GlobalNOC Services Update Internet2 Global Summit

Size: px
Start display at page:

Download "GlobalNOC Services Update Internet2 Global Summit"

Transcription

1 GlobalNOC Services Update 2015 Internet2 Global Summit

2 Annual Report 4/28/15

3 Service Desk Year in Review: Welcomed ARE-ON and OSHEAN to the GlobalNOC Family All I2 FootPrints Projects Consolidated Into 1 = 1/5 of the Former Notifications Grown by 4 Staff and 1 Robot April 28, 2015

4 Service Desk Year in Review: Conducted DR Exercise in Early December 2015 with Positive Result Created and Implemented a Major Incident Communication Policy April 28, 2015

5 Service Desk Activity Metrics for million alarms/year ~ 5200/day 30,000 tickets created/year ~ 82/day 15,600 phone calls received/year ~ 43/day 264,000 s sent and received ~ 720/ day April 28, 2015

6 Year Ahead: Service Desk Pursuing ISO 20,000 certification Why? By When? What Will the Net Effect Be?

7 2015 Priorities

8 2015 Focus Areas

9 Automation

10 Goal Find the worst things to do by hand. Make a machine do those things. Things that are: Dangerous Slow Annoying

11 Focus Areas Business Processes on-call button auto-assign issues auto-notify auto-discover devices in a new network Reporting How many times did we call an engineer? Config automation alerting on config drift generate template config for new boxes push & pipeline Incident Advisor auto-fix hints Annoying

12 Service Management

13 Goal MINIMIZE unplanned work confusion inconsistency Stay flexibile, agile, and custom

14 Huh? STANDARDIZE: for processes where consistency is most important ORGANIZE: a simple lightweight structure where custom and novel work happens

15 2 Parts Part 1: ISO/IEC Certification Sparked by Internet2 effort, working to reach certification Aligned with ITIL Incident Management Change Management Capacity Management Availability Management etc

16 2 Parts Part 2: Other service-level improvements Service Dashboard (end users, network owners) Prioritize improvements Faster Turn-up Change Management

17 So what It s not good enough anymore to talk about boxes and circuits. Everything is more complicated now. We don t deliver networks, we deliver services Requires rigor to make sure those services work, and agility to make sure those services evolve quickly

18 example What s the availability of everyone s IP Service for Internet2? complexities: multiple sessions connectors back each other up Let s define available! First, a service is down if packets have to be retransmitted So: Up = ALL BGP sessions are established, no loss known At Risk = At least 1 session is down, but at least one route is still in the routing table Down = no routes

19 Data Model Entity Routed R&E Service BGP Routing Data Peer State Routes BGP Peering BGP Peering ASN Peer IP SLA Reporting Engine Weekly Report

20 Service Awareness

21 Corresponding process S y s report generated SLA met? no send to NPT N T P yes outage in GRNOC control? yes recommend changes Dir of Op no Approve Changes? no Recommended Changes N et w or k O w n er Published Report yes Published Report with Outline of Changes

22 Work Management

23 Goal Get coherent system to manage our work systems tools disciplines processes In other words, track, prioritize, and measure everything we do.

24 This means For the people who do work: "Where do I go to see everything I'm supposed to be doing? What should I be doing first? For the managers: "Are we too busy? Are we working on the right things? For the strategic view: "Are we doing well/better than a year ago?

25 How does work get tracked Tickets s Post-its Workflow records Meeting docs Many todo lists

26 The future Review ticketing Look at structured processes Project management Unified view of workload and results

27 Recruiting

28 Goal Make sure we have enough talented people now and 5 years from now

29 Parts Attract & hire Pipeline Get more students in Improve Development

30 Attracting How do we attract experts that fit? Challenges Scary job descriptions People don t know what R&E or GlobalNOC does Indiana - No really, it s a nice place!

31 Pipeline Getting people into the pipeline Students have worked very well Summer of Networking How do we get more? Keeping the talent growing Develop people well Level up!

32 What s New With GlobalNOC Software?

33 SNAPP High performance SNMP measurement/visualization tool 3 major revisions, project began in 2002 RRDtool based storage High performance SNMP data collector Web-based data browser and Web-services API

34 SNAPP 4 with TSDS Moving from RRDtool to a non-relational database TSDS Database based on MongoDB Sophisticated query language: TSQL Rich meta-data integrated with data. Allows for powerful queries; long-term longitudinal analysis General Time Series Data Store, not just SNMP data Ex. NOC activity metrics / key performance indicators; optical characteristics (light levels, loss, etc.); environmental/power data; aggregate flow data; OWAMP; BWCTL

35

36 Alertmon Improvements Alert Collapsing Collapse services on a host when host is not reachable Root cause analysis based on dependency graph allows for intelligent collapsing of alerts and suggests root cause of multiple alerts. Monitoring of management VPN endpoints to collapse alerts behind VPN when management network access is impaired

37

38

39

40 NOAA Operations Portal High-level overview of network status Operational Status Map Performance Measurement Overview Operations Calendars Detailed data pulled from other GlobalNOC tools Multi-network aggregate views

41

42

43

44 SciPass Science DMZ Campus Networks are enterprise infrastructure large number of small flows security is a required capability not elephant flow friendly could just bypass but that doesn t provide required security what about performance assurance? 19

45 Combine OpenFlow Switch Bro PerfSonar create reactive system default to secure / slow path use IDS to control what goes on fast path Approach

46 Reactive Bypass Performance 64 ms - time to detect and bypass 250 ms - doubled throughput of firewall 1.5 sec - same throughput as no firewall

47 Find Out More Software Page Code Repository

48 FlowSpace Firewall Developed in partnership with Internet2 Open Source Software OpenFlow Hypervisor Slice OpenFlow 1.0 based on VLAN ID Currently running on Internet2 AL2S Other deployments growing. We re interested in helping get FlowSpace Firewall running on your OpenFlow network More Information/Download:

Move beyond the expected.

Move beyond the expected. Infrastructure Management & Monitoring for Business-Critical Continuity TM Move beyond the expected. The Avocent Data Center Planner Taking data center operations to the next level Execution Availability

More information

Oracle Diagnostics Pack For Oracle Database

Oracle Diagnostics Pack For Oracle Database Oracle Diagnostics Pack For Oracle Database ORACLE DIAGNOSTICS PACK FOR ORACLE DATABASE Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line, and provides the industry

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor

More information

IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization

IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Under Attack IT costs are now more than 50% of the average Fortune 500 company s capital costs

More information

Cisco Network Assurance Engine with ServiceNow Cisco Network Assurance Engine, the industry s first SDN-ready intent assurance suite, integrates with

Cisco Network Assurance Engine with ServiceNow Cisco Network Assurance Engine, the industry s first SDN-ready intent assurance suite, integrates with Solution brief Cisco Network Assurance Engine Integration with ServiceNow Continuous network verification and analysis with closed-loop incident management Challenge In monitoring service health, identifying

More information

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, 2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered

More information

M I N S LITTLE BLACK BOOK OF JIRA SERVICE DESK ESSENTIALS

M I N S LITTLE BLACK BOOK OF JIRA SERVICE DESK ESSENTIALS 10 M I N S LITTLE BLACK BOOK OF JIRA SERVICE DESK ESSENTIALS THE ESSENTIALS OF JIRA SERVICE DESK IN 10 MINUTES Take a 10 minute break from your keyboard and we ll give you a run down of JIRA Service Desk

More information

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack

More information

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012

Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Web Hosting: Mason Home Page Server (Jiju) Service Level Agreement 2012 Table of Contents 1 General Overview... 2 2 Service Description... 2 2.1 Service Scope... 2 2.1.1 Eligibility Requirements... 2 2.1.2

More information

What s New in Release 9.2 Martin Adamčík

What s New in Release 9.2 Martin Adamčík CA SPECTRUM Infrastructure Manager What s New in Release 9.2 Martin Adamčík Agenda New IP Routing Management New Report Management Capabilities Network Configuration Management Enhancements in r9.2 Other

More information

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors Dubai, June 11, 2007 Challenging Questions > Should we slow down

More information

SIEM Solutions from McAfee

SIEM Solutions from McAfee SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an

More information

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved Trust in the Cloud Mike Foley RSA Virtualization Evangelist 2009/2010/2011 1 2010 VMware Inc. All rights reserved Agenda How do you solve for Trust = Visibility + Control? What s needed to build a Trusted

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud Overview: Realizing the Full Power of the Cloud Cloud computing provides tremendous competitive advantages to companies, but

More information

Secure Foundations: Why RHEL isn t just another Linux distribution

Secure Foundations: Why RHEL isn t just another Linux distribution Secure Foundations: Why RHEL isn t just another Linux distribution Lucy Kerner Principal Technical Product Marketing Manager - Security, Red Hat May 3, 2017 ONLY TWO OPERATING SYSTEMS MATTER WORLDWIDE

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

ORACLE DIAGNOSTICS PACK

ORACLE DIAGNOSTICS PACK ORACLE DIAGNOSTICS PACK KEY FEATURES AND BENEFITS: Automatic Performance Diagnostic liberates administrators from this complex and time consuming task, and ensures quicker resolution of performance bottlenecks.

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

Managing Performance in Liferay DXP: An Overview of Liferay Connected Services

Managing Performance in Liferay DXP: An Overview of Liferay Connected Services Managing Performance in Liferay DXP: An Overview of Liferay Connected Services Executive Summary Liferay Connected Services (LCS) is an online platform that helps our customers successfully manage their

More information

Revisions to the National Board Certification Process

Revisions to the National Board Certification Process Revisions to the National Board Certification Process Over the last 25 years, the National Board has advanced the teaching profession by establishing and maintaining the definitive standards of accomplished

More information

Secure Science DMZ using Event-Driven SDN. Technical Solutions Cisco

Secure Science DMZ using Event-Driven SDN. Technical Solutions Cisco Secure Science DMZ using Event-Driven SDN Tae Hwang Technical Solutions Architect @ Cisco Typical Science DMZ Architecture 1.0 What is the biggest challenge with this architecture? Internet Firewall I2

More information

Riverbed. Rapidly troubleshoot critical application and network issues using real-time infrastructure visualization and monitoring.

Riverbed. Rapidly troubleshoot critical application and network issues using real-time infrastructure visualization and monitoring. DATA SHEET OVERVIEW Network engineers manage complex and constantly changing networks. These networks carry business-critical services and applications, and are required to deliver high-performance while

More information

Getting Started with Cybersecurity

Getting Started with Cybersecurity 2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents

More information

SecureVue. SecureVue

SecureVue. SecureVue SecureVue SecureVue Detects Cyber-Attacks Before They Impact Your Business Provides Situational Awareness to Proactively Address Enterprise Threats Ensures Quick and Easy Compliance Reporting and Documentation

More information

(Office 365) Service Level Expectation

(Office 365) Service Level Expectation Email SLE Service Overview... 2 Service Features... 2 Service Warranty... 3 Support Model... 3 Support Hours and Initial Response Times... 4 Support Request Resolution Targets... 5 Service Request Fulfillment

More information

Welcome to Staying Ahead Webinar

Welcome to Staying Ahead Webinar Welcome to Staying Ahead Webinar Migrating to NNMi 1 Footer Goes Here Agenda 1. NNMi features and benefits 2. PSQS / Education offerings around NNMi 3. Q&A 2 Footer Goes Here Streamline your network operations

More information

9.2(1)SU1 OL

9.2(1)SU1 OL Prerequisites, page 1 workflow, page 2 architecture considerations, page 2 Deployment model considerations, page 3 for Large PoD and Small PoD, page 4 for Micro Node, page 8 Prerequisites Before you plan

More information

Manufacturing security: Bridging the gap between IT and OT

Manufacturing security: Bridging the gap between IT and OT Manufacturing security: Bridging the gap between IT and OT For manufacturers, every new connection point is an opportunity. And a risk. The state of IT/OT security in manufacturing On the plant floor,

More information

Installation & Basic Configuration

Installation & Basic Configuration Installation & Basic Configuration This document is a result of work by the perfsonar Project (http://www.perfsonar.net) and is licensed under CC BY-SA 4.0 (https://creativecommons.org/licenses/by-sa/4.0/).

More information

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan 10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper January 2015 Copyright 2015 AireSpring Introduction Today s modern enterprises employ IT technologies that deliver higher value,

More information

NOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave

NOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave NOAA TICAP Robert Sears NOAA/OCIO/SDD/N-Wave N-Wave Program N-Wave is a program of Federal and contract staff that manage the NOAA Enterprise Network known as N-Wave, and also supports/aligns and executes

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware User's Guide for Oracle Business Process Management 11g Release 1 (11.1.1.4.0) E15175-03 January 2011 Oracle Fusion Middleware User's Guide for Oracle Business Process Management

More information

What To Ask Your SD-WAN Vendor

What To Ask Your SD-WAN Vendor #FutureWAN What To Ask Your SD-WAN Vendor Ramesh Prabagaran, VP of Product Management Twitter: @ramsba Motivation & Rationale Marketing vs Reality Network auto provisions, auto corrects, auto everything

More information

Network Management Functions - Fault. Network Management

Network Management Functions - Fault. Network Management Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures

More information

Using Event-Driven SDN for Dynamic DDoS Mitigation

Using Event-Driven SDN for Dynamic DDoS Mitigation Using Event-Driven SDN for Dynamic DDoS Mitigation Craig Hill Distinguished SE, US Federal crhill@cisco.com CCIE #1628 1 Concept and Content Creators The Cisco Engineering Team: Jason King Steven Carter

More information

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1 RSA Advanced Security Operations Richard Nichols, Director EMEA 1 What is the problem we need to solve? 2 Attackers Are Outpacing Defenders..and the Gap is Widening Attacker Capabilities The defender-detection

More information

Introducing Cisco Network Assurance Engine

Introducing Cisco Network Assurance Engine BRKACI-2403 Introducing Cisco Network Assurance Engine Intent Based Networking for Data Centers Sundar Iyer, Distinguished Engineer Head Cisco Network Assurance Engine Team Dhruv Jain, Director of Product

More information

Cisco Prime for Enterprise Innovative Network Management

Cisco Prime for Enterprise Innovative Network Management Cisco Prime for Enterprise Innovative Network Management Session ID 1 Agenda Network Management Challenges Cisco Prime for Enterprise Overview Service-Centric Foundation Common Operational Attributes Benefits

More information

Enhanced Threat Detection, Investigation, and Response

Enhanced Threat Detection, Investigation, and Response Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

by Cisco Intercloud Fabric and the Cisco

by Cisco Intercloud Fabric and the Cisco Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

ITIL Event Management in the Cloud

ITIL Event Management in the Cloud ITIL Event Management in the Cloud An AWS Cloud Adoption Framework Addendum January 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

WAN Application Infrastructure Fueling Storage Networks

WAN Application Infrastructure Fueling Storage Networks WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Monitoring and Troubleshooting Smaller Office Networks with Savvius Insight

Monitoring and Troubleshooting Smaller Office Networks with Savvius Insight TM TECH BRIEF Monitoring and Troubleshooting Smaller Office Networks with Savvius Insight With the internet and network hardware being such essential commodities, your corporate network can easily extend

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

How Security Policy Orchestration Extends to Hybrid Cloud Platforms How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com

More information

IPv6 on Campus. The stuff you need to know

IPv6 on Campus. The stuff you need to know IPv6 on Campus The stuff you need to know Campfire! http://xkcd.com/ 742/ What is IPv6 and Why do I care? Next generation Internet addressing protocol ISPs around the world are handing out IPv6 addresses

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Automating the Software-Defined Data Center with vcloud Automation Center

Automating the Software-Defined Data Center with vcloud Automation Center Automating the Software-Defined Data Center with vcloud Automation Center Aviv Waiss, lead Cloud management Specialist 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business

More information

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,

More information

Virtualized Network Services SDN solution for service providers

Virtualized Network Services SDN solution for service providers Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers

More information

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.

More information

MAXIMIZING ROI FROM AKAMAI ION USING BLUE TRIANGLE TECHNOLOGIES FOR NEW AND EXISTING ECOMMERCE CUSTOMERS CONSIDERING ION CONTENTS EXECUTIVE SUMMARY... THE CUSTOMER SITUATION... HOW BLUE TRIANGLE IS UTILIZED

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Contact Center SIP Migration SYNERGY DRIVES SUCCESS

Contact Center SIP Migration SYNERGY DRIVES SUCCESS Contact Center SIP Migration SYNERGY DRIVES SUCCESS @ One Voice A Complete SIP Solution One Voice for Genesys A Complete SIP Solution for Contact Centers CUSTOMER EXPERIENCE PLATFORM A B Work Items Rules

More information

The Modern SOC and NOC

The Modern SOC and NOC The Modern SOC and NOC Network Operations Centers in Turkey December 2017 IT Services are Shifting Away From Asset to Business Process Support Preventive notifications Reactive break-fix Predictive analytics

More information

Cisco Technical Services Advantage

Cisco Technical Services Advantage Cisco Technical Services Advantage Cisco Technical Services Advantage goes beyond just fix it to help you achieve specific operational outcomes, so you can keep business processes running, accommodate

More information

Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2. What s New

Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2. What s New Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 4 TALENT CENTER ENHANCEMENTS... 5 My Offer

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics Christopher Say (CCIE RS SP) Consulting System Engineer csaychoh@cisco.com Challenges in operating a hybrid data center

More information

To ITIL and Beyond: Operational Discipline via Process

To ITIL and Beyond: Operational Discipline via Process To ITIL and Beyond: Operational Discipline via Process Glenn O Donnell 1 To ITIL and Beyond: Operational Discipline via Process Building IT credibility with structured process discipline ITIL as a basis

More information

Pragmatic Data Security. Rich Mogull Securosis

Pragmatic Data Security. Rich Mogull Securosis Pragmatic Data Security Rich Mogull Securosis Do you feel the pain? No standards No architectures No money Many products None of which work together All of which make the same claims, despite conflicting

More information

Service Assurance in Virtualized Data Centers. A foundation for cloud services and the Software-Defined Data Center (SDDC)

Service Assurance in Virtualized Data Centers. A foundation for cloud services and the Software-Defined Data Center (SDDC) Service Assurance in Virtualized Data Centers A foundation for cloud services and the Software-Defined Data Center (SDDC) Introduction IT organizations are increasing their adoption of virtualization technologies

More information

Using ITIL to Measure Your BCP

Using ITIL to Measure Your BCP Using ITIL to Measure Your BCP 1 Agenda ITIL v3 Overview Why Use ITIL ITIL Continual Improvement Process Critical Success Factors and Key Performance Indicators Creating Metrics Scoring System Sample BCP

More information

Nexthink V5: What is New?

Nexthink V5: What is New? Nexthink V5: What is New? Nexthink V5 is scheduled to be released at the end of December 2013. Watch a preview at http://www.nexthink.com/itanalytics/v5/. Nexthink will host two events in January 2014

More information

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0 Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Cisco Integration Platform

Cisco Integration Platform Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product

More information

IBM Vulnerability Management Service

IBM Vulnerability Management Service Service Description 1. Service Overview IBM Vulnerability Management Service IBM Vulnerability Management Service (called VMS or Service ) is designed to provide a comprehensive, Web-driven vulnerability

More information

Open-Falcon A Distributed and High-Performance Monitoring System. Yao-Wei Ou & Lai Wei 2017/05/22

