Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Process

Size: px
Start display at page:

Download "Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Process"

Transcription

1 LAW, INVESTIGATIONS, AND ETHICS Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Laurence J. Wolf Recovering from incidents in a timely appropriate manner is vital to maintaining operational efficiency, controlling costs, and keeping users happy and productive. A key to quick recovery is having an incident management process in place. An analysis of the incident management process can offer insight into how effectively the process supports problem detection and isolation and systems restoration. An analysis of the incident management process can contribute to systems and application resilience, the capacity to keep failures from dramatically affecting users. Highly available and secure systems are a business imperative, for good reason. Averting a system crash or hacker attack can prevent loss of revenue, production delays, and escalating costs. The sobering reality, though, is that the powerful, complex technologies we all rely on aren t perfect. They can and do break down. People create problems, too. Often, they don t adhere to best practices or they lack needed knowledge. They make mistakes. And sometimes, they re just plain malicious. As stated above, whether incidents result from glitches or attacks, recovering from them in a timely appropriate manner is vital to maintaining operational efficiency, controlling costs, and keeping users happy and productive. A key to quick recovery is having an incident management process in place that enables network, systems, and security management organizations to correctly address problems and maintain service levels. The incident management LAURENCE J. WOLF, CISSP, is Senior Manger in Deloitte s Enterprise Risk Services Practice. He has 19 years of experience in systems, networks, security, and software development, and resilient design, implementation, and testing, as well as business continuity planning. He has spent the past 12 years working at and consulting for Wall Street financial firms and has a degree in electrical engineering from the University of Pennsylvania. Acknowledgments must be given to Vik Bhat and Danny Rojas for their help and assistance in formalizing this methodology. L A W, I N V E S T I G A T I O N S, A N D E T H I C S 9

2 Incident management is a complex interaction of people, processes, tools, and communication. And different circumstances can require distinct approaches. process embraces the processes, procedures, and supporting tools to detect, isolate, and restore failed or malfunctioning systems. An analysis of the incident management process provides a baseline against which all incident-related activities can be compared and creates a framework for conducting a gap analysis to determine the best path to improvement. Diligently applied, an analysis of the incident management process can help equip technical organizations to accelerate problem resolution, keep problems from reoccurring, and improve feedback to users waiting, patiently or otherwise, for problems to be fixed. Again, it also can contribute to systems and application resilience. ADDRESSING THE AVAILABILITY AND SECURITY IMPERATIVES Organizations define availability differently depending on their needs. One may require uptime. For another, having systems humming during the business workday with a four-hour incident recovery time is fine. Many organizations dedicate considerable human and technical resources to creating an incident management process that satisfies uptime requirements. Typically the process provides both proactive monitoring, such as pre-outage conditions and performance measurement, and reactive monitoring, including fault management and system and user outages. Although some organizations successfully use the incident management process, others struggle to understand and implement it. Incident management is a complex interaction of people, processes, tools, and communication. And different circumstances can require distinct approaches. To conduct an effective analysis of the incident management process, an organization needs to understand its distinct requirements. It may face technical issues, such as a fault management system that does not provide timely information. It may have a disorganized approach to problem resolution. Or, it may not view a problem as a priority when it should. In addition, different problems can require different levels of communication. