Every feature your CMDB needs, nothing it doesn't
A live CMDB, dependency mapping, network discovery, endpoint inventory, ITILv4 incident and change management, workflow automation, Microsoft 365 integration, and a complete audit trail. The core platform, VECTOR scanning, and ATLAS agents are in every plan, including the free tier.
IT asset tracking with dependency mapping
Every kind of IT asset modelled with purpose-built fields.
Kovira ships a comprehensive set of configuration item types covering devices, networks, WAN circuits, services, racks, locations, domains, software, licences, SLAs, vendors, contracts, people, groups, passwords, APIs, documents, incidents, and changes. Each CI type has its own set of fields that actually matter for that type of asset, so you are not filling in irrelevant metadata just to satisfy a generic form.
Every CI can be linked to other CIs through typed relationships, which means you can see exactly how a switch failure would ripple through your network, or which contracts are tied to which vendor, or what services depend on a particular server. The dependency map is interactive and visual, not a flat table you have to squint at.
Key capabilities
- Comprehensive set of typed asset categories
- Interactive visual dependency maps
- Typed relationships between any CI pair
- Version history on every record with one-click rollback
- Relational integrity, not spreadsheets
ITILv4-aligned incident and change management
Real ITIL incident depth: response and resolution SLAs, resolution and closure codes, watchers, parent and child links.
Before you make a change, Kovira lets you run a full upstream and downstream impact analysis. Pick a CI and you see every dependency, every service that could be affected, and every team that needs to know. Change approvals are gated to an independent reviewer: the person who created the change cannot approve their own work.
Incidents carry the fields ITIL practices actually call for: priority matrix, response and resolution SLA timers driven by per-customer policies and coverage windows, resolution category, closure code, who resolved it, watchers who get notified on updates, parent and child links for major events that group dozens of related tickets, and a postmortem document reference for major incidents. Reopens are tracked with a counter so you can spot patterns instead of patching the symptom.
Every incident and change links back to the CIs it touches, so postmortems and audits run against current configuration rather than someone's recollection.
Key capabilities
- Response and resolution SLAs with per-customer policies
- Coverage windows per weekday, plus holiday calendars that pause the timer
- Resolution categories, closure codes, and resolved-by tracking
- Watchers, parent and child incident linking, and reopen counters
- Postmortem document references on major incidents
- Independent change approvals: the creator cannot self-approve
ITSM workflow automation
Visual builder, broad trigger surface, real action library, full execution audit.
Kovira ships a visual workflow builder for multi-step approvals, conditional branches, delayed steps, retries, and quantified checks across collections of CIs. Trigger surface covers what IT teams actually wire up: CI changes, incident lifecycle events, SLA events (at risk, breached, paused, resumed), scheduled intervals, manual dispatch, and incoming email when a monitored mailbox is connected.
The action library is wide enough that you do not have to leave the platform for everyday automation. Send email through a managed sender, update CIs, create incidents, transition SLA timers, call any external webhook, and run data transforms (regex extract, string operations, JSON shape) over the run scope so later steps act on cleaned-up values rather than raw payloads. Failed actions retry on a backoff; concurrency controls stop the same workflow firing twice on the same event.
Built-in system workflows handle the table-stakes notifications out of the box: ticket created, ticket assigned, SLA at risk, and SLA breach all email the right people without you wiring it up. Every run produces a per-step execution log with input, output, and error captured, so you can trace exactly what happened and why.
Key capabilities
- Triggers: CI changes, incidents, SLA events, schedules, incoming email, manual dispatch
- Actions: send email, update CI, create incident, webhook, SLA pause/start/stop/reset, data transforms
- Data transforms: regex extract, string operations, JSON shape, applied to the run scope
- Built-in system workflows for ticket and SLA notifications, ready out of the box
- Conditional branches, quantified checks, delayed steps, retry on backoff
- Per-step execution log with input, output, and error captured
Mailbox to ticket: turn shared inboxes into a ticket pipeline
Connect a support@ mailbox and email becomes incidents, replies thread, automation kicks in.
