SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
computerworld
                                         TechnologY
                                          BrIefIngS
                                         IT ServIce ManageMenT



Quick Insights on Consolidation,                                         Data Center and IT
                                                                         Service Management
Virtualization, Spending,                                                Syndrome
Business Service Management,                                             Enabling Data Center and IT
SLAs and Cloud Computing                                                 Service Management for the
                                                                         Mid-tier Enterprise
                                                                         Companies rely on the data center and IT to
Today’s mid-tier enterprises are charged with the challenge of pro-      provide mission-critical services like e-mail, Web
viding mission critical services in the face of increasing technologi-   and voice. However, assuring service delivery and
cal complexity and modest budgets. Aligning resources, employing         reliability becomes increasingly difficult as the
best practices and leveraging technologies can help IT organiza-         necessary growth in data center virtualization,
tions cut through the complexity, be more responsive to business         distributed and mobile access, cloud-based appli-
requirements and meet service level expectations.                        cations and outsourced service technologies fuel
                                                                         operational complexity. Data center and IT organi-
                                                                         zations respond by evolving processes and build-
This guide is designed to provide mid-tier enterprises with a quick
                                                                         ing out workgroup specialties such as networks,
read and insights on the most pressing issues, practices and             operations, applications, security and help desk
considerations regarding consolidation, virtualization, spending,        that serve to scale management. Unfortunately,
business service management, service level agreements and cloud          this can also produce departmental silos, reduced
computing. Each topic provides pertinent takeaways and an online         IT responsiveness and blurred service capacity.
reference to facilitate further examination. You’ll also learn how       Furthermore, enterprise expansion often drives
advancing IT organizations from technology-based cost centers            the procurement of specialized tools designed
into service-oriented business enablers can yield greater support        to manage the infrastructure from a component,
                                                                         rather than a service, perspective.
of business requirements, reduced risk and improved operational
efficiencies even in the midst of budget cuts and added resource
                                                                         The growth in data center and IT complexity,
constraints.                                                             potential blind spots and inefficiencies due to
                                                                         operational silos, and disparate IT management
   Brought to you                                                        tools — or in some cases the lack of tools in
   compliments of                                                        mid-tier IT organizations — contribute to service
                                                                         delivery risks, outages and degradation. These is-
                                                                         sues diminish an effective means to monitor and
                                                                         optimize service levels, manage change, quickly
                                                                         find and resolve the root cause of problems, and
                                                                         automate compliance efforts.



            Real-WoRld InsIghts fRom ComputeRWoRld stRategIC paRtneR Content
To improve service reliability,         vices, or the applications or databases? If so, did
                                            organizations must be able to           the change occur from a known admin account
                                            see and manage all aspects of           and workstation? Is the virtualization server in
                                            performance, availability and           the process of moving the virtual host containing
                                            security related to that service.       the application or the database server from one
                                            This requires a fully integrated        physical machine to another? Are there known
                                            approach to capture, correlate          unpatched security vulnerabilities on the server?
                                            and manage operational data,            If the problem is caused by a security vulner-
                                            consolidate core IT manage-             ability, how was it exploited, who is the attacker,
                                            ment functions, and automate            and who else was affected? Are any workstations
                                            service definition and SLA              showing abnormal traffic flow?
                                            tracking. Until now, available
IT management tools have either been too expensive, very labor intensive or         In many cases, the problem is indeed one of
lacking in required integration.                                                    the above. Sometimes, however, another user is
                                                                                    downloading a large file or watching streaming
The AccelOps all-in-one data center and IT service management solution              media that is clogging up a shared router inter-
provides infrastructure oversight and controls to advance service reliability       face, and the problem automatically goes away
across performance, availability and security dimensions. Delivered as virtual      when the other user is done.
appliance software or Software as a Service (SaaS), AccelOps links the infra-       The question is, how quickly can problems be
structure directly to business and business services. This brings the manage-       pinpointed, prioritized and resolved to maintain
ment of the data center/IT as service to the forefront and, in turn, enables the    service levels with the best use of IT staff and
organization to better focus on quality, uptime and efficiency.                     technology resources?

AccelOps puts the “who, what, where, when, why and how” at the operator’s           Disparate IT management tools cannot cor-
fingertips to monitor and enhance service levels, better optimize resources         relate the data effectively or fast enough. The
and further reduce business risk. AccelOps combines discovery, data aggrega-        real problem of inferring the true root cause is
tion, correlation, out-of-the-box analytics, data management and reporting to       often left to the user. Even after the root cause is
yield a single pane of glass into data center and IT operations and services.       identified, getting to the true identity and current
Integrated functionality includes the following:                                    location of the offending user or host is another
                                                                                    matter, as this information is spread across
  n Business service management and service mapping                                 different management domains such as OS logs,
  n Performance management / network behavior analysis                              router configurations, VPN logs, etc. This lack
  n Availability management / service level agreement                               of automation and real-time visibility affects the
  n Security information event management                                           organization’s capacity to keep an IT infrastruc-
  n Change control / automated CMDB                                                 ture healthy, with minimal service level disruption
  n Event / log consolidation with cross-correlation                                and degradation.
  n Identity, access and location management with

    directory service integration                                                   The AccelOps Approach
  n Network visualization and enterprise search                                     AccelOps delivers a seamlessly integrated, uni-
  n Compliance and governance automation                                            fied and service-oriented platform for the collec-
                                                                                    tion, monitoring, precise drill-down, root-cause
Why Disparate IT Management Tools Do Not Suffice                                    analysis and detailed reporting on all IT events/
To fully understand the necessity of holistically managing the data center and      logs and performance metrics that cuts through
IT, consider the following scenario: A remote branch office worker reports a        networks, systems, applications, vendors and
slow application. Is the application really overloading the host, or is the data-   technology boundaries. It provides data centers
base server not responding fast enough? Is there another application on the         and IT organizations the full context (who, what,
same server that is competing for resources? Are the networks in between OK?        where, when, why and how) at their fingertips at
Is the storage network between the database server and the storage OK? Are          any given time, and the necessary confidence
the supporting network infrastructure services such as DNS and the domain           and control in service delivery.
controllers responsive? Did someone recently make a change to network de-                                         ContInued on page 6



TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                   2
Service Level Matters                                                                 Virtualization and
SLA Definitions and Solutions
                                                                                      Consolidation
A service-level agreement (SLA) serves as the foundation for the level of ser-        Virtualization 101
vice expected by a customer from a supplier or for service-driven organizations       Virtualization technologies provide a layer of
among business departments and IT. SLAs document the service, capabilities            abstraction between hardware, devices, systems
and reliability, as well as requirements, performance measurement, remedies and       and the software running on them. The three basic
penalties. SLAs should be designed to minimize or eliminate misinterpretation.        categories of virtualization — storage, network and
                                                                                      server — are the most common applications of the
Service requisites should specify what services are provided, availability details,   technology today. Virtualization offers a logical view
the duties of each party, simple metrics, reporting processes, escalation and         of computing resources rather than a conventional
remedy procedures, dispute resolution, and cost/service tradeoffs. SLAs should        physical view.
be living documents with mechanisms in place for periodic review and updating.
learn more about slas                                                                 Virtualization helps IT departments do more with
http://www.cio.com/article/128900/sla_definitions_and_solutions                       less by collecting disparate computing resources
                                                                                      into shareable resources. This is presented in pools
The IT Management Maturity Curve                                                      of storage, manageable network bandwidth, and the
IT service management aligns information technology processes, controls and           allocation of server operating systems, processors
priorities to meet business demands while offering the promise of reducing risks      and memory. This results in a reduction in hard-
of service disruptions, realizing greater cost savings and enabling more assured      ware, energy to cool that hardware and, potentially,
service expansion. The concept of IT being run as a service, as opposed to            personnel to manage it. However, virtualization can
functional infrastructure and application silos, has gained significant adoption      present challenges such as performance conflicts
by many organizations. Leading IT standards such as ITIL, ISO and COBIT all           and management deficiencies. Organizations need
support the tenants of IT service management to better integrate IT according to      to understand how the technology changes the way
business objectives.                                                                  a data center is managed, administered and oper-
                                                                                      ated.
CIOs, IT executives and data center directors seek to implement IT service
                                                                                      learn more about virtualization, from
management best practices to improve service responsiveness and drive down
                                                                                      benefits to implementation challenges
operational costs. Where your organization is positioned on the IT management         http://www.cio.com/article/40701/aBC_an_Introduc-
maturity curve regarding activities and capabilities can provide some insight as      tion_to_virtualization
to where to invest in respective processes and supporting management tools that
will progress service reliability, delivery and enhancement.                          Virtual Certainties
take a moment to assess your It management maturity stage                             The benefits of virtualization are well known in
http://survey.constantcontact.com/survey/a07e2hvwp6kfszlfj46/start                    terms of economics, consolidating resources,
                                                                                      infrastructure simplification and green IT — but it
No Virtualization Skills? Better Get Started                                          is not a panacea. Organizations must consider the
Virtualization skills are hot and in demand. While virtualization know-how will       impact virtualization will have on system adminis-
eventually become part of the standard skill set for system administrators,           tration costs and whether the technology is likely
today’s IT managers must dedicate resources to virtualization exclusively. To         to increase complexity rather than reduce it. For
avoid losing virtualization experts to other employers, companies should strike       example, server virtualization has operational
a balance between dedicated staff and domain expertise. Cross-team working            benefits, as well as risks. As with any technology,
groups, for example, can help companies leverage skill sets and optimize virtual-     virtualization is only as good as the planning and
ization investments.                                                                  management that organizations put behind it.
learn more about how virtualization should shape your hiring practices                get a more holistic view of virtualization technologies
http://www.cio.com/article/495322/no_virtualization_skills_Better_get_                http://www.theinfoboom.com/pov/editor/virtual-
started?page=1&taxonomyId=1448                                                        certainties




TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                            3
Best Practices                                                                          structure, and the relationships among IT resources
                                                                                        and business services. As an IT management offering,
                                                                                        they provide a number of features and benefits:
How to Prioritize IT Spending
During an Economic Recession                                                              n Infrastructure management and instrumentation
Reduced spending requires an examination of IT priorities – taking stock of what
                                                                                          n Monitoring, alerting, event management and
one has and assessing choices. At the top of the list for cost savings is consolida-
                                                                                            capacity planning
tion across and within data centers, beginning with server and storage virtualiza-
                                                                                          n Improved service quality by implementing best
tion. This generally means reducing the number of parts and redundancies by
                                                                                            practices and preempting issues
assessing the following:
                                                                                          n Faster problem resolution in terms of identify-

                                                                                            ing resources and determining diagnosis (root
  n Number of vendors / suppliers (economies)
                                                                                            cause)
  n Number of applications needed (license reduction)
                                                                                          n Enhanced compliance by automating best-
  n Renegotiation of vendor contracts (cost reduction)
                                                                                            practice processes that support regulatory and
  n The age of the equipment and associated cost of maintenance (replacement
                                                                                            industry mandates
    options)
  n Data management (data stores, de-duplication and analysis)                          learn about business service management benefits
  n Processes (operational efficiency and effectiveness)
                                                                                        http://www.cio.com/article/203700/data_Center_opti-
                                                                                        mization_the_value_of_Business_service_management?
                                                                                        page=1&taxonomyId=1448
Additional downturn spending considerations should take into account portfo-
lio management, capacity planning and infrastructure management, as well as             Network Management:
security. Portfolio management serves to optimize expenditures by rationalizing         Tips for Managing Costs
the value and feature enhancement requests among enterprise applications. IT            Steady infrastructure cost growth, beyond power and
should also consider tools for more intelligently managing data, investigate cloud      storage, is usually due to expanded network demands
computing and consider SaaS applications for capabilities that are less expen-          resulting from physical expansion or increased
sive to outsource. Well-designed identity management and security controls can          connectivity. Network management becomes more
also help reduce potential risks due to employee turnover and use of outsourced         complex as network expansion — such as an increase
services.                                                                               in the number of sites, users, devices, applications or
                                                                                        services — and respective costs grow.
By continuing to invest wisely during a downturn, organizations can strengthen
their long-term future and reduce costs.                                                In order to control costs and maintain reliability,
get more tips for It cost-cutting                                                       one needs to know how efficiently the network is
http://www.cio.com/article/464725/how_to_prioritize_It_spending_during_aneco-           performing and the location of network performance
nomic_Recession?page=1&taxonomyId=1448                                                  bottlenecks. One example is trending bandwidth
                                                                                        consumption per application, server, network loca-
Data Center Optimization: The Value of                                                  tion, user/group, time of day, etc.
Business Service Management
Organizations seek to better optimize the data center and reduce costs by assess-       Once this is determined, there are many technolo-
ing applications, platforms, capacity and operations. It is important to consider       gies that can be applied to reduce costs, prevent
the value of the business services supported by a given application and, as such,       additional growth or reduce potential problems. Two
the business value behind your technology. Two factors determine the business           such methods are network monitoring and virtualiza-
value of a resource: knowing which business services and respective processes a         tion. Network monitoring tools across wired, wireless
resource supports, and understanding the business criticality of those services as      and other connectivity services, such as VPN and
measured by the impact of performance degradation or temporary loss of                  VoIP, can help manage bandwidth consumption and
those services.                                                                         reduce performance bottlenecks. Network consolida-
                                                                                        tion via virtualization can improve network utilization,
Business service management (BSM) solutions facilitate the transition from a            efficiency and agility by reconfiguring the network in-
technically-oriented, platform-based and silo management approach to a horizon-         frastructure to deliver services from a pool of shared
tal, business-oriented approach. BSM solutions offer a holistic view of the IT infra-   network, server and storage resources.



TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                          4
The ultimate objective in network management and cost control is to understand        myth no. 2: all you need is your credit card. Not
and reach more predictable demand patterns to permit better utilization while         so fast: Infrastructure-as-a-service players might not
spreading overhead costs over more productive assets.                                 meet all of your needs.
get more tips for cutting network costs                                               myth no. 3: the cloud reduces your workload.
http://www.cio.com/article/445863/network_management_tips_for_managing_Costs          But you really need to know which model of cloud
                                                                                      computing is right for you.
How to Build a Hybrid Cloud Computing Strategy                                        myth no. 4: You can seamlessly blend your private
Cloud infrastructures hold the promise of server virtualization, application
                                                                                      “cloud” (your virtualized data center) with public
deployment and as-needed scale, but not every application is a good fit. Each of
                                                                                      cloud providers. This depends on the application
the three cloud computing deployment options has different characteristics that
                                                                                      and requirements.
should be considered:
                                                                                      myth no. 5: You won’t ever be able to seamlessly
  n Public clouds – best economies of scale, but with a shared infrastructure         blend your public and private clouds. This is rela-
    model with limited configuration, security and service level specifications       tive to how standardized are your configurations,
  n Internal clouds – operate within your data center, providing added security       data models and deployment policies.
    but modest economies of scale                                                     myth no. 6: Cloud computing always saves you
  n Hosted clouds – operate on service provider premises and resources that
                                                                                      money. This again depends on the applications.
    are segregated from others, but implement enterprise capabilities that are
    managed as a pool                                                                 myth no. 7: a cloud provider can guarantee secu-
                                                                                      rity. Beyond security certifications and provisions,
Enterprises should consider a strategy that leverages all three options via virtual   there is no absolute guarantee.
private cloud technologies, resulting in a hybrid cloud strategy. Virtual private     myth no. 8: If you’re running vms, you’re doing
cloud is a technique to extend trust boundaries across resources regardless           cloud computing. While virtualization is one ele-
of their deployment. Implemented with technology at the network security or           ment, other items include scalability, pricing and
application layers, it enables an enterprise to define and control addressing,        provisioning.
topology, protocols and encrypted communications for instances deployed to
                                                                                      myth no. 9: Cloud computing is about technology.
cloud computing platforms.
                                                                                      It is also about manageability.

Beyond the technology, one should:                                                    Read all the cloud computing myth details
                                                                                      http://www.cio.com/article/495523/Busting_the_nine_
1. Examine the available portfolio of deployment options
                                                                                      myths_of_Cloud_Computing?taxonomyId=1448
2. Partner with enterprise architects to ascertain the best
   deployment per application
3. Determine the security model to be applied                                         Is the Cloud Reliable Enough for
4. Understand your hosting providers’ current capabilities,                           Your Business?
   redundancy and future plans                                                        Cloud-based services offer pay-as-you-go process-
                                                                                      ing power and storage space that don’t require an
The net result will provide a hybrid cloud strategy that optimizes business service   investment in IT infrastructure. But as dependency
deployment efficiencies, as well as matches business application needs with           on cloud computing grows, so too do concerns
infrastructure and security management requisites.                                    about its reliability and providers’ willingness to
Read more advice on cloud computing integration                                       accept responsibility for outages. Before signing a
http://www.cio.com/article/493492/how_to_Build_a_hybrid_Cloud_Computing_              contract, companies should consider a provider’s at-
strategy?taxonomyId=1448                                                              titude toward customer service, the provider’s physi-
                                                                                      cal facilities, how quickly the provider is growing,
Busting the Nine Myths of Cloud Computing                                             the possibility of service interruptions and the out-
Before you jump on the cloud computing bandwagon, understand the truth                age response plan.
behind these nine myths to determine what’s best for your company:                    learn more about cloud computing’s benefits and top
                                                                                      challenges
myth no. 1: there’s one single “cloud.” No, there are more: “infrastructure as a      http://www.cio.com/article/493957/Is_the_Cloud_Reli-
service,” Web services providers and Software-as-a-Service applications.              able_enough_for_Your_Business_



TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                         5
ContInued fRom page 2                                                                The languages are versatile enough for dealing
Building the full context requires an understanding of the infrastructure            with a wide range of IT operational data such
components, their relationships, and the meaning of current events to the in-        as events/logs, network flows and performance
frastructure components by analytics and correlation, and being able to align        metrics from networks, servers and applications.
the meaning and impact of current events to higher-level business services           Being XML based, the language enables users
and applications.                                                                    to rapidly add support for custom applications
                                                                                     and share with the community. The XML files are
CMDB Automation for Instant Success in Change Management                             compiled at runtime to give the same level of
Mapping the infrastructure landscape and relationship in CMDB is a prereq-           performance as handwritten code. The search-
uisite for any data center and IT management solution. AccelOps completely           and-rule language supports a diverse range of
automates the CMDB building process via a bottom-up approach:                        analytics, from simple searching for textual pat-
                                                                                     terns in the raw data to complex rules that trigger
  n   Automatic discovery of networks, servers, applications and users
                                                                                     when abnormal event patterns are detected.
  n   Automatic categorization into specific functional device groups such as        Rule thresholds can be static or dynamic based
      firewalls, storage, virtualized servers, databases and user groups such as     on statistical profiles. SQL-like aggregation and
      administrators and regular users                                               sorting on more than 200 parsed attributes is
  n   Automatic identification and maintenance of component relationships:           supported.
      Layer 2 and Layer 3 topology maps, virtual to physical host mappings,
      wireless AP to controller and n-tier application traffic flows, and applica-   The solution ships with a bevy of built-in and
      tions to infrastructure mappings                                               customizable device support, and analytics for
  n   Automatic identity and location mappings: Network identities such as           most top-tier vendors. Exposure to pre-defined
      workstation IPs and MAC addresses are continuously mapped to user              analytics and an intuitive graphical interface
      identities such as domain/server/VPN accounts and corresponding loca-          to write searches and rules ensures a nominal
      tions such as wired switch ports, VLAN IDs, wireless access points and         learning curve. Unified treatment of all data
      VPN gateways.                                                                  along with the rich contextual metadata from
                                                                                     discovery allow the user to search and write ac-
  n   Automatic configuration and software details mappings: Network device
                                                                                     curate problem detection rules that span perfor-
      and server configurations, and software details are captured and ver-
                                                                                     mance, availability, security and change aspects.
      sioned to detect changes.
                                                                                     Scenarios include zero-day malware infections
                                                                                     from unpatched machines, suspicious database
The bottom-up approach in CMDB automation gives the data center and IT
                                                                                     logons, unusual geographical sources of Web
organization a pragmatic way to quickly realize the benefits of change man-
                                                                                     server traffic, slow network scans and a sudden
agement while removing the burden of data collection across organizational
                                                                                     increase/decrease of application traffic.
barriers.
                                                                                     Service Discovery and Impact
Innovations in Analytics and Correlation for Proactive
                                                                                     Analysis to Align IT with Business
Management and Efficient Root-cause Identification
                                                                                     Rather than only monitor the health and security
Without correlation and analytics capabilities, a CMDB would not be com-
                                                                                     of the data center and IT on a component-by-
plete for any data center and IT management solution. The rich infrastructure
                                                                                     component basis, AccelOps allows data center
relationship information in a CMDB needs to be correlated with current events
                                                                                     and IT organizations to truly manage them from
and performance metrics to provide proactive measures for identifying excep-
                                                                                     a service perspective. This leads to the ultimate
tions, vulnerabilities and problems ahead of time, and to accurately pinpoint
                                                                                     goal of maintaining and improving IT service
root causes to minimize service disruption.
                                                                                     delivery.

This is accomplished by the AccelOps’ powerful analytics and correlation en-         AccelOps defines a business service as a smart
gine, which is powered by three major innovations: 1) XML-based language for         container of relevant devices and applications
parsing data, 2) XML-based search and rule language for mining the parsed            serving a business purpose. From that point on,
data, and 3) a profile and anomaly detection engine that can detect anoma-           all the monitoring and analysis can be presented
lies on any problem dimension.                                                       from a business service perspective.




TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                   6
departmental view. In addition, the unique virtual
                                                                                     appliance-based, clustered, multi-tiered and
                                                                                     hybrid storage architecture separates the storage
                                                                                     from the computation, and separates the hard-
                                                                                     ware from the software. This allows the user to:
                                                                                       n Choose the best-of-breed storage platform
                                                                                       n Keep migrating the software to cheaper,
                                                                                         faster, newer hardware to improve perfor-
                                                                                         mance without losing any data
                                                                                       n Take advantage of robust failover capabili-

                                                                                         ties of virtualization management servers
It is possible to track service-level metrics, efficiently respond to incidents on       to gain higher availability for the AccelOps
a prioritized basis, record business impact, and provide business intelligence           solution
on IT best practices, compliance reporting and IT service improvement. What
                                                                                     The hybrid data management architecture
is also novel about AccelOps is how easily a business service can be defined
                                                                                     comprises a proprietary “flat-file based”
and maintained. Because AccelOps automatically discovers the applications
                                                                                     database for storing event data and an embed-
running on the servers, as well as the network connectivity and the traffic
                                                                                     ded, commercial-grade relational database for
flow, the user can simply choose the applications and respective servers, and
                                                                                     storing CMDB data. This approach allows for
be intelligently guided to choose the rest of the components of the business
                                                                                     better compression and faster event handling
service. This business service discovery and definition capability in AccelOps
                                                                                     (data insertion and query rates) that equates to
completely automates a process that would normally take many people and
                                                                                     greater scale, productivity, efficient data storage
considerable effort to complete and maintain.
                                                                                     and a more engaging user experience.
With the understanding of service, IT executives and staff members can
answer questions such as:                                                            AccelOps has a multi-tiered, clustered, scale-out
                                                                                     architecture that can be run on multiple virtual
  n How can we gain insight into IT service achievement?                             machines to facilitate parallel computation. This
  n How can we proactively manage our infrastructure, and more efficiently           allows the user to instantly increase perfor-
    respond to incidents and threats from a service perspective?                     mance by adding hardware without expensive
  n What are the vulnerabilities and risks in our infrastructure?
                                                                                     data migration procedures.
  n Where can we make improvements?
  n Are my technology investments yielding expected results?                         Finally, the AccelOps’ user interface is built on
  n When and where can performance and availability problems and                     the Adobe Flex RIA framework, which allows for
    service interruptions be avoided, and which issues have greater                  a more engaging desktop application experi-
    service consequences?                                                            ence, yet runs from a browser offering anywhere,
  n Which new technology, deployed application, patch or potential                   anytime accessibility.
    choke point is affecting uptime?
  n What resources can be further optimized, either by consolidation                 AccelOps brings to market a uniquely integrated
    or adding capacity?                                                              IT service management solution that allows IT
  n Where can we reduce capital expenditures, redeploy resources and                 to see the trees as well as the forest – harness-
    improve efficiency?                                                              ing the value from an organization’s existing
                                                                                     operational data. Yet it provides a cost-effective,
These questions can be answered with more than 500 built-in reports and              flexible and scalable IT service management
rules coupled with comprehensive analytics. Behavioral or statistic profiling        solution packaged for mid-tier enterprises. Given
rules and best practices reports can be tuned and applied to satisfy a variety       the solution’s functional depth and breadth, the
of security, availability, performance and compliance monitoring, and report-        holistic approach allows organizations to be more
ing requirements, and to create compensating controls.                               efficient, enhances service reliability, and makes
As a SaaS and virtual appliance offering, the AccelOps solution is built from the    service management practical and tangible.
ground up for multi-tenancy support where different organizations can have           learn how accelops helps It accelerate business
their own customized view and higher-level management can have a cross-              www.accelops.net



TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses                                                                       7

Contenu connexe

Plus de GuardEra Access Solutions, Inc.

