SlideShare a Scribd company logo
AlarmTILT Communication Model   for Nagios
Communication Model with Nagios Customer Environment 1.  Nagios  events are transmitted to remote AlarmTILT servers via a  secure IP  (Internet, VPN,…) connection. 2.  Within AlarmTILT, an alert procedure starts, if the incoming event matches pre-defined incident criteria. Client Heartbeat Events Encrypted IP INTERNET Servers
Communication Model with Nagios Customer Environment 3.  The processed alert is routed through different channels to the right destination group. 4.  Following pre-defined procedures, support people are notified via  all possible media  (phone, mobile, PC,…).  Communication networks are provided and fully operated by AlarmTILT  (Connectivity as a Service) . Client SMS ISDN networks Internet Mobile networks Heartbeat Events Encrypted IP INTERNET Servers
Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment SMS ISDN networks Internet Mobile networks 5.  AlarmTILT provides advanced  escalation  features  and  time dependent destinations  . Client Voice Escalation  STEP 1 (no acknowledgment within x minutes) Servers
Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment Voice SMS ISDN networks Internet Mobile networks 6.  Mixing  media and alerted people  shortens the delay  between the detection of an incident and the beginning of its  resolution. Client Escalation  STEP 2 (no acknowledgment within x minutes) Servers Voice
Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment Voice SMS Voice ISDN networks Internet Mobile networks 6.  Mixing  media and alerted people  shortens the delay  between the detection of an incident and the beginning of its resolution. Client SMS E-mail Escalation  STEP 3 (no acknowledgment within x minutes) Servers
Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment SMS SMS Voice E-mail John Doe replies directly to the alert « OK on the move » ISDN networks Internet Mobile networks 7.  Confirmation channel routing adds  two-way n otificat ion handling . Escalation procedures stop automatically, when a member of staff  acknowledges  the call.  Client Voice Servers
Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment ISDN networks Internet John Doe has acknowledged Mobile networks 8.  Support teams involved are notified, that John Doe is on his way, or when an incident has been  resolved.  Client SMS Voice SMS Voice E-mail Servers
Communication Model with Nagios Alert dispatching Heartbeat Events Encrypted IP INTERNET Customer Environment Mobile networks ISDN networks Internet Alert acknowledgments 9.  AlarmTILT also provides full incidents and resolution history of all generated alerts: all transactions (generated event / opened incident / alerting procedures /closed incident) are logged for an  efficient reporting  and incident troubleshooting. HORIZONTAL COMMUNICATION Provide vital /useful information Reach the right people Instantaneously Client Servers
Now that you know how it works:  Download the AlarmTILT Client for Nagios  http://www.alarmtilt.com/?action=solutions&browse=nagios

More Related Content

What's hot

my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
jadeja dhanraj
 
Electricot
ElectricotElectricot
Electricot
hobbis
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 

What's hot (20)

MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation. MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation.
 
Another proposal
Another proposalAnother proposal
Another proposal
 
HSB - DDoS Threats and Trends - Gurdeep Dhillon
HSB - DDoS Threats and Trends - Gurdeep DhillonHSB - DDoS Threats and Trends - Gurdeep Dhillon
HSB - DDoS Threats and Trends - Gurdeep Dhillon
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Electricot
ElectricotElectricot
Electricot
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
ST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on dempST tech tour - sigfox presentation & hands-on demp
ST tech tour - sigfox presentation & hands-on demp
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
WebWayOne
WebWayOneWebWayOne
WebWayOne
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
VPN
VPNVPN
VPN
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 

Viewers also liked (7)

20080617 Alarm Tilt Client For Nagios
20080617 Alarm Tilt Client For Nagios20080617 Alarm Tilt Client For Nagios
20080617 Alarm Tilt Client For Nagios
 
Summery of project outcome
Summery of project outcomeSummery of project outcome
Summery of project outcome
 
Disaster Management Summary For Web
Disaster Management Summary For WebDisaster Management Summary For Web
Disaster Management Summary For Web
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to AlarmTilt Client for Nagios

Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
ardhita banu adji
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
write31
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
RAJASHREE B
 

Similar to AlarmTilt Client for Nagios (20)

Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile Growing internet of things solution in industries and mobile
Growing internet of things solution in industries and mobile
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Presentazione Edistar English
Presentazione Edistar EnglishPresentazione Edistar English
Presentazione Edistar English
 
Under DDoS Attack?
Under DDoS Attack? Under DDoS Attack?
Under DDoS Attack?
 
TADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovTADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin Ivanov
 
[GITSN] wireless data security system
[GITSN] wireless data security system[GITSN] wireless data security system
[GITSN] wireless data security system
 
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
 
Paradial Corporate And Product 2009 05
Paradial Corporate And Product 2009 05Paradial Corporate And Product 2009 05
Paradial Corporate And Product 2009 05
 
EGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - LicensingEGLA's Patent and Intellectual Property Portfolio - Licensing
EGLA's Patent and Intellectual Property Portfolio - Licensing
 
Propuesto de 911 o C4 de Paraguy
Propuesto de 911 o C4 de Paraguy Propuesto de 911 o C4 de Paraguy
Propuesto de 911 o C4 de Paraguy
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
company profile
company profilecompany profile
company profile
 
Telestax Restcomm Telecom API pre-conference workshop 11 Nov 2013
Telestax Restcomm Telecom API pre-conference workshop 11 Nov 2013Telestax Restcomm Telecom API pre-conference workshop 11 Nov 2013
Telestax Restcomm Telecom API pre-conference workshop 11 Nov 2013
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...Cloud Controlled Intrusion Detection &  Burglary Prevention Stratagems in  Ho...
Cloud Controlled Intrusion Detection & Burglary Prevention Stratagems in Ho...
 
