SlideShare une entreprise Scribd logo
1  sur  10
How IT Accelerates Business




                        SOC – NOC Convergence
                        “Why Monitoring is Not Enough”




© 2009 AccelOps, Inc.
Increasing Data Center Complexity
Technology
  Virtualization, network storage, VOIP and web applications

Access
  VPN, mobile, WAN, LAN, wireless, security

People
  Distributed, specialized, fewer resources, lower budgets

Process
  ITSM adoption – control, administration, and monitoring of the entire
  infrastructure – supported by standards (COBIT, ITIL, ISO, etc.)

Tools
  Multiple point tools, bolt-on with expensive integration points, maintenance



                               (C) 2009 AccelOps, Inc.   8/4/2009   2
Current State Resolution Process
“All hands on deck”
  Multiple people, systems, consoles, data sources, …
  Synchronous communication challenging
  No “single source of truth”



Outcomes
  Extended root-cause analysis
  Decreased MTTR
                                              Datacenter   Help Desk SOC, NOC Systems,   Application
  SLA’s not achieved                           Director                        Admin       Mgmt.

  Unhappy customers



                        (C) 2009 AccelOps, Inc.     8/4/2009     3
What is Needed
Cross-domain visibility
  Network, systems, security, applications and identity

Understanding of interdependencies
  Element relationship to applications and business services

Rapid, comprehensive information access
  “A single source of truth”

Aligned systems, tools
  Seamless
  Cost-effective

A single pane of glass…

                          (C) 2009 AccelOps, Inc.   8/4/2009   4
Why SOC − NOC Convergence
Optimize resources

Align stakeholders, systems, tools, information
  Procedures
  Controls
  Workflows
  Reporting

Improve SLA

Decrease costs

Increase responsiveness to the business


                        (C) 2009 AccelOps, Inc.   8/4/2009   5
SOC/NOC Convergence − How
Define critical capabilities
  Network operations                             Security operations
     Network fault tolerance                          Network behavior anomaly
     Switch/router configuration                      detection
     Sniffing troubleshooting                         Intrusion detection
     Systems monitoring                               Log management
                                                      Network forensics

Identify control/process gaps
  Network anomalies and system changes (underlying issue,
  vulnerability)
  Identity and location (who and where)
  Violation or incident impact on business (diminished means to
  understand impact)

                            (C) 2009 AccelOps, Inc.   8/4/2009   6
SOC/NOC Convergence − How
Alignment
  Organizational, standards, controls, policies

Identify enabling technology
  Integrated tools vs. Point tools
  Complementary technology integration – e.g. Service desk




                          (C) 2009 AccelOps, Inc.   8/4/2009   7
AccelOps & SOC/NOC Convergence
Single-pane of glass for end-to-end visibility
  Cuts across networks, systems, applications and identity

Proactive monitoring and efficient root-cause analysis
reduces service downtime and optimize resources
  Correlate data from all components and domains (performance,
  availability, security) to derive root cause

Integrated monitoring solution
  Performance, Availability, Change,
  Security, BSM
  Visualization, Enterprise Search
  CMDB
  Identity, location management
  Compliance automation
                           (C) 2009 AccelOps, Inc.   8/4/2009   8
Information
Please contact AccelOps at
  Sales@accelops.net
  +1 (408) 490-0903, extension 1

Or visit www.accelops.net




                        (C) 2009 AccelOps, Inc.   8/4/2009   9
© 2009 AccelOps, Inc.

Contenu connexe

Tendances

Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
Gabby Nizri
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Company Profile
Company ProfileCompany Profile
Company Profile
3SC World
 

Tendances (20)

5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the Expert
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
Exercise Your SOC: How to run an effective SOC response simulation (BSidesCha...
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 

En vedette

Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
Fuad Khan
 
Network Operations Center - Marlabs
Network Operations Center - MarlabsNetwork Operations Center - Marlabs
Network Operations Center - Marlabs
Marlabs
 
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
vkn13
 

En vedette (20)

Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
Network Monitoring & Alarming
Network Monitoring & Alarming Network Monitoring & Alarming
Network Monitoring & Alarming
 
