Enterprise-grade ITSM suite supporting ITIL-aligned service delivery, advanced automation, AI, and integrations for risk-sensitive, high-availability brokerage IT environments.
More about Symantec (Broadcom)
Systems for managing IT service requests, incidents, problems, and changes across the organization, often following ITIL or other service management frameworks.
More IT Service Management Solutions
More IT and Infrastructure ...
Self-Service Portal Allows end-users to create and manage their own service requests via a web portal. |
CA Service Management includes a robust self-service portal as part of its ITSM solution, as described in product documentation. | |
Knowledge Base Integration Provides access to self-help articles and documentation to reduce service tickets. |
Knowledge base integration is a core component, enabling users to access self-help articles. | |
Request Categorization & Prioritization Automates sorting and prioritizing service requests according to defined rules. |
The platform supports automated request categorization and prioritization through advanced workflow rules. | |
Request Fulfillment Time Average time taken to fulfill a service request. |
No information available | |
Automated Routing Automatically assigns requests to the appropriate teams or personnel. |
Automated routing is featured, using business logic to assign service tickets. | |
Customizable Forms Allows customization of request submission forms for specific information capture. |
Request forms are highly customizable, supporting varying information capture needs. | |
Multi-channel Request Submission Supports request submission via email, web, chat, and phone. |
Supports multi-channel submission including web, email, and phone. | |
Status Tracking Enables users and IT staff to track the live status of service requests. |
Live status tracking for users and IT staff is standard. | |
Service Level Agreement (SLA) Tracking Monitors and enforces time limits for request resolution. |
SLA tracking and enforcement are included, critical for regulated industries. | |
Approval Workflow Automation Automates the approval process for certain types of service requests. |
Approval workflow automation is included in the workflow engine. | |
Request History and Audit Trail Maintains a record of all actions taken on service requests for compliance/audit purposes. |
Audit trails and request history logs provided for compliance. | |
Mobile Accessibility Allows users and agents to manage requests via mobile devices. |
Web-based and mobile access enabled for users/agents. | |
Request Feedback Collection Collects customer satisfaction feedback after a request is completed. |
Customer satisfaction surveys can be triggered after ticket closure. | |
Bulk Request Management Enables bulk creation or updating of service requests. |
Bulk ticket/request handling supported, as outlined in admin functions. | |
Integration with Asset Management Links requests to specific assets for context and tracking. |
Asset management integration tightly linked with service requests. |
Automated Incident Detection Integrates with monitoring systems to auto-create incidents from alerts. |
Automated incident detection through integration with monitoring tools. | |
Incident Logging Central archive for recording details of each incident. |
Incident logging is a core ITIL process in the solution. | |
Incident Categorization and Prioritization Classifies and assigns priority to incidents for efficient triage. |
Categorization and prioritization are standard for incidents. | |
Impact Assessment Evaluates and records the business impact of incidents. |
System supports business impact assessment for incidents. | |
Incident Resolution Time Time taken to resolve an incident from creation to closure. |
No information available | |
Escalation Workflows Automatic escalation of unresolved incidents based on SLA rules. |
Automated escalation workflows based on SLA/priority. | |
Communication and Notification Tools Notifies relevant stakeholders and users during incident lifecycle. |
Multi-channel communication and notification tools included. | |
Major Incident Management Special process handling for critical/high-impact incidents. |
Major incident workflows are standard for high-impact events. | |
Root Cause Recording Documents identified root causes post-resolution for future reference. |
Root cause documentation is available as a post-resolution step. | |
Incident Templates Predefined templates to simplify logging of recurring types of incidents. |
Incident templates are available to streamline recurring issue logging. | |
On-call Management Integration Integration with on-call schedules to identify available responders. |
On-call and roster integrations available for ticket assignment. | |
Automated Incident Closure Incidents close automatically upon completion of resolution and verification. |
Incidents can be closed automatically with verification. | |
Incident Analytics and Reporting Generates reports on incident trends, types, resolution time, and more. |
The reporting engine includes incident analytics. |
Problem Logging Provides a mechanism to record and track identified problems. |
Problem logging is an ITIL-aligned function present in CA Service Management. | |
Known Error Database Maintains a repository of known errors and their workarounds. |
Known error database and workarounds are core to the problem module. | |
Problem Analysis Tools Facilitates root cause analysis using techniques (e.g., 5 Whys, fishbone diagram). |
Platform offers tools for root cause analysis. | |
Linkage to Incidents Connects related incidents to a single problem ticket for holistic management. |
Incidents can be linked to problems for holistic management. | |
Problem Prioritization Assigns priority based on impact and urgency to problems. |
Problem prioritization based on impact and urgency is supported. | |
Permanent Solution Tracking Tracks implementation of permanent solutions to problems. |
Permanent solution tracking for problem resolution is available. | |
Problem Review and Closure Process Formal review before closure to ensure issue has been fully resolved. |
Formal review and closure process is standard for problem tickets. | |
Problem Trend Analysis Provides analytics on problem occurrence and trends. |
Problem trend analytics available in reporting. | |
Problem Reporting Enables detailed reporting on open, resolved, and recurring problems. |
Reporting capabilities include detailed problem reports. | |
Collaboration Tools Allows teams to collaborate with notes, attachments, and discussion threads on problems. |
Collaboration during problem resolution is supported via notes, attachments, and threads. | |
Problem Lifecycle Automation Automates movement through problem statuses based on triggers and workflow. |
Problem lifecycle automation is enabled by workflow configuration. | |
Audit Trail for Problems Logs all modifications and actions taken on a problem ticket. |
Compliance-driven audit trails are included. |
Change Request Logging Captures and records all requests for change to IT infrastructure. |
Change request logging is a core capability. | |
Workflow Customization Customizable multi-stage workflows for review, testing, and approval. |
Custom workflow configuration for multi-stage review/approval supported. | |
Impact and Risk Analysis Assesses possible impacts and risks of proposed changes. |
Platform assesses impact and risk for each change. | |
Change Calendar Visual display of planned changes to avoid conflicts. |
Change calendar offers visual scheduling to minimize conflicts. | |
Change Advisory Board (CAB) Integration Facilitates scheduling, voting, and documentation for CAB meetings. |
CAB integration for approval and voting is standard. | |
Automated Notifications Notifies stakeholders about change status and upcoming implementations. |
Automated notifications for change status and schedule. | |
Backout Planning Documentation and approval of rollback plans in case of failure. |
Backout/rollback planning is documented with change requests. | |
Change Approval Time Time required for a typical change request to be approved. |
No information available | |
Change Collision Detection System warnings for potentially conflicting changes. |
Change collision/conflict detection is part of the scheduling/calendar tool. | |
Change Documentation Attaches all supporting documentation, test results, and evidence. |
Change documentation and supporting information are attached to each record. | |
Change Implementation Tracking Logs the application, outcome, and status of each change. |
Tracks and logs the outcome and status for change implementation. | |
Post-Implementation Review Supports structured review of change outcomes to capture lessons learned. |
Post-implementation review support is standard. | |
Change Auditing Maintains a complete audit trail for compliance and control. |
Full change auditing for compliance. |
Asset Inventory Management Central repository for all IT hardware, software, and virtual assets. |
Asset Inventory Management is a core feature. | |
Auto-Discovery Automatically discovers and updates records of IT assets in the environment. |
Supports auto-discovery of networked assets. | |
Configuration Management Database (CMDB) Repository of configuration items (CI) and their relationships. |
A configuration management database (CMDB) is part of the suite. | |
Asset Lifecycle Monitoring Tracks assets through procurement, deployment, maintenance, and retirement. |
Tracks asset lifecycle, including maintenance and retirement. | |
Relationship Mapping Visual display of dependencies and relationships among assets and services. |
Relationships and dependencies among assets are visually mapped. | |
Change Impact Analysis Assesses which assets/services will be affected by proposed changes. |
Impact analysis for change management is available. | |
