SlideShare a Scribd company logo
Automated Management
of Intelligent Devices
James Dollar
Founder & CTO, Uplogix
Austin, Texas

                         The power of your most trusted IT admin everywhere, all the time
The World Today:
               Connectivity is King
Data Centers                                                                   Remote
                                                                                Sites
                                           Operations
                                            Center(s)




   Isolated
  Locations
                          Mobile Workers




                                                    Customer-facing
                                                      Equipment



                                                             ©2012 Uplogix, Inc. | uplogix.com   2
Managing Intelligent Devices & Systems


   The trend is toward smarter, and more-connected
   devices and systems.




Cloud-based,            Widely          Self-reporting          Critical
mission-critical      distributed        diagnostics          components
 Business Requirements:
  Uptime – Only useful if they are working, and connected with acceptable
    QoS
  Security – Critical to operations, customers
  Acceptable Operating Cost – Increasing numbers of complex and
   critical devices is a formula for support costs to skyrocket
                                                            ©2012 Uplogix, Inc. | uplogix.com   3
Managing Intelligent Devices & Systems:
The Challenges

Remote Location
 Downtime is dead time
 QoS = productivity = P&L

Data Center
 Security is critical
 Virtualization makes the network more critical

Isolated Locations
 Increasingly rely on wireless connectivity
 Expectation of office-level IT services – anywhere on Earth


Customer-facing Devices
 To deliver more services, need constant connection
 Security of data transfer is important
                                               ©2012 Uplogix, Inc. | uplogix.com   4
Managing Intelligent Devices & Systems:
The Challenges

Operations Center
   You just can’t put highly-trained people everywhere,
   all the time, so operations are


                CENTRALIZED

This introduces new challenges:
• Collecting and processing vast amounts of monitoring data
           COMPLEXITY & TRIAGING OF ISSUES
• A reliance on the network to manage networked devices
               DOWNTIME & TRUCK ROLLS
• Staged updates and standardization of versions
              SECURITY & COMPLIANCE RISK

                                              ©2012 Uplogix, Inc. | uplogix.com   5
The World Today:
               Connectivity is King
Data Centers                                                          Remote
                                                                       Sites
                                  Operations
                                   Center(s)




   Isolated
  Locations               The solution is
                    distributed & automated
                      device management
                                           Customer-facing
                                             Equipment



                                                    ©2012 Uplogix, Inc. | uplogix.com   6
Managing Intelligent Devices & Systems:
         The Solution

       AUTO MATI O N


 Monitoring vs. Management
 The difference between knowing there is an issue, and fixing the issue

 Business Requirements for Automated Management
  – Reliability        – Flexibility           – Simplicity
  – Security           – Interoperability


                                                       ©2012 Uplogix, Inc. | uplogix.com   7
What do you need for distributed
           automated management?

 Directly connect to devices
  To see everything an on-site technician would see,
  more reliably and without impacting the network
 On-board processing & storage
  Monitor, evaluate and take actions based on the run-book, back up
  configurations and OS files onsite
 Secure out-of-band access
  Provide an off-network connection for more complicated problem
  resolution by a remote technician
 Role-based access and audited management
  Eliminate potential for abuse and ensure policy compliance
 Complement existing centralized management tools
  Feed the NOC with information, backfill for audit and compliance

                                                          ©2012 Uplogix, Inc. | uplogix.com   8
Business Requirement: Simplification
                    Solve problems before the SLA timer starts
                                                    The Road to Recovery
                                  UNKNOWN              IDENTIFICATION                    ISOLATION            RESOLUTION



   EVENT                                                                                                                            RECOVERY


Standard NSM Tools                                       SLA Timer Starts


                        UNKNOWN                           IDENTIFICATION                         ISOLATION             RESOLUTION


     0:00 min                5:00      10:00          15:00          minutes or hours      minutes or hours          hours or days

            Detection through                                        Administrator begins fault isolation and                       Tech arrives
            polling and verification                                 resolutions attempt, or places service call                    on-site

With Automated Management
                                                                                                                                       COMPLIANCE

                                                                                                                                       With Standard NSM:
UNKNOWN   I DENT I F I CAT I ON         ISOLATION                      RESOLUTION                                                      Days or weeks
                                                                                                                                       Compliance is missing
      0:00                 0:30       1:00     1:30           2:00        2:30          3:00 minutes                                   or requires manual
                                                                                                                                       research
            Problem detected from                                    L1 & L2 run book actions automated,
            local polling every 30 sec.                              NOC notified, device recovered or escalated                       At all times
                                                                                                                                       All actions stored for
                                                                                                                                       compliance reporting




                                                                                                                       ©2012 Uplogix, Inc. | uplogix.com        9
Business Requirement: Reliability
                   Battlefield Communications
                                          Broadband
                                             Satellite
                                                                                     Remote Locations




     Killeen, TX
                                                                             Secure Comms Crate
Half a world away…                                                                                            PDU
                                                                              Satellite Modem
If a remote station’s communications
go down, the provider has a two-way                                                   Router
connection to gear over an Iridium
                                                                             WAN Accelerator
out-of-band connection.
                                                                                      Switch
They receive updates and can access
equipment as if onsite, often saving                                            Automated
                                                                                Management
the need for a support call into remote
and often dangerous locations.                           Out-of-band Over
                                                          Iridum Satellite


                                                                                ©2012 Uplogix, Inc. | uplogix.com   10
Business Requirement: Security
      Know who did what, and when

IT Policy Enforcement
  – Maintains and enforces AAA (Authentication, Authorization
    and Accounting), regardless of the state of the network.
  – Ensure only the right users have the right level of access to
    devices and systems providing granular and customizable
    access, authorization and role-based permission controls


Audit & Compliance Reporting
  – Logs all changes made by users and the results of those
    changes, and inspect the logs in real-time for problems
  – Provide in-depth reporting of changes made to satisfy
    numerous compliance standards

                                                     ©2010 Uplogix, Inc. | uplogix.com   11
Business Requirements: Flexibility &
         Interoperability – Remote Sites




Automated management
for distributed locations

• Group similar sites for
  easier deployment
• Device management
    • Scheduled updates
• User Group management

                                      ©2012 Uplogix, Inc. | uplogix.com   12
What’s next for
local management?


    The Cloud &
     even more
ubiquitous networking

                 ©2012 Uplogix, Inc. | uplogix.com   13
What’s next for
local management?


The Smart(er) Grid




                     ©2012 Uplogix, Inc. | uplogix.com   14
What’s next for
local management?

 The final frontier?
   Well, maybe.

  Jan 2010 | Cisco
    Puts Internet
  Router in Space
                       ©2012 Uplogix, Inc. | uplogix.com   15

More Related Content

What's hot

Pv performance services
Pv performance servicesPv performance services
Pv performance services
Convertitalia
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
Khazret Sapenov
 
Embrace private cloud with confidence
Embrace private cloud with confidenceEmbrace private cloud with confidence
Embrace private cloud with confidence
ManageEngine, Zoho Corporation
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
Ed Wong
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
 
On site services flyer
On site services flyerOn site services flyer
On site services flyer
kadarnell77
 
Diagnosability versus The Cloud, Toronto 2011-04-21
Diagnosability versus The Cloud, Toronto 2011-04-21Diagnosability versus The Cloud, Toronto 2011-04-21
Diagnosability versus The Cloud, Toronto 2011-04-21
Cary Millsap
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
Novell
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Novell
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
Novell
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Geographic Information Coordinating Council
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
Vadimazz
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentation
Bluehusker
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Novell
 
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
Savvius, Inc
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
Bob Rhubart
 
20120609 cod mms_feedback_osamut
20120609 cod mms_feedback_osamut20120609 cod mms_feedback_osamut
20120609 cod mms_feedback_osamut
Osamu Takazoe
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
Insider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM EditionInsider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM Edition
Matt Holitza
 
Laurent Tarin B P M Ilog
Laurent  Tarin    B P M  IlogLaurent  Tarin    B P M  Ilog
Laurent Tarin B P M Ilog
SOA Symposium
 

What's hot (20)

Pv performance services
Pv performance servicesPv performance services
Pv performance services
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
 
Embrace private cloud with confidence
Embrace private cloud with confidenceEmbrace private cloud with confidence
Embrace private cloud with confidence
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
On site services flyer
On site services flyerOn site services flyer
On site services flyer
 
Diagnosability versus The Cloud, Toronto 2011-04-21
Diagnosability versus The Cloud, Toronto 2011-04-21Diagnosability versus The Cloud, Toronto 2011-04-21
Diagnosability versus The Cloud, Toronto 2011-04-21
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentation
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
Improving the IP Telephony Experience: How to Troubleshoot Converged Networks...
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
20120609 cod mms_feedback_osamut
20120609 cod mms_feedback_osamut20120609 cod mms_feedback_osamut
20120609 cod mms_feedback_osamut
 
ZENDAL BACKUP
ZENDAL BACKUPZENDAL BACKUP
ZENDAL BACKUP
 
Insider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM EditionInsider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM Edition
 
Laurent Tarin B P M Ilog
Laurent  Tarin    B P M  IlogLaurent  Tarin    B P M  Ilog
Laurent Tarin B P M Ilog
 

Similar to Automated Management of Intelligent Devices

iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
MAX Risk Intelligence by LOGICnow
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed Services
RNelson20
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
PacketTrap Msp
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
CloudExpoEurope
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
IBM Danmark
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based Services
Symantec
 
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) SystemWQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
Dubai Quality Group
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
jhulsey
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
jhulsey
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
SecPod Technologies
 
Planet azure starship system center exploring new worlds
Planet azure starship system center exploring new worldsPlanet azure starship system center exploring new worlds
Planet azure starship system center exploring new worlds
CompuTrain. De IT opleider.
 
AI, Robotics & impacts on the future of WHS
AI, Robotics & impacts on the future of WHSAI, Robotics & impacts on the future of WHS
AI, Robotics & impacts on the future of WHS
Australian Institute of Health & Safety
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
apompliano
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
What does performance mean in the cloud
What does performance mean in the cloudWhat does performance mean in the cloud
What does performance mean in the cloud
Michael Kopp
 
Dss Business Overview 2012 01 20
Dss Business Overview 2012 01 20Dss Business Overview 2012 01 20
Dss Business Overview 2012 01 20
Ernie Barber
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBoot
OpSource
 
Cloud malfunction up11
Cloud malfunction up11Cloud malfunction up11
Cloud malfunction up11
Alex Maclinovsky
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
PerformanceVision (previously SecurActive)
 
WQD2011 - Kaizen case study by DEWA - Access Control System
WQD2011 - Kaizen case study by DEWA - Access Control SystemWQD2011 - Kaizen case study by DEWA - Access Control System
WQD2011 - Kaizen case study by DEWA - Access Control System
Dubai Quality Group
 

Similar to Automated Management of Intelligent Devices (20)

iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed Services
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Evaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based ServicesEvaluating Risks of Cloud Based Services
Evaluating Risks of Cloud Based Services
 
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) SystemWQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
WQD2011 - KAIZEN - DEWA - CCTV (Closed Circuit Television) System
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
 
SanerNow Endpoint Management
SanerNow Endpoint ManagementSanerNow Endpoint Management
SanerNow Endpoint Management
 
Planet azure starship system center exploring new worlds
Planet azure starship system center exploring new worldsPlanet azure starship system center exploring new worlds
Planet azure starship system center exploring new worlds
 
AI, Robotics & impacts on the future of WHS
AI, Robotics & impacts on the future of WHSAI, Robotics & impacts on the future of WHS
AI, Robotics & impacts on the future of WHS
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
What does performance mean in the cloud
What does performance mean in the cloudWhat does performance mean in the cloud
What does performance mean in the cloud
 
Dss Business Overview 2012 01 20
Dss Business Overview 2012 01 20Dss Business Overview 2012 01 20
Dss Business Overview 2012 01 20
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBoot
 
