Making the Right Application Discovery and Dependency Mapping (ADDM) Investment
June 10, 2015

Dennis Drogseth
EMA

Share this

This is the second in a series taken from Chapters Three, Twelve, and Appendix B in CMDB Systems: Making Change Work in the Age of Cloud and Agile. It is not meant as a substitute in any way for the book, but should provide you with a good beginning point for thinking about the technology selection process. Our first blog was on core CMDB selection.

The Application Discovery and Dependency Mapping (ADDM) market is evolving rapidly, and in multiple directions at once. While this can be confusing, it is overall a good thing. Through this diversity, vendors delivering ADDM capabilities are, as an aggregate, seeking to be more responsive to a yet broader set of constituents, use cases, and roles than ever before. This includes requirements emerging from internal and external (public) cloud, the extended enterprise across ecosystems, agile application development, and a dramatic upswing in currency, ease of deployment and modularity.

In some cases you will want to be sure to select an ADDM package that integrates with your core CMDB at initial deployment. In other cases it may come at a later time as a separate investment. On the other hand, depending on use case and overall readiness, an ADDM package may be the right starting point for growing your CMDB System in Phase One even without a core CMDB.

Multi-Use Case versus Performance-Optimized

Probably the first place to start in evaluating the ADDM opportunity is to group vendor solutions into two general categories: multi-use-case and performance-optimized. While there has been some blending, each group is optimized for distinct values.

Multi-Use Case: ADDM first became an area of intense innovation roughly 10 years ago with the initial tidal wave of interest in CMDB deployments and the need to capture service-related interdependencies more effectively. Subsequently, that first crop of companies was largely acquired by leading platform solutions with native CMDB integrations. As a group, these ADDM pioneers were and still are focused on capturing configuration-related changes as well as application-to-infrastructure residency, with use cases targeted at asset and change management.

Performance-optimized ADDM: About five years ago, the industry began to see a new crop of ADDM solutions more focused on performance interdependencies, transactional awareness, and more real-time dynamic currency. Many of these also supported CMDB integrations; all were highly automated and, to some degree, were complementary to ADDM-related investments from the first wave. Vendors in this category are raising the bar on in-depth transactional awareness; dynamic, operational insights into application-to-application and application-to-infrastructure interdependencies; and higher levels of automation in terms of discovery and currency.

As the ADDM market progresses, both groups are beginning to harvest strengths from each other, and in this respect, they are becoming more alike. On the other hand, at least for the foreseeable future, there will be numerous situations where a complementary relationship between two separate ADDM packages may well be the right choice.

Read: 6 Key Points of ADDM Evaluation

Dennis Drogseth is VP at Enterprise Management Associates (EMA)
Share this

The Latest

March 21, 2019

Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn't have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits ...

March 20, 2019

Network performance issues come in all shapes and sizes, and can require vast amounts of time and resources to solve. Here are three examples of painful network performance issues you're likely to encounter this year, and how NPMD solutions can help you overcome them ...

March 19, 2019

"Scale up" versus "scale out" doesn't just apply to hardware investments, it also has an impact on product features. "Scale up" promotes buying the feature set you think you need now, then adding "feature modules" and licenses as you discover additional feature requirements are needed. Often as networks grow in size they also grow in complexity ...

March 18, 2019

Network Packet Brokers play a critical role in gaining visibility into new complex networks. They deliver the packet data and information IT and security teams need to identify problems, recognize security issues, and ensure overall network performance. However, not all Packet Brokers are created equal when it comes to scalability. Simply "scaling up" your network infrastructure at every growth point is a more complex and more expensive endeavor over time. Let's explore three ways the "scale up" approach to infrastructure growth impedes NetOps and security professionals (and the business as a whole) ...

March 15, 2019

Loyal users are the key to your service desk's success. Happy users want to use your services and they recommend your services in the organization. It takes time and effort to exceed user expectations, but doing so means keeping the promises we make to our users and being careful not to do too much without careful consideration for what's best for the organization and users ...

March 14, 2019

What's the difference between user satisfaction and user loyalty? How can you measure whether your users are satisfied and will keep buying from you? How much effort should you make to offer your users the ultimate experience? If you're a service provider, what matters in the end is whether users will keep coming back to you and will stay loyal ...

March 13, 2019

What if I said that a 95% reduction in the amount of IT noise, 99% reduction in ticket volume and 99% L1 resolution rate are not only possible, but that some of the largest, most complex enterprises in the world see these metrics in their environments every day, thanks to Artificial Intelligence (AI) and Machine Learning (ML)? Would you dismiss that as belonging to the realm of science fiction? ...

March 12, 2019
As a consumer, when you order products online, how do you expect them to get delivered? Some key requirements are: the product must arrive on time, well-packed, and ultimately must give you an easy gateway to return it if it is not as per your expectations. All this has been made possible via a single application. But what if this application doesn't function the way you want or cracks down mid-way, or probably leaks off information about you to some potential hackers? Technical uncertainty and digital chaos are the two double-edged swords dangling over this billion-dollar ecommerce market. Can Quality Assurance and Software Testing save application developers from this endless juggle? ...
March 11, 2019

Of those surveyed, 96% of organizations have a digital transformation strategy, with 57% approaching it as an enterprise-wide priority, with a clear emphasis on speed of business, costs, risk, and customer satisfaction, according to IDC’s Aligning IT Strategies and Business Expectations for Digital Transformation Success, sponsored by EasyVista ...

March 08, 2019

One of my ongoing areas of focus is analytics, AIOps, and the intersection with AI and machine learning more broadly. Within this space, sad to say, semantic confusion surrounding just what these terms mean echoes the confusions surrounding ITSM ...