SlideShare a Scribd company logo
1 of 8
Download to read offline
Establishment of a
coherent monitoring
system
CASE STUDY
Overview
For a government department of colossal importance
(responsible for regulating the functions of corporate
entities) it was essential to detect and scrutinize all
the configurable items (CIs) within a specific
geographical boundary. Such a coherent and
dependable monitoring mechanism, once
established, was required to generate relevant alerts
& notifications, resulting in significant reduction of
any downtime of the overall ITsystem.
Challenge
The problem was more complex than initially
perceived, as the likelihood of inadvertently
overlooking precise critical information by human
operators, made it more challenging in ensuring
proactive monitoring and control within the given
environment.
Challenge
CIs remains unmonitored
Business execution might come to a dead stop
leading to decrease in productivity
Deficiency in data trust
Lack of Lean Data Measurement & Analytics
No proactiveness in detecting & preventing
system failures, No controlling over the
technology
Also, with no vigilance in place, a high degree of
vulnerability was existing in the system, spawning
the following potential threats:
Solution
Our solution captured the incidents and incorporated
hem in a dashboard reflecting key performance
statistics, allowing the business decision makers to
monitor transactions real time, take corrective actions
and prevent major incident faults.
In case of any such incident, tickets are raised
immediately, and throughout the incident management
life cycle, the activities are automatically monitored and
logged for audit purpose, to be used for business-
impact-analysis/assessment.
Result
Preventing incidents and faults, thereby increasing
the time saved for controlling the complex
infrastructure
Real time analysis (via visual data and graphic
display) enabling performance monitoring and
ensuring process governance through continual
improvement
This project was a major success, resulting in a win-
win for both the client and ProcessIT Global. Some of
the tangible benefits from the project were as follows:
Result
Future-proof CMDB, SecOps and AIOPs enabled
solution
Proper interpretation of alerts through
elimination of ā€œfalse positiveā€ and ā€œfalse negativeā€
alerts
Assurance of zero downtime
Protection of diverse ITand non-IT business assets
Follow us for more case studies
Want to exchange ideas on Cybersecurity or know
how ProcessIT Global can help your business?
Contact us at info@processitglobal.com

More Related Content

Similar to Intranet implementation of Identity and Access Manager

2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
Ā 
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...GE Software
Ā 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
Ā 
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoTWhat is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoTEmbitel Technologies (I) PVT LTD
Ā 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event ManagementJade Global
Ā 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecDr. Maceo D. Wattley
Ā 
Assets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptxAssets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptxGenicAssets
Ā 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
Ā 
Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...Ariel Lerer
Ā 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationThieu Nguyen Bao Chau
Ā 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO EbookNiTOROMInc
Ā 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
Ā 
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya
Ā 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business ProcessesLaurie LeBlanc
Ā 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business ProcessesLaurie LeBlanc
Ā 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEMAbuSyeedRaihan
Ā 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityCognizant
Ā 

Similar to Intranet implementation of Identity and Access Manager (20)

2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Ā 
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Ā 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Ā 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
Ā 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
Ā 
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoTWhat is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
Ā 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
Ā 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
Ā 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
Ā 
Assets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptxAssets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptx
Ā 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
Ā 
Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...
Ā 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
Ā 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
Ā 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
Ā 
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Ā 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
Ā 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
Ā 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
Ā 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost Quality
Ā 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Ā 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Ā 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 

Intranet implementation of Identity and Access Manager

  • 1. Establishment of a coherent monitoring system CASE STUDY
  • 2. Overview For a government department of colossal importance (responsible for regulating the functions of corporate entities) it was essential to detect and scrutinize all the configurable items (CIs) within a specific geographical boundary. Such a coherent and dependable monitoring mechanism, once established, was required to generate relevant alerts & notifications, resulting in significant reduction of any downtime of the overall ITsystem.
  • 3. Challenge The problem was more complex than initially perceived, as the likelihood of inadvertently overlooking precise critical information by human operators, made it more challenging in ensuring proactive monitoring and control within the given environment.
  • 4. Challenge CIs remains unmonitored Business execution might come to a dead stop leading to decrease in productivity Deficiency in data trust Lack of Lean Data Measurement & Analytics No proactiveness in detecting & preventing system failures, No controlling over the technology Also, with no vigilance in place, a high degree of vulnerability was existing in the system, spawning the following potential threats:
  • 5. Solution Our solution captured the incidents and incorporated hem in a dashboard reflecting key performance statistics, allowing the business decision makers to monitor transactions real time, take corrective actions and prevent major incident faults. In case of any such incident, tickets are raised immediately, and throughout the incident management life cycle, the activities are automatically monitored and logged for audit purpose, to be used for business- impact-analysis/assessment.
  • 6. Result Preventing incidents and faults, thereby increasing the time saved for controlling the complex infrastructure Real time analysis (via visual data and graphic display) enabling performance monitoring and ensuring process governance through continual improvement This project was a major success, resulting in a win- win for both the client and ProcessIT Global. Some of the tangible benefits from the project were as follows:
  • 7. Result Future-proof CMDB, SecOps and AIOPs enabled solution Proper interpretation of alerts through elimination of ā€œfalse positiveā€ and ā€œfalse negativeā€ alerts Assurance of zero downtime Protection of diverse ITand non-IT business assets
  • 8. Follow us for more case studies Want to exchange ideas on Cybersecurity or know how ProcessIT Global can help your business? Contact us at info@processitglobal.com