Cloud malfunction up11
Cloud malfunction up11Cloud malfunction up11
Cloud malfunction up11
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
WQD2011 - Kaizen case study by DEWA - Access Control System
WQD2011 - Kaizen case study by DEWA - Access Control SystemWQD2011 - Kaizen case study by DEWA - Access Control System
WQD2011 - Kaizen case study by DEWA - Access Control System
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Automated Management of Intelligent Devices

  • 1. Automated Management of Intelligent Devices James Dollar Founder & CTO, Uplogix Austin, Texas The power of your most trusted IT admin everywhere, all the time
  • 2. The World Today: Connectivity is King Data Centers Remote Sites Operations Center(s) Isolated Locations Mobile Workers Customer-facing Equipment ©2012 Uplogix, Inc. | uplogix.com 2
  • 3. Managing Intelligent Devices & Systems The trend is toward smarter, and more-connected devices and systems. Cloud-based, Widely Self-reporting Critical mission-critical distributed diagnostics components Business Requirements:  Uptime – Only useful if they are working, and connected with acceptable QoS  Security – Critical to operations, customers  Acceptable Operating Cost – Increasing numbers of complex and critical devices is a formula for support costs to skyrocket ©2012 Uplogix, Inc. | uplogix.com 3
  • 4. Managing Intelligent Devices & Systems: The Challenges Remote Location  Downtime is dead time  QoS = productivity = P&L Data Center  Security is critical  Virtualization makes the network more critical Isolated Locations  Increasingly rely on wireless connectivity  Expectation of office-level IT services – anywhere on Earth Customer-facing Devices  To deliver more services, need constant connection  Security of data transfer is important ©2012 Uplogix, Inc. | uplogix.com 4
  • 5. Managing Intelligent Devices & Systems: The Challenges Operations Center You just can’t put highly-trained people everywhere, all the time, so operations are CENTRALIZED This introduces new challenges: • Collecting and processing vast amounts of monitoring data COMPLEXITY & TRIAGING OF ISSUES • A reliance on the network to manage networked devices DOWNTIME & TRUCK ROLLS • Staged updates and standardization of versions SECURITY & COMPLIANCE RISK ©2012 Uplogix, Inc. | uplogix.com 5
  • 6. The World Today: Connectivity is King Data Centers Remote Sites Operations Center(s) Isolated Locations The solution is distributed & automated device management Customer-facing Equipment ©2012 Uplogix, Inc. | uplogix.com 6
  • 7. Managing Intelligent Devices & Systems: The Solution AUTO MATI O N  Monitoring vs. Management The difference between knowing there is an issue, and fixing the issue  Business Requirements for Automated Management – Reliability – Flexibility – Simplicity – Security – Interoperability ©2012 Uplogix, Inc. | uplogix.com 7
  • 8. What do you need for distributed automated management?  Directly connect to devices To see everything an on-site technician would see, more reliably and without impacting the network  On-board processing & storage Monitor, evaluate and take actions based on the run-book, back up configurations and OS files onsite  Secure out-of-band access Provide an off-network connection for more complicated problem resolution by a remote technician  Role-based access and audited management Eliminate potential for abuse and ensure policy compliance  Complement existing centralized management tools Feed the NOC with information, backfill for audit and compliance ©2012 Uplogix, Inc. | uplogix.com 8
  • 9. Business Requirement: Simplification Solve problems before the SLA timer starts The Road to Recovery UNKNOWN IDENTIFICATION ISOLATION RESOLUTION EVENT RECOVERY Standard NSM Tools SLA Timer Starts UNKNOWN IDENTIFICATION ISOLATION RESOLUTION 0:00 min 5:00 10:00 15:00 minutes or hours minutes or hours hours or days Detection through Administrator begins fault isolation and Tech arrives polling and verification resolutions attempt, or places service call on-site With Automated Management COMPLIANCE With Standard NSM: UNKNOWN I DENT I F I CAT I ON ISOLATION RESOLUTION Days or weeks Compliance is missing 0:00 0:30 1:00 1:30 2:00 2:30 3:00 minutes or requires manual research Problem detected from L1 & L2 run book actions automated, local polling every 30 sec. NOC notified, device recovered or escalated At all times All actions stored for compliance reporting ©2012 Uplogix, Inc. | uplogix.com 9
  • 10. Business Requirement: Reliability Battlefield Communications Broadband Satellite Remote Locations Killeen, TX Secure Comms Crate Half a world away… PDU Satellite Modem If a remote station’s communications go down, the provider has a two-way Router connection to gear over an Iridium WAN Accelerator out-of-band connection. Switch They receive updates and can access equipment as if onsite, often saving Automated Management the need for a support call into remote and often dangerous locations. Out-of-band Over Iridum Satellite ©2012 Uplogix, Inc. | uplogix.com 10
  • 11. Business Requirement: Security Know who did what, and when IT Policy Enforcement – Maintains and enforces AAA (Authentication, Authorization and Accounting), regardless of the state of the network. – Ensure only the right users have the right level of access to devices and systems providing granular and customizable access, authorization and role-based permission controls Audit & Compliance Reporting – Logs all changes made by users and the results of those changes, and inspect the logs in real-time for problems – Provide in-depth reporting of changes made to satisfy numerous compliance standards ©2010 Uplogix, Inc. | uplogix.com 11
  • 12. Business Requirements: Flexibility & Interoperability – Remote Sites Automated management for distributed locations • Group similar sites for easier deployment • Device management • Scheduled updates • User Group management ©2012 Uplogix, Inc. | uplogix.com 12
  • 13. What’s next for local management? The Cloud & even more ubiquitous networking ©2012 Uplogix, Inc. | uplogix.com 13
  • 14. What’s next for local management? The Smart(er) Grid ©2012 Uplogix, Inc. | uplogix.com 14
  • 15. What’s next for local management? The final frontier? Well, maybe. Jan 2010 | Cisco Puts Internet Router in Space ©2012 Uplogix, Inc. | uplogix.com 15

