GlobalNOC Services Update Internet2 Global Summit
|
|
- Drusilla McDonald
- 6 years ago
- Views:
Transcription
1 GlobalNOC Services Update 2015 Internet2 Global Summit
2 Annual Report 4/28/15
3 Service Desk Year in Review: Welcomed ARE-ON and OSHEAN to the GlobalNOC Family All I2 FootPrints Projects Consolidated Into 1 = 1/5 of the Former Notifications Grown by 4 Staff and 1 Robot April 28, 2015
4 Service Desk Year in Review: Conducted DR Exercise in Early December 2015 with Positive Result Created and Implemented a Major Incident Communication Policy April 28, 2015
5 Service Desk Activity Metrics for million alarms/year ~ 5200/day 30,000 tickets created/year ~ 82/day 15,600 phone calls received/year ~ 43/day 264,000 s sent and received ~ 720/ day April 28, 2015
6 Year Ahead: Service Desk Pursuing ISO 20,000 certification Why? By When? What Will the Net Effect Be?
7 2015 Priorities
8 2015 Focus Areas
9 Automation
10 Goal Find the worst things to do by hand. Make a machine do those things. Things that are: Dangerous Slow Annoying
11 Focus Areas Business Processes on-call button auto-assign issues auto-notify auto-discover devices in a new network Reporting How many times did we call an engineer? Config automation alerting on config drift generate template config for new boxes push & pipeline Incident Advisor auto-fix hints Annoying
12 Service Management
13 Goal MINIMIZE unplanned work confusion inconsistency Stay flexibile, agile, and custom
14 Huh? STANDARDIZE: for processes where consistency is most important ORGANIZE: a simple lightweight structure where custom and novel work happens
15 2 Parts Part 1: ISO/IEC Certification Sparked by Internet2 effort, working to reach certification Aligned with ITIL Incident Management Change Management Capacity Management Availability Management etc
16 2 Parts Part 2: Other service-level improvements Service Dashboard (end users, network owners) Prioritize improvements Faster Turn-up Change Management
17 So what It s not good enough anymore to talk about boxes and circuits. Everything is more complicated now. We don t deliver networks, we deliver services Requires rigor to make sure those services work, and agility to make sure those services evolve quickly
18 example What s the availability of everyone s IP Service for Internet2? complexities: multiple sessions connectors back each other up Let s define available! First, a service is down if packets have to be retransmitted So: Up = ALL BGP sessions are established, no loss known At Risk = At least 1 session is down, but at least one route is still in the routing table Down = no routes
19 Data Model Entity Routed R&E Service BGP Routing Data Peer State Routes BGP Peering BGP Peering ASN Peer IP SLA Reporting Engine Weekly Report
20 Service Awareness
21 Corresponding process S y s report generated SLA met? no send to NPT N T P yes outage in GRNOC control? yes recommend changes Dir of Op no Approve Changes? no Recommended Changes N et w or k O w n er Published Report yes Published Report with Outline of Changes
22 Work Management
23 Goal Get coherent system to manage our work systems tools disciplines processes In other words, track, prioritize, and measure everything we do.
24 This means For the people who do work: "Where do I go to see everything I'm supposed to be doing? What should I be doing first? For the managers: "Are we too busy? Are we working on the right things? For the strategic view: "Are we doing well/better than a year ago?
25 How does work get tracked Tickets s Post-its Workflow records Meeting docs Many todo lists
26 The future Review ticketing Look at structured processes Project management Unified view of workload and results
27 Recruiting
28 Goal Make sure we have enough talented people now and 5 years from now
29 Parts Attract & hire Pipeline Get more students in Improve Development
30 Attracting How do we attract experts that fit? Challenges Scary job descriptions People don t know what R&E or GlobalNOC does Indiana - No really, it s a nice place!
31 Pipeline Getting people into the pipeline Students have worked very well Summer of Networking How do we get more? Keeping the talent growing Develop people well Level up!
