What is ADM?
As discussed in the above introduction, ADM
is a solution for discovering applications, servers and network devices and historically, customers have relied on conventional techniques to track dependencies such as endless spreadsheets and extensive audits. But the proliferation of virtualized data centers
, cloud and microservices has made it increasingly difficult to track dependencies using these methods. Now, application maps are usually the first step to visualizing complex IT environments but traditional ADM engagements are expensive.
This pilot assessment helps you realize the benefits of a complete ADM engagement and how it can directly influence your business outcomes. The initial assessment is limited for up to 15 applications* to be conducted over a 10-week period. This assessment leverages DAAnE (D
ggregation and An
ngine, which produces and maintains an accurate picture of business application architectures), a tool developed exclusively by WWT Application Services
. The assessment is explicitly designed so that to deliver significant value and insight to your environment.
*Large enterprise-scale applications (i.e. SAP, Online Banking, Epic/Cerner/MedSeries4, Enterprise Data Warehouses, Global LIMS platforms, etc.) are not in scope for this pilot assessment and instead would be subject to a full ADM assessment.
Each ADM assessment is unique to the customer and will include one Application Impact Report per application. This report contains:
- Application Summary: Short summary explaining how, where and by whom the application is used
- Application Dependencies: Summary of the application dependencies as determined by telemetry data, system of record information and stakeholder interviews
- Application Integrations: Summary of the application integrations determined by telemetry data, system of record information and stakeholder interviews
- Connections & Protocols: Summary of the connectivity captured by the telemetry tool (SRC & DST IP, Ports, Protocols)
- Security & Authentication Methods: Summary of the security model and methods of authentication used by the application’s users
- Data Locations: Details about where data is created and/or accessed by the application and where it is stored, along with the data classification and any regulatory requirements
- User Interface Summary: Overview of how the user interface is delivered to customers (web, thick client, Citrix, VDI, etc.) and any special requirements of the UI
If the ADM project is in support of a data center migration, we can also provide:
- Move Groups: Summary of move groups based on the data collected and correlated
- Implementation Summary: Summary of the major dependencies and integrations that must be accounted for before the application can be successfully migrated to the target environment