Management of Configuration and Assets of the Service

The Service Configuration and Asset Management Process is in the Transition Phase of the Service Lifecycle according to the best ITIL® Practices. For an effective and efficient management of the Services it is necessary to control the infrastructure with which we provide them. This constitutes all the resources of Technology, Competences of the Personnel and the configuration of their relations to be able to supply the Services.

During the scope of our SERVICE OF CONFIGURATION MANAGEMENT AND SERVICE ASSETS, a Training on Fundamentals of ITIL® Best Practices will be conducted in the first instance in order to standardize the language and terminology that we will use during our Service. Afterwards, an evaluation of the Process will be carried out, in order to determine the current situation of the activities carried out in our client related to this Process and contrast them with the best ITIL® 2011 practices, which will allow us to identify improvement actions. Then the Accompaniment will be carried out for the actions identified.

The automation of the configuration management process is supported by a configuration database (CMDB) whose main characteristic, in addition to storing information on the different configuration elements, is the ability to store information on the relationships between the different elements and on other related processes such as Incidents, Problems, Change Requests, Service Level Agreements etc. We can configure this CMDB using ITSM software tools such as ServiceDesk Plus that allow activities to be carried out according to the ITIL® Processes.

Our service will improve the control of the Assets used in the organization and the effectiveness and efficiency in the provision of its services. Supporting IT decision making, both in the strategic and tactical. It reduces exposure to the risks associated with IT assets, ensuring compliance with legal, industrial and corporate standards, and the requirements related to them.


Only 3% of websites have security measures against hacking There are about a billion official web pages on...


6 places where hackers can find out information about you Hackers currently have a juicy range of places to...