32 What s New With GlobalNOC Software?
33 SNAPP High performance SNMP measurement/visualization tool 3 major revisions, project began in 2002 RRDtool based storage High performance SNMP data collector Web-based data browser and Web-services API
34 SNAPP 4 with TSDS Moving from RRDtool to a non-relational database TSDS Database based on MongoDB Sophisticated query language: TSQL Rich meta-data integrated with data. Allows for powerful queries; long-term longitudinal analysis General Time Series Data Store, not just SNMP data Ex. NOC activity metrics / key performance indicators; optical characteristics (light levels, loss, etc.); environmental/power data; aggregate flow data; OWAMP; BWCTL
35
36 Alertmon Improvements Alert Collapsing Collapse services on a host when host is not reachable Root cause analysis based on dependency graph allows for intelligent collapsing of alerts and suggests root cause of multiple alerts. Monitoring of management VPN endpoints to collapse alerts behind VPN when management network access is impaired
37
38
39
40 NOAA Operations Portal High-level overview of network status Operational Status Map Performance Measurement Overview Operations Calendars Detailed data pulled from other GlobalNOC tools Multi-network aggregate views
41
42
43
44 SciPass Science DMZ Campus Networks are enterprise infrastructure large number of small flows security is a required capability not elephant flow friendly could just bypass but that doesn t provide required security what about performance assurance? 19
45 Combine OpenFlow Switch Bro PerfSonar create reactive system default to secure / slow path use IDS to control what goes on fast path Approach
46 Reactive Bypass Performance 64 ms - time to detect and bypass 250 ms - doubled throughput of firewall 1.5 sec - same throughput as no firewall
47 Find Out More Software Page Code Repository
48 FlowSpace Firewall Developed in partnership with Internet2 Open Source Software OpenFlow Hypervisor Slice OpenFlow 1.0 based on VLAN ID Currently running on Internet2 AL2S Other deployments growing. We re interested in helping get FlowSpace Firewall running on your OpenFlow network More Information/Download:
Move beyond the expected.
Infrastructure Management & Monitoring for Business-Critical Continuity TM Move beyond the expected. The Avocent Data Center Planner Taking data center operations to the next level Execution Availability
More informationOracle Diagnostics Pack For Oracle Database
Oracle Diagnostics Pack For Oracle Database ORACLE DIAGNOSTICS PACK FOR ORACLE DATABASE Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line, and provides the industry
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More information<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g
Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor
More informationIT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization
IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Under Attack IT costs are now more than 50% of the average Fortune 500 company s capital costs
More informationCisco Network Assurance Engine with ServiceNow Cisco Network Assurance Engine, the industry s first SDN-ready intent assurance suite, integrates with
Solution brief Cisco Network Assurance Engine Integration with ServiceNow Continuous network verification and analysis with closed-loop incident management Challenge In monitoring service health, identifying
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationM I N S LITTLE BLACK BOOK OF JIRA SERVICE DESK ESSENTIALS
10 M I N S LITTLE BLACK BOOK OF JIRA SERVICE DESK ESSENTIALS THE ESSENTIALS OF JIRA SERVICE DESK IN 10 MINUTES Take a 10 minute break from your keyboard and we ll give you a run down of JIRA Service Desk
More informationOrchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud
Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack
More informationWeb Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012
Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2
More informationWhat s New in Release 9.2 Martin Adamčík
CA SPECTRUM Infrastructure Manager What s New in Release 9.2 Martin Adamčík Agenda New IP Routing Management New Report Management Capabilities Network Configuration Management Enhancements in r9.2 Other
More informationitsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors
itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors Dubai, June 11, 2007 Challenging Questions > Should we slow down
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationTrust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved
Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationvrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud
vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud Overview: Realizing the Full Power of the Cloud Cloud computing provides tremendous competitive advantages to companies, but
More informationSecure Foundations: Why RHEL isn t just another Linux distribution
Secure Foundations: Why RHEL isn t just another Linux distribution Lucy Kerner Principal Technical Product Marketing Manager - Security, Red Hat May 3, 2017 ONLY TWO OPERATING SYSTEMS MATTER WORLDWIDE
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationORACLE DIAGNOSTICS PACK
ORACLE DIAGNOSTICS PACK KEY FEATURES AND BENEFITS: Automatic Performance Diagnostic liberates administrators from this complex and time consuming task, and ensures quicker resolution of performance bottlenecks.
More informationRSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief
RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationManaging Performance in Liferay DXP: An Overview of Liferay Connected Services
Managing Performance in Liferay DXP: An Overview of Liferay Connected Services Executive Summary Liferay Connected Services (LCS) is an online platform that helps our customers successfully manage their
More informationRevisions to the National Board Certification Process
Revisions to the National Board Certification Process Over the last 25 years, the National Board has advanced the teaching profession by establishing and maintaining the definitive standards of accomplished
More informationSecure Science DMZ using Event-Driven SDN. Technical Solutions Cisco
Secure Science DMZ using Event-Driven SDN Tae Hwang Technical Solutions Architect @ Cisco Typical Science DMZ Architecture 1.0 What is the biggest challenge with this architecture? Internet Firewall I2
More informationRiverbed. Rapidly troubleshoot critical application and network issues using real-time infrastructure visualization and monitoring.
DATA SHEET OVERVIEW Network engineers manage complex and constantly changing networks. These networks carry business-critical services and applications, and are required to deliver high-performance while
More informationGetting Started with Cybersecurity
2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents
More informationSecureVue. SecureVue
SecureVue SecureVue Detects Cyber-Attacks Before They Impact Your Business Provides Situational Awareness to Proactively Address Enterprise Threats Ensures Quick and Easy Compliance Reporting and Documentation
More information(Office 365) Service Level Expectation
Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment
More informationWelcome to Staying Ahead Webinar
Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations
More information9.2(1)SU1 OL
Prerequisites, page 1 workflow, page 2 architecture considerations, page 2 Deployment model considerations, page 3 for Large PoD and Small PoD, page 4 for Micro Node, page 8 Prerequisites Before you plan
More informationManufacturing security: Bridging the gap between IT and OT
Manufacturing security: Bridging the gap between IT and OT For manufacturers, every new connection point is an opportunity. And a risk. The state of IT/OT security in manufacturing On the plant floor,
More informationInstallation & Basic Configuration
Installation & Basic Configuration This document is a result of work by the perfsonar Project (http://www.perfsonar.net) and is licensed under CC BY-SA 4.0 (https://creativecommons.org/licenses/by-sa/4.0/).
More information10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan
10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network
More informationUnifying the Distributed Enterprise with MPLS Mesh
Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper January 2015 Copyright 2015 AireSpring Introduction Today s modern enterprises employ IT technologies that deliver higher value,
More informationNOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave
NOAA TICAP Robert Sears NOAA/OCIO/SDD/N-Wave N-Wave Program N-Wave is a program of Federal and contract staff that manage the NOAA Enterprise Network known as N-Wave, and also supports/aligns and executes
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationOracle Fusion Middleware
Oracle Fusion Middleware User's Guide for Oracle Business Process Management 11g Release 1 (11.1.1.4.0) E15175-03 January 2011 Oracle Fusion Middleware User's Guide for Oracle Business Process Management
More informationWhat To Ask Your SD-WAN Vendor
#FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything
More informationNetwork Management Functions - Fault. Network Management
Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures
More informationUsing Event-Driven SDN for Dynamic DDoS Mitigation
Using Event-Driven SDN for Dynamic DDoS Mitigation Craig Hill Distinguished SE, US Federal crhill@cisco.com CCIE #1628 1 Concept and Content Creators The Cisco Engineering Team: Jason King Steven Carter
More informationRSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1
RSA Advanced Security Operations Richard Nichols, Director EMEA 1 What is the problem we need to solve? 2 Attackers Are Outpacing Defenders..and the Gap is Widening Attacker Capabilities The defender-detection
More informationIntroducing Cisco Network Assurance Engine
BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product
More informationCisco Prime for Enterprise Innovative Network Management
Cisco Prime for Enterprise Innovative Network Management Session ID 1 Agenda Network Management Challenges Cisco Prime for Enterprise Overview Service-Centric Foundation Common Operational Attributes Benefits
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationAdopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security
Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationITIL Event Management in the Cloud
ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum January 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationMonitoring and Troubleshooting Smaller Office Networks with Savvius Insight
TM TECH BRIEF Monitoring and Troubleshooting Smaller Office Networks with Savvius Insight With the internet and network hardware being such essential commodities, your corporate network can easily extend
More informationSOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust
More informationHow Security Policy Orchestration Extends to Hybrid Cloud Platforms
How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com
More informationIPv6 on Campus. The stuff you need to know
IPv6 on Campus The stuff you need to know Campfire! http://xkcd.com/ 742/ What is IPv6 and Why do I care? Next generation Internet addressing protocol ISPs around the world are handing out IPv6 addresses
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center Aviv Waiss, lead Cloud management Specialist 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationVirtualized Network Services SDN solution for service providers
Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers
More informationTALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT
DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.
More informationMAXIMIZING ROI FROM AKAMAI ION USING BLUE TRIANGLE TECHNOLOGIES FOR NEW AND EXISTING ECOMMERCE CUSTOMERS CONSIDERING ION CONTENTS EXECUTIVE SUMMARY... THE CUSTOMER SITUATION... HOW BLUE TRIANGLE IS UTILIZED
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationContact Center SIP Migration SYNERGY DRIVES SUCCESS
Contact Center SIP Migration SYNERGY DRIVES SUCCESS @ One Voice A Complete SIP Solution One Voice for Genesys A Complete SIP Solution for Contact Centers CUSTOMER EXPERIENCE PLATFORM A B Work Items Rules
More informationThe Modern SOC and NOC
The Modern SOC and NOC Network Operations Centers in Turkey December 2017 IT Services are Shifting Away From Asset to Business Process Support Preventive notifications Reactive break-fix Predictive analytics
More informationCisco Technical Services Advantage
Cisco Technical Services Advantage Cisco Technical Services Advantage goes beyond just fix it to help you achieve specific operational outcomes, so you can keep business processes running, accommodate
More informationOracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2. What s New
Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 4 TALENT CENTER ENHANCEMENTS... 5 My Offer
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer csaychoh@cisco.com Challenges in operating a hybrid data center
More informationTo ITIL and Beyond: Operational Discipline via Process
To ITIL and Beyond: Operational Discipline via Process Glenn O Donnell 1 To ITIL and Beyond: Operational Discipline via Process Building IT credibility with structured process discipline ITIL as a basis
More informationPragmatic Data Security. Rich Mogull Securosis
Pragmatic Data Security Rich Mogull Securosis Do you feel the pain? No standards No architectures No money Many products None of which work together All of which make the same claims, despite conflicting
More informationService Assurance in Virtualized Data Centers. A foundation for cloud services and the Software-Defined Data Center (SDDC)
Service Assurance in Virtualized Data Centers A foundation for cloud services and the Software-Defined Data Center (SDDC) Introduction IT organizations are increasing their adoption of virtualization technologies
More informationUsing ITIL to Measure Your BCP
Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP
More informationNexthink V5: What is New?
