveraging existing investment in the technology, centralising access to the information and then overlaying risk assessment and compliance.
Then you will be using all the tools in your toolbox correctly. And that will give you a faster, better product at the end.
What’s the business value and IT impact of Visibility and control? Find out in the IDC White Paper.