Soumettre la recherche
Mettre en ligne
IT Network Asset Discovery & Inventory
•
1 j'aime
•
779 vues
I
ikirmer
Suivre
IT Network Asset Discovery & Inventory using agent-less technology.
Lire moins
Lire la suite
Signaler
Partager
Signaler
Partager
1 sur 12
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Tech 2 Tech: Network performance
Tech 2 Tech: Network performance
Jisc
Remote Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
Mohit Gupta (Advisor – Business | IT Strategy | Delivery)
Extending ADDM Discovery to Firewalls, Applications and Routers
Extending ADDM Discovery to Firewalls, Applications and Routers
Wes Moskal-Fitzpatrick
Ece seminar 20070927
Ece seminar 20070927
Todd Deshane
System analyst
System analyst
returnasap
Introduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
Software Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and Control
Bastian Fischer
Dell CloudIQ provides a single console for proactive monitoring and had negli...
Dell CloudIQ provides a single console for proactive monitoring and had negli...
Principled Technologies
Recommandé
Tech 2 Tech: Network performance
Tech 2 Tech: Network performance
Jisc
Remote Access For Desktop With Encryption System (
Remote Access For Desktop With Encryption System (
Mohit Gupta (Advisor – Business | IT Strategy | Delivery)
Extending ADDM Discovery to Firewalls, Applications and Routers
Extending ADDM Discovery to Firewalls, Applications and Routers
Wes Moskal-Fitzpatrick
Ece seminar 20070927
Ece seminar 20070927
Todd Deshane
System analyst
System analyst
returnasap
Introduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
Software Defined Substation Intelligence, Automation and Control
Software Defined Substation Intelligence, Automation and Control
Bastian Fischer
Dell CloudIQ provides a single console for proactive monitoring and had negli...
Dell CloudIQ provides a single console for proactive monitoring and had negli...
Principled Technologies
Incident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
Iben Rodriguez
Monitoring active-directory
Monitoring active-directory
Prince JabaKumar
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
pallavikhandekar212
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Anne Starr
Hp open view
Hp open view
Ganesh Kumar Veerla
Enterprise network management
Enterprise network management
ManageEngine, Zoho Corporation
History of data centric transformation preso
History of data centric transformation preso
Darren Pulsipher
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
Liz Warner
501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
Craig Gross, CFA, CTP
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Tripwire
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
SolarWinds
Cloud Computing and Data Centers
Cloud Computing and Data Centers
bega karadza
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Chapter14
Chapter14
Muhammad Ahad
Deployment websese
Deployment websese
thanglx
2020 Vision For Your Network
2020 Vision For Your Network
Dell World
Meeting 2 introdcution network administrator
Meeting 2 introdcution network administrator
Syaiful Ahdan
Server Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary Tools
elliando dias
Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)
Brian Brazil
Contenu connexe
Tendances
Incident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
Iben Rodriguez
Monitoring active-directory
Monitoring active-directory
Prince JabaKumar
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
pallavikhandekar212
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
Iben Rodriguez
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Anne Starr
Hp open view
Hp open view
Ganesh Kumar Veerla
Enterprise network management
Enterprise network management
ManageEngine, Zoho Corporation
History of data centric transformation preso
History of data centric transformation preso
Darren Pulsipher
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
Liz Warner
501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
Craig Gross, CFA, CTP
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Tripwire
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
SolarWinds
Cloud Computing and Data Centers
Cloud Computing and Data Centers
bega karadza
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
Chapter14
Chapter14
Muhammad Ahad
Deployment websese
Deployment websese
thanglx
2020 Vision For Your Network
2020 Vision For Your Network
Dell World
Meeting 2 introdcution network administrator
Meeting 2 introdcution network administrator
Syaiful Ahdan
Tendances
(20)
Incident Handling in a BYOD Environment
Incident Handling in a BYOD Environment
Monitoring active-directory
Monitoring active-directory
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Hp open view
Hp open view
Enterprise network management
Enterprise network management
History of data centric transformation preso
History of data centric transformation preso
Platform Observability and Infrastructure Closed Loops
Platform Observability and Infrastructure Closed Loops
501 ch 4 securing your network
501 ch 4 securing your network
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
Network Troubleshooting - Part 2
Network Troubleshooting - Part 2
Cloud Computing and Data Centers
Cloud Computing and Data Centers
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Chapter14
Chapter14
Deployment websese
Deployment websese
2020 Vision For Your Network
2020 Vision For Your Network
Meeting 2 introdcution network administrator
Meeting 2 introdcution network administrator
En vedette
Server Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary Tools
elliando dias
Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)
Brian Brazil
Infrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And Design
Alan McSweeney
Enterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over Everything
TeamQuest Corporation
Inventory and Asset Management
Inventory and Asset Management
Jeff Lewandowski
Fusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-september
Gonéri Le Bouder
Methodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity Planning
Leonid Grinshpan, Ph.D.
