Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

Application management

Application management

(also AM)

Application management definition

Application management is the process of managing software applications throughout their lifecycle, from initial deployment to retirement. It combines various processes, tools, and policies to ensure efficient application deployment and management. Usually, application management includes tasks such as installation, configuration, maintenance, and troubleshooting.

Application management key stakeholders

  • Application analyst. This is the most critical person in the process. They are responsible for managing the whole lifecycle of the app. A few people can perform this job as a team, but one person may be enough.
  • Business unit owners. These are the investors in the business or those who benefit from the applications and application management.
  • Developers. These are the application designers and the technical staff working on developing and implementing the application. They are also responsible for security.
  • Users. These people give feedback, allowing the application to evolve.

Application management key components

  • Application discovery refers to identifying all applications within an organization, including commercial and open-source software and custom-built apps.
  • Application inventory involves creating a list of all software applications in use, such as information about the version, location, and configuration.
  • Application deployment entails deploying new applications or updates, which may involve testing, configuration, and roll out to end users.
  • Application monitoring includes monitoring applications’ performance and availability and identifying and addressing potential issues.
  • Application security is implementing security controls to protect applications from unauthorized access, modification, or disclosure.
  • Application retirement involves retiring or decommissioning applications that are no longer needed or have reached the end of their useful life.

Further reading

Ultimate digital security