Software License Management Tracks license usage, compliance, and renewal requirements. |
Software license management is part of asset tools. | |
Asset Tagging Supports tagging and tracking of physical and digital assets. |
Asset tagging and tracking fields included. | |
Integration with Procurement Systems Links asset records with purchasing/procurement data. |
Integration with procurement/purchasing supported. | |
Asset Valuation Captures and updates current asset value over time. |
No information available | |
Audit Trails for Assets Tracks all changes and movements of each asset. |
Asset audit trails/logging available. | |
Bulk Asset Import/Export Facilitates batch upload and download of asset records. |
Bulk asset import/export supported, especially via CSV or API. |
SLA Definition Engine Construction of detailed agreement terms, escalation paths, and penalties. |
SLA definition and management engine included. | |
SLA Timer/Clock Realtime SLA countdown timer for each ticket/request. |
SLA timers and countdown visible in ticket views. | |
Breach Notifications Automatic escalation and notifications when SLA targets are at risk. |
Automatic notifications/escalation on SLA breach risk. | |
Multi-tier SLA Support Allows different SLAs for different categories, users, or services. |
Supports multiple tiers of SLA by category or service. | |
OLA/UC Management Supports OLAs (internal) and UCs (supplier) agreements/tracking. |
No information available | |
SLA Reporting and Analytics Provides dashboards and exportable reports on SLA achievement and breaches. |
SLA dashboards and analytics are part of management reporting. | |
Out-of-hours SLA Configuration Considers support calendars in SLA timing. |
No information available | |
Customer Communication Templates Reusable templates for proactive SLA-related communication. |
Communication templates for SLAs are standard in notification module. | |
Real-time SLA Monitoring Monitors current SLA compliance for all open items. |
Real-time SLA monitoring system is implemented. | |
SLA Policy Versioning Tracks changes and provides version control for SLA policies. |
No information available |
REST API Support Full-featured, documented REST API for integration with external systems. |
Platform supports REST APIs for broad integration (API documentation available publicly). | |
Pre-built Connectors Off-the-shelf integrations with common IT systems (Active Directory, monitoring, email, etc.). |
Library of pre-built connectors and integrations available. | |
Webhooks Supports push notifications to and from other systems based on events/triggers. |
Webhooks and event triggers support system-to-system notifications. | |
Scripting and Automation Support Allows custom scripts or workflow configuration for advanced automation. |
Scripting and no-code automation tools are available for workflow. | |
Marketplace for Add-ons Directory of available third-party integrations and add-ons. |
Marketplace or directory of add-ons/extensions exists. | |
Data Import/Export Tools Bulk data transfer between platforms with configurable mapping. |
Data import/export tools available for initial setup and migration. | |
Custom Field Support Ability to add custom data fields to objects in the system. |
Admin can define custom fields for all core entities. | |
Event-Driven Integration Engine Orchestrates business logic triggered by system events. |
Event-driven triggers and orchestration tools included. | |
Open Authentication Standards Supports OAuth, SAML, or other secure authentication protocols for SSO/API usage. |
Open authentication standards such as SAML, OAuth are supported. | |
Integration API Rate Limit Maximum supported number of API requests per second. |
No information available |
Role-based Access Control Configurable permissions based on user roles and responsibilities. |
Role-based access control is a core security mechanism. | |
Multi-factor Authentication Requires at least two authentication methods for access. |
Multi-factor authentication offered for user access. | |
Single Sign-On (SSO) Integration with enterprise authentication providers for simplified secure access. |
Single Sign-On supported through common protocols. | |
Data Encryption at Rest All customer and system data is encrypted when stored. |
Data at rest encrypted (AES or similar), as per documentation. | |
Data Encryption in Transit TLS or equivalent protection for all communication. |
Data encryption in transit uses TLS/SSL. | |
Audit Logging Tracks every user action and system change for compliance. |
Full audit logging for compliance and monitoring. | |
Compliance Certifications Supports PCI-DSS, SOX, GDPR, and other regulatory requirements. |
Product certified for compliance with regulatory frameworks (SOX, GDPR etc). | |
Regular Security Updates Receives frequent, automatic security patching and upgrades. |
Receives regular, automatic security patch updates. | |
Access Review and Certification Tools to review and certify access rights regularly. |