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostGuardEra Access Solutions, Inc.
 

Plus de GuardEra Access Solutions, Inc. (20)

Rp 2010 data-breach-report-en_xg
Rp 2010 data-breach-report-en_xgRp 2010 data-breach-report-en_xg
Rp 2010 data-breach-report-en_xg
 
Deepwater Horizon
Deepwater HorizonDeepwater Horizon
Deepwater Horizon
 
Cloud Computing Payback
Cloud Computing PaybackCloud Computing Payback
Cloud Computing Payback
 
10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
2010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V12010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V1
 
2010 Hipaa Rules 011310
2010 Hipaa Rules 0113102010 Hipaa Rules 011310
2010 Hipaa Rules 011310
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
 
Accel Ops Brochure0609
Accel Ops Brochure0609Accel Ops Brochure0609
Accel Ops Brochure0609
 
Healthcare Data Security Update
Healthcare Data Security UpdateHealthcare Data Security Update
Healthcare Data Security Update
 
HITECH Act
HITECH ActHITECH Act
HITECH Act
 
EMR Yes- No
EMR Yes- NoEMR Yes- No
EMR Yes- No
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Closing the Clinical IT Chasm
Closing the Clinical IT ChasmClosing the Clinical IT Chasm
Closing the Clinical IT Chasm
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
2009 Databreach Report
2009 Databreach Report2009 Databreach Report
2009 Databreach Report
 
Forrester Healthcare
Forrester HealthcareForrester Healthcare
Forrester Healthcare
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Enabling Healthcare Reform Using IT
Enabling Healthcare Reform Using ITEnabling Healthcare Reform Using IT
Enabling Healthcare Reform Using IT
 
Thisa Lite Message
Thisa Lite MessageThisa Lite Message
Thisa Lite Message
 

Dernier

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Computerworld Accel Ops Tech Briefing