Open-Falcon A Distributed and High-Performance Monitoring System. Yao-Wei Ou & Lai Wei 2017/05/22 Open-Falcon A Distributed and High-Performance Monitoring System Yao-Wei Ou & Lai Wei 2017/05/22 Let us begin with a little story Grafana PR#3787 [feature] Add Open-Falcon datasource I'm sorry but we will

More information

FRONT USER GUIDE Getting Started with Front

FRONT USER GUIDE Getting Started with Front USER GUIDE USER GUIDE Getting Started with Front ESSENTIALS Teams That Use Front How To Roll Out Front Quick Start Productivity Tips Downloading Front Adding Your Team Inbox Add Your Own Work Email Update

More information

SDN, SD-WAN, NFV, VNF I m confused!

SDN, SD-WAN, NFV, VNF I m confused! SDN, SD-WAN, NFV, VNF I m confused! Presenter: Tim Sullivan CEO, Coevolve @timsullo April 2017 Introduction to Coevolve Coevolve was established in 2014 to help drive enterprise adoption of next-generation

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

Session 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights

Session 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights Session 408 Tuesday, October 22, 10:00 AM - 11:00 AM Track: Industry Insights ITIL Success: Five Years Later Paul Fibkins Director and Founder, FIBKO LLC fibkinsp@hotmail.com Session Description In 2007,

More information

RSA IT Security Risk Management

RSA IT Security Risk Management RSA IT Security Risk Adding Insight to Security March 18, 2014 Wael Jaroudi GRC Sales Specialist 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity

More information

Smartsheet for Jira Visibility is the Key to Velocity

Smartsheet for Jira Visibility is the Key to Velocity Smartsheet for Jira Visibility is the Key to Velocity Joe Stanfill Sr. Manager, Marketing Smartsheet Benita Howe VP, PMO and Business Operations IgniteTech Certain information set forth in this presentation

More information

Introduction to Cisco UCS Central

Introduction to Cisco UCS Central Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management

More information

Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User

Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User BUSINESS CHALLENGE Problems can occur anywhere from the physical layer to wireless, across

More information

Data Center Automation

Data Center Automation Data Center Automation About Arista Networks 10/40/100GbE Networks for the Virtualized Cloud & Data Center Founded in 2004 Shipping Since Mid-2008 ANET, IPO (NYSE) in June 2014 1000+ Employees More than

More information

AdvisorSLA. The next IP SLA generation Solution. Advisor SLA. Network & Application Performance Monitoring Solution.

AdvisorSLA. The next IP SLA generation Solution. Advisor SLA. Network & Application Performance Monitoring Solution. - The next IP SLA generation Solution Advisor SLA Network & Application Performance Monitoring Solution 2 Advisor SLA Network & Application Performance Monitoring Solution. Executive Summary The Advisor

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Implementing CiscoWorks LMS 4.0 (CWLMS)

Implementing CiscoWorks LMS 4.0 (CWLMS) Implementing CiscoWorks LMS 4.0 (CWLMS) Course Overview: Implementing CiscoWorks LMS (CWLMS) v4.0 teaches learners how to use CiscoWorks LAN Management Solution (LMS) 4.0 to manage their network. The focus

More information

Level 3 SM Enhanced Management Thresholds and Alerts Customer FAQs

Level 3 SM Enhanced Management Thresholds and Alerts Customer FAQs Level 3 SM Enhanced Management Thresholds and Alerts Customer FAQs These Frequently Asked Questions relate to the Enhanced Management Thresholds and Alert feature 2015 Level 3 Communications, LLC. All

More information

Architecting the Right SOA Infrastructure

Architecting the Right SOA Infrastructure Infrastructure Architecture: Architecting the Right SOA Infrastructure Robert Insley Principal SOA Global Technology Services 2007 IBM Corporation SOA Architect Summit Roadmap What is the impact of SOA

More information

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD CONTENTS EXECUTIVE SUMMARY 1 MULTI-CLOUD CHANGES THE SECURITY EQUATION 2 SECTION 1: CLOUD SILOS IMPAIR VISIBILITY AND RESPONSE 3

More information