Connect a Microsoft 365 user or shared mailbox and every new message raises an incident in Kovira. Replies from the requester or from technicians thread back onto the original incident as comments, with attachments and inline images preserved. Conversation matching uses Microsoft's native conversation identifier, standard email threading headers, and a normalised subject fallback, so threads do not split when someone strips the ticket reference from the subject line.
Access is scoped per mailbox to the minimum read permission and revocable from the Microsoft 365 admin centre at any time. There is no tenant-wide admin grant. Change notifications come in close to real time, so an email landing in the inbox produces an incident within seconds, not on a polling cycle. The incoming-mail workflow trigger then fires whatever automation you have wired up: assign by routing rules, set priority by sender domain, send an acknowledgement, populate fields from the email body, escalate, or chain into your existing approval flow.
Loop prevention is built in. Auto-replies, bounce notifications, and Kovira's own outbound mail are detected and skipped, so you do not get a feedback loop the first time someone forwards a vacation responder.
Key capabilities
- Scoped per-mailbox access, no tenant-wide admin grant required
- New mail becomes an incident within seconds, not on a polling cycle
- Native Microsoft 365 reply threading with subject fallback
- Attachments and inline images preserved on the incident
- Incoming-mail workflow trigger for routing, acknowledgements, and escalation
- Automatic loop prevention for bounces, autoresponders, and our own replies
- Mailbox count by plan: 1 on Teams, 3 on Business, 5 on MSP
VECTOR network scanner and ATLAS endpoint agents
Automated discovery from the network and every endpoint, with real physical topology.
Point VECTOR at a subnet and it finds the devices, maps how they connect, and keeps your CMDB current. Routers, switches, firewalls, servers, workstations, printers, and IoT all surface as CIs, with no agent required on the scanned devices.
VECTOR also pulls the physical-network detail most network tools skip. Port-level connectivity from your managed switches shows which device is plugged into which port, and the platform tracks where each device has been seen on the network so you can answer the reverse question: where on the network is this device today? Topology stops being an arrows-and-boxes diagram somebody redrew once and starts being something the CMDB can answer.
ATLAS covers the endpoint side. It runs on Windows and Linux machines and reports hardware specs, installed software, and security posture, so endpoint inventory stays accurate without anyone chasing it. Both VECTOR collectors and ATLAS endpoints can be paused, resumed, or uninstalled centrally from the workspace, and heartbeats flag any agent that goes silent. Both are included in every plan, including the free tier.
Key capabilities
- Physical topology with port-level connectivity
- Device-to-port presence intelligence from managed switches
- Find any device on the network instantly
- Hardware, software, and security posture from ATLAS endpoints
- Pause, resume, and uninstall agents centrally
- Heartbeats flag anything that goes quiet; Windows and Linux support
Same device, one record
Kovira knows when two sources are describing the same thing.
A single server can show up in a VECTOR scan, an ATLAS agent check-in, and an import from another tool. In most CMDBs, that lands as three records you have to untangle by hand.
Kovira reconciles those signals into one CI automatically, no matter how many sources fed into it. The original source of every field is preserved, so you can always answer the question of where a particular value came from.
Key capabilities
- Multiple sources, one record
- Works across VECTOR, ATLAS, and Microsoft 365
- Automatic, not manual
- See where each data point came from
- A unified inventory from day one
Microsoft 365 integration
Sync users, groups, and devices from Entra ID and Intune.
If you are running Microsoft 365, Kovira can pull your users, security groups, directory roles, and managed devices straight from Entra ID and Intune. The sync runs in the background, so your CMDB stays current without anyone having to manually update records when someone joins, leaves, or gets a new laptop.
The data flows into the same CI model as everything else, which means you can see an employee, the device they are using, the groups they belong to, and the services they have access to, all in one place. Synced records are correlated with VECTOR and ATLAS data automatically.
Key capabilities
- Users, security groups, and directory roles from Entra ID
- Managed devices from Microsoft Intune
- Background sync
- Data appears as native CIs alongside other assets
- Automatic correlation with VECTOR and ATLAS data
Built-in documentation linked to your CIs
Runbooks, SOPs, postmortems, and architecture docs next to the assets they describe.