Nexthink V5: What is New? Nexthink V5 is scheduled to be released at the end of December 2013. Watch a preview at http://www.nexthink.com/itanalytics/v5/. Nexthink will host two events in January 2014
More informationForescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0
Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationCisco Integration Platform
Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product
More informationIBM Vulnerability Management Service
Service Description 1. Service Overview IBM Vulnerability Management Service IBM Vulnerability Management Service (called VMS or Service ) is designed to provide a comprehensive, Web-driven vulnerability
More informationOpen-Falcon A Distributed and High-Performance Monitoring System. Yao-Wei Ou & Lai Wei 2017/05/22
Open-Falcon A Distributed and High-Performance Monitoring System Yao-Wei Ou & Lai Wei 2017/05/22 Let us begin with a little story Grafana PR#3787 [feature] Add Open-Falcon datasource I'm sorry but we will
More informationFRONT USER GUIDE Getting Started with Front
USER GUIDE USER GUIDE Getting Started with Front ESSENTIALS Teams That Use Front How To Roll Out Front Quick Start Productivity Tips Downloading Front Adding Your Team Inbox Add Your Own Work Email Update
More informationSDN, SD-WAN, NFV, VNF I m confused!
SDN, SD-WAN, NFV, VNF I m confused! Presenter: Tim Sullivan CEO, Coevolve @timsullo April 2017 Introduction to Coevolve Coevolve was established in 2014 to help drive enterprise adoption of next-generation
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationBUILDING AND MAINTAINING SOC
BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:
More informationSession 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights
Session 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights ITIL Success: Five Years Later Paul Fibkins Director and Founder, FIBKO LLC fibkinsp@hotmail.com Session Description In 2007,
More informationRSA IT Security Risk Management
RSA IT Security Risk Adding Insight to Security March 18, 2014 Wael Jaroudi GRC Sales Specialist 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity
More informationSmartsheet for Jira Visibility is the Key to Velocity
Smartsheet for Jira Visibility is the Key to Velocity Joe Stanfill Sr. Manager, Marketing Smartsheet Benita Howe VP, PMO and Business Operations IgniteTech Certain information set forth in this presentation
More informationIntroduction to Cisco UCS Central
Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management
More informationVisual TruView Unified Network and Application Performance Management Focused on the Experience of the End User
Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User BUSINESS CHALLENGE Problems can occur anywhere from the physical layer to wireless, across
More informationData Center Automation
Data Center Automation About Arista Networks 10/40/100GbE Networks for the Virtualized Cloud & Data Center Founded in 2004 Shipping Since Mid-2008 ANET, IPO (NYSE) in June 2014 1000+ Employees More than
More informationAdvisorSLA. The next IP SLA generation Solution. Advisor SLA. Network & Application Performance Monitoring Solution.
- The next IP SLA generation Solution Advisor SLA Network & Application Performance Monitoring Solution 2 Advisor SLA Network & Application Performance Monitoring Solution. Executive Summary The Advisor
More informationSTRATEGIC PLAN
STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationImplementing CiscoWorks LMS 4.0 (CWLMS)
Implementing CiscoWorks LMS 4.0 (CWLMS) Course Overview: Implementing CiscoWorks LMS (CWLMS) v4.0 teaches learners how to use CiscoWorks LAN Management Solution (LMS) 4.0 to manage their network. The focus
More informationLevel 3 SM Enhanced Management Thresholds and Alerts Customer FAQs
Level 3 SM Enhanced Management Thresholds and Alerts Customer FAQs These Frequently Asked Questions relate to the Enhanced Management Thresholds and Alert feature 2015 Level 3 Communications, LLC. All
More informationArchitecting the Right SOA Infrastructure
Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA
More informationWHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD
WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD CONTENTS EXECUTIVE SUMMARY 1 MULTI-CLOUD CHANGES THE SECURITY EQUATION 2 SECTION 1: CLOUD SILOS IMPAIR VISIBILITY AND RESPONSE 3
More information