SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
IT Network Asset Discovery & Inventory
Diverse Network Communications, Inc.
IT Asset Tracking Problem
Data Center Assets are (usually) tracked using
spreadsheets
   They don’t track enough detail
   They don’t track enough detail
   Are very difficult to keep updated
   Are very difficult to keep updated
   At best are about 60 - 75 percent accurate
   At best are about 60 - 75 percent accurate
IT Operations staff usually are not provided with:
   The complete virtual to physical mapping
   The complete virtual to physical mapping
   What software is installed on each server
   What software is installed on each server
   Interdependencies between applications or servers
   Interdependencies between applications or servers
Conducting an IT Asset Discovery & Inventory is
usually:
   A manual process or mixed
   A manual process or mixed
   Very expensive and time consuming
   Very expensive and time consuming
   Inaccurate by the time its completed
   Inaccurate by the time its completed
   Compiled into a spreadsheet
   Compiled into a spreadsheet
          Copyright © 2009 Diverse Network Communications Inc.   2
Motivation for IT Asset
      Discovery & Inventory
Require the information to:
  Conduct TCO/ROI analysis of the current environment
  Conduct TCO/ROI analysis of the current environment
  Implement major infrastructure changes
  Implement major infrastructure changes
  Data Center Consolidation
  Data Center Consolidation
  Develop a Business Continuance/Disaster Recovery plans
  Develop a Business Continuance/Disaster Recovery plans
  As a part of a corporate mergers and acquisitions
  As a part of a corporate mergers and acquisitions
A need to understand what:
  Is really on each LAN segment (100%)
  Is really on each LAN segment (100%)
  The version and quantity of each asset type
  The version and quantity of each asset type
  The virtualization translation to physical infrastructure
  The virtualization translation to physical infrastructure
  (server, storage, network)
  (server, storage, network)
  What Applications are installed and versions
  What Applications are installed and versions
  Server and application interdependencies
  Server and application interdependencies
  Relationship between devices (server to switch to router)
  Relationship between devices (server to switch to router)

         Copyright © 2009 Diverse Network Communications Inc.   3
DNC’s IT Asset Discovery &
  Inventory Approach
Use Server and Application aware process to
extract important data
Perform discoveries using an “agent-less”
process
Automate all aspects of the data collection
Does not perform “Port Scanning”
Complete the Discovery, Inventory and
Analysis in one week
Leverage the collected data for additional
enhanced services:
  Detailed Systems and Application Mapping
  Enhance the deployment of ITIL based services
        Copyright © 2009 Diverse Network Communications Inc.   4
DNC’s Discovery Overview
One week basic engagement:
One week basic engagement:
   One day data gathering
   One day data gathering
   Four days for analysis and custom reports
   Four days for analysis and custom reports
Basic discovery service will scan three LAN segments (765
Basic discovery service will scan three LAN segments (765
possible network addresses)
possible network addresses)
Employ server and application aware discovery process
Employ server and application aware discovery process
Requirements:
Requirements:
   Access to your network to:
   Access to your network to:
      Network access to connect the discovery laptop
      Network access to connect the discovery laptop
      Or, Customer workstation to install the discovery software
      Or, Customer workstation to install the discovery software
   Access to privileged accounts
   Access to privileged accounts
   Will require about one hour from:
   Will require about one hour from:
      UNIX system administrator
      UNIX system administrator
      Windows system administrator
      Windows system administrator
      Storage administrator
      Storage administrator
      Network administrator
      Network administrator
      Security manager
      Security manager

           Copyright © 2009 Diverse Network Communications Inc.    5
General Discovery Information

 Server Discovery
 Storage Array
 Storage Area Network (SAN)
 Network Attached Storage
 Network Switches
 Network Routers
 Other Network Devices

       Copyright © 2009 Diverse Network Communications Inc.   6
Server Discovery Information

Hardware (CPUs, Type, Memory,
devices, etc)
Operating System Type, version, patch
level (HP-UX, IBM AIX, Sun Solaris,
Linux, OSF1, Windows)
Storage (file system, logical and
physical volumes, storage array, and
tape devices)
Network interfaces (including virtual)
        Copyright © 2009 Diverse Network Communications Inc. 7
Installed software and versions
SAN Discovery Information
Storage Area Network Switches configuration
  Brocade family
  Cisco MDS
Storage Arrays configurations:
  EMC Symmetrix / DMX
  EMC CLARiiON
  IBM ESS
  HP EVA
  Hitachi
  Sun
        Copyright © 2009 Diverse Network Communications Inc.   8
Other Network Devices Discovery
          Information
 Network Printers
 Cisco Routers
 Cisco Switches
 Wireless access points




       Copyright © 2009 Diverse Network Communications Inc.   9
Deliverables

Microsoft Access database containing
discovery and Inventory data
Standard reports about the assets
Three custom reports




