SlideShare a Scribd company logo
1 of 2
Download to read offline
people audit




                                                    Establishing Visibility into
                                                    Remote Vendor Access
Case Study                                          at Pelephone
                                                    Challenge
Pelephone                                           Pelephone, Israel’s #1 cellular phone carrier with 2.4 million
                                                    subscribers manages a diverse IT server environment with over 1,200
                                                    servers in their Tel Aviv headquarters as well as in 3 IT hosting
            Industry: Cellular Telephony            centers, running both customer-facing and business management
            Founded: 1986                           applications. To achieve optimal QoS and operational efficiency,
            Headquarters: Tel Aviv, Israel          assuring server stability and uptime is a top IT priority. “Our server
                                                    platform is our lifeline,” commented Isaac Milshtein, Pelephone’s


“With so many privileged
                                                    Director of Engineering IT Operations.

                                                    As is common in the telecom industry, Pelephone maintains many
 vendors accessing our                              custom-tailored 3rd party applications, providing content and
                                                    value-add services to Pelephone subscribers. The numerous
  servers, it can be difficult                        privileged vendors who are remotely accessing these servers, and are
  to keep an eye on who’s                           responsible for software support and upgrades, further complicate

  doing what.                                       Pelephone’s server management job. This provider used ObserveIT's

                      ”
Isaac Milshtein, Director
                                                    Gateway solution, comprising of ObserveIT management console and
                                                    multiple server agents. Hence, non-stop 24X7 SLA could be easily
                                                    offered based on the detailed and granular auditing capabilities of
Engineering IT Operations Pelephone
                                                    the ObserveIT data recording solutions.


Solution
Pelephone turned to ObserveIT’s window session recording platform for the purpose of establishing visibility into remote
session activity. The initial deployment was rolled out on five internal corporate applications in October of 2006. Less than
one month later, ObserveIT already delivered on its promise when Pelephone’s experienced an overnight service outage on
a mission-critical business application. The back-and-forth process between IT and the software vendor offered no solution.
Consulting the ObserveIT session recordings not only brought immediate resolution to the problem, it also helped identify
the responsible party and precise cause, thus allowing Pelephone to implement procedures to prevent its reoccurrence.

Following this incident, Pelephone deployed ObserveIT on their entire production server environment. ObserveIT’s system
administration benefits helped solve system outages of high-profile customer-facing applications. For an even stronger
troubleshooting impact, Pelephone integrated ObserveIT with their CA Unicenter network monitoring system. As a result,
any alert in the Unicenter management console includes a link to an ObserveIT window session playback for any active
session at the time the alert was fired. With this tight integration, mid-level system operators are able to identify problems
that in the past were only solved by senior system administrators, thus dramatically easing the forensic reconstruction of
past events and reducing mean time to repair.
Case Study
                    people audit




Establishing Visibility into
Remote Vendor Access at Pelephone

How it Works
The ObserveIT Agent is installed on each of Pelephone’s 1,200 servers, which include NT4.0, Win2000 and Win2003.
The agent remains idle until keyboard or mouse activity is detected in an NetOP or Terminal Services session. When
activated, the agent takes negligible CPU overhead, capturing each user action. Screen snapshot and metadata about
the state of the OS and application is analyzed and encoded using ObserveIT’s patented algorithms, and is sent via
HTTP POST to the Application Server.

The ObserveIT Application Server, an ASP.NET application running under IIS in the main Pelephone data center,
accepts the data posted by the Agent, processes it, and sends it to the ObserveIT Database Server to be stored and
indexed. The Application Server also periodically provides configuration information to the Agents. The ObserveIT
Web Console, also an ASP.NET application, is the primary interface for Pelephone IT and Security users.




                                                                                     Benefits
                                                                                    Fast problem resolution and
                                                                                    root-cause analysis with
                                                                                    elimination of ‘finger-pointing’

                                                                                    Increased uptime reliability

                                                                                    Dramatic increase in compliance
                                                                                    with console and remote access
                                                                                    usage policies

                                                                                    Third-party transparency and
                                                                                    reliability


Future Directions
Having deployed ObserveIT throughout their entire IT server
environment, Pelephone is looking to further capitalize on this
infrastructure. The full production deployment is being augmented
by a software release validation deployment, allowing Pelephone
to monitor, check and train users regarding all aspects of new
system deployment. As an additional side benefit, Pelephone will
also be using ObserveIT to validate service provider billing reports
by comparing reported hours to actual activity.



info@observeit-sys.com | www.observeit-sys.com

More Related Content

Viewers also liked

Viewers also liked (17)

