IT Foundation Management for IT Operations Your business is built on IT An Effective and Efficient Systems Management Approach
Jun 11, 2015
IT Foundation Managementfor IT Operations
Your business is built on IT
An Effective and Efficient Systems Management Approach
Page 2
IT Foundation Management
Security Foundation
Closing the Foundation Gap• Role-based access and control• Record the 5 Ws• Complete forensic history
Compliance FoundationMeeting Intent & Interpretation• Control subsystems changes• Detect compliance events• Build auditable history
IT Operations Foundation
Doing More with LessUniversal, integrated
environment•Optimized automated process •
Secure remote management•
IT Services FoundationDelivering on CommitmentsSense and Respond in real-
time• Correlate across the
architecture• Proactively manage and
protect•
IT Foundation Management
TDi Technologies Your business is built on IT
Page 3
What is the IT Foundation?
Servers… Network Gear… SANS… Operating Systems…
Networks…Databases… Appliances…Virtual Machines…
Blades…
Environment…
The IT Foundation includes all of your:
And is supported by:
I’m Joe…Solaris Systems Administrator
Steve,I’m a SANS Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Dave,Independent Consultant
Chris here…Tools Manager
Michael…VM Administrator
TDi Technologies Your business is built on IT
Page 4
IT Foundation Management
I’m Joe…Solaris Systems Administrator
Steve,I’m a SANS Administrator
Cheryl,Oracle DBA…
Hi. Raphael.Network Administration
Hi I’m Tania,Linux Systems Administrator
Dave,Independent Consultant
Chris here…Tools Manager
DELIVERS A COMMON:
Foundational System Operations Approach Security Model Compliance Practice
DRIVING:
Dramatic Simplification Automation of Repetitive Actions Common Practices Continuous Improvement Transparency Reliability Quality
YIELDING:
Reduced Cost Better Service Greater Agility Improved Governance Reduced Risk Command and Control
Michael…VM Administrator
TDi Technologies Your business is built on IT
Privileged Actors
Privileged Interfaces
Page 5
Simplification, Oversight, and Management
SimplificationSimplification Transparency and Oversight
Transparency and Oversight
Manages all Privileged
Interfaces with ONE system
Encodes and automates
common tasks
Provides universal operations
methodology
Centralizes management
Manages all Privileged
Interfaces with ONE system
Encodes and automates
common tasks
Provides universal operations
methodology
Centralizes management
All Privileged User actions
automatically recorded
Access control centralized
Authorization centralized
Compliance automated
Management centralized
All Privileged User actions
automatically recorded
Access control centralized
Authorization centralized
Compliance automated
Management centralized
Automates repetitive actions
One maintenance
methodology
Automatic forensic history
creation
Serves all platforms
Improves efficiency
Automates repetitive actions
One maintenance
methodology
Automatic forensic history
creation
Serves all platforms
Improves efficiency
SimplificationSimplification Transparency and Oversight
Transparency and Oversight Improved MaintenanceImproved MaintenanceImproved MaintenanceImproved Maintenance
TDi Technologies Your business is built on IT
Page 6
Simplification Example – Access Complexity
CMDB? SSH?
PuTTY?
Other records? HTTP?
TeraTerm?
Other DB? TELNET?
Absolute?
IP Address?
Other?
Terminal?
ZOC?
Tunnelier?
etc?
HOW? WHERE? WHAT? WHICH?
Log on?
Credentials?
Commands?
What syntax
applies?
With the Traditional Approach, Privileged Actors need to know…
With IT Foundation Management, Privileged Actors need to know…
NAME
Page 7
Transparency and Oversight
With the Traditional Approach…
We require access to be controlled
We require changes to be documented
I have records, but I do not have a means to verify them
We are required to manually document changes
Usually we do that immediately after making a change
Sometimes things are very busy, and we have to document changes later on
Sometimes changes just don’t get documented….
With IT Foundation Management…
Access is enforced against Policy through IT Foundation Management
All change records are available in real-time: recorded down to the key stroke
Verification is simple and accurate: always
The system documents changes for us automatically: in real-time
WE DON’T HAVE TO WORRY ABOUT DOCUMENTING CHANGES – WE JUST CONCENTRATE ON DOING
OUR JOBS!
Page 8
Maintenance is Managed Safely and Effectively
Patching
• Security• Performance• Features• Maintainability
Configuration
• Performance• Demand• New requirements• Issues• Expansion• Infrastructure changes
Housekeeping
• Disk clean-up• Update user/asset records• Run backups• Monitor/schedule jobs
Upgrading
• New software versions
Maintenance Includes:
Traditional Approach IT Foundation Management
Tools Multiple One
Methods Multiple One
Automation Varies by tool Common - powerful
Logging Limited or none Comprehensive
Issue Resolution Difficult Fully supported
Repetitive Actions Individual Up to 40 at a time
TDi Technologies Your business is built on IT
Maintenance occurs regularly – yet mistakes can take critical IT assets off-line or compromise security.
IT Foundation Management optimizes, automates, and centrally-manages all foundational maintenance
activities.
Page 9
Remediate Faster – Fix More Root Causes
Notification: 15 – 30 minutes
Isolation: I have to figure that out
Analysis: Time to hunt and dig…
Remediation: Take my best shot
0
15
60
45
30
Traditional Approach…
MTTR
0
15
60
45
30
MTTR
0
15
60
45
30
MTTR
IT Foundation Management…
Standard Systems Critical Systems
TDi Technologies Your business is built on IT
Notification: 15 – 30 minutes
Isolation: (with help) I figure it out
Analysis: Rich context already there
Remediation: Easy and Accurate
Notification: Instant (milliseconds)
Isolation: Automatic (by system)
Analysis: Rich context already there
Remediation: Easy and Accurate
All Systems
Page 10
IT Operations Benefits
Transparency
Access policy enforced
Change records auomatically captured
Verification
Maintenance
One tool
One method
Powerful automation
Comprehensive forensics
Issue resolution directly supported
Repetitive actions automated
Mean Time to Repair
Notification from minutes to milliseconds
Isolation is automatic
Analysis with rich context
Remediation is easy and accurate
Simplification
Cost reduction (move repetitive work to system)
Agility (common process, automation)
Consistency (common process, unified method)
TDi Technologies Your business is built on IT
Page 11
How to Engage TDi Technologies
TDi Technologies Your business is built on IT
Web: www.tditechnologies.com/contact
Email: [email protected]
Phone: 1-800-695-1258