Sumerian IT Capacity Planning Research
Sumerian IT Capacity Planning Research
Sumerian
ITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with Helpdesk
Intratek Solutions
AssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick Guide
Garrett Conti
Asset Inventory
Asset Inventory
Andrew Harrison
Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008
John Allspaw
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning process
Rohan Monis
EM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM Metrics
Maaz Anjum
Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...
Dr. Kim (Kyllesbech Larsen)
Capacity Planning
Capacity Planning
MOHD ARISH
En vedette
(16)
Server Inventory Using Free, Open Source, and Proprietary Tools
Server Inventory Using Free, Open Source, and Proprietary Tools
Provisioning and Capacity Planning (Travel Meets Big Data)
Provisioning and Capacity Planning (Travel Meets Big Data)
Infrastructure And Application Consolidation Analysis And Design
Infrastructure And Application Consolidation Analysis And Design
Enterprise Capacity Optimization - Capacity Management Over Everything
Enterprise Capacity Optimization - Capacity Management Over Everything
Inventory and Asset Management
Inventory and Asset Management
Fusioninventory openworldforum-paris-2011-september
Fusioninventory openworldforum-paris-2011-september
Methodology Of Enterprise Applications Capacity Planning
Methodology Of Enterprise Applications Capacity Planning
Sumerian IT Capacity Planning Research
Sumerian IT Capacity Planning Research
ITInfo -- IT Inventory & Asset Management System with Helpdesk
ITInfo -- IT Inventory & Asset Management System with Helpdesk
AssetWorks Fixed Asset Inventory Management Quick Guide
AssetWorks Fixed Asset Inventory Management Quick Guide
Asset Inventory
Asset Inventory
Capacity Planning for Web Operations - Web20 Expo 2008
Capacity Planning for Web Operations - Web20 Expo 2008
Tools for capacity planning, measurement of capacity, capacity planning process
Tools for capacity planning, measurement of capacity, capacity planning process
EM12c: Capacity Planning with OEM Metrics
EM12c: Capacity Planning with OEM Metrics
Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity planning in mobile data networks experiencing exponential growth in ...
Capacity Planning
Capacity Planning
Similaire à IT Network Asset Discovery & Inventory
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
ssuser20fcbe
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platform
dreamforce2006
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
webhostingguy
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
Presentation ciac
Presentation ciac
xKinAnx
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
Internship msc cs
Internship msc cs
Pooja Bhojwani
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hill
webhostingguy
network-management Web base.ppt
network-management Web base.ppt
AssadLeo1
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
DataWorks Summit
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Splunk
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
Anna Liu
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk
Software update for embedded systems
Software update for embedded systems
SZ Lin
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
5nine
VMware: my jsme “software defined”
VMware: my jsme “software defined”
MarketingArrowECS_CZ
Brighttalk understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
Andrew White
Similaire à IT Network Asset Discovery & Inventory
(20)
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
Trusted Reliability & Performance with the AppExchange Platform
Trusted Reliability & Performance with the AppExchange Platform
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Slides for Week 1 - Lec 2
Slides for Week 1 - Lec 2
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
Presentation ciac
Presentation ciac
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Internship msc cs
Internship msc cs
Scaleable Enterprise Computing Andre Hill
Scaleable Enterprise Computing Andre Hill
network-management Web base.ppt
network-management Web base.ppt
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Software update for embedded systems
Software update for embedded systems
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
VMware: my jsme “software defined”
VMware: my jsme “software defined”
Brighttalk understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
IT Network Asset Discovery & Inventory
1.
IT Network Asset
Discovery & Inventory Diverse Network Communications, Inc.
2.
IT Asset Tracking
Problem Data Center Assets are (usually) tracked using spreadsheets They don’t track enough detail They don’t track enough detail Are very difficult to keep updated Are very difficult to keep updated At best are about 60 - 75 percent accurate At best are about 60 - 75 percent accurate IT Operations staff usually are not provided with: The complete virtual to physical mapping The complete virtual to physical mapping What software is installed on each server What software is installed on each server Interdependencies between applications or servers Interdependencies between applications or servers Conducting an IT Asset Discovery & Inventory is usually: A manual process or mixed A manual process or mixed Very expensive and time consuming Very expensive and time consuming Inaccurate by the time its completed Inaccurate by the time its completed Compiled into a spreadsheet Compiled into a spreadsheet Copyright © 2009 Diverse Network Communications Inc. 2
3.