Building a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops CenterBuilding a World-Class Proactive Integrated Security and Network Ops Center
Building a World-Class Proactive Integrated Security and Network Ops Center
 
SOC Foundation
SOC FoundationSOC Foundation
SOC Foundation
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire Research
 
Noc and soc deck
Noc and soc deckNoc and soc deck
Noc and soc deck
 
Emergencies and on call
Emergencies and on callEmergencies and on call
Emergencies and on call
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 
SIEM and SOC
SIEM and SOCSIEM and SOC
SIEM and SOC
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
2015-ShowNet-報告資料
2015-ShowNet-報告資料2015-ShowNet-報告資料
2015-ShowNet-報告資料
 
Network Operations Center - Marlabs
Network Operations Center - MarlabsNetwork Operations Center - Marlabs
Network Operations Center - Marlabs
 
Advancing From Fault Management To Fault Resolution Framework
Advancing From Fault Management To Fault Resolution FrameworkAdvancing From Fault Management To Fault Resolution Framework
Advancing From Fault Management To Fault Resolution Framework
 
NETWORK OPERATION CENTER
NETWORK OPERATION CENTERNETWORK OPERATION CENTER
NETWORK OPERATION CENTER
 
Network Operations Center
Network Operations Center  Network Operations Center
Network Operations Center
 
Monitoring and Log Management for
Monitoring and Log Management forMonitoring and Log Management for
Monitoring and Log Management for
 
Image processing Presentation
Image processing PresentationImage processing Presentation
Image processing Presentation
 
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing Basics
 

Similaire à AccelOps & SOC-NOC Convergence

Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
Emulex Corporation
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
Anna Liu
 
Cloud computing security and privacy christian goire
Cloud computing security and privacy christian goireCloud computing security and privacy christian goire
Cloud computing security and privacy christian goire
goire
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
webhostingguy
 
Excellent slides on the new z13s announced on 16th Feb 2016
Excellent slides on the new z13s announced on 16th Feb 2016Excellent slides on the new z13s announced on 16th Feb 2016
Excellent slides on the new z13s announced on 16th Feb 2016
Luigi Tommaseo
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
Vincent Kwon
 

Similaire à AccelOps & SOC-NOC Convergence (20)

Cloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno MelandriCloud Computing 2010 - EMC - Bruno Melandri
Cloud Computing 2010 - EMC - Bruno Melandri
 
Accel Ops Csobc Sans Webcast 090210.Ppt
Accel Ops Csobc Sans Webcast 090210.PptAccel Ops Csobc Sans Webcast 090210.Ppt
Accel Ops Csobc Sans Webcast 090210.Ppt
 
On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...
 
Software Licensing In The Cloud (CloudWorld 2009)
Software Licensing In The Cloud  (CloudWorld 2009)Software Licensing In The Cloud  (CloudWorld 2009)
Software Licensing In The Cloud (CloudWorld 2009)
 
Global Technology Outlook
Global Technology Outlook Global Technology Outlook
Global Technology Outlook
 
Using Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service DeliveryUsing Network Recording and Search to Improve IT Service Delivery
Using Network Recording and Search to Improve IT Service Delivery
 
Overview of GovCloud Today
Overview of GovCloud TodayOverview of GovCloud Today
Overview of GovCloud Today
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
 
Building a Hybrid Cloud The Real Deal
Building a Hybrid Cloud The Real DealBuilding a Hybrid Cloud The Real Deal
Building a Hybrid Cloud The Real Deal
 
IBM vision for aviation
IBM vision for aviationIBM vision for aviation
IBM vision for aviation
 
Using NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application PerformanceUsing NetFlow to Improve Network Visibility and Application Performance
Using NetFlow to Improve Network Visibility and Application Performance
 
Cloud computing security and privacy christian goire
Cloud computing security and privacy christian goireCloud computing security and privacy christian goire
Cloud computing security and privacy christian goire
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
Excellent slides on the new z13s announced on 16th Feb 2016
Excellent slides on the new z13s announced on 16th Feb 2016Excellent slides on the new z13s announced on 16th Feb 2016
Excellent slides on the new z13s announced on 16th Feb 2016
 
RA TechED 2019 - SY08 - Developing Information Ready Applications using Smart...
RA TechED 2019 - SY08 - Developing Information Ready Applications using Smart...RA TechED 2019 - SY08 - Developing Information Ready Applications using Smart...
RA TechED 2019 - SY08 - Developing Information Ready Applications using Smart...
 
