IT Foundation Managementfor IT Operations<br />An Effective and Efficient Systems Management Approach<br />Your business i...
IT Foundation Management<br />Security Foundation<br />Closing the Foundation Gap<br /><ul><li> Role-based access and control
 Record the 5 Ws
 Complete forensic history</li></ul>IT Operations Foundation<br />Doing More with Less<br />Universal, integrated environm...
 Detect compliance events
 Build auditable history</li></ul>IT Services Foundation<br />Delivering on Commitments<br />Sense and Respond in real-tim...
What is the IT Foundation?<br />The IT Foundation includes all of your:<br />Servers…<br />Network Gear…<br />SANS…<br />O...
IT Foundation Management<br />Privileged Interfaces<br />DELIVERS A COMMON:<br /> Foundational System<br /> Operations App...
Simplification, Oversight, and Management<br />Transparency and Oversight<br />Simplification<br />Improved Maintenance<br...
Encodes and automates common tasks
Provides universal operations methodology
Upcoming SlideShare
Loading in...5
×

TDi Technologies - IT Foundation Management (IT Operations)

290

Published on

IT Foundation Management simplifies IT Operations with one system, one method, one practice.

By simplifying the daily work of IT Operations, IT Foundation Management reduces costs, lessens the risk of human error, and it increases the agility of the IT organization. Work becomes smoother and more productive. Business needs are met. IT Foundation Management automates repetitive tasks and retains the domain knowledge needed to keep the IT Foundation healthy and fully operational.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
290
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

TDi Technologies - IT Foundation Management (IT Operations)

  1. 1. IT Foundation Managementfor IT Operations<br />An Effective and Efficient Systems Management Approach<br />Your business is built on IT<br />
  2. 2. IT Foundation Management<br />Security Foundation<br />Closing the Foundation Gap<br /><ul><li> Role-based access and control
  3. 3. Record the 5 Ws
  4. 4. Complete forensic history</li></ul>IT Operations Foundation<br />Doing More with Less<br />Universal, integrated environment•<br />Optimized automated process •<br /> Secure remote management•<br />SECURITY<br />IT OPERATIONS<br />VIRTUALIZATION<br />IT Foundation Management<br />COMPLIANCE<br />FOUNDATION<br />IT SERVICES<br />Compliance Foundation<br />Meeting Intent & Interpretation<br /><ul><li> Control subsystems changes
  5. 5. Detect compliance events
  6. 6. Build auditable history</li></ul>IT Services Foundation<br />Delivering on Commitments<br />Sense and Respond in real-time•<br /> Correlate across the architecture•<br /> Proactively manage and protect•<br /> TDi Technologies Your business is built on IT<br />
  7. 7. What is the IT Foundation?<br />The IT Foundation includes all of your:<br />Servers…<br />Network Gear…<br />SANS…<br />Operating Systems…<br />Blades…<br />Networks…<br />Databases…<br />Appliances…<br />Virtual Machines…<br />Environment…<br />And is supported by:<br />Michael…<br />VM Administrator<br />I’m Joe…<br />Solaris Systems Administrator<br />Steve,<br />I’m a SANS Administrator<br />Cheryl,<br />Oracle DBA…<br />Hi. Raphael.<br />Network Administration<br />Dave,<br />Independent Consultant<br />Chris here…<br />Tools Manager<br />Hi I’m Tania,<br />Linux Systems Administrator<br /> TDi Technologies Your business is built on IT<br />
  8. 8. IT Foundation Management<br />Privileged Interfaces<br />DELIVERS A COMMON:<br /> Foundational System<br /> Operations Approach<br /> Security Model<br /> Compliance Practice<br />DRIVING:<br /> Dramatic Simplification<br /> Automation of Repetitive Actions<br /> Common Practices<br /> Continuous Improvement<br /> Transparency<br /> Reliability<br /> Quality<br />YIELDING:<br /> Reduced Cost<br /> Better Service<br /> Greater Agility<br /> Improved Governance<br /> Reduced Risk<br /> Command and Control<br />Privileged Actors<br />Michael…<br />VM Administrator<br /> I’m Joe…<br />Solaris Systems Administrator<br />Steve,<br />I’m a SANS Administrator<br />Cheryl,<br />Oracle DBA…<br />Hi. Raphael.<br />Network Administration<br />Dave,<br />Independent Consultant<br />Chris here…<br />Tools Manager<br />Hi I’m Tania,<br />Linux Systems Administrator<br /> TDi Technologies Your business is built on IT<br />
  9. 9. Simplification, Oversight, and Management<br />Transparency and Oversight<br />Simplification<br />Improved Maintenance<br />Improved Maintenance<br />Simplification<br />Transparency and Oversight<br /><ul><li>Manages all Privileged Interfaces with ONE system
  10. 10. Encodes and automates common tasks
  11. 11. Provides universal operations methodology
  12. 12. Centralizes management
  13. 13. All Privileged User actions automatically recorded
  14. 14. Access control centralized
  15. 15. Authorization centralized
  16. 16. Compliance automated
  17. 17. Management centralized
  18. 18. Automates repetitive actions
  19. 19. One maintenance methodology
  20. 20. Automatic forensic history creation
  21. 21. Serves all platforms
  22. 22. Improves efficiency</li></ul> TDi Technologies Your business is built on IT<br />
  23. 23. Simplification Example – Access Complexity<br />With the Traditional Approach, Privileged Actors need to know…<br />Log on?<br />PuTTY?<br />Absolute?<br />Credentials?<br />TeraTerm?<br />ZOC?<br />IP Address?<br />SSH?<br />CMDB?<br />Commands?<br />Tunnelier?<br />WHERE?<br />WHICH?<br />WHAT?<br />HOW?<br />Terminal?<br />Other DB?<br />TELNET?<br />etc?<br />Other records?<br />HTTP?<br />Other?<br />What syntax applies?<br />With IT Foundation Management, Privileged Actors need to know…<br />NAME<br />
  24. 24. Transparency and Oversight<br />With IT Foundation Management…<br />With the Traditional Approach…<br /> Access is enforced against Policy through IT Foundation Management<br /> All change records are available in real-time: recorded down to the key stroke<br /> Verification is simple and accurate: always<br /> We require access to be controlled<br /> We require changes to be documented<br /> I have records, but I do not have a means to verify them<br /> We are required to manually document changes<br /> Usually we do that immediately after making a change<br /> Sometimes things are very busy, and we have to document changes later on<br /> Sometimes changes just don’t get documented….<br /> The system documents changes for us automatically: in real-time<br />We don’t have to worry about documenting changes – we just concentrate on doing our jobs!<br />
  25. 25. Maintenance is Managed Safely and Effectively<br />Maintenance occurs regularly – yet mistakes can take critical IT assets off-line or compromise security.<br />Maintenance Includes:<br />Patching<br /><ul><li>Security
  26. 26. Performance
  27. 27. Features
  28. 28. Maintainability</li></ul>Configuration<br /><ul><li>Performance
  29. 29. Demand
  30. 30. New requirements
  31. 31. Issues
  32. 32. Expansion
  33. 33. Infrastructure changes</li></ul>Housekeeping<br /><ul><li>Disk clean-up
  34. 34. Update user/asset records
  35. 35. Run backups
  36. 36. Monitor/schedule jobs</li></ul>Upgrading<br /><ul><li>New software versions</li></ul> TDi Technologies Your business is built on IT<br />IT Foundation Management optimizes, automates, and centrally-manages all foundational maintenance activities.<br />
  37. 37. IT Foundation Management…<br />Traditional Approach…<br />All Systems<br />Standard Systems<br />Critical Systems<br />Remediate Faster – Fix More Root Causes<br /> Notification: 15 – 30 minutes<br /> Isolation: (with help) I figure it out<br /> Analysis: Rich context already there<br /> Remediation: Easy and Accurate<br /> Notification: 15 – 30 minutes<br /> Isolation: I have to figure that out<br /> Analysis: Time to hunt and dig…<br /> Remediation: Take my best shot<br /> Notification: Instant (milliseconds)<br /> Isolation: Automatic (by system)<br /> Analysis: Rich context already there<br /> Remediation: Easy and Accurate<br />30<br />30<br />30<br />15<br />15<br />15<br />45<br />45<br />45<br />0<br />60<br />0<br />60<br />0<br />60<br />MTTR<br />MTTR<br />MTTR<br /> TDi Technologies Your business is built on IT<br />
  38. 38. IT Operations Benefits<br />Transparency<br />Access policy enforced<br />Change records auomatically captured<br />Verification<br />Maintenance<br />One tool<br />One method<br />Powerful automation<br />Comprehensive forensics<br />Issue resolution directly supported<br />Repetitive actions automated<br />Mean Time to Repair<br />Notification from minutes to milliseconds<br />Isolation is automatic<br />Analysis with rich context<br />Remediation is easy and accurate<br />Simplification<br />Cost reduction (move repetitive work to system)<br />Agility (common process, automation)<br />Consistency (common process, unified method)<br /> TDi Technologies Your business is built on IT<br />
  39. 39. How to Engage TDi Technologies<br /> TDi Technologies Your business is built on IT<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×