SlideShare a Scribd company logo
1 of 17
Download to read offline
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 1
TIGER©
BSM
An innovative technology for
modeling and deploying
enterprise business services
By
Israel Gold♣, D.Sc. Ziv Kaspi♥, M.Sc.
Samuel Levin♣, D.Sc. Gadi Klevansky♥, M.A.
Benzi Abramovitch♥, MBA
April 2007
♣ Avalon-Net, Israel
♥ Bank Leumi, Israel
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 2
Executive Overview
Avalon Net addresses the rapidly growing demand of enterprises to ensure business agility
by leveraging their existing IT and Communications (ITC) assets in a continuously
changing business environment. Avalon Net provides breakthrough business-service
management (BSM) software that presents a complete real-time visibility on large-scale
heterogenic ITC systems and their entire sub-components.
TIGER®
software is a comprehensive framework which provides IT organizations with the
ability to effectively model, monitor and manage their ITC enterprise infrastructures.
Empowered by unique BSM implementation methodology, TIGER
©
tools enable real-time
control of operational risks in an enterprise, that in turn, significantly improves business-
service quality, cost savings, and increases IT responsiveness.
Using an innovative computer aided mapping technology, TIGER
©
BSM facilitates
mapping of business services to ITC infrastructure, thereby integrating network
monitoring, asset management and business services into a centralized service-based
console that enables to monitor service availability and fix IT infrastructure problems.
BSM Service Model
TIGER © BSM
applications
storageservers
routers
firewalls
IT Resources
Business
Process 1
($$)
Service
($$$)
Business
Process 2
($$$)
BSM Service Model
TIGER © BSM
applications
storageservers
routers
firewalls
applications
storageservers
routers
firewalls
applications
storageservers
routers
firewallsfirewalls
IT Resources
Business
Process 1
($$)
Service
($$$)
Business
Process 2
($$$)
Business
Process 1
($$)
Service
($$$)
Business
Process 2
($$$)
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 3
TIGER
©
BSM was developed to meet two major challenges:
• Enterprises face difficulties in modeling business services due to the fact that
traditionally they have clear separation between the business organization and the IT
organization. As result, business personnel, IT personnel and maintenance personnel
use different terminology and speak “different languages”. Thus, definition and
modeling of a business service is problematic. Hence, the need for a methodology and
tools that will bring business service perspective to IT operations and will serve as
technological bridge between business and IT parts of the enterprise.
• Enterprises are constantly seeking for new ways to shorten the deployment time of
BSM solution, and thereby reduce the risks associated with such projects. Enterprises
are wasting too much time and resources, today, when they are moving new, or
updated, ITC products from a development and test environments into a production.
This white paper focuses on how TIGER
©
BSM technology meets the challenges of business
service modeling and deployment discussed above.
TIGER
©
BSM implementation methodology is powered by the BSM Generator (BSM-G)
which is an intuitive and interactive CAD oriented GUI facility that let’s you handle the
difficulty of business service modeling and implementation.
TIGER
©
uses innovative computer aided technology for mapping applications to underlying
ITC resources. Application mapping is accomplished by means of application signatures
which facilitate discovery of all servers that execute a given application, and then by
employing TIGER
©
BSM-G tool for actual selection of appropriate servers. Once application
servers are determined, the complete mapping to ITC resources becomes visible using the
ITC infrastructure topology stored in TIGER
©
smart CMDB.
To address the challenge of fast deployment, TIGER
©
BSM-G provides support for several
working environments: development, integration, and production, each containing a
complete and consistent view of the same business model. This facilitates easy
comparison of different working environments and makes it possible to track ITC
infrastructure changes and consistently update the BSM projection of underlying
resources. This guarantees the shortest path from prototyping to production and reduces
the risks associated with such projects.
Finally, TIGER
©
adapter for BMC Atrium®
CMDB demonstrates that its data collection and
BSM modeling technologies, coupled with integration logic, enable quick and simple
implementation of business service management, using visualization tools like BMC SIM®
(Service Impact Manager). Furthermore, the use of BMC EIE®
(Enterprise integration
Engine) to integrate with Atrium®
CMDB, removes the need and the costs associated with
using BMC SME®
(Service Model Editor).
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 4
Table of Contents
Executive Overview...................................................................................... 2
1 TIGER©
BSM Model ................................................................................. 5
1.1 The Business Layer.........................................................................................6
1.2 The Application Layer......................................................................................6
1.3 The ITC Resource Layer ..................................................................................7
2 Application Mapping............................................................................... 8
2.1 Application Signatures.....................................................................................8
2.1.1 Definition…………………………………………………………………………………………………………………..9
2.2 Application Mapping Stages .............................................................................9
3 Putting it all together........................................................................... 10
4 Working Environments......................................................................... 12
4.1 The Development Environment ...................................................................... 12
4.2 The Integration Environment ......................................................................... 12
4.3 The Production Environment .......................................................................... 13
5 TIGER©
adapter for BMC....................................................................... 14
6 TIGER©
BSM Key Benefits..................................................................... 15
7 About Avalon-Net................................................................................. 16
7.1 Products...................................................................................................... 16
7.2 About Avalon-Net ......................................................................................... 17
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 5
1 TIGER©
BSM Model
TIGER
©
BSM model consists of three layers: business layer, application layer and ITC
resource layer, as illustrated in Figure 1. The model tree is a mapping of business services
to ITC resources; it combines user guided mapping of business services to underlying
applications and innovative computer aided application mapping1 to ITC resources.
System
App
Service
Business
Process
Business
Process
Business
Process
System
App
System
App
System
App
Business
App
Business
App
Business
App
Business
App
Servers
routers storage
IT
Resources
IT
Resources
IT
Resources
Business Layer
Application
Layer
ITC Resource
Layer
Business to App
Layer
Mapping
App to IT
Resource Layer
Mapping
System
App
Service
Business
Process
Business
Process
Business
Process
System
App
System
App
System
App
Business
App
Business
App
Business
App
Business
App
Servers
routers storage
IT
Resources
IT
Resources
IT
Resources
Business Layer
Application
Layer
ITC Resource
Layer
Business to App
Layer
Mapping
App to IT
Resource Layer
Mapping
Figure 1 - TIGER
©
BSM Model
TIGER
©
facilitates the generation of BSM models by means of its computer aided design
(CAD) tool called BSM-G; it is an intuitive and easy-to-use GUI environment that lets the
customer handle the difficulty of BSM modeling and implementation. By using TIGER
©
BSM-G, it is possible to accomplish the following tasks:
• Map and document business services and underlying processes
• Map and document business applications and underlying system services
• Map business services to ITC resources
1 Application dependency mapping is versatile; it began as an enabler for business service management and
change management, and now it's expanding into data center management. See Forrester research 2006 paper
titled: “The Forrester Wave: Application Mapping For the CMDB”
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 6
1.1 The Business Layer
The business layer represents business services, in the form of a business tree, where a
given business service may consist of one, or more, tree levels. Management of the
business tree is the job of a dedicated business analyst.
The business tree contains 2 types of objects:
• A service object describing a business service being modeled
• A business process object describing a business process associated with parent
business service.
Information about each object includes: name, description, owner and more.
For example, consider a banking system that includes a best-invest business service. The
best-invest service consists of three business processes: new-account, portfolio-analysis,
and stock-trading, as depicted in Figure 2, below.
1.2 The Application Layer
The application layer represents information about application and system software in the
form of an application tree. Management of the application tree can be done
independently from the business tree and it is the job of a dedicated application specialist.
The Application tree contains 2 types of objects:
• A business application object describing an application developed by the enterprise.
• A system application object describing a system product like: database, web
server, etc. that was purchased from some software vendor. For example, DB2,
ADABAS, NATURAL, IIS, WAS and BIZTALK.
Information about each object includes: name, description, owner, reference to operation
guide and more.
Consider for example the best-invest service depicted in Figure 2. The best-invest service
includes three business applications: long questionnaire, customer analysis form and
trading app. The underlying system applications are: DB2, WAS, BIZTALK and HIS.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 7
Application
Layer
Best
Invest
Business Layer
Portfolio
Analysis
SIH
WAS
Trading
App
system app signatures
Application
Dictionary
Sig2
DB2
BIZTALK
BIATALK
HIS
WAS
DB2
signatureapp
Trading App
Customer analysis form
Long Questionnaire
signatureapp
Long
Questionnaire
customer
analysis
form
business app signatures
New
Account
Stock
Trading
Sig1
Sig3
Sig4
Sig5
Sig6
Sig7
Application
Layer
Best
Invest
Business Layer
Portfolio
Analysis
SIH
WAS
Trading
App
system app signatures
Application
Dictionary
Sig2
DB2
BIZTALK
BIATALK
HIS
WAS
DB2
signatureapp
Trading App
Customer analysis form
Long Questionnaire
signatureapp
Long
Questionnaire
customer
analysis
form
business app signatures
New
Account
Stock
Trading
Sig1
Sig3
Sig4
Sig5
Sig6
Sig7
Figure 2 –Application Layer and associated Application Dictionary
Mapping business applications to ITC resources is facilitated by means of application
signatures that are stored in the application dictionary, as explained in the sequel.
1.3 The ITC Resource Layer
The ITC resource layer, see Figure 1, consists of IT and communication infrastructure
resources like servers, routers, switches and storage that are discovered using TIGER
©
agent-less network scanning. ITC resource information includes among others: hostname,
IP address, software and hardware configuration, logical and physical location and
operational status. Figure 3, provides an example of TIGER
©
asset reporting.
A central component of the IT Resource Layer is TIGER
©
smart CMDB that runs on top of
Oracle database engine and represents a repository which provides a complete description
of an ITC environment. The database is empowered by a network mapping method that
discovers the ITC infrastructure topology, and by a set of data processing methods which
allow generation of a complete description for each of the contained resources. TIGER
©
CMDB is also home for the application dictionary.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 8
Figure 3 - TIGER
©
Asset Report
2 Application Mapping
TIGER
©
uses innovative computer aided technology for mapping applications to underlying
ITC resources. Application mapping is accomplished by discovering all servers that execute
a given application, and employing TIGER
©
BSM-G tool for mapping a given application to
appropriate server(s). Once application servers are determined, the complete mapping to
IT resources becomes visible using the ITC infrastructure topology stored in TIGER
©
smart
CMDB.
Discovery of servers that execute a given application is accomplished by means of
application signatures, as discussed in the next section. The mapping process is
illustrated by Figure 4, below.
2.1 Application Signatures
TIGER
©
approach to application mapping is that the application specialist should have
limited knowledge about enterprise application implementation. He is assumed to know
which business applications constitute a business service, and identify the underlying
system applications. However, he is not assumed to know how to break down a given
application into its components; for example, what are the exact system services that
constitute a DB2 server in Windows environment, or what are the exact DB2 jobs that
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 9
must be started in a Mainframe. Nevertheless, knowledge of this information is mandatory
for monitoring the health of business applications that rely on these system services.
To this end, TIGER
©
BSM-G enables to create and maintain application signatures in its
application dictionary. The usage of signature technology, as described below, plays
crucial role in TIGER
©
application mapping.
2.1.1 Definition
An application signature is the minimal set of discoverable entities that uniquely identify
an executing application. This can be names of running executables, names of
services/processes, names of DLLs, names of started mainframe jobs, etc.
For example the Table 1, below provides signatures of system applications used by the
best-invest service, depicted in Figure 2.
System
applications
Application
Signature
Comment
DB2 DB5PDBM1, DB5PIRLM, DB5PMSTR, DB5PDIST,
DB4PIRLM, DB4PDIST, DB4PMSTR, DB4PDBM1,
DB3PIRLM, DB3PMSTR, DB3PDIST, DB3PDBM1,
DB1PIRLM, DB1PDBM1, DB1PDIST, DB1PMSTR
List of started Mainframe
jobs
WAS5 Wasservice.exe IBM WebSphere Application
Server V5 – Express 51
BIZTALK Btsntsvc.exe BizTalk Service
Mscis.exe BizTalk Messaging Service
BIZTALK Windows
Services
HIS mngagent.exe SNA MngAgent
hostproc.exe SNA Host Account Synchronizer
snaserver.exe SnaServer
snabase.exe SnaBase
HIS Windows Services
Table 1 – System application signatures example
2.2 Application Mapping Stages
Application mapping is accomplished by discovering servers that execute applications with
matching signatures, and using TIGER
©
BSM-G to map these applications into appropriate
servers. This is a three stage process, based on the ITC infrastructure of a production
environment, as illustrated by Figure 4.
1. Create application signatures in the application dictionary.
2. Discovery of application servers.
This stage is executed automatically and accomplished with the aid of intelligent
agents that are scheduled to run on enterprise servers and match the signatures of
executing applications with those defined in TIGER
©
application dictionary. At the
end of this stage, we know exactly which server is executing a given application.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 10
signature
match
Application
Dictionary
App
signature
App
signature
application
server
application mapping stages:
1. Create application signatures
using BSM -G
2. Discover application servers
by matching application
signatures
3. Map applications to servers
using BSM -G
(1)
(2)
(3)
TIGER
©
Application
Object
signature
match
Application
Dictionary
App
signature
App
signature
application
server
application mapping stages:
1. Create application signatures
using BSM -G
2. Discover application servers
by matching application
signatures
3. Map applications to servers
using BSM -G
(1)
(2)
(3)
TIGER
©
Application
Object
Figure 4 - Application Mapping
3. Mapping applications to appropriate servers.
This stage is accomplished interactively using TIGER
©
BSM-G GUI. In this stage the
user can map a given business/system application to appropriate server(s) according
to stage 1 discovery process. The application mapping operation displays a list of
servers executing a given application and lets the user select appropriate servers. This
is done using a drag and drop operation.
Once the application has been mapped to its servers, the complete mapping to ITC
resources becomes visible using the underlying network topology obtained by the
resource layer.
3 Putting it all together
This section describes TIGER
©
methodology for deploying BSM solution in the enterprise,
as an ordered sequence of steps. The assumption is that the customer has installed the
TIGER
©
system, and has assigned TIGER
©
AUID (Asset Unique ID) to each ITC resource2.
2 Consult Avalon-Net professional services for more information about TIGER®
AUID assignment
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 11
# Description Actions
1 Resource layer
discovery
Discover ITC resources and ITC topology using appropriate TIGER©
tools
2 application
agent
installation
Install TIGER©
intelligent application agents on enterprise machines
3 Application
dictionary
customization
TIGER©
installation comes with pre-defined application dictionary.
Use TIGER©
BSM-G to customize your application signatures. Do it
as early as possible to accelerate application mapping
4 Application
servers
discovery
Schedule application data collection and server discovery. Once you
do it, application server discovery is executed automatically with no
user intervention. By matching application data collected by TIGER©
intelligent agents against application signatures, TIGER©
detects
which server supports a given application
5 Business Layer
management
Select a business analyst that will create the enterprise business
tree using TIGER©
BSM-G. Specifically he needs to define the
business services and their associated business processes
6 Application
Layer
management
1. Select an application specialist that will manage the application
tree.
2. Using TIGER©
BSM-G, define business applications and their
underlying system applications. For each application
a. create application object in the application tree
b. create application signature the application directory
c. register the application signature with the application tree
object
7 Business to
application
mapping
Use TIGER©
BSM-G to map business processes in the business tree
into appropriate business applications in the application tree
8 Application to
ITC resources
mapping
Use TIGER©
BSM-G to map applications to appropriate servers. This
stage is accomplished interactively using TIGER©
BSM-G GUI. The
mapping operation displays a list of servers that execute a given
application and the user just needs to select appropriate servers
9 BSM model
visualization
Use TIGER©
BSM-G to open the model tree. This will present the
entire BSM model with its health status.
The final step is optional. It can be integration with a tool like BMC Atrium®
CMDB in
order to leverage investment in 3rd
party software.
# description Actions
10 Integration
with BMC
CMDB to
leverage
enterprise
investment in
BMC software
This is done in 2 steps:
1. Activate TIGER©
integration facility for BMC Atrium®
CMDB
(see Section 4)
2. Use BMC SIM®
(Service Impact Manger) visualization console
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 12
4 Working Environments
Enterprises are constantly seeking for new ways to shorten the time of deploying a BSM
solution, and thereby reduce the risks associated with such projects. Today, enterprises
usually separate their production environment from development/integration. As result,
too much time and resources are wasted when moving from a development and test
environment into a production environment.
To address the challenge of fast deployment, TIGER
©
BSM-G provides support several
working environments: development, integration, and production, each containing a
complete and consistent view of the same business model3. This enables easy comparison
of different working environments and makes it possible to track changes between
environments and consistently update the BSM projection of underlying ITC resources.
This guarantees the shortest path from prototyping to production and reduces the risks
associated with such projects.
4.1 The Development Environment
Initial creation of business and application trees should be done in the development
environment. This environment is unique by its ability to customize the application
dictionary, thereby affecting application server discovery. To verify signature correctness it
is sufficient to discover limited number of application servers.
The development environment should also be used to map business services to business
applications. This mapping is kept consistent in all environments.
4.2 The Integration Environment
Once the business model
3
has been created, the integration environment should be used
for accomplishing the actual mapping of applications to ITC resources. In this
environment, a production ITC infrastructure should be used. The model will probably
have to be changed in order to accommodate for change in the underlying infrastructure.
For example, a development model may contain a single BIZTALK server, while a
production model might be using 5 BIZTALK severs (for load balancing purposes).
Once applications mapping has been completed, the model tree will display the complete
mapping of business services to ITC resources.
3 A business model amounts to: business and application trees with business to application tree mapping, and
excludes application to ITC resource mapping.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 13
4.3 The Production Environment
TIGER
©
model tree of a production environment represents an up-to-date BSM model, and
enables to monitors the underlying ITC infrastructure. Due to the fact that ITC
infrastructure changes over time, there is a need to track software and hardware changes
and update the model accordingly.
TIGER©
is capable of comparing software and hardware components between its various
environments. This can be done per application or per server basis, or even per a
complete environment. Such comparison can provide reasons for business service
malfunction. For example, failures due to server replacement or software upgrade.
It is important to keep in mind that the business model4 is kept consistent in all
environments and any change in the business model becomes visible in all TIGER
©
environments.
4 A business model amounts to: business and application trees with business to application tree mapping, and
excludes application to ITC resource mapping.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 14
5 TIGER© adapter for BMC
TIGER
©
adapter for BMC demonstrates that its data collection and BSM modeling
technologies coupled with integration logic enable quick and simple implementation of
business service management, using 3rd
party visualization tools like BMC SIM®
(Service
Impact Manager).
Furthermore, the use of BMC EIE®
(Enterprise integration Engine V7) adapter to integrate
with Atrium®
CMDB, removes the need and the costs associated with using BMC SME®
(Service Model Editor).
A general view of TIGER
©
and Atrium®
CMDB integration is depicted in Figure 5, below.
BMC Atrium Ø
CMDB
TIGER
©
Data SetPortal
CMDB
RE
ReconciliationEngine
BMC
EIEØ
TIGER
©
TIGER
©
CMDB
TIGER
©
Reconciliation
Rules
Data export
BMC Atrium Ø
CMDB
TIGER
©
Data SetPortal
CMDB
Portal
CMDB
RE
ReconciliationEngine
RE
ReconciliationEngine
BMC
EIEØ
TIGER
©
TIGER
©
CMDB
TIGER
©
Reconciliation
Rules
Data export
Figure 5r and Atrium®
CMDB Integration
The integration process is composed of two steps:
1. Exporting BSM model delta changes from TIGER
©
CMDB into appropriate BMC
Atrium®
dataset. During this operation, each exported TIGER
©
object is assigned
unique sequence number to be used by the Reconciliation Engine.
2. Activation of Atrium’s Reconciliation Engine using TIGER
©
reconciliation rules. This
will synchronize TIGER
©
dataset with Portal CMDB.
The integration process can be scheduled to run automatically, thereby synchronizing
TIGER
©
and Atrium®
databases without manual intervention.
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 15
6 TIGER©
BSM Key Benefits
TIGER
©
BSM is unique and innovative technology that facilitates mapping of business
services to ITC infrastructure, thereby integrating ITC performance monitoring, asset
management, change management and business services into a centralized service-based
management console.
The use of TIGER
©
BSM-G to generate and implement enterprise BSM model has the
following key benefits:
Documentation of all technological components that take part in the enterprise
business solution
Documentation of business services and processes
Document of applications and their distribution across the network
Document inter-application relationship and dependency
Identification of system applications characteristics and signatures
Bring business service perspective to IT operations, by maping business services to
IT resources.
Generation of business oriented ITC layer in which each IT component has a
measured affect on business processes.
Fast BSM deployment by integrating development, integration and production
environments.
Ability to monitor business service health and rapidly detect an fix corresponding
ITC infrastructure problems
Ability to understand the holistic impact of cost, operational risks, time and
resources associated with failure of a given business service
TIGER
©
adapter for BMC can leverage enterprise investment in 3rd
party software.
The integration with BMC Atrium®
CMDB demonstrates that its data collection and
BSM modeling technologies enable quick and simple implementation of BSM using
visualization tools like BMC SIM®
(Service Impact Manager).
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 16
7 About Avalon-Net
7.1 Products
Avalon Net provides breakthrough software products that present real-time holistic
visibility on large-scale heterogenic ITC systems and their impact on business services. A
suite of five products automatically maps the business services to its ITC infrastructure’s
assets and aggregate them into a trusted CMDB, along with analytical tools that can
foresee future failures. This enables rapid allocation of performance problems, anomalies
detection and capacity planning to improve the availability and utilization of an
enterprise's entire business infrastructures.
The complete Suite of Management Software includes the following products:
TIGER©
- Complete BSM package of end-to-end solution
Sybilla©
- Prediction, capacity planning, and anomalies detection
Lancelot©
- Network performance monitoring
Priamus©
- High performance data collection
Gawain©
- IP flow analysis
A typical solution structure of Avalon Net's products (marked with yellow) for an
Enterprise customer is the following:
TIGER
©
BSM - Innovative technology for modeling and deploying enterprise business services
Copyright 2007 Avalon Net Ltd. 17
Avalon Net's products development has been strongly anchored in the field – tailored for
the customers' needs, with their continuous input, and with immediate real proof-tests.
Following the Lancelot field success, the broader TIGER©
product was jointly developed
with Leumi Bank team. TIGER©
is also used as the upper-level integration umbrella of all
the legacy control solutions that have been installed over the years for customer IT&C
systems.
7.2 About Avalon-Net
Avalon Net is a private company that was founded in 2000 and launched its commercial
products in 2001. Its R&D and growth have been driven purely by internal resources and
design partners. Year-end 2005 has seen the company in a profitable position with a
positive cash-flow. Over 50 active installations are in production within enterprises in
Israel, USA, Canada, Germany, Switzerland, and Russia, and its installed base includes
banks, telecom service providers, and universities.

More Related Content

What's hot

Maximize Control with ITIL Service Asset & Configuration Management
Maximize Control with ITIL Service Asset & Configuration ManagementMaximize Control with ITIL Service Asset & Configuration Management
Maximize Control with ITIL Service Asset & Configuration ManagementBMC ITSM
 
Maximo integration to other systems by Bashar Mahasen
 Maximo integration to other systems by Bashar Mahasen Maximo integration to other systems by Bashar Mahasen
Maximo integration to other systems by Bashar MahasenBashar Mahasen
 
IBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM Danmark
 
Develop Composite Business Services To Enable Reuse In A Service Orien...
Develop  Composite  Business  Services To  Enable  Reuse In A  Service  Orien...Develop  Composite  Business  Services To  Enable  Reuse In A  Service  Orien...
Develop Composite Business Services To Enable Reuse In A Service Orien...Kirill Osipov
 
Maximo Mobile Suite Workshop Regis Adamus Sep 2012
Maximo Mobile Suite Workshop   Regis Adamus Sep 2012Maximo Mobile Suite Workshop   Regis Adamus Sep 2012
Maximo Mobile Suite Workshop Regis Adamus Sep 2012alipaiva
 
TRI-1-Case Studies in Improving TRIRIGA Application Performance
TRI-1-Case Studies in Improving TRIRIGA Application PerformanceTRI-1-Case Studies in Improving TRIRIGA Application Performance
TRI-1-Case Studies in Improving TRIRIGA Application PerformanceMark Johnson
 
IBM Smarter Process
IBM Smarter ProcessIBM Smarter Process
IBM Smarter ProcessProlifics
 
Maximo competition
Maximo competitionMaximo competition
Maximo competitionProjetech
 
Maximo differentiators
Maximo differentiatorsMaximo differentiators
Maximo differentiatorsProjetech
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB EnigmaAxios Systems
 
Igniting Application Testing with AI + Automation
Igniting Application Testing with AI + Automation Igniting Application Testing with AI + Automation
Igniting Application Testing with AI + Automation IBM
 
Smarter Computing: Transform your business with Cloud
Smarter Computing: Transform your business with CloudSmarter Computing: Transform your business with Cloud
Smarter Computing: Transform your business with CloudIBM India Smarter Computing
 
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...Hendrik van Run
 
Impact si valoare in Asset Management cu Primavera Project Management
Impact si valoare in Asset Management cu Primavera Project ManagementImpact si valoare in Asset Management cu Primavera Project Management
Impact si valoare in Asset Management cu Primavera Project ManagementTotalSoft
 

What's hot (20)

Maximize Control with ITIL Service Asset & Configuration Management
Maximize Control with ITIL Service Asset & Configuration ManagementMaximize Control with ITIL Service Asset & Configuration Management
Maximize Control with ITIL Service Asset & Configuration Management
 
Maximo integration to other systems by Bashar Mahasen
 Maximo integration to other systems by Bashar Mahasen Maximo integration to other systems by Bashar Mahasen
Maximo integration to other systems by Bashar Mahasen
 
IBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM SmartCloud Enterprise
IBM SmartCloud Enterprise
 
Develop Composite Business Services To Enable Reuse In A Service Orien...
Develop  Composite  Business  Services To  Enable  Reuse In A  Service  Orien...Develop  Composite  Business  Services To  Enable  Reuse In A  Service  Orien...
Develop Composite Business Services To Enable Reuse In A Service Orien...
 
Maximo Mobile Suite Workshop Regis Adamus Sep 2012
Maximo Mobile Suite Workshop   Regis Adamus Sep 2012Maximo Mobile Suite Workshop   Regis Adamus Sep 2012
Maximo Mobile Suite Workshop Regis Adamus Sep 2012
 
Maximo overview
Maximo overviewMaximo overview
Maximo overview
 
CMDB Building Blocks
CMDB Building BlocksCMDB Building Blocks
CMDB Building Blocks
 
AspectCTRM For Fuel Marketers
AspectCTRM For Fuel MarketersAspectCTRM For Fuel Marketers
AspectCTRM For Fuel Marketers
 
TRI-1-Case Studies in Improving TRIRIGA Application Performance
TRI-1-Case Studies in Improving TRIRIGA Application PerformanceTRI-1-Case Studies in Improving TRIRIGA Application Performance
TRI-1-Case Studies in Improving TRIRIGA Application Performance
 
discovery
discoverydiscovery
discovery
 
Leading Auto Ancillary Outsources Total IT
Leading Auto Ancillary Outsources Total ITLeading Auto Ancillary Outsources Total IT
Leading Auto Ancillary Outsources Total IT
 
IBM Smarter Process
IBM Smarter ProcessIBM Smarter Process
IBM Smarter Process
 
Maximo competition
Maximo competitionMaximo competition
Maximo competition
 
Maximo differentiators
Maximo differentiatorsMaximo differentiators
Maximo differentiators
 
Cracking the CMDB Enigma
Cracking the CMDB EnigmaCracking the CMDB Enigma
Cracking the CMDB Enigma
 
Igniting Application Testing with AI + Automation
Igniting Application Testing with AI + Automation Igniting Application Testing with AI + Automation
Igniting Application Testing with AI + Automation
 
Smarter Computing: Transform your business with Cloud
Smarter Computing: Transform your business with CloudSmarter Computing: Transform your business with Cloud
Smarter Computing: Transform your business with Cloud
 
Integrated managed services
Integrated managed servicesIntegrated managed services
Integrated managed services
 
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
CIN-2650 - Cloud adoption! Enforcer to transform your organization around peo...
 
Impact si valoare in Asset Management cu Primavera Project Management
Impact si valoare in Asset Management cu Primavera Project ManagementImpact si valoare in Asset Management cu Primavera Project Management
Impact si valoare in Asset Management cu Primavera Project Management
 

Viewers also liked

Existe la infancia
Existe la infanciaExiste la infancia
Existe la infanciaYocetamayo
 
Técnicas de expresión
Técnicas de expresión Técnicas de expresión
Técnicas de expresión thaliamedina
 
Toan bo thong tin ve du an vinhomes cau dien
Toan bo thong tin ve du an vinhomes cau dienToan bo thong tin ve du an vinhomes cau dien
Toan bo thong tin ve du an vinhomes cau dienCầu Diễn Vinhomes
 
Kaushal Patel_Resume
Kaushal Patel_ResumeKaushal Patel_Resume
Kaushal Patel_ResumeKaushal Patel
 
Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?The Buffalo History Museum
 
Síndrome de turner
Síndrome de turnerSíndrome de turner
Síndrome de turnerMi Casa
 
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...Önkormányzat Kővágószőlős
 
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...Önkormányzat Kővágószőlős
 

Viewers also liked (13)

Existe la infancia
Existe la infanciaExiste la infancia
Existe la infancia
 
Técnicas de expresión
Técnicas de expresión Técnicas de expresión
Técnicas de expresión
 
Toan bo thong tin ve du an vinhomes cau dien
Toan bo thong tin ve du an vinhomes cau dienToan bo thong tin ve du an vinhomes cau dien
Toan bo thong tin ve du an vinhomes cau dien
 
Kaushal Patel_Resume
Kaushal Patel_ResumeKaushal Patel_Resume
Kaushal Patel_Resume
 
Ahmer Jamil
Ahmer JamilAhmer Jamil
Ahmer Jamil
 
Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?Are Your Ancestors in the Buffalo History Museum?
Are Your Ancestors in the Buffalo History Museum?
 
Síndrome de turner
Síndrome de turnerSíndrome de turner
Síndrome de turner
 
HÉSZ, Helyi Építési Szabályzat módosítás
HÉSZ, Helyi Építési Szabályzat módosításHÉSZ, Helyi Építési Szabályzat módosítás
HÉSZ, Helyi Építési Szabályzat módosítás
 
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...
Kővágószőlős Község Önkormányzat Képviselő-testületének 7/2016. (II. 23.) szá...
 
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...
KŐVÁGÓSZŐLŐS KÖZSÉG ÖNKORMÁNYZAT KÉPVISELŐ-TESTÜLETÉNEK 2/2014.(V.15.) számú ...
 
RESUMEN DE INTRODUCCIÓN A LA BIBLIA
RESUMEN DE INTRODUCCIÓN A LA BIBLIARESUMEN DE INTRODUCCIÓN A LA BIBLIA
RESUMEN DE INTRODUCCIÓN A LA BIBLIA
 
Anatomía de Muslo
Anatomía de MusloAnatomía de Muslo
Anatomía de Muslo
 
Es la biblia palabra de dios
Es  la biblia palabra de diosEs  la biblia palabra de dios
Es la biblia palabra de dios
 

Similar to TigerBSM

Bluedog White Paper - ERP-light solution for SMEs.pdf
Bluedog White Paper - ERP-light solution for SMEs.pdfBluedog White Paper - ERP-light solution for SMEs.pdf
Bluedog White Paper - ERP-light solution for SMEs.pdftom termini
 
A proven roadmap to business agility by industry
A proven roadmap to business agility by industryA proven roadmap to business agility by industry
A proven roadmap to business agility by industryIBM Software India
 
Improve IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and IronstreamImprove IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and IronstreamPrecisely
 
MES (Manufacturing Execution System) Pocket Guide
MES (Manufacturing Execution System) Pocket GuideMES (Manufacturing Execution System) Pocket Guide
MES (Manufacturing Execution System) Pocket GuideVera Leonik-Shilyaeva
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayPandu W Sastrowardoyo
 
IBM Services Platform with Watson
IBM Services Platform with WatsonIBM Services Platform with Watson
IBM Services Platform with WatsonPatrick Bouillaud
 
Lesson 9 use of technology
Lesson 9   use of technologyLesson 9   use of technology
Lesson 9 use of technologycoburgpsych
 
1.31.17 Asignet Technology FAQ & Vendor Assurance Summary
1.31.17 Asignet Technology FAQ & Vendor Assurance Summary1.31.17 Asignet Technology FAQ & Vendor Assurance Summary
1.31.17 Asignet Technology FAQ & Vendor Assurance SummaryJason Koenigsberg,MBA
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkCognizant
 
2011.10.19 - Cloud Partner Day - Reseller Breakout
2011.10.19 - Cloud Partner Day - Reseller Breakout2011.10.19 - Cloud Partner Day - Reseller Breakout
2011.10.19 - Cloud Partner Day - Reseller BreakoutClub Alliances
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Simplicité Software
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. IBM
 
CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003Paul Johnson
 
2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon
2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon
2011.10.13 - Annonces IBM pour Cloud Builders - Loic SimonClub Alliances
 
Data centerconsolidations
Data centerconsolidationsData centerconsolidations
Data centerconsolidationsAnand Raj
 

Similar to TigerBSM (20)

Bluedog White Paper - ERP-light solution for SMEs.pdf
Bluedog White Paper - ERP-light solution for SMEs.pdfBluedog White Paper - ERP-light solution for SMEs.pdf
Bluedog White Paper - ERP-light solution for SMEs.pdf
 
IBM ITS Services
IBM ITS ServicesIBM ITS Services
IBM ITS Services
 
A proven roadmap to business agility by industry
A proven roadmap to business agility by industryA proven roadmap to business agility by industry
A proven roadmap to business agility by industry
 
Improve IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and IronstreamImprove IT operations management with ServiceNow and Ironstream
Improve IT operations management with ServiceNow and Ironstream
 
MES (Manufacturing Execution System) Pocket Guide
MES (Manufacturing Execution System) Pocket GuideMES (Manufacturing Execution System) Pocket Guide
MES (Manufacturing Execution System) Pocket Guide
 
IBM BladeCenter Foundation for Cloud
IBM BladeCenter Foundation for CloudIBM BladeCenter Foundation for Cloud
IBM BladeCenter Foundation for Cloud
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP Day
 
IBM Services Platform with Watson
IBM Services Platform with WatsonIBM Services Platform with Watson
IBM Services Platform with Watson
 
Lesson 9 use of technology
Lesson 9   use of technologyLesson 9   use of technology
Lesson 9 use of technology
 
1.31.17 Asignet Technology FAQ & Vendor Assurance Summary
1.31.17 Asignet Technology FAQ & Vendor Assurance Summary1.31.17 Asignet Technology FAQ & Vendor Assurance Summary
1.31.17 Asignet Technology FAQ & Vendor Assurance Summary
 
Architecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information FrameworkArchitecture Standardization Using the IBM Information Framework
Architecture Standardization Using the IBM Information Framework
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
vFS3 Exhibitor Directory
vFS3 Exhibitor DirectoryvFS3 Exhibitor Directory
vFS3 Exhibitor Directory
 
2011.10.19 - Cloud Partner Day - Reseller Breakout
2011.10.19 - Cloud Partner Day - Reseller Breakout2011.10.19 - Cloud Partner Day - Reseller Breakout
2011.10.19 - Cloud Partner Day - Reseller Breakout
 
Briefing Simplicité Software (English)
Briefing Simplicité Software (English)Briefing Simplicité Software (English)
Briefing Simplicité Software (English)
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.
 
CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003CICS_TS_White_Paper_PJ_PNT003
CICS_TS_White_Paper_PJ_PNT003
 
2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon
2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon
2011.10.13 - Annonces IBM pour Cloud Builders - Loic Simon
 
IBM bBluemix to accelerate your digital transformation
IBM bBluemix to accelerate your digital transformationIBM bBluemix to accelerate your digital transformation
IBM bBluemix to accelerate your digital transformation
 
Data centerconsolidations
Data centerconsolidationsData centerconsolidations
Data centerconsolidations
 

TigerBSM

  • 1. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 1 TIGER© BSM An innovative technology for modeling and deploying enterprise business services By Israel Gold♣, D.Sc. Ziv Kaspi♥, M.Sc. Samuel Levin♣, D.Sc. Gadi Klevansky♥, M.A. Benzi Abramovitch♥, MBA April 2007 ♣ Avalon-Net, Israel ♥ Bank Leumi, Israel
  • 2. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 2 Executive Overview Avalon Net addresses the rapidly growing demand of enterprises to ensure business agility by leveraging their existing IT and Communications (ITC) assets in a continuously changing business environment. Avalon Net provides breakthrough business-service management (BSM) software that presents a complete real-time visibility on large-scale heterogenic ITC systems and their entire sub-components. TIGER® software is a comprehensive framework which provides IT organizations with the ability to effectively model, monitor and manage their ITC enterprise infrastructures. Empowered by unique BSM implementation methodology, TIGER © tools enable real-time control of operational risks in an enterprise, that in turn, significantly improves business- service quality, cost savings, and increases IT responsiveness. Using an innovative computer aided mapping technology, TIGER © BSM facilitates mapping of business services to ITC infrastructure, thereby integrating network monitoring, asset management and business services into a centralized service-based console that enables to monitor service availability and fix IT infrastructure problems. BSM Service Model TIGER © BSM applications storageservers routers firewalls IT Resources Business Process 1 ($$) Service ($$$) Business Process 2 ($$$) BSM Service Model TIGER © BSM applications storageservers routers firewalls applications storageservers routers firewalls applications storageservers routers firewallsfirewalls IT Resources Business Process 1 ($$) Service ($$$) Business Process 2 ($$$) Business Process 1 ($$) Service ($$$) Business Process 2 ($$$)
  • 3. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 3 TIGER © BSM was developed to meet two major challenges: • Enterprises face difficulties in modeling business services due to the fact that traditionally they have clear separation between the business organization and the IT organization. As result, business personnel, IT personnel and maintenance personnel use different terminology and speak “different languages”. Thus, definition and modeling of a business service is problematic. Hence, the need for a methodology and tools that will bring business service perspective to IT operations and will serve as technological bridge between business and IT parts of the enterprise. • Enterprises are constantly seeking for new ways to shorten the deployment time of BSM solution, and thereby reduce the risks associated with such projects. Enterprises are wasting too much time and resources, today, when they are moving new, or updated, ITC products from a development and test environments into a production. This white paper focuses on how TIGER © BSM technology meets the challenges of business service modeling and deployment discussed above. TIGER © BSM implementation methodology is powered by the BSM Generator (BSM-G) which is an intuitive and interactive CAD oriented GUI facility that let’s you handle the difficulty of business service modeling and implementation. TIGER © uses innovative computer aided technology for mapping applications to underlying ITC resources. Application mapping is accomplished by means of application signatures which facilitate discovery of all servers that execute a given application, and then by employing TIGER © BSM-G tool for actual selection of appropriate servers. Once application servers are determined, the complete mapping to ITC resources becomes visible using the ITC infrastructure topology stored in TIGER © smart CMDB. To address the challenge of fast deployment, TIGER © BSM-G provides support for several working environments: development, integration, and production, each containing a complete and consistent view of the same business model. This facilitates easy comparison of different working environments and makes it possible to track ITC infrastructure changes and consistently update the BSM projection of underlying resources. This guarantees the shortest path from prototyping to production and reduces the risks associated with such projects. Finally, TIGER © adapter for BMC Atrium® CMDB demonstrates that its data collection and BSM modeling technologies, coupled with integration logic, enable quick and simple implementation of business service management, using visualization tools like BMC SIM® (Service Impact Manager). Furthermore, the use of BMC EIE® (Enterprise integration Engine) to integrate with Atrium® CMDB, removes the need and the costs associated with using BMC SME® (Service Model Editor).
  • 4. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 4 Table of Contents Executive Overview...................................................................................... 2 1 TIGER© BSM Model ................................................................................. 5 1.1 The Business Layer.........................................................................................6 1.2 The Application Layer......................................................................................6 1.3 The ITC Resource Layer ..................................................................................7 2 Application Mapping............................................................................... 8 2.1 Application Signatures.....................................................................................8 2.1.1 Definition…………………………………………………………………………………………………………………..9 2.2 Application Mapping Stages .............................................................................9 3 Putting it all together........................................................................... 10 4 Working Environments......................................................................... 12 4.1 The Development Environment ...................................................................... 12 4.2 The Integration Environment ......................................................................... 12 4.3 The Production Environment .......................................................................... 13 5 TIGER© adapter for BMC....................................................................... 14 6 TIGER© BSM Key Benefits..................................................................... 15 7 About Avalon-Net................................................................................. 16 7.1 Products...................................................................................................... 16 7.2 About Avalon-Net ......................................................................................... 17
  • 5. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 5 1 TIGER© BSM Model TIGER © BSM model consists of three layers: business layer, application layer and ITC resource layer, as illustrated in Figure 1. The model tree is a mapping of business services to ITC resources; it combines user guided mapping of business services to underlying applications and innovative computer aided application mapping1 to ITC resources. System App Service Business Process Business Process Business Process System App System App System App Business App Business App Business App Business App Servers routers storage IT Resources IT Resources IT Resources Business Layer Application Layer ITC Resource Layer Business to App Layer Mapping App to IT Resource Layer Mapping System App Service Business Process Business Process Business Process System App System App System App Business App Business App Business App Business App Servers routers storage IT Resources IT Resources IT Resources Business Layer Application Layer ITC Resource Layer Business to App Layer Mapping App to IT Resource Layer Mapping Figure 1 - TIGER © BSM Model TIGER © facilitates the generation of BSM models by means of its computer aided design (CAD) tool called BSM-G; it is an intuitive and easy-to-use GUI environment that lets the customer handle the difficulty of BSM modeling and implementation. By using TIGER © BSM-G, it is possible to accomplish the following tasks: • Map and document business services and underlying processes • Map and document business applications and underlying system services • Map business services to ITC resources 1 Application dependency mapping is versatile; it began as an enabler for business service management and change management, and now it's expanding into data center management. See Forrester research 2006 paper titled: “The Forrester Wave: Application Mapping For the CMDB”
  • 6. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 6 1.1 The Business Layer The business layer represents business services, in the form of a business tree, where a given business service may consist of one, or more, tree levels. Management of the business tree is the job of a dedicated business analyst. The business tree contains 2 types of objects: • A service object describing a business service being modeled • A business process object describing a business process associated with parent business service. Information about each object includes: name, description, owner and more. For example, consider a banking system that includes a best-invest business service. The best-invest service consists of three business processes: new-account, portfolio-analysis, and stock-trading, as depicted in Figure 2, below. 1.2 The Application Layer The application layer represents information about application and system software in the form of an application tree. Management of the application tree can be done independently from the business tree and it is the job of a dedicated application specialist. The Application tree contains 2 types of objects: • A business application object describing an application developed by the enterprise. • A system application object describing a system product like: database, web server, etc. that was purchased from some software vendor. For example, DB2, ADABAS, NATURAL, IIS, WAS and BIZTALK. Information about each object includes: name, description, owner, reference to operation guide and more. Consider for example the best-invest service depicted in Figure 2. The best-invest service includes three business applications: long questionnaire, customer analysis form and trading app. The underlying system applications are: DB2, WAS, BIZTALK and HIS.
  • 7. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 7 Application Layer Best Invest Business Layer Portfolio Analysis SIH WAS Trading App system app signatures Application Dictionary Sig2 DB2 BIZTALK BIATALK HIS WAS DB2 signatureapp Trading App Customer analysis form Long Questionnaire signatureapp Long Questionnaire customer analysis form business app signatures New Account Stock Trading Sig1 Sig3 Sig4 Sig5 Sig6 Sig7 Application Layer Best Invest Business Layer Portfolio Analysis SIH WAS Trading App system app signatures Application Dictionary Sig2 DB2 BIZTALK BIATALK HIS WAS DB2 signatureapp Trading App Customer analysis form Long Questionnaire signatureapp Long Questionnaire customer analysis form business app signatures New Account Stock Trading Sig1 Sig3 Sig4 Sig5 Sig6 Sig7 Figure 2 –Application Layer and associated Application Dictionary Mapping business applications to ITC resources is facilitated by means of application signatures that are stored in the application dictionary, as explained in the sequel. 1.3 The ITC Resource Layer The ITC resource layer, see Figure 1, consists of IT and communication infrastructure resources like servers, routers, switches and storage that are discovered using TIGER © agent-less network scanning. ITC resource information includes among others: hostname, IP address, software and hardware configuration, logical and physical location and operational status. Figure 3, provides an example of TIGER © asset reporting. A central component of the IT Resource Layer is TIGER © smart CMDB that runs on top of Oracle database engine and represents a repository which provides a complete description of an ITC environment. The database is empowered by a network mapping method that discovers the ITC infrastructure topology, and by a set of data processing methods which allow generation of a complete description for each of the contained resources. TIGER © CMDB is also home for the application dictionary.
  • 8. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 8 Figure 3 - TIGER © Asset Report 2 Application Mapping TIGER © uses innovative computer aided technology for mapping applications to underlying ITC resources. Application mapping is accomplished by discovering all servers that execute a given application, and employing TIGER © BSM-G tool for mapping a given application to appropriate server(s). Once application servers are determined, the complete mapping to IT resources becomes visible using the ITC infrastructure topology stored in TIGER © smart CMDB. Discovery of servers that execute a given application is accomplished by means of application signatures, as discussed in the next section. The mapping process is illustrated by Figure 4, below. 2.1 Application Signatures TIGER © approach to application mapping is that the application specialist should have limited knowledge about enterprise application implementation. He is assumed to know which business applications constitute a business service, and identify the underlying system applications. However, he is not assumed to know how to break down a given application into its components; for example, what are the exact system services that constitute a DB2 server in Windows environment, or what are the exact DB2 jobs that
  • 9. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 9 must be started in a Mainframe. Nevertheless, knowledge of this information is mandatory for monitoring the health of business applications that rely on these system services. To this end, TIGER © BSM-G enables to create and maintain application signatures in its application dictionary. The usage of signature technology, as described below, plays crucial role in TIGER © application mapping. 2.1.1 Definition An application signature is the minimal set of discoverable entities that uniquely identify an executing application. This can be names of running executables, names of services/processes, names of DLLs, names of started mainframe jobs, etc. For example the Table 1, below provides signatures of system applications used by the best-invest service, depicted in Figure 2. System applications Application Signature Comment DB2 DB5PDBM1, DB5PIRLM, DB5PMSTR, DB5PDIST, DB4PIRLM, DB4PDIST, DB4PMSTR, DB4PDBM1, DB3PIRLM, DB3PMSTR, DB3PDIST, DB3PDBM1, DB1PIRLM, DB1PDBM1, DB1PDIST, DB1PMSTR List of started Mainframe jobs WAS5 Wasservice.exe IBM WebSphere Application Server V5 – Express 51 BIZTALK Btsntsvc.exe BizTalk Service Mscis.exe BizTalk Messaging Service BIZTALK Windows Services HIS mngagent.exe SNA MngAgent hostproc.exe SNA Host Account Synchronizer snaserver.exe SnaServer snabase.exe SnaBase HIS Windows Services Table 1 – System application signatures example 2.2 Application Mapping Stages Application mapping is accomplished by discovering servers that execute applications with matching signatures, and using TIGER © BSM-G to map these applications into appropriate servers. This is a three stage process, based on the ITC infrastructure of a production environment, as illustrated by Figure 4. 1. Create application signatures in the application dictionary. 2. Discovery of application servers. This stage is executed automatically and accomplished with the aid of intelligent agents that are scheduled to run on enterprise servers and match the signatures of executing applications with those defined in TIGER © application dictionary. At the end of this stage, we know exactly which server is executing a given application.
  • 10. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 10 signature match Application Dictionary App signature App signature application server application mapping stages: 1. Create application signatures using BSM -G 2. Discover application servers by matching application signatures 3. Map applications to servers using BSM -G (1) (2) (3) TIGER © Application Object signature match Application Dictionary App signature App signature application server application mapping stages: 1. Create application signatures using BSM -G 2. Discover application servers by matching application signatures 3. Map applications to servers using BSM -G (1) (2) (3) TIGER © Application Object Figure 4 - Application Mapping 3. Mapping applications to appropriate servers. This stage is accomplished interactively using TIGER © BSM-G GUI. In this stage the user can map a given business/system application to appropriate server(s) according to stage 1 discovery process. The application mapping operation displays a list of servers executing a given application and lets the user select appropriate servers. This is done using a drag and drop operation. Once the application has been mapped to its servers, the complete mapping to ITC resources becomes visible using the underlying network topology obtained by the resource layer. 3 Putting it all together This section describes TIGER © methodology for deploying BSM solution in the enterprise, as an ordered sequence of steps. The assumption is that the customer has installed the TIGER © system, and has assigned TIGER © AUID (Asset Unique ID) to each ITC resource2. 2 Consult Avalon-Net professional services for more information about TIGER® AUID assignment
  • 11. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 11 # Description Actions 1 Resource layer discovery Discover ITC resources and ITC topology using appropriate TIGER© tools 2 application agent installation Install TIGER© intelligent application agents on enterprise machines 3 Application dictionary customization TIGER© installation comes with pre-defined application dictionary. Use TIGER© BSM-G to customize your application signatures. Do it as early as possible to accelerate application mapping 4 Application servers discovery Schedule application data collection and server discovery. Once you do it, application server discovery is executed automatically with no user intervention. By matching application data collected by TIGER© intelligent agents against application signatures, TIGER© detects which server supports a given application 5 Business Layer management Select a business analyst that will create the enterprise business tree using TIGER© BSM-G. Specifically he needs to define the business services and their associated business processes 6 Application Layer management 1. Select an application specialist that will manage the application tree. 2. Using TIGER© BSM-G, define business applications and their underlying system applications. For each application a. create application object in the application tree b. create application signature the application directory c. register the application signature with the application tree object 7 Business to application mapping Use TIGER© BSM-G to map business processes in the business tree into appropriate business applications in the application tree 8 Application to ITC resources mapping Use TIGER© BSM-G to map applications to appropriate servers. This stage is accomplished interactively using TIGER© BSM-G GUI. The mapping operation displays a list of servers that execute a given application and the user just needs to select appropriate servers 9 BSM model visualization Use TIGER© BSM-G to open the model tree. This will present the entire BSM model with its health status. The final step is optional. It can be integration with a tool like BMC Atrium® CMDB in order to leverage investment in 3rd party software. # description Actions 10 Integration with BMC CMDB to leverage enterprise investment in BMC software This is done in 2 steps: 1. Activate TIGER© integration facility for BMC Atrium® CMDB (see Section 4) 2. Use BMC SIM® (Service Impact Manger) visualization console
  • 12. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 12 4 Working Environments Enterprises are constantly seeking for new ways to shorten the time of deploying a BSM solution, and thereby reduce the risks associated with such projects. Today, enterprises usually separate their production environment from development/integration. As result, too much time and resources are wasted when moving from a development and test environment into a production environment. To address the challenge of fast deployment, TIGER © BSM-G provides support several working environments: development, integration, and production, each containing a complete and consistent view of the same business model3. This enables easy comparison of different working environments and makes it possible to track changes between environments and consistently update the BSM projection of underlying ITC resources. This guarantees the shortest path from prototyping to production and reduces the risks associated with such projects. 4.1 The Development Environment Initial creation of business and application trees should be done in the development environment. This environment is unique by its ability to customize the application dictionary, thereby affecting application server discovery. To verify signature correctness it is sufficient to discover limited number of application servers. The development environment should also be used to map business services to business applications. This mapping is kept consistent in all environments. 4.2 The Integration Environment Once the business model 3 has been created, the integration environment should be used for accomplishing the actual mapping of applications to ITC resources. In this environment, a production ITC infrastructure should be used. The model will probably have to be changed in order to accommodate for change in the underlying infrastructure. For example, a development model may contain a single BIZTALK server, while a production model might be using 5 BIZTALK severs (for load balancing purposes). Once applications mapping has been completed, the model tree will display the complete mapping of business services to ITC resources. 3 A business model amounts to: business and application trees with business to application tree mapping, and excludes application to ITC resource mapping.
  • 13. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 13 4.3 The Production Environment TIGER © model tree of a production environment represents an up-to-date BSM model, and enables to monitors the underlying ITC infrastructure. Due to the fact that ITC infrastructure changes over time, there is a need to track software and hardware changes and update the model accordingly. TIGER© is capable of comparing software and hardware components between its various environments. This can be done per application or per server basis, or even per a complete environment. Such comparison can provide reasons for business service malfunction. For example, failures due to server replacement or software upgrade. It is important to keep in mind that the business model4 is kept consistent in all environments and any change in the business model becomes visible in all TIGER © environments. 4 A business model amounts to: business and application trees with business to application tree mapping, and excludes application to ITC resource mapping.
  • 14. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 14 5 TIGER© adapter for BMC TIGER © adapter for BMC demonstrates that its data collection and BSM modeling technologies coupled with integration logic enable quick and simple implementation of business service management, using 3rd party visualization tools like BMC SIM® (Service Impact Manager). Furthermore, the use of BMC EIE® (Enterprise integration Engine V7) adapter to integrate with Atrium® CMDB, removes the need and the costs associated with using BMC SME® (Service Model Editor). A general view of TIGER © and Atrium® CMDB integration is depicted in Figure 5, below. BMC Atrium Ø CMDB TIGER © Data SetPortal CMDB RE ReconciliationEngine BMC EIEØ TIGER © TIGER © CMDB TIGER © Reconciliation Rules Data export BMC Atrium Ø CMDB TIGER © Data SetPortal CMDB Portal CMDB RE ReconciliationEngine RE ReconciliationEngine BMC EIEØ TIGER © TIGER © CMDB TIGER © Reconciliation Rules Data export Figure 5r and Atrium® CMDB Integration The integration process is composed of two steps: 1. Exporting BSM model delta changes from TIGER © CMDB into appropriate BMC Atrium® dataset. During this operation, each exported TIGER © object is assigned unique sequence number to be used by the Reconciliation Engine. 2. Activation of Atrium’s Reconciliation Engine using TIGER © reconciliation rules. This will synchronize TIGER © dataset with Portal CMDB. The integration process can be scheduled to run automatically, thereby synchronizing TIGER © and Atrium® databases without manual intervention.
  • 15. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 15 6 TIGER© BSM Key Benefits TIGER © BSM is unique and innovative technology that facilitates mapping of business services to ITC infrastructure, thereby integrating ITC performance monitoring, asset management, change management and business services into a centralized service-based management console. The use of TIGER © BSM-G to generate and implement enterprise BSM model has the following key benefits: Documentation of all technological components that take part in the enterprise business solution Documentation of business services and processes Document of applications and their distribution across the network Document inter-application relationship and dependency Identification of system applications characteristics and signatures Bring business service perspective to IT operations, by maping business services to IT resources. Generation of business oriented ITC layer in which each IT component has a measured affect on business processes. Fast BSM deployment by integrating development, integration and production environments. Ability to monitor business service health and rapidly detect an fix corresponding ITC infrastructure problems Ability to understand the holistic impact of cost, operational risks, time and resources associated with failure of a given business service TIGER © adapter for BMC can leverage enterprise investment in 3rd party software. The integration with BMC Atrium® CMDB demonstrates that its data collection and BSM modeling technologies enable quick and simple implementation of BSM using visualization tools like BMC SIM® (Service Impact Manager).
  • 16. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 16 7 About Avalon-Net 7.1 Products Avalon Net provides breakthrough software products that present real-time holistic visibility on large-scale heterogenic ITC systems and their impact on business services. A suite of five products automatically maps the business services to its ITC infrastructure’s assets and aggregate them into a trusted CMDB, along with analytical tools that can foresee future failures. This enables rapid allocation of performance problems, anomalies detection and capacity planning to improve the availability and utilization of an enterprise's entire business infrastructures. The complete Suite of Management Software includes the following products: TIGER© - Complete BSM package of end-to-end solution Sybilla© - Prediction, capacity planning, and anomalies detection Lancelot© - Network performance monitoring Priamus© - High performance data collection Gawain© - IP flow analysis A typical solution structure of Avalon Net's products (marked with yellow) for an Enterprise customer is the following:
  • 17. TIGER © BSM - Innovative technology for modeling and deploying enterprise business services Copyright 2007 Avalon Net Ltd. 17 Avalon Net's products development has been strongly anchored in the field – tailored for the customers' needs, with their continuous input, and with immediate real proof-tests. Following the Lancelot field success, the broader TIGER© product was jointly developed with Leumi Bank team. TIGER© is also used as the upper-level integration umbrella of all the legacy control solutions that have been installed over the years for customer IT&C systems. 7.2 About Avalon-Net Avalon Net is a private company that was founded in 2000 and launched its commercial products in 2001. Its R&D and growth have been driven purely by internal resources and design partners. Year-end 2005 has seen the company in a profitable position with a positive cash-flow. Over 50 active installations are in production within enterprises in Israel, USA, Canada, Germany, Switzerland, and Russia, and its installed base includes banks, telecom service providers, and universities.