SlideShare a Scribd company logo
Establishment of a
coherent monitoring
system
CASE STUDY
Overview
For a government department of colossal importance
(responsible for regulating the functions of corporate
entities) it was essential to detect and scrutinize all
the configurable items (CIs) within a specific
geographical boundary. Such a coherent and
dependable monitoring mechanism, once
established, was required to generate relevant alerts
& notifications, resulting in significant reduction of
any downtime of the overall ITsystem.
Challenge
The problem was more complex than initially
perceived, as the likelihood of inadvertently
overlooking precise critical information by human
operators, made it more challenging in ensuring
proactive monitoring and control within the given
environment.
Challenge
CIs remains unmonitored
Business execution might come to a dead stop
leading to decrease in productivity
Deficiency in data trust
Lack of Lean Data Measurement & Analytics
No proactiveness in detecting & preventing
system failures, No controlling over the
technology
Also, with no vigilance in place, a high degree of
vulnerability was existing in the system, spawning
the following potential threats:
Solution
Our solution captured the incidents and incorporated
hem in a dashboard reflecting key performance
statistics, allowing the business decision makers to
monitor transactions real time, take corrective actions
and prevent major incident faults.
In case of any such incident, tickets are raised
immediately, and throughout the incident management
life cycle, the activities are automatically monitored and
logged for audit purpose, to be used for business-
impact-analysis/assessment.
Result
Preventing incidents and faults, thereby increasing
the time saved for controlling the complex
infrastructure
Real time analysis (via visual data and graphic
display) enabling performance monitoring and
ensuring process governance through continual
improvement
This project was a major success, resulting in a win-
win for both the client and ProcessIT Global. Some of
the tangible benefits from the project were as follows:
Result
Future-proof CMDB, SecOps and AIOPs enabled
solution
Proper interpretation of alerts through
elimination of “false positive” and “false negative”
alerts
Assurance of zero downtime
Protection of diverse ITand non-IT business assets
Follow us for more case studies
Want to exchange ideas on Cybersecurity or know
how ProcessIT Global can help your business?
Contact us at info@processitglobal.com

More Related Content

Similar to Intranet implementation of Identity and Access Manager

2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
GE Software
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoTWhat is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
Embitel Technologies (I) PVT LTD
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
Jade Global
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecDr. Maceo D. Wattley
 
Assets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptxAssets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptx
GenicAssets
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...
Ariel Lerer
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationThieu Nguyen Bao Chau
 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
NiTOROMInc
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
Michael Nickle
 
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya
 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
Laurie LeBlanc
 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
Laurie LeBlanc
 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
AbuSyeedRaihan
 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost Quality
Cognizant
 

Similar to Intranet implementation of Identity and Access Manager (20)

2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
Drive Profitability with Big Data Analytics: from Asset to Operations Optimiz...
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoTWhat is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
What is Predictive Maintenance? Learn Its Benefits & Role of Industrial IoT
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
ServiceNow Event Management
ServiceNow Event ManagementServiceNow Event Management
ServiceNow Event Management
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
Assets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptxAssets Management in Utilities Industry.pptx
Assets Management in Utilities Industry.pptx
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...Meeting the challenges to adopt visual production management systems hms-whit...
Meeting the challenges to adopt visual production management systems hms-whit...
 
IoT - threats and opportunities to the organization
IoT - threats and opportunities to the organizationIoT - threats and opportunities to the organization
IoT - threats and opportunities to the organization
 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOsKaseya: Making Operational IT Strategic: Special Edition for Education CIOs
Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs
 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
 
Alignia for Business Processes
Alignia for Business ProcessesAlignia for Business Processes
Alignia for Business Processes
 
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
8 BIGGEST MISTAKES IT PRACTITIONERS MAKE AND HOW TO AVOID THEM
 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost Quality
 

Recently uploaded

Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Intranet implementation of Identity and Access Manager

  • 1. Establishment of a coherent monitoring system CASE STUDY
  • 2. Overview For a government department of colossal importance (responsible for regulating the functions of corporate entities) it was essential to detect and scrutinize all the configurable items (CIs) within a specific geographical boundary. Such a coherent and dependable monitoring mechanism, once established, was required to generate relevant alerts & notifications, resulting in significant reduction of any downtime of the overall ITsystem.
  • 3. Challenge The problem was more complex than initially perceived, as the likelihood of inadvertently overlooking precise critical information by human operators, made it more challenging in ensuring proactive monitoring and control within the given environment.
  • 4. Challenge CIs remains unmonitored Business execution might come to a dead stop leading to decrease in productivity Deficiency in data trust Lack of Lean Data Measurement & Analytics No proactiveness in detecting & preventing system failures, No controlling over the technology Also, with no vigilance in place, a high degree of vulnerability was existing in the system, spawning the following potential threats:
  • 5. Solution Our solution captured the incidents and incorporated hem in a dashboard reflecting key performance statistics, allowing the business decision makers to monitor transactions real time, take corrective actions and prevent major incident faults. In case of any such incident, tickets are raised immediately, and throughout the incident management life cycle, the activities are automatically monitored and logged for audit purpose, to be used for business- impact-analysis/assessment.
  • 6. Result Preventing incidents and faults, thereby increasing the time saved for controlling the complex infrastructure Real time analysis (via visual data and graphic display) enabling performance monitoring and ensuring process governance through continual improvement This project was a major success, resulting in a win- win for both the client and ProcessIT Global. Some of the tangible benefits from the project were as follows:
  • 7. Result Future-proof CMDB, SecOps and AIOPs enabled solution Proper interpretation of alerts through elimination of “false positive” and “false negative” alerts Assurance of zero downtime Protection of diverse ITand non-IT business assets
  • 8. Follow us for more case studies Want to exchange ideas on Cybersecurity or know how ProcessIT Global can help your business? Contact us at info@processitglobal.com