Every IT team has runbooks, standard operating procedures, and architecture documentation sitting in a shared drive somewhere, disconnected from the systems they describe. Kovira has a full document editor built in with structured content blocks: rich text, code, tables, checklists, images, callouts, and embedded diagrams.
Documents can be linked directly to CIs, so when you are looking at a server and wondering how to restart a service on it, the runbook is right there. Postmortem documents link to incidents, so the major-incident review lives next to the ticket it came from. Collaborative editing is supported with author locking, so multiple people can work on the same document without overwriting each other.
Key capabilities
- Rich document blocks for any kind of content
- Link documents directly to any CI
- Postmortem document references on major incidents
- Collaborative editing with author locking
- Version history on every document
- Structured authoring built for IT teams
Tenant isolation, role-based access control, and recycle bin
Database-level isolation, per-member RBAC overrides, and a soft-delete safety net for CIs.
Kovira was built with tenant isolation from the start, not bolted on later. Every organisation's data is separated at the database level, and the application layer enforces tenant context on every single query. There are no admin backdoors, no shared tables, and no ways for one tenant's data to leak into another. On the MSP plan, the same isolation extends across many client workspaces in one account: each workspace is fully isolated while technicians can switch between them without logging out.
Role-based access control gives you four base levels (Owner, Admin, Editor, Viewer) plus per-member overrides for the cases that do not fit a role cleanly. A specific user can be granted a permission above their role or have one revoked below it without changing the role itself, so you can keep the model clean and still handle the contractor who needs read-only access to one workspace section.
Deleted configuration items move into a recycle bin instead of being removed outright. From there you can restore the record back to its prior state or purge it permanently when you are sure. Recycled CIs do not count against your plan’s CI limit while they sit in the bin.
Key capabilities
- Row-level security policies at the database level
- Tenant-scoped queries on every single request
- Four base RBAC roles plus per-member permission overrides
- Recycle bin with restore or permanent purge for deleted CIs
- Switch between workspaces without logging out (MSP plan)
- No shared tables, no backdoors, no data leakage
Complete audit trail for compliance
Every action logged. Always on. Cannot be disabled.
Every action that anyone takes in Kovira is logged: every CI creation, every field edit, every status change, every login, every permission check, and every workflow execution. The audit log captures who did it, what they did, when they did it, and from where. This is not optional and cannot be turned off.
For teams that need to pass compliance audits, whether that is ISO 27001 or just your own internal governance requirements, the audit trail provides the evidence you need without having to build a separate reporting system. Logs are filterable by date, user, action type, and CI, and can be exported for external review.
Key capabilities
- Who, what, when, and where for every action
- CI edits, logins, permission checks, and workflow runs
- Ready for ISO 27001 and governance audits
- Filterable by date, user, action type, and CI
- Exportable for external review
ITILv4 CMDB tool built for practice, not theory
Structured around the ITIL practices that matter most.
Kovira is structured around the ITIL practices that matter most to growing IT teams: Service Configuration Management, Change Enablement, Incident Management, Problem Management, IT Asset Management, and Service Request Management.
This is not a generic project management tool with ITIL labels slapped on it. The data model, the workflows, the permission structure, and the reporting are all designed around how ITIL actually works in practice. If you are working towards ITIL maturity, or you already follow ITIL and need a CMDB tool that does not fight you, Kovira is built for that.
Key capabilities
- Service Configuration Management with full CI lifecycle
- Change Enablement with impact analysis and approval workflows
- Incident Management with SLA tracking and CI linking
- IT Asset Management across every category
- Purpose-built data model, not generic project management
Related
Every configuration item Kovira models
Purpose-built CI types covering devices, networks, services, racks, locations, SLAs, contracts, vendors, password vaults, and more. Each type has typed columns in the schema, dependency mapping, version history with rollback, and workflow triggers.
See every CI typeBe ready to see it in action
Kovira is launching soon. The free tier will include the full CMDB, VECTOR scanning, and ATLAS agents. Microsoft 365 sync and higher limits come with Teams and up.