Kas kas atean
Kas kas ateanKas kas atean
Kas kas atean
 
Urte askoan, txapela kaskoan!2
Urte askoan, txapela kaskoan!2Urte askoan, txapela kaskoan!2
Urte askoan, txapela kaskoan!2
 
Capítulo colatina 2012 1
Capítulo colatina 2012 1Capítulo colatina 2012 1
Capítulo colatina 2012 1
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
2 letônia --amatciems
2  letônia --amatciems2  letônia --amatciems
2 letônia --amatciems
 
Guarding Against Wrongful Convictions
Guarding Against Wrongful ConvictionsGuarding Against Wrongful Convictions
Guarding Against Wrongful Convictions
 
Bio consul
Bio consulBio consul
Bio consul
 
APWA Stormwater Luncheon_Jan 09, 2012
APWA Stormwater Luncheon_Jan 09, 2012APWA Stormwater Luncheon_Jan 09, 2012
APWA Stormwater Luncheon_Jan 09, 2012
 
Influence essay
Influence essayInfluence essay
Influence essay
 
Ejemplo climograma.
Ejemplo climograma.Ejemplo climograma.
Ejemplo climograma.
 
NOA Company Presentation HD
NOA Company Presentation HDNOA Company Presentation HD
NOA Company Presentation HD
 
0 que idade-tem_a_avó
0  que idade-tem_a_avó0  que idade-tem_a_avó
0 que idade-tem_a_avó
 
BIGTREE ARCHITECTS (2)
BIGTREE ARCHITECTS (2)BIGTREE ARCHITECTS (2)
BIGTREE ARCHITECTS (2)
 
Ideia grupo empreendedoras e novos negócios
Ideia   grupo empreendedoras e novos negóciosIdeia   grupo empreendedoras e novos negócios
Ideia grupo empreendedoras e novos negócios
 
นิดชุดา
นิดชุดานิดชุดา
นิดชุดา
 
2012
20122012
2012
 
SerraEh
SerraEhSerraEh
SerraEh
 

Similar to Case Study - Establishing Visibility into Remote Vendor Access at Pelephone

ObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your ServersObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your ServersObserveIT
 
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...ObserveIT
 
Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...ObserveIT
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksCisco Mobility
 
Colaboración - la Nueva Plataforma para los Negocios
Colaboración - la Nueva Plataforma para los NegociosColaboración - la Nueva Plataforma para los Negocios
Colaboración - la Nueva Plataforma para los NegociosMundo Contact
 
A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloudLaurent Eschenauer
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss developmentbezpiecznik
 
Intersolv Mid-Market Business Cloud Analysis
Intersolv Mid-Market Business Cloud AnalysisIntersolv Mid-Market Business Cloud Analysis
Intersolv Mid-Market Business Cloud Analysisbfmx3js
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersCisco Mobility
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...Itris Automation Square
 
Disaster Solutions 2.0
Disaster Solutions 2.0Disaster Solutions 2.0
Disaster Solutions 2.0ferryheeneman
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wautersdynamicscom
 
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 Farms
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 FarmsOSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 Farms
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 FarmsKnowledge Cue
 

Similar to Case Study - Establishing Visibility into Remote Vendor Access at Pelephone (20)

ObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your ServersObserveIT Brochure - Like a Security Camera on your Servers
ObserveIT Brochure - Like a Security Camera on your Servers
 
Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
 
Ipanema
IpanemaIpanema
Ipanema
 
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
Case Study - System Access Audit Compliance at The Center to Promote HealthCa...
 
Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...Case Study - Auditing remote access of employees at a leading financial insti...
Case Study - Auditing remote access of employees at a leading financial insti...
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Colaboración - la Nueva Plataforma para los Negocios
Colaboración - la Nueva Plataforma para los NegociosColaboración - la Nueva Plataforma para los Negocios
Colaboración - la Nueva Plataforma para los Negocios
 
A short introduction to the cloud
A short introduction to the cloudA short introduction to the cloud
A short introduction to the cloud
 
Erp b
Erp bErp b
Erp b
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss development
 
Intersolv Mid-Market Business Cloud Analysis
Intersolv Mid-Market Business Cloud AnalysisIntersolv Mid-Market Business Cloud Analysis
Intersolv Mid-Market Business Cloud Analysis
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Week8 slide
Week8 slideWeek8 slide
Week8 slide
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
 
SOA OSB BPEL BPM Presentation
SOA OSB BPEL BPM PresentationSOA OSB BPEL BPM Presentation
SOA OSB BPEL BPM Presentation
 
Disaster Solutions 2.0
Disaster Solutions 2.0Disaster Solutions 2.0
Disaster Solutions 2.0
 
About Shenick
About ShenickAbout Shenick
About Shenick
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric WautersDynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
Dynamics NAV, Windows Azure & Windows Phone 7, Eric Wauters
 
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 Farms
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 FarmsOSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 Farms
OSP303 SharePoint 2010 – Planning High Availability for SharePoint 2010 Farms
 

More from ObserveIT

Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5ObserveIT
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramObserveIT
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...ObserveIT
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz WebinarObserveIT
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringObserveIT
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveITObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?ObserveIT
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App SecurityObserveIT
 

More from ObserveIT (20)

Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz Webinar
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity Monitoring
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
Xerox: Improving Data & App Security
Xerox: Improving Data & App SecurityXerox: Improving Data & App Security
Xerox: Improving Data & App Security
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Case Study - Establishing Visibility into Remote Vendor Access at Pelephone

  • 1. people audit Establishing Visibility into Remote Vendor Access Case Study at Pelephone Challenge Pelephone Pelephone, Israel’s #1 cellular phone carrier with 2.4 million subscribers manages a diverse IT server environment with over 1,200 servers in their Tel Aviv headquarters as well as in 3 IT hosting Industry: Cellular Telephony centers, running both customer-facing and business management Founded: 1986 applications. To achieve optimal QoS and operational efficiency, Headquarters: Tel Aviv, Israel assuring server stability and uptime is a top IT priority. “Our server platform is our lifeline,” commented Isaac Milshtein, Pelephone’s “With so many privileged Director of Engineering IT Operations. As is common in the telecom industry, Pelephone maintains many vendors accessing our custom-tailored 3rd party applications, providing content and value-add services to Pelephone subscribers. The numerous servers, it can be difficult privileged vendors who are remotely accessing these servers, and are to keep an eye on who’s responsible for software support and upgrades, further complicate doing what. Pelephone’s server management job. This provider used ObserveIT's ” Isaac Milshtein, Director Gateway solution, comprising of ObserveIT management console and multiple server agents. Hence, non-stop 24X7 SLA could be easily offered based on the detailed and granular auditing capabilities of Engineering IT Operations Pelephone the ObserveIT data recording solutions. Solution Pelephone turned to ObserveIT’s window session recording platform for the purpose of establishing visibility into remote session activity. The initial deployment was rolled out on five internal corporate applications in October of 2006. Less than one month later, ObserveIT already delivered on its promise when Pelephone’s experienced an overnight service outage on a mission-critical business application. The back-and-forth process between IT and the software vendor offered no solution. Consulting the ObserveIT session recordings not only brought immediate resolution to the problem, it also helped identify the responsible party and precise cause, thus allowing Pelephone to implement procedures to prevent its reoccurrence. Following this incident, Pelephone deployed ObserveIT on their entire production server environment. ObserveIT’s system administration benefits helped solve system outages of high-profile customer-facing applications. For an even stronger troubleshooting impact, Pelephone integrated ObserveIT with their CA Unicenter network monitoring system. As a result, any alert in the Unicenter management console includes a link to an ObserveIT window session playback for any active session at the time the alert was fired. With this tight integration, mid-level system operators are able to identify problems that in the past were only solved by senior system administrators, thus dramatically easing the forensic reconstruction of past events and reducing mean time to repair.
  • 2. Case Study people audit Establishing Visibility into Remote Vendor Access at Pelephone How it Works The ObserveIT Agent is installed on each of Pelephone’s 1,200 servers, which include NT4.0, Win2000 and Win2003. The agent remains idle until keyboard or mouse activity is detected in an NetOP or Terminal Services session. When activated, the agent takes negligible CPU overhead, capturing each user action. Screen snapshot and metadata about the state of the OS and application is analyzed and encoded using ObserveIT’s patented algorithms, and is sent via HTTP POST to the Application Server. The ObserveIT Application Server, an ASP.NET application running under IIS in the main Pelephone data center, accepts the data posted by the Agent, processes it, and sends it to the ObserveIT Database Server to be stored and indexed. The Application Server also periodically provides configuration information to the Agents. The ObserveIT Web Console, also an ASP.NET application, is the primary interface for Pelephone IT and Security users. Benefits Fast problem resolution and root-cause analysis with elimination of ‘finger-pointing’ Increased uptime reliability Dramatic increase in compliance with console and remote access usage policies Third-party transparency and reliability Future Directions Having deployed ObserveIT throughout their entire IT server environment, Pelephone is looking to further capitalize on this infrastructure. The full production deployment is being augmented by a software release validation deployment, allowing Pelephone to monitor, check and train users regarding all aspects of new system deployment. As an additional side benefit, Pelephone will also be using ObserveIT to validate service provider billing reports by comparing reported hours to actual activity. info@observeit-sys.com | www.observeit-sys.com