  • 1. computerworld TechnologY BrIefIngS IT ServIce ManageMenT Quick Insights on Consolidation, Data Center and IT Service Management Virtualization, Spending, Syndrome Business Service Management, Enabling Data Center and IT SLAs and Cloud Computing Service Management for the Mid-tier Enterprise Companies rely on the data center and IT to Today’s mid-tier enterprises are charged with the challenge of pro- provide mission-critical services like e-mail, Web viding mission critical services in the face of increasing technologi- and voice. However, assuring service delivery and cal complexity and modest budgets. Aligning resources, employing reliability becomes increasingly difficult as the best practices and leveraging technologies can help IT organiza- necessary growth in data center virtualization, tions cut through the complexity, be more responsive to business distributed and mobile access, cloud-based appli- requirements and meet service level expectations. cations and outsourced service technologies fuel operational complexity. Data center and IT organi- zations respond by evolving processes and build- This guide is designed to provide mid-tier enterprises with a quick ing out workgroup specialties such as networks, read and insights on the most pressing issues, practices and operations, applications, security and help desk considerations regarding consolidation, virtualization, spending, that serve to scale management. Unfortunately, business service management, service level agreements and cloud this can also produce departmental silos, reduced computing. Each topic provides pertinent takeaways and an online IT responsiveness and blurred service capacity. reference to facilitate further examination. You’ll also learn how Furthermore, enterprise expansion often drives advancing IT organizations from technology-based cost centers the procurement of specialized tools designed into service-oriented business enablers can yield greater support to manage the infrastructure from a component, rather than a service, perspective. of business requirements, reduced risk and improved operational efficiencies even in the midst of budget cuts and added resource The growth in data center and IT complexity, constraints. potential blind spots and inefficiencies due to operational silos, and disparate IT management Brought to you tools — or in some cases the lack of tools in compliments of mid-tier IT organizations — contribute to service delivery risks, outages and degradation. These is- sues diminish an effective means to monitor and optimize service levels, manage change, quickly find and resolve the root cause of problems, and automate compliance efforts. Real-WoRld InsIghts fRom ComputeRWoRld stRategIC paRtneR Content
  • 2. To improve service reliability, vices, or the applications or databases? If so, did organizations must be able to the change occur from a known admin account see and manage all aspects of and workstation? Is the virtualization server in performance, availability and the process of moving the virtual host containing security related to that service. the application or the database server from one This requires a fully integrated physical machine to another? Are there known approach to capture, correlate unpatched security vulnerabilities on the server? and manage operational data, If the problem is caused by a security vulner- consolidate core IT manage- ability, how was it exploited, who is the attacker, ment functions, and automate and who else was affected? Are any workstations service definition and SLA showing abnormal traffic flow? tracking. Until now, available IT management tools have either been too expensive, very labor intensive or In many cases, the problem is indeed one of lacking in required integration. the above. Sometimes, however, another user is downloading a large file or watching streaming The AccelOps all-in-one data center and IT service management solution media that is clogging up a shared router inter- provides infrastructure oversight and controls to advance service reliability face, and the problem automatically goes away across performance, availability and security dimensions. Delivered as virtual when the other user is done. appliance software or Software as a Service (SaaS), AccelOps links the infra- The question is, how quickly can problems be structure directly to business and business services. This brings the manage- pinpointed, prioritized and resolved to maintain ment of the data center/IT as service to the forefront and, in turn, enables the service levels with the best use of IT staff and organization to better focus on quality, uptime and efficiency. technology resources? AccelOps puts the “who, what, where, when, why and how” at the operator’s Disparate IT management tools cannot cor- fingertips to monitor and enhance service levels, better optimize resources relate the data effectively or fast enough. The and further reduce business risk. AccelOps combines discovery, data aggrega- real problem of inferring the true root cause is tion, correlation, out-of-the-box analytics, data management and reporting to often left to the user. Even after the root cause is yield a single pane of glass into data center and IT operations and services. identified, getting to the true identity and current Integrated functionality includes the following: location of the offending user or host is another matter, as this information is spread across n Business service management and service mapping different management domains such as OS logs, n Performance management / network behavior analysis router configurations, VPN logs, etc. This lack n Availability management / service level agreement of automation and real-time visibility affects the n Security information event management organization’s capacity to keep an IT infrastruc- n Change control / automated CMDB ture healthy, with minimal service level disruption n Event / log consolidation with cross-correlation and degradation. n Identity, access and location management with directory service integration The AccelOps Approach n Network visualization and enterprise search AccelOps delivers a seamlessly integrated, uni- n Compliance and governance automation fied and service-oriented platform for the collec- tion, monitoring, precise drill-down, root-cause Why Disparate IT Management Tools Do Not Suffice analysis and detailed reporting on all IT events/ To fully understand the necessity of holistically managing the data center and logs and performance metrics that cuts through IT, consider the following scenario: A remote branch office worker reports a networks, systems, applications, vendors and slow application. Is the application really overloading the host, or is the data- technology boundaries. It provides data centers base server not responding fast enough? Is there another application on the and IT organizations the full context (who, what, same server that is competing for resources? Are the networks in between OK? where, when, why and how) at their fingertips at Is the storage network between the database server and the storage OK? Are any given time, and the necessary confidence the supporting network infrastructure services such as DNS and the domain and control in service delivery. controllers responsive? Did someone recently make a change to network de- ContInued on page 6 TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 2
  • 3. Service Level Matters Virtualization and SLA Definitions and Solutions Consolidation A service-level agreement (SLA) serves as the foundation for the level of ser- Virtualization 101 vice expected by a customer from a supplier or for service-driven organizations Virtualization technologies provide a layer of among business departments and IT. SLAs document the service, capabilities abstraction between hardware, devices, systems and reliability, as well as requirements, performance measurement, remedies and and the software running on them. The three basic penalties. SLAs should be designed to minimize or eliminate misinterpretation. categories of virtualization — storage, network and server — are the most common applications of the Service requisites should specify what services are provided, availability details, technology today. Virtualization offers a logical view the duties of each party, simple metrics, reporting processes, escalation and of computing resources rather than a conventional remedy procedures, dispute resolution, and cost/service tradeoffs. SLAs should physical view. be living documents with mechanisms in place for periodic review and updating. learn more about slas Virtualization helps IT departments do more with http://www.cio.com/article/128900/sla_definitions_and_solutions less by collecting disparate computing resources into shareable resources. This is presented in pools The IT Management Maturity Curve of storage, manageable network bandwidth, and the IT service management aligns information technology processes, controls and allocation of server operating systems, processors priorities to meet business demands while offering the promise of reducing risks and memory. This results in a reduction in hard- of service disruptions, realizing greater cost savings and enabling more assured ware, energy to cool that hardware and, potentially, service expansion. The concept of IT being run as a service, as opposed to personnel to manage it. However, virtualization can functional infrastructure and application silos, has gained significant adoption present challenges such as performance conflicts by many organizations. Leading IT standards such as ITIL, ISO and COBIT all and management deficiencies. Organizations need support the tenants of IT service management to better integrate IT according to to understand how the technology changes the way business objectives. a data center is managed, administered and oper- ated. CIOs, IT executives and data center directors seek to implement IT service learn more about virtualization, from management best practices to improve service responsiveness and drive down benefits to