Editor's Notes

  1. Need some kind of intro: One of the global trends in IT is toward more smart and connected devices and systems. They are everywhere from your bank to your datacenter, to your utility company to a branch office.These devices and systems will deliver incredible applications and efficiencies, but will also impose a crippling IT burden without adopting new ways to automate their management.This presentation will show examples of how the trend toward more intelligent devices extends to the tools needed to deploy, manage and secure them in the field. Learn the common requirements for implementing local management in intelligent systems in almost any industry.
  2. Purpose: Elaborate on the implications in terms of operational and business impact of the capabilities shown in the previous slide. Standard NSM Tools Clicks:Click to highlight “event to recovery” timelineClick to show NSM “Unknown” Phase.Click to show NSM “Identification” and “Isolation” Phases.Click to show NSM “Resolution” Phase.Uplogix Clicks:Click to show Uplogix Unknown Phase is 0s.Click to show max. Identification 30s.Click to show rapid automated isolation and resolutionClick to show dramatic comparison of timelines and summary bullets
  3. Provide in-depth reporting of changes made to satisfy numerous compliance standards: Sarbanes-Oxley (SOX) Payment Card Industry Data Security Standards (PCIDSS) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Energy Policy Act of 2005 (NERC/FERC) Federal Information Security Management Act of 2002 (FISMA) Gramm-Leach-Bliley Act (GLBA) IT Policy Enforcement – HOW:Automates session management to prevent unauthorized access to systemsMaintains and enforces AAA (Authentication, Authorization and Accounting) model, regardless of the state of the networkProvides multifactor authentication through integration with RSA SecureID and Secure Computing SafewordUses SSHv2 for encrypting access and communication with all managed devicesAudit and Compliance Reporting – HOW:Captures, logs and archives every keystroke and output, unlike SNMP-based tools that fail to capture changes during a network outageUniquely inspects audit logs in real-time for problems and can proactively take rules-based automated recovery actions based on log patterns, avoiding outages and time-consuming manual log analysis