Next Generation Automation Final
Next Generation Automation FinalNext Generation Automation Final
Next Generation Automation Final
 
Arup Driving Data Centre Efficiency Through Virtual Reality (Web Version)
Arup Driving Data Centre Efficiency Through Virtual Reality (Web Version)Arup Driving Data Centre Efficiency Through Virtual Reality (Web Version)
Arup Driving Data Centre Efficiency Through Virtual Reality (Web Version)
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Cop Test Going The Cloud Versie 0.5
Cop Test  Going The Cloud Versie 0.5Cop Test  Going The Cloud Versie 0.5
Cop Test Going The Cloud Versie 0.5
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

AccelOps & SOC-NOC Convergence

  • 1. How IT Accelerates Business SOC – NOC Convergence “Why Monitoring is Not Enough” © 2009 AccelOps, Inc.
  • 2. Increasing Data Center Complexity Technology Virtualization, network storage, VOIP and web applications Access VPN, mobile, WAN, LAN, wireless, security People Distributed, specialized, fewer resources, lower budgets Process ITSM adoption – control, administration, and monitoring of the entire infrastructure – supported by standards (COBIT, ITIL, ISO, etc.) Tools Multiple point tools, bolt-on with expensive integration points, maintenance (C) 2009 AccelOps, Inc. 8/4/2009 2
  • 3. Current State Resolution Process “All hands on deck” Multiple people, systems, consoles, data sources, … Synchronous communication challenging No “single source of truth” Outcomes Extended root-cause analysis Decreased MTTR Datacenter Help Desk SOC, NOC Systems, Application SLA’s not achieved Director Admin Mgmt. Unhappy customers (C) 2009 AccelOps, Inc. 8/4/2009 3
  • 4. What is Needed Cross-domain visibility Network, systems, security, applications and identity Understanding of interdependencies Element relationship to applications and business services Rapid, comprehensive information access “A single source of truth” Aligned systems, tools Seamless Cost-effective A single pane of glass… (C) 2009 AccelOps, Inc. 8/4/2009 4
  • 5. Why SOC − NOC Convergence Optimize resources Align stakeholders, systems, tools, information Procedures Controls Workflows Reporting Improve SLA Decrease costs Increase responsiveness to the business (C) 2009 AccelOps, Inc. 8/4/2009 5
  • 6. SOC/NOC Convergence − How Define critical capabilities Network operations Security operations Network fault tolerance Network behavior anomaly Switch/router configuration detection Sniffing troubleshooting Intrusion detection Systems monitoring Log management Network forensics Identify control/process gaps Network anomalies and system changes (underlying issue, vulnerability) Identity and location (who and where) Violation or incident impact on business (diminished means to understand impact) (C) 2009 AccelOps, Inc. 8/4/2009 6
  • 7. SOC/NOC Convergence − How Alignment Organizational, standards, controls, policies Identify enabling technology Integrated tools vs. Point tools Complementary technology integration – e.g. Service desk (C) 2009 AccelOps, Inc. 8/4/2009 7
  • 8. AccelOps & SOC/NOC Convergence Single-pane of glass for end-to-end visibility Cuts across networks, systems, applications and identity Proactive monitoring and efficient root-cause analysis reduces service downtime and optimize resources Correlate data from all components and domains (performance, availability, security) to derive root cause Integrated monitoring solution Performance, Availability, Change, Security, BSM Visualization, Enterprise Search CMDB Identity, location management Compliance automation (C) 2009 AccelOps, Inc. 8/4/2009 8
  • 9. Information Please contact AccelOps at Sales@accelops.net +1 (408) 490-0903, extension 1 Or visit www.accelops.net (C) 2009 AccelOps, Inc. 8/4/2009 9