Motivation for IT
Asset Discovery & Inventory Require the information to: Conduct TCO/ROI analysis of the current environment Conduct TCO/ROI analysis of the current environment Implement major infrastructure changes Implement major infrastructure changes Data Center Consolidation Data Center Consolidation Develop a Business Continuance/Disaster Recovery plans Develop a Business Continuance/Disaster Recovery plans As a part of a corporate mergers and acquisitions As a part of a corporate mergers and acquisitions A need to understand what: Is really on each LAN segment (100%) Is really on each LAN segment (100%) The version and quantity of each asset type The version and quantity of each asset type The virtualization translation to physical infrastructure The virtualization translation to physical infrastructure (server, storage, network) (server, storage, network) What Applications are installed and versions What Applications are installed and versions Server and application interdependencies Server and application interdependencies Relationship between devices (server to switch to router) Relationship between devices (server to switch to router) Copyright © 2009 Diverse Network Communications Inc. 3
4.
DNC’s IT Asset
Discovery & Inventory Approach Use Server and Application aware process to extract important data Perform discoveries using an “agent-less” process Automate all aspects of the data collection Does not perform “Port Scanning” Complete the Discovery, Inventory and Analysis in one week Leverage the collected data for additional enhanced services: Detailed Systems and Application Mapping Enhance the deployment of ITIL based services Copyright © 2009 Diverse Network Communications Inc. 4
5.
DNC’s Discovery Overview One
week basic engagement: One week basic engagement: One day data gathering One day data gathering Four days for analysis and custom reports Four days for analysis and custom reports Basic discovery service will scan three LAN segments (765 Basic discovery service will scan three LAN segments (765 possible network addresses) possible network addresses) Employ server and application aware discovery process Employ server and application aware discovery process Requirements: Requirements: Access to your network to: Access to your network to: Network access to connect the discovery laptop Network access to connect the discovery laptop Or, Customer workstation to install the discovery software Or, Customer workstation to install the discovery software Access to privileged accounts Access to privileged accounts Will require about one hour from: Will require about one hour from: UNIX system administrator UNIX system administrator Windows system administrator Windows system administrator Storage administrator Storage administrator Network administrator Network administrator Security manager Security manager Copyright © 2009 Diverse Network Communications Inc. 5
6.
General Discovery Information
Server Discovery Storage Array Storage Area Network (SAN) Network Attached Storage Network Switches Network Routers Other Network Devices Copyright © 2009 Diverse Network Communications Inc. 6
7.
Server Discovery Information Hardware
(CPUs, Type, Memory, devices, etc) Operating System Type, version, patch level (HP-UX, IBM AIX, Sun Solaris, Linux, OSF1, Windows) Storage (file system, logical and physical volumes, storage array, and tape devices) Network interfaces (including virtual) Copyright © 2009 Diverse Network Communications Inc. 7 Installed software and versions
8.
SAN Discovery Information Storage
Area Network Switches configuration Brocade family Cisco MDS Storage Arrays configurations: EMC Symmetrix / DMX EMC CLARiiON IBM ESS HP EVA Hitachi Sun Copyright © 2009 Diverse Network Communications Inc. 8
9.
Other Network Devices
Discovery Information Network Printers Cisco Routers Cisco Switches Wireless access points Copyright © 2009 Diverse Network Communications Inc. 9
10.
Deliverables Microsoft Access database
containing discovery and Inventory data Standard reports about the assets Three custom reports Copyright © 2009 Diverse Network Communications Inc. 10
11.
Benefits Remove the human
factor from the data gathering Tedious process for IT Operations staff Higher accuracy of data Better consistency of the data quality Faster results for decision support Assist with the annual: Hardware and software maintenance budgeting Hardware and software maintenance budgeting License management decisions License management decisions Can be used to improve ITIL process: Configuration management audits Configuration management audits Upgrade plan decisions Upgrade plan decisions Security audits Security audits Disaster Recovery audits/planning/recovery Disaster Recovery audits/planning/recovery Regulatory Issues Regulatory Issues Copyright © 2009 Diverse Network Communications Inc. 11
12.
Questions Irwin.Kirmer@DnciConsulting.com
(303) 881-8154 Copyright © 2009 Diverse Network Communications Inc. 12
Télécharger maintenant