implementation challenges operational costs. Where your organization is positioned on the IT management http://www.cio.com/article/40701/aBC_an_Introduc- maturity curve regarding activities and capabilities can provide some insight as tion_to_virtualization to where to invest in respective processes and supporting management tools that will progress service reliability, delivery and enhancement. Virtual Certainties take a moment to assess your It management maturity stage The benefits of virtualization are well known in http://survey.constantcontact.com/survey/a07e2hvwp6kfszlfj46/start terms of economics, consolidating resources, infrastructure simplification and green IT — but it No Virtualization Skills? Better Get Started is not a panacea. Organizations must consider the Virtualization skills are hot and in demand. While virtualization know-how will impact virtualization will have on system adminis- eventually become part of the standard skill set for system administrators, tration costs and whether the technology is likely today’s IT managers must dedicate resources to virtualization exclusively. To to increase complexity rather than reduce it. For avoid losing virtualization experts to other employers, companies should strike example, server virtualization has operational a balance between dedicated staff and domain expertise. Cross-team working benefits, as well as risks. As with any technology, groups, for example, can help companies leverage skill sets and optimize virtual- virtualization is only as good as the planning and ization investments. management that organizations put behind it. learn more about how virtualization should shape your hiring practices get a more holistic view of virtualization technologies http://www.cio.com/article/495322/no_virtualization_skills_Better_get_ http://www.theinfoboom.com/pov/editor/virtual- started?page=1&taxonomyId=1448 certainties TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 3
  • 4. Best Practices structure, and the relationships among IT resources and business services. As an IT management offering, they provide a number of features and benefits: How to Prioritize IT Spending During an Economic Recession n Infrastructure management and instrumentation Reduced spending requires an examination of IT priorities – taking stock of what n Monitoring, alerting, event management and one has and assessing choices. At the top of the list for cost savings is consolida- capacity planning tion across and within data centers, beginning with server and storage virtualiza- n Improved service quality by implementing best tion. This generally means reducing the number of parts and redundancies by practices and preempting issues assessing the following: n Faster problem resolution in terms of identify- ing resources and determining diagnosis (root n Number of vendors / suppliers (economies) cause) n Number of applications needed (license reduction) n Enhanced compliance by automating best- n Renegotiation of vendor contracts (cost reduction) practice processes that support regulatory and n The age of the equipment and associated cost of maintenance (replacement industry mandates options) n Data management (data stores, de-duplication and analysis) learn about business service management benefits n Processes (operational efficiency and effectiveness) http://www.cio.com/article/203700/data_Center_opti- mization_the_value_of_Business_service_management? page=1&taxonomyId=1448 Additional downturn spending considerations should take into account portfo- lio management, capacity planning and infrastructure management, as well as Network Management: security. Portfolio management serves to optimize expenditures by rationalizing Tips for Managing Costs the value and feature enhancement requests among enterprise applications. IT Steady infrastructure cost growth, beyond power and should also consider tools for more intelligently managing data, investigate cloud storage, is usually due to expanded network demands computing and consider SaaS applications for capabilities that are less expen- resulting from physical expansion or increased sive to outsource. Well-designed identity management and security controls can connectivity. Network management becomes more also help reduce potential risks due to employee turnover and use of outsourced complex as network expansion — such as an increase services. in the number of sites, users, devices, applications or services — and respective costs grow. By continuing to invest wisely during a downturn, organizations can strengthen their long-term future and reduce costs. In order to control costs and maintain reliability, get more tips for It cost-cutting one needs to know how efficiently the network is http://www.cio.com/article/464725/how_to_prioritize_It_spending_during_aneco- performing and the location of network performance nomic_Recession?page=1&taxonomyId=1448 bottlenecks. One example is trending bandwidth consumption per application, server, network loca- Data Center Optimization: The Value of tion, user/group, time of day, etc. Business Service Management Organizations seek to better optimize the data center and reduce costs by assess- Once this is determined, there are many technolo- ing applications, platforms, capacity and operations. It is important to consider gies that can be applied to reduce costs, prevent the value of the business services supported by a given application and, as such, additional growth or reduce potential problems. Two the business value behind your technology. Two factors determine the business such methods are network monitoring and virtualiza- value of a resource: knowing which business services and respective processes a tion. Network monitoring tools across wired, wireless resource supports, and understanding the business criticality of those services as and other connectivity services, such as VPN and measured by the impact of performance degradation or temporary loss of VoIP, can help manage bandwidth consumption and those services. reduce performance bottlenecks. Network consolida- tion via virtualization can improve network utilization, Business service management (BSM) solutions facilitate the transition from a efficiency and agility by reconfiguring the network in- technically-oriented, platform-based and silo management approach to a horizon- frastructure to deliver services from a pool of shared tal, business-oriented approach. BSM solutions offer a holistic view of the IT infra- network, server and storage resources. TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 4
  • 5. The ultimate objective in network management and cost control is to understand myth no. 2: all you need is your credit card. Not and reach more predictable demand patterns to permit better utilization while so fast: Infrastructure-as-a-service players might not spreading overhead costs over more productive assets. meet all of your needs. get more tips for cutting network costs myth no. 3: the cloud reduces your workload. http://www.cio.com/article/445863/network_management_tips_for_managing_Costs But you really need to know which model of cloud computing is right for you. How to Build a Hybrid Cloud Computing Strategy myth no. 4: You can seamlessly blend your private Cloud infrastructures hold the promise of server virtualization, application “cloud” (your virtualized data center) with public deployment and as-needed scale, but not every application is a good fit. Each of cloud providers. This depends on the application the three cloud computing deployment options has different characteristics that and requirements. should be considered: myth no. 5: You won’t ever be able to seamlessly n Public clouds – best economies of scale, but with a shared infrastructure blend your public and private clouds. This is rela- model with limited configuration, security and service level specifications tive to how standardized are your configurations, n Internal clouds – operate within your data center, providing added security data models and deployment policies. but modest economies of scale myth no. 6: Cloud computing always saves you n Hosted clouds – operate on service provider premises and resources that money. This again depends on the applications. are segregated from others, but implement enterprise capabilities that are managed as a pool myth no. 7: a cloud provider can guarantee secu- rity. Beyond security certifications and provisions, Enterprises should consider a strategy that leverages all three options via virtual there is no absolute guarantee. private cloud technologies, resulting in a hybrid cloud strategy. Virtual private myth no. 8: If you’re running vms, you’re doing cloud is a technique to extend trust boundaries across resources regardless cloud computing. While virtualization is one ele- of their deployment. Implemented with technology at the network security or ment, other items include scalability, pricing and application layers, it enables an enterprise to define and control addressing, provisioning. topology, protocols and encrypted communications for instances deployed to myth no. 9: Cloud computing is about technology. cloud computing platforms. It is also about manageability. Beyond the technology, one should: Read all the cloud computing myth details http://www.cio.com/article/495523/Busting_the_nine_ 1. Examine the available portfolio of deployment options myths_of_Cloud_Computing?taxonomyId=1448 2. Partner with enterprise architects to ascertain the best deployment per application 3. Determine the security model to be applied Is the Cloud Reliable Enough for 4. Understand your hosting providers’ current capabilities, Your Business? redundancy and future plans Cloud-based services offer pay-as-you-go process- ing power and storage space that don’t require an The net result will provide a hybrid cloud strategy that optimizes business service investment in IT infrastructure. But as dependency deployment efficiencies, as well as matches business application needs with on cloud computing grows, so too do concerns infrastructure and security management requisites. about its reliability and providers’ willingness to Read more advice on cloud computing integration accept responsibility for outages. Before signing a http://www.cio.com/article/493492/how_to_Build_a_hybrid_Cloud_Computing_ contract, companies should consider a provider’s at- strategy?taxonomyId=1448 titude toward customer service, the provider’s physi- cal facilities, how quickly the provider is growing, Busting the Nine Myths of Cloud Computing the possibility of service interruptions and the out- Before you jump on the cloud computing bandwagon, understand the truth age response plan. behind these nine myths to determine what’s best for your company: learn more about cloud computing’s benefits and top challenges myth no. 1: there’s one single “cloud.” No, there are more: “infrastructure as a http://www.cio.com/article/493957/Is_the_Cloud_Reli- service,” Web services providers and Software-as-a-Service applications. able_enough_for_Your_Business_ TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 5
  • 6. ContInued fRom page 2 The languages are versatile enough for dealing Building the full context requires an understanding of the infrastructure with a wide range of IT operational data such components, their relationships, and the meaning of current events to the in- as events/logs, network flows and performance frastructure components by analytics and correlation, and being able to align metrics from networks, servers and applications. the meaning and impact of current events to higher-level business services Being XML based, the language enables users and applications. to rapidly add support for custom applications and share with the community. The XML files are CMDB Automation for Instant Success in Change Management compiled at runtime to give the same level of Mapping the infrastructure landscape and relationship in CMDB is a prereq- performance as handwritten code. The search- uisite for any data center and IT management solution. AccelOps completely and-rule language supports a diverse range of automates the CMDB building process via a bottom-up approach: analytics, from simple searching for textual pat- terns in the raw data to complex rules that trigger n Automatic discovery of networks, servers, applications and users when abnormal event patterns are detected. n Automatic categorization into specific functional device groups such as Rule thresholds can be static or dynamic based firewalls, storage, virtualized servers, databases and user groups such as on statistical profiles. SQL-like aggregation and administrators and regular users sorting on more than 200 parsed attributes is n Automatic identification and maintenance of component relationships: supported. Layer 2 and Layer 3 topology maps, virtual to physical host mappings, wireless AP to controller and n-tier application traffic flows, and applica- The solution ships with a bevy of built-in and tions to infrastructure mappings customizable device support, and analytics for n Automatic identity and location mappings: Network identities such as most top-tier vendors. Exposure to pre-defined workstation IPs and MAC addresses are continuously mapped to user analytics and an intuitive graphical interface identities such as domain/server/VPN accounts and corresponding loca- to write searches and rules ensures a nominal tions such as wired switch ports, VLAN IDs, wireless access points and learning curve. Unified treatment of all data VPN gateways. along with the rich contextual metadata from discovery allow the user to search and write ac- n Automatic configuration and software details mappings: Network device curate problem detection rules that span perfor- and server configurations, and software details are captured and ver- mance, availability, security and change aspects. sioned to detect changes. Scenarios include zero-day malware infections from unpatched machines, suspicious database The bottom-up approach in CMDB automation gives the data center and IT logons, unusual geographical sources of Web organization a pragmatic way to quickly realize the benefits of change man- server traffic, slow network scans and a sudden agement while removing the burden of data collection across organizational increase/decrease of application traffic. barriers. Service Discovery and Impact Innovations in Analytics and Correlation for Proactive Analysis to Align IT with Business Management and Efficient Root-cause Identification Rather than only monitor the health and security Without correlation and analytics capabilities, a CMDB would not be com- of the data center and IT on a component-by- plete for any data center and IT management solution. The rich infrastructure component basis, AccelOps allows data center relationship information in a CMDB needs to be correlated with current events and IT organizations to truly manage them from and performance metrics to provide proactive measures for identifying excep- a service perspective. This leads to the ultimate tions, vulnerabilities and problems ahead of time, and to accurately pinpoint goal of maintaining and improving IT service root causes to minimize service disruption. delivery. This is accomplished by the AccelOps’ powerful analytics and correlation en- AccelOps defines a business service as a smart gine, which is powered by three major innovations: 1) XML-based language for container of relevant devices and applications parsing data, 2) XML-based search and rule language for mining the parsed serving a business purpose. From that point on, data, and 3) a profile and anomaly detection engine that can detect anoma- all the monitoring and analysis can be presented lies on any problem dimension. from a business service perspective. TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 6
  • 7. departmental view. In addition, the unique virtual appliance-based, clustered, multi-tiered and hybrid storage architecture separates the storage from the computation, and separates the hard- ware from the software. This allows the user to: n Choose the best-of-breed storage platform n Keep migrating the software to cheaper, faster, newer hardware to improve perfor- mance without losing any data n Take advantage of robust failover capabili- ties of virtualization management servers It is possible to track service-level metrics, efficiently respond to incidents on to gain higher availability for the AccelOps a prioritized basis, record business impact, and provide business intelligence solution on IT best practices, compliance reporting and IT service improvement. What The hybrid data management architecture is also novel about AccelOps is how easily a business service can be defined comprises a proprietary “flat-file based” and maintained. Because AccelOps automatically discovers the applications database for storing event data and an embed- running on the servers, as well as the network connectivity and the traffic ded, commercial-grade relational database for flow, the user can simply choose the applications and respective servers, and storing CMDB data. This approach allows for be intelligently guided to choose the rest of the components of the business better compression and faster event handling service. This business service discovery and definition capability in AccelOps (data insertion and query rates) that equates to completely automates a process that would normally take many people and greater scale, productivity, efficient data storage considerable effort to complete and maintain. and a more engaging user experience. With the understanding of service, IT executives and staff members can answer questions such as: AccelOps has a multi-tiered, clustered, scale-out architecture that can be run on multiple virtual n How can we gain insight into IT service achievement? machines to facilitate parallel computation. This n How can we proactively manage our infrastructure, and more efficiently allows the user to instantly increase perfor- respond to incidents and threats from a service perspective? mance by adding hardware without expensive n What are the vulnerabilities and risks in our infrastructure? data migration procedures. n Where can we make improvements? n Are my technology investments yielding expected results? Finally, the AccelOps’ user interface is built on n When and where can performance and availability problems and the Adobe Flex RIA framework, which allows for service interruptions be avoided, and which issues have greater a more engaging desktop application experi- service consequences? ence, yet runs from a browser offering anywhere, n Which new technology, deployed application, patch or potential anytime accessibility. choke point is affecting uptime? n What resources can be further optimized, either by consolidation AccelOps brings to market a uniquely integrated or adding capacity? IT service management solution that allows IT n Where can we reduce capital expenditures, redeploy resources and to see the trees as well as the forest – harness- improve efficiency? ing the value from an organization’s existing operational data. Yet it provides a cost-effective, These questions can be answered with more than 500 built-in reports and flexible and scalable IT service management rules coupled with comprehensive analytics. Behavioral or statistic profiling solution packaged for mid-tier enterprises. Given rules and best practices reports can be tuned and applied to satisfy a variety the solution’s functional depth and breadth, the of security, availability, performance and compliance monitoring, and report- holistic approach allows organizations to be more ing requirements, and to create compensating controls. efficient, enhances service reliability, and makes As a SaaS and virtual appliance offering, the AccelOps solution is built from the service management practical and tangible. ground up for multi-tenancy support where different organizations can have learn how accelops helps It accelerate business their own customized view and higher-level management can have a cross- www.accelops.net TECHNOLOGY BRIEFING • It seRvICe management foR mId-tIeR enteRpRIses 7