EENA2019: Track1 session1 _IoT_into the PSAP; overwhelmed yet? Brett Whitney
EENA2019: Track1 session1 _IoT_into the PSAP; overwhelmed yet? Brett WhitneyEENA2019: Track1 session1 _IoT_into the PSAP; overwhelmed yet? Brett Whitney
EENA2019: Track1 session1 _IoT_into the PSAP; overwhelmed yet? Brett Whitney
 
EENA2019: Track1 session1 _IoT into the PSAP; overwhelmed yet?_Brett Whitney
EENA2019: Track1 session1 _IoT into the PSAP; overwhelmed yet?_Brett WhitneyEENA2019: Track1 session1 _IoT into the PSAP; overwhelmed yet?_Brett Whitney
EENA2019: Track1 session1 _IoT into the PSAP; overwhelmed yet?_Brett Whitney
 
AUTOMATED FAULT TOLERANT FIRE DETECTION AND WARNING COMMUNICATOR SYSTEM
AUTOMATED FAULT TOLERANT FIRE DETECTION AND WARNING COMMUNICATOR SYSTEMAUTOMATED FAULT TOLERANT FIRE DETECTION AND WARNING COMMUNICATOR SYSTEM
AUTOMATED FAULT TOLERANT FIRE DETECTION AND WARNING COMMUNICATOR SYSTEM
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

AlarmTilt Client for Nagios

  • 2. Communication Model with Nagios Customer Environment 1. Nagios events are transmitted to remote AlarmTILT servers via a secure IP (Internet, VPN,…) connection. 2. Within AlarmTILT, an alert procedure starts, if the incoming event matches pre-defined incident criteria. Client Heartbeat Events Encrypted IP INTERNET Servers
  • 3. Communication Model with Nagios Customer Environment 3. The processed alert is routed through different channels to the right destination group. 4. Following pre-defined procedures, support people are notified via all possible media (phone, mobile, PC,…). Communication networks are provided and fully operated by AlarmTILT (Connectivity as a Service) . Client SMS ISDN networks Internet Mobile networks Heartbeat Events Encrypted IP INTERNET Servers
  • 4. Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment SMS ISDN networks Internet Mobile networks 5. AlarmTILT provides advanced escalation features and time dependent destinations . Client Voice Escalation STEP 1 (no acknowledgment within x minutes) Servers
  • 5. Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment Voice SMS ISDN networks Internet Mobile networks 6. Mixing media and alerted people shortens the delay between the detection of an incident and the beginning of its resolution. Client Escalation STEP 2 (no acknowledgment within x minutes) Servers Voice
  • 6. Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment Voice SMS Voice ISDN networks Internet Mobile networks 6. Mixing media and alerted people shortens the delay between the detection of an incident and the beginning of its resolution. Client SMS E-mail Escalation STEP 3 (no acknowledgment within x minutes) Servers
  • 7. Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment SMS SMS Voice E-mail John Doe replies directly to the alert « OK on the move » ISDN networks Internet Mobile networks 7. Confirmation channel routing adds two-way n otificat ion handling . Escalation procedures stop automatically, when a member of staff acknowledges the call. Client Voice Servers
  • 8. Communication Model with Nagios Heartbeat Events Encrypted IP INTERNET Customer Environment ISDN networks Internet John Doe has acknowledged Mobile networks 8. Support teams involved are notified, that John Doe is on his way, or when an incident has been resolved. Client SMS Voice SMS Voice E-mail Servers
  • 9. Communication Model with Nagios Alert dispatching Heartbeat Events Encrypted IP INTERNET Customer Environment Mobile networks ISDN networks Internet Alert acknowledgments 9. AlarmTILT also provides full incidents and resolution history of all generated alerts: all transactions (generated event / opened incident / alerting procedures /closed incident) are logged for an efficient reporting and incident troubleshooting. HORIZONTAL COMMUNICATION Provide vital /useful information Reach the right people Instantaneously Client Servers
  • 10. Now that you know how it works: Download the AlarmTILT Client for Nagios http://www.alarmtilt.com/?action=solutions&browse=nagios

Editor's Notes

  1. --- EN ---- In this chapter, I would like to highlight the importance of communication in the context of Business Continuity. --- FR ---- Dans ce chapitre, je voudrais juste souligner l’importance de la communication dans le cadre de la Business Continuity.
  2. --- EN ---- In this chapter, I would like to highlight the importance of communication in the context of Business Continuity. --- FR ---- Dans ce chapitre, je voudrais juste souligner l’importance de la communication dans le cadre de la Business Continuity.