Fifteen years ago there was a revolution in information technology operations. Different teams that managed networks and systems merged their practices and technology under frameworks like Computer Associates Unicenter and IBM Tivoli. Today, these solutions have evolved to CA Spectrum, SolarWinds, and SpiceWorks. These are all fantastic technologies that have proven that the fusion of information technology operations and network management could occur, and in fact are complementary when running from the same tool, same interface, and share information.
Now, fast forward to today and consider the concepts of vulnerability management and privileged identity management. Two very different teams and technology but unified in many concepts and well documented as best practices. Consider the SANS 20 Critical Security Controls: