Context
Clésence, a social housing provider within the Action Logement Group, relies on multiple IT management and cybersecurity tools — AD, CMDB, monitoring and EDR — each covering a specific scope. These tools operate independently: data is scattered, access is restricted to certain profiles, and no cross-functional view allows teams to query the entire estate quickly and easily.
The Infrastructure Manager's assessment was clear: every incident required 2 to 3 hours — at best — to reconstruct what had happened. The result: a permanently reactive posture. The goal with OverView was to move from reactive to preventive, having information upfront to act immediately.
A concrete example: during the Log4j crisis, the team first had to inventory the estate, then identify affected assets — precious time lost.
Challenges
A siloed IT estate. Data was spread across AD, CMDB, monitoring and EDR, with no consolidated or cross-functional view. Identifying active and inactive devices across a multi-site estate was a daily headache.
A lack of operational visibility. It was impossible to quickly assess the real state of devices (active/inactive) without manually querying each tool.
A costly reactive posture. The lack of anticipation turned every incident into a race against time. The team wanted to better anticipate IT and cyber incidents to prevent rather than cure.
Why OverView
Clésence chose OverView for its ability to leverage existing tools without a complete rebuild, its overlay approach enabling reliable reporting without starting from scratch, and its suitability for mid-sized organizations: fast, flexible, usable by all, and fostering cross-team collaboration.
Internal coordination was swift. With the data team focused on business topics and the CISO being outsourced, the infrastructure team had full autonomy to lead the project.
Implementation
The deployment followed five key stages:
- Automatic data collection — API connection to existing repositories (AD, GLPI, EDR, monitoring)
- Repository consolidation — Unification and automatic daily updates
- Contextualization and prioritization — Business context enrichment: asset location, sensitivity, criticality
- Investigation and analysis — Access to all the data that individual tools alone cannot provide
- Action plan management — Gap remediation and corrective action tracking
Key indicators were deployed across four axes: executive view and IT governance, coverage and compliance, risk and vulnerability management, and infrastructure and IT assets. Multi-level reporting was set up: overall Clésence view plus per-site detail.
Results
| Benefit | Detail |
|---|---|
| Autonomous investigation | No more dependency on source tool access — 100% of the estate visible in real time |
| Single access point | Intuitive interface usable by the entire IT team: infrastructure, network, support, security |
| Executive communication | Smooth and effective reporting to the executive board, with meaningful indicators |
| GLPI enrichment | Automatic GLPI feeding with consolidated data |
| Vulnerability prioritization | Cyber reporting with business-context-based prioritization |
The team shifted from a 100% reactive posture to a preventive approach. Information is now available upfront, enabling immediate action during an incident instead of spending hours on reconstruction.
What the Infrastructure Manager says
"OverView transformed our siloed IT repositories into a single, actionable access point. Smooth communication with leadership, autonomous investigation."
— Alexandre Demol, Infrastructure Manager — Clésence