Start your 2019 with an IT infrastructure Detox. Improve your IBM server performance, security and compliance.
The Recarta 360 degree IT assessment will give you complete visibility of your entire IT estate, worts 'n all.
Our impartial assessment will highlight any potential performance and compliance risks as well has helping you to plan cost savings in areas such as Hardware, Software & Support.
Who Benefits from The Recarta 360 degree IT assessment ?

The Recarta IT 360° assessment has been designed and developed for newly appointed senior IT decision makers. The review will give anyone looking to gain an accurate view of their entire IT position, in order that they can make educated performance and cost efficiency decisions.

Our team of consultants specialize in all aspects of hardware, software and database performance as well as licensing compliance. They can identify any infrastructure performance risk as well as highlight where cost efficiencies can be made.

If you are new to a role that involve making strategic IT decision The Recarta 360° assessment will give you the insight you need to make informed choices.

What is The Recarta 360 degree IT assessment ?

Total Visibility

Gain complete visibility of your entire hardware and software estate

Compliance Assurance

Identify your software & hardware licensing position

Cost & Efficiency Savings

Identify cost and efficiency savings

How does it work?

Our 360° assessment will look at every aspect of your IT estate. Our team will look your inherited hardware, software, support contracts, licensing position and data base use. We’ll identify any potential performance risks as well as highlight where cost savings can be introduced. This unique evaluation service aims to give you total control of your IT environments, costs as well as provide your with a plan to introduce cost and efficiency savings.

The technology behind the analysis

IBM® Tivoli Application Dependency Discovery Manager (TADDM) is a configuration management tool that helps IT operations personnel ensure and improve application availability in application environments. TADDM provides the details of configuration items (CIs) using automated, agentless discovery of assets and their application dependencies, and it includes a discovery library technology to help leverage data from other sources.

TADDM provides operational staff with a top-down view of applications so that they can quickly understand the structure, status, configuration, and change history of their business-critical applications. When performance and availability problems occur, this view helps the staff to immediately isolate issues and to more effectively plan for application change without disruption. The TADDM database, a configuration management database, is created and maintained without requiring custom infrastructure modeling. TADDM also provides complete cross-tier dependency maps, topological views, change tracking, event propagation, and detailed reports and analytics.

TADDM depends on the discovery of information, which is performed using sensors that are deployed as part of the TADDM product. The data that results from the discovery process is used to create cross-tier dependency maps that link the physical and logical topologies. This hierarchical directory represents your entire runtime environment.

Understand the discovery phase

Discovery is a multilevel process that collects configuration information about the entire application infrastructure, identifying deployed software components, physical servers, network devices, virtual systems, and host data that is used in the runtime environment. Discovery is performed using sensors that are part of the IBM® Tivoli Application Dependency Discovery Manager (TADDM) product.

The job of the sensor is to discover configuration items (CIs), create model objects, and persist the model objects to the TADDM database. The sensors use protocols that are specific to the resources that they are designed to discover. The following protocols are examples:

Cisco Discovery Protocol (CDP)

Java™ Management Extensions (JMX)

Secure Shell (SSH)

Simple Network Management Protocol (SNMP)

Structured Query Language (SQL)

When possible, a secure connection is used between the TADDM server and the target systems.

Arrange your Recarta IT 360° Review