      Copyright © 2009 Diverse Network Communications Inc.   10
Benefits
Remove the human factor from the data gathering
Tedious process for IT Operations staff
Higher accuracy of data
Better consistency of the data quality
Faster results for decision support
Assist with the annual:
  Hardware and software maintenance budgeting
  Hardware and software maintenance budgeting
  License management decisions
  License management decisions
Can be used to improve ITIL process:
  Configuration management audits
  Configuration management audits
  Upgrade plan decisions
  Upgrade plan decisions
  Security audits
  Security audits
  Disaster Recovery audits/planning/recovery
  Disaster Recovery audits/planning/recovery
  Regulatory Issues
  Regulatory Issues
         Copyright © 2009 Diverse Network Communications Inc.   11
Questions




Irwin.Kirmer@DnciConsulting.com
         (303) 881-8154
 Copyright © 2009 Diverse Network Communications Inc.   12

Contenu connexe

Tendances

Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIben Rodriguez
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directoryPrince JabaKumar
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computingpallavikhandekar212
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersIben Rodriguez
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1Anne Starr
 
History of data centric transformation preso
History of data centric transformation presoHistory of data centric transformation preso
History of data centric transformation presoDarren Pulsipher
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsLiz Warner
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryAFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryCraig Gross, CFA, CTP
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Tripwire
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2SolarWinds
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centersbega karadza
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgEric Vanderburg
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administratorSyaiful Ahdan
 

Tendances (20)

Incident Handling in a BYOD Environment
Incident Handling in a BYOD EnvironmentIncident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
 
Monitoring active-directory
Monitoring active-directoryMonitoring active-directory
Monitoring active-directory
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
Hp open view
Hp open viewHp open view
Hp open view
 
Enterprise network management
Enterprise network managementEnterprise network management
Enterprise network management
 
History of data centric transformation preso
History of data centric transformation presoHistory of data centric transformation preso
History of data centric transformation preso
 
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed LoopsPlatform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryAFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
 
Cloud Computing and Data Centers
Cloud Computing and Data CentersCloud Computing and Data Centers
Cloud Computing and Data Centers
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
Chapter14
Chapter14Chapter14
Chapter14
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
 

En vedette

Server Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary ToolsServer Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary Toolselliando dias
 
Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)Brian Brazil
 
Infrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And DesignInfrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And DesignAlan McSweeney
 
Enterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over EverythingEnterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over EverythingTeamQuest Corporation
 
Inventory and Asset Management
Inventory and Asset ManagementInventory and Asset Management
Inventory and Asset ManagementJeff Lewandowski
 
Fusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-septemberFusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-septemberGonéri Le Bouder
 
Methodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity PlanningMethodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity PlanningLeonid Grinshpan, Ph.D.
 
Sumerian IT Capacity Planning Research
Sumerian IT Capacity Planning ResearchSumerian IT Capacity Planning Research
Sumerian IT Capacity Planning ResearchSumerian
 
ITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with HelpdeskITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with HelpdeskIntratek Solutions
 
AssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick GuideAssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick GuideGarrett Conti
 
Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008John Allspaw
 
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning processTools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning processRohan Monis
 
EM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM MetricsEM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM MetricsMaaz Anjum
 
Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...Dr. Kim (Kyllesbech Larsen)
 
Capacity Planning
Capacity PlanningCapacity Planning
Capacity PlanningMOHD ARISH
 

En vedette (16)

Server Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary ToolsServer Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary Tools
 
Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)
 
Infrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And DesignInfrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And Design
 
Enterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over EverythingEnterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over Everything
 
Inventory and Asset Management
Inventory and Asset ManagementInventory and Asset Management
Inventory and Asset Management
 
Fusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-septemberFusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-september
 
Methodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity PlanningMethodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity Planning
 
Sumerian IT Capacity Planning Research
Sumerian IT Capacity Planning ResearchSumerian IT Capacity Planning Research
Sumerian IT Capacity Planning Research
 
ITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with HelpdeskITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with Helpdesk
 
AssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick GuideAssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick Guide
 
Asset Inventory
Asset InventoryAsset Inventory
Asset Inventory
 
Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008
 
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning processTools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning process
 
EM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM MetricsEM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM Metrics
 
Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...
 
Capacity Planning
Capacity PlanningCapacity Planning
Capacity Planning
 

Similaire à IT Network Asset Discovery & Inventory

FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxssuser20fcbe
 
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange PlatformTrusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platformdreamforce2006
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2webhostingguy
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciacxKinAnx
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre HillScaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hillwebhostingguy
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiDataWorks Summit
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Splunk
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systemsSZ Lin
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds5nine
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”MarketingArrowECS_CZ
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 

Similaire à IT Network Asset Discovery & Inventory (20)

FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange PlatformTrusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platform
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Presentation ciac
Presentation   ciacPresentation   ciac
Presentation ciac
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre HillScaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hill
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Software update for embedded systems
Software update for embedded systemsSoftware update for embedded systems
Software update for embedded systems
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 

