HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

Similar documents
Data Center Infrastructure Management (DCIM) Demystified

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

Cisco Start. IT solutions designed to propel your business

Data Center Consolidation and Migration Made Simpler with Visibility

Automating IT Asset Visualisation

Managing intranets: opportunities and challenges

Controlling Costs and Driving Agility in the Datacenter

APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS

Changing the way companies run their data centers

PAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..

Perfect Balance of Public and Private Cloud

Accelerate Your Enterprise Private Cloud Initiative

Balancing the pressures of a healthcare SQL Server DBA

Symantec NetBackup 7 for VMware

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

Making the most of DCIM. Get to know your data center inside out

Remodel. New server deployment time is reduced from weeks to minutes

HOW BUSINESS FUNCTIONS ARE DRIVING PUBLIC CLOUD ADOPTION ACROSS THE TECHNOLOGY, MEDIA & ENTERTAINMENT INDUSTRY

INTELLIGENCE DRIVEN GRC FOR SECURITY

A Model for Resilience

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

Ensuring a Successful DCIM Project. What You Need to Know. Paul Goodison CEO, Cormant Inc.

Hitachi Adaptable Modular Storage and Hitachi Workgroup Modular Storage

AN APPLICATION-CENTRIC APPROACH TO DATA CENTER MIGRATION

Asia/Pacific: Systems Consolidation, Hype or Reality?

Modern Database Architectures Demand Modern Data Security Measures

Networking for a dynamic infrastructure: getting it right.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Symantec Data Center Transformation

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Symantec Data Center Migration Service

10 Hidden IT Risks That Might Threaten Your Business

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

The State of Data Center Health Management Strategy 2017

WHITE PAPER. Navigating the Cloud. Key factors for long term success

Why Enterprises Need to Optimize Their Data Centers

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Hitachi Adaptable Modular Storage and Workgroup Modular Storage

The Microsoft Large Mailbox Vision

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Choosing the Right Cloud Computing Model for Data Center Management

BUSINESS CONTINUITY: THE PROFIT SCENARIO

When Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

Simplified. Software-Defined Storage INSIDE SSS

Smart Data Center Solutions

DCIM and how it helps deliver the InteropNet. Paul Goodison CEO, Cormant Inc CORMANT

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

Tips for Effective Patch Management. A Wanstor Guide

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Accelerating the Business Value of Virtualization

How the WAN is Driving Digital Transformation. An IDC InfoBrief, Sponsored by

MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT

Governance for the Public Sector Cloud

White paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth

Best Practices in Securing a Multicloud World

Cisco Director Class SAN Planning and Design Service

Guide. A small business guide to data storage and backup

CA Security Management

Why Converged Infrastructure?

The data quality trends report

Availability and the Always-on Enterprise: Why Backup is Dead

The Value of Force.com as a GRC Platform

The Business Case for Network Segmentation

Overcoming the Challenges of Server Virtualisation

Careful What You Wish For: Poor Colocation Design Could Cost You. Thorough assessment of upfront costs to prevent future system failures

Now on Now: How ServiceNow has transformed its own GRC processes

Backup 2.0: Simply Better Data Protection

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

TEL2813/IS2820 Security Management

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Change & Configuration Management Market

Cisco CloudCenter Use Case Summary

A Methodology to Build Lasting, Intelligent Cybersecurity Programs

CLOUD COMPUTING PRIMER

Networking for a smarter data center: Getting it right

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Breakdown of Some Common Website Components and Their Costs.

A Practical Guide to Cost-Effective Disaster Recovery Planning

How Industrial PoE Switches Facilitate Reliable Outdoor IP Surveillance Networks. Jackey Hsueh Product Manager

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality

Instant evolution in the age of digitization. Turn technology into your competitive advantage

The Windstream Enterprise Advantage for Banking

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

Tripwire State of Container Security Report

Introduction to Business continuity Planning

The 7 Habits of Highly Effective API and Service Management

Uncovering the Full Potential of Avid Unity MediaNetworks

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Discover the all-flash storage company for the on-demand world

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

Converged Cloud and Digital Transformation: A Strategy for Business Success

Enabling efficiency through Data Governance: a phased approach

Government IT Modernization and the Adoption of Hybrid Cloud

ArcSight Activate Framework

Transcription:

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

ARE YOU REALLY READY TO EXECUTE A GLOBAL IOT STRATEGY? Increased demand driven by long-term trends of the Internet of Things, WLAN, connected LED lighting and office densification means that for the enterprise IT infrastructure project owner, the game has changed. It has become second-nature for enterprise organizations to include the bandwidth and storage requirements of IP-enabled devices such as CCTV, security and access control when designing a corporate LAN; however, the relentless march of technology and the ubiquity of high-speed connectivity mean the variety and availability of IP-addressable devices is growing rapidly. As organizations turn to technology to improve operations and reduce costs, the new challenge for project owners is to position systems to cope with an unknowable future. By its very nature, an enterprise-wide IoT strategy will need to be delivered across multiple sites, which requires significant planning and a consistent approach to design, installation and commissioning, as well as full visibility of geographically-distant project sites. In this situation it s vital each installation is delivered consistently to guarantee longterm functionality and cost savings. How do you make sure the Scope of Work, BOM and design are documented sufficiently to provide clarity, consistency and international regulatory compliance when corporate risk mitigation is non-negotiable? at each site. This is particularly relevant in international deployments where local regulations (as well as attitudes towards employee / third-party safety and the importance of insurances) differ from installer to installer, let alone country to country. For global IoT or IP-network deployments then, the lack of a central deployment advisor providing full global support is a potential hurdle when regulatory compliance and risk mitigation are non-negotiable. Delivering on an IoT or wider IP-enabled strategy requires significant thought and a method of working that ensures the maximum benefit is derived from emerging technologies. A successful enterprise-wide deployment requires a consistent approach to design, planning, installation and commissioning, as well as accurate project progress reporting on geographically distant sites. Finally, the cost savings gained through shortening the supply chain and the economies of scale generated by taking a consistent approach to purchasing also start to come to prominence, which can only be a good thing when budgets are tight. Achieving this can be a real problem for enterprise project owners when you consider that the geographies involved will almost certainly mean a different installer is required www.molexces.com / 2

What are the issues? Because of the pressure added by the Internet of Things (IoT) on IT infrastructure and data centers, visibility and control are now critical. Poor network management is not an option, certainly not with the IoT. Many organizations believe they have their finger on the pulse with regard to accurate asset management in their data centers and IT infrastructures but 90% of the time that simply isn t true; it s very common for audit teams to regularly uncover many more IT assets than data center owner previously assumed existed. In an effort try and maintain up to date infrastructure knowledge, it s become common for system and network administrators to maintain quite complex documentation of racks, devices, links and network resources they have under their control. Typically all that information is recorded in spreadsheets, which need to be updated every time a change is made. In theory it provides a solution that can be trusted but only when a single person is doing the job and updating the records - add more people working on network Moves, Adds and Changes (MAC) and an accurate overview can quickly deteriorate into fog. When information is stored in different places or isn t recorded accurately it results in poor hand-off from one task to the next, systems stop working and trust in the process disappears. Without established processes and a solid IT audit and documentation system in place, an organization lacks the vital information required to create a scalable foundation for the future. Customers will complain their issues get lost, workloads become duplicated due to the lack of visibility and the problems that people have now are getting worse as the complexity increases

The benefits of an IT Asset Audit and Documentation system The increasing density and complexity of modern IT infrastructures means it has become even more difficult to understand network, SAN and power connectivity. Naturally, this leads to a requirement for accurate and timely management information, such as capacity reporting, risk assessments, change records and audit trails, which also add to the workload of technical staff. Improving the documentation of the existing physical infrastructure is a quick way to increase team productivity and reduce project workload. An IT Asset Audit and Documentation (IPAAD) system empowers customers to make smart decisions about their IT infrastructure. It can make a business more competitive by enabling users to evaluate their IT strengths and weaknesses and identify opportunities for improvement. They will know absolutely when they are doing things correctly and can course-correct more quickly when they re not. Understanding the details of assets, their power and network connections, enables highly accurate capacity planning to the port or rack U level. Critical connections can be automatically and easily identified, reducing the risks of failure. Planning, migrations and changes are easily accomplished. Employee productivity dramatically increases as processes and workflows are implemented to ensure stress-free moves, adds, changes. Having a system in place that supports business processes can also enable growth by providing a blueprint for new employees to work from and it enables cross-training to minimize business interruption in cases of illness or employee turnover. This of course, applies to any distributed IT infrastructure. By the way, just searching for poorly titled or misplaced documents costs organizations an average of $3,900 per employee, per year (source: Marissa Brassfield - Productivity Losses ). Finally, it can also drive profitability by enabling users to discover efficiency improvement opportunities without sacrificing quality and consistency. Duplication of effort can be identified, as can areas of neglect. Users maximize the value of everything they do by ensuring it can be leveraged elsewhere, ultimately saving time, effort and cost. In short, this technology: Identifies the location, connectivity, dependencies or ownership of any component within seconds across multiple sites Automates the creation and maintenance of Visio diagrams covering floor plans, racks, networks, power and single points of failure Controls capacity at multiple levels ports, cards, equipment, space, power, rooms, etc. space, power, storage, firewalls, etc. Reduces power consumption by optimizing asset utilization Adopting a solid asset management solution will minimize human error. By having a baseline model library of devices that the customer can choose from, the ability to drag and drop devices into racks in an application and create a rack elevation view (both front and rear) that clearly shows what the rack looks like populated with devices, is proven to reduce human error drastically. www.molexces.com / 4

How does it work? An IT Asset Audit and Documentation system looks after the hardware elements of the infrastructure. It combines the physical changes, (where equipment is located, space reservation in racks and projects, how equipment connects together) with all the various trusted sources you may already have, such as spreadsheets, discovery systems, Word document recovery plans etc. From this combination of inputs, the system will produce various types of outputs from a common source, such as reports, so that the capacity within a datacenter or IT Infrastructure can be understood. Equally, the user might wish to understand space utilization, power connectivity or the impact of changes; the system can produce various types of Excel abstracts for custom reporting and to help kick-start projects. It can also generate various types of visual outputs, such as floor and rack diagrams and network diagrams. Once an initial audit is completed, the accuracy of the data can be maintained easily using the system. It s quite common for users to perform site surveys when they aren t sure of something and once in place, an IT Asset Audit and Documentation system can dramatically reduce (if not eliminate) site surveys, which means projects can be delivered more quickly. Via automated diagrams, an IT Asset Audit and Documentation system makes it easier to understand interdependencies between components. It leverages the Microsoft Visio package to automatically draw diagrams, so, rather than creating a rack schematic manually from scratch with Excel or Visio, which would normally take two to three hours, the same task can be accomplished in just a few seconds with a few clicks. The process can be totally automated, which mean thousands of rack diagrams can be generated every night. This simple improvement to the way the existing physical infrastructure is documented provides a quick way to increase team productivity and reduce project workload.

Is this just another discovery engine? No, IT Asset Audit and Documentation from Molex isn t a discovery engine! The promise with discovery engines is that they ll provide accurate data in real time because of the tool but the reality is that it s the processes and workflows that provide accurate data. It s not good enough to know what you have, you must also know what you have planned and allocated. A discovery engine will verify the active equipment already installed and in operation but it can t tell you how cabling runs between devices or where a device is located. It won t discover offline devices either and importantly, it can t identify or report what MAC work somebody else has planned and therefore, the risks posed by change or disruption. All in all, discovery engines claim to provide a quick way to get control and understanding across multiple teams and locations but in reality all they give you is a letterbox view of the active components in a system and yet another set of data that needs to be managed on the top of that which already exists. What are the impacts of not implementing an asset management strategy? It s impossible to manage or plan, for example, a data center or IT infrastructure effectively if you can t see what you have - visibility is essential. Without an accurate view of IT infrastructure assets, management decisions have significant potential to be based on bad or corrupted data, which will result in bad choices; it s not just about a one-off audit to validate what you have, it s also about putting a robust solution in place to maintain accurate data efficiently. And where IoT implementations are concerned, the impact of a bad asset management can be substantial; when a decision is made based on an inaccurate picture of the precise equipment that exists, a false perception that you might be running out of equipment, power, space, cooling or capacity is created. If a business could fit an extra 10% of kit into the same data center space, then it could extend the life of that facility by another year or two, saving on refurbishment or renting external space. Why would you buy more racks or network switches if you can optimize the existing capacity? Will you be doing the same thing and expecting different results? If businesses continue to use their own methodology and spreadsheets to document their IT infrastructure, they cannot expect different results to those they have currently: Faults, issues and attacks will always take longer to isolate and fix Duplicated effort is likely to occur with every project and task There will be unnecessary disruption to the availability of services There will be failure conditions, due to complexity It will take longer to implement MACs/projects Individuals and teams will get blamed for organizational communication problems People and technical resources won t be used efficiently www.molexces.com / 6

Will it help my organization? Combined with our global deployment services capabilities, the IT Asset Audit and Documentation service from Molex enables asset management, capacity planning, power mitigation and risks assessment that increases IT management productivity. Employees no longer need to be on-site to identify which assets are in their IT infrastructure and what space, power and cooling is available. From experience, the human error rate from using spreadsheets to collect data is also substantial and can prove costly. Companies spend a lot of time confirming and updating this bad data, as well as making poor decisions based on it. Just moving from spreadsheets to our service solution, with the ability to get visual/textual information on your space and assets from a centralized database, can save tens of thousands of dollars in record keeping and timewasting processes. An IT Asset Audit and Documentation system creates value... By enabling organizations to identify location, connectivity, dependencies and ownership of any component within seconds on any site By automating the creation and maintenance of Visio diagrams covering floor plans, racks, networks, power and single points of failure By enabling complete control of ports, cards, equipment, space, power, rooms etc with no duplication of information By reducing power consumption, optimizing asset utilization and assisting with power mitigation and risks assessment By enabling multiple views of the IT infrastructure, making it easier to understand dependencies between components By providing assistance with troubleshooting, planning, scheduling, capacity reporting and resource management Combining space, power, cabling, networks, servers, storage, firewalls and other technologies within one system has many advantages. It makes it easy to plan, build, operate and manage the technical infrastructure as there is less duplication of information

Connected Enterprise Solutions www.molexces.com Connecting Enterprises Simply Solved DKH UK 0717 2017 Molex