Access reviews and certification tools are present for auditing. | |
Data Retention Policies Configurable policies for automatic data archiving/deletion. |
Data retention policies are configurable for compliance. | |
Anonymization and Masking Capability to mask or anonymize sensitive data sets for non-production uses. |
Data masking/anonymization capabilities described for test environments. |
Real-time Dashboards Live views of service health, workload, and open tickets across IT services. |
Real-time dashboards available for service health and workload. | |
Custom Report Builder Allows creation of custom reports with selectable fields and filters. |
Custom report builder included in analytics module. | |
Scheduled Reporting Automatic generation and delivery of reports at specified intervals. |
Allows automatic scheduled report creation and delivery. | |
Historical Trend Analysis Identifies trends in service requests, incidents, and assets over time. |
Aggregates and analyzes historical data for trend analysis. | |
KPI Monitoring Tracks achievement of key performance indicators for teams and services. |
Tracks KPI achievement in dashboards. | |
Drill-down Capabilities Users can drill into summary figures for detailed investigation. |
Users can drill through report data for details. | |
Export Options Download reports in common formats (CSV, PDF, XLS). |
Export to CSV, PDF and other formats supported for reporting. | |
Report Sharing Shareable links or automatic email delivery to stakeholders. |
Report sharing through URLs, email, and user dashboard. | |
Data Visualization Tools Graphical presentations of metrics (charts, graphs, heatmaps). |
Interactive visualizations (charts, graphs) in analytics module. | |
Pre-Built Templates Common reports (SLA, volume, productivity) available out-of-the-box. |
Pre-built templates for common ITSM reporting needs. |
Customizable User Interface Allows admins and users to adjust layouts, themes, and navigation. |
User interface is highly customizable for layouts and themes. | |
Accessibility Compliance Conforms to standards (e.g. WCAG, Section 508) for users with disabilities. |
No information available | |
Localization/Multilingual Support Offers the interface in multiple languages for global teams. |
Supports localization and multiple languages. | |
Mobile App Availability Native mobile applications for iOS and Android devices. |
Native mobile apps for iOS and Android available. | |
Performance/Snappiness Average system response time for UI actions. |
No information available | |
Contextual Help & Tooltips Dynamic, in-app guidance for new or infrequent users. |
In-app help and tooltips are embedded throughout. | |
User Onboarding Tools Walkthroughs, checklists, and tutorials for new users. |
Walkthroughs/tutorials aid new user onboarding. | |
Personalized Dashboards Users can create personal views of important metrics and tickets. |
Personal dashboards and widgets can be customized by user. | |
Unified Search Cross-module, full-text search functionality. |
Unified search allows search across requests, assets, documentation, etc. | |
Notification Preferences Users can customize their notification settings per medium and event. |
Users can set personal notification preferences for different events. |
Multi-tenancy/Partitioning Supports multiple departments, subsidiaries, or brokerage entities within a single solution. |
Multi-tenancy/partitioning is supported for large enterprises. | |
User Role and Permission Management Fine-grained control over what each user can view and do. |
Role and permissions management is granular and admin configurable. | |
Bulk User Import/Provisioning Systematic onboarding of users from directories or CSV imports. |
Bulk user provisioning tools included (e.g., from AD or CSV). | |
High Availability Architecture supports clustering and failover to ensure service continuity. |
Supports high-availability clusters and failover options. | |
Data Backup & Recovery Automated, scheduled system backups with recovery procedures. |
Automated system backup and recovery workflows included. | |
Disaster Recovery Time Objective (RTO) Maximum allowed downtime in case of major outage. |
No information available | |
Disaster Recovery Point Objective (RPO) Maximum allowed data loss measured in time. |
No information available | |
Scalable Architecture Can support rapid growth in user base and transaction volumes. |
Designed for large-scale, high-growth environments. | |
24/7 Vendor Support Availability Availability of live or ticket-based vendor support any time. |
24/7 vendor support provided for enterprise clients. | |
Release and Patch Management Automated rollout and rollback processes for updates. |
Automated patch and release management included. | |
Monitoring and Alerting Proactive alerts for outages, system errors, or abnormal activity. |
Proactive system monitoring and alerting available. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.