IT Network Asset Discovery & Inventory

  • 1. IT Network Asset Discovery & Inventory Diverse Network Communications, Inc.
  • 2. IT Asset Tracking Problem Data Center Assets are (usually) tracked using spreadsheets They don’t track enough detail They don’t track enough detail Are very difficult to keep updated Are very difficult to keep updated At best are about 60 - 75 percent accurate At best are about 60 - 75 percent accurate IT Operations staff usually are not provided with: The complete virtual to physical mapping The complete virtual to physical mapping What software is installed on each server What software is installed on each server Interdependencies between applications or servers Interdependencies between applications or servers Conducting an IT Asset Discovery & Inventory is usually: A manual process or mixed A manual process or mixed Very expensive and time consuming Very expensive and time consuming Inaccurate by the time its completed Inaccurate by the time its completed Compiled into a spreadsheet Compiled into a spreadsheet Copyright © 2009 Diverse Network Communications Inc. 2
  • 3. Motivation for IT Asset Discovery & Inventory Require the information to: Conduct TCO/ROI analysis of the current environment Conduct TCO/ROI analysis of the current environment Implement major infrastructure changes Implement major infrastructure changes Data Center Consolidation Data Center Consolidation Develop a Business Continuance/Disaster Recovery plans Develop a Business Continuance/Disaster Recovery plans As a part of a corporate mergers and acquisitions As a part of a corporate mergers and acquisitions A need to understand what: Is really on each LAN segment (100%) Is really on each LAN segment (100%) The version and quantity of each asset type The version and quantity of each asset type The virtualization translation to physical infrastructure The virtualization translation to physical infrastructure (server, storage, network) (server, storage, network) What Applications are installed and versions What Applications are installed and versions Server and application interdependencies Server and application interdependencies Relationship between devices (server to switch to router) Relationship between devices (server to switch to router) Copyright © 2009 Diverse Network Communications Inc. 3
  • 4. DNC’s IT Asset Discovery & Inventory Approach Use Server and Application aware process to extract important data Perform discoveries using an “agent-less” process Automate all aspects of the data collection Does not perform “Port Scanning” Complete the Discovery, Inventory and Analysis in one week Leverage the collected data for additional enhanced services: Detailed Systems and Application Mapping Enhance the deployment of ITIL based services Copyright © 2009 Diverse Network Communications Inc. 4
  • 5. DNC’s Discovery Overview One week basic engagement: One week basic engagement: One day data gathering One day data gathering Four days for analysis and custom reports Four days for analysis and custom reports Basic discovery service will scan three LAN segments (765 Basic discovery service will scan three LAN segments (765 possible network addresses) possible network addresses) Employ server and application aware discovery process Employ server and application aware discovery process Requirements: Requirements: Access to your network to: Access to your network to: Network access to connect the discovery laptop Network access to connect the discovery laptop Or, Customer workstation to install the discovery software Or, Customer workstation to install the discovery software Access to privileged accounts Access to privileged accounts Will require about one hour from: Will require about one hour from: UNIX system administrator UNIX system administrator Windows system administrator Windows system administrator Storage administrator Storage administrator Network administrator Network administrator Security manager Security manager Copyright © 2009 Diverse Network Communications Inc. 5
  • 6. General Discovery Information Server Discovery Storage Array Storage Area Network (SAN) Network Attached Storage Network Switches Network Routers Other Network Devices Copyright © 2009 Diverse Network Communications Inc. 6
  • 7. Server Discovery Information Hardware (CPUs, Type, Memory, devices, etc) Operating System Type, version, patch level (HP-UX, IBM AIX, Sun Solaris, Linux, OSF1, Windows) Storage (file system, logical and physical volumes, storage array, and tape devices) Network interfaces (including virtual) Copyright © 2009 Diverse Network Communications Inc. 7 Installed software and versions
  • 8. SAN Discovery Information Storage Area Network Switches configuration Brocade family Cisco MDS Storage Arrays configurations: EMC Symmetrix / DMX EMC CLARiiON IBM ESS HP EVA Hitachi Sun Copyright © 2009 Diverse Network Communications Inc. 8
  • 9. Other Network Devices Discovery Information Network Printers Cisco Routers Cisco Switches Wireless access points Copyright © 2009 Diverse Network Communications Inc. 9
  • 10. Deliverables Microsoft Access database containing discovery and Inventory data Standard reports about the assets Three custom reports Copyright © 2009 Diverse Network Communications Inc. 10
  • 11. Benefits Remove the human factor from the data gathering Tedious process for IT Operations staff Higher accuracy of data Better consistency of the data quality Faster results for decision support Assist with the annual: Hardware and software maintenance budgeting Hardware and software maintenance budgeting License management decisions License management decisions Can be used to improve ITIL process: Configuration management audits Configuration management audits Upgrade plan decisions Upgrade plan decisions Security audits Security audits Disaster Recovery audits/planning/recovery Disaster Recovery audits/planning/recovery Regulatory Issues Regulatory Issues Copyright © 2009 Diverse Network Communications Inc. 11
  • 12. Questions Irwin.Kirmer@DnciConsulting.com (303) 881-8154 Copyright © 2009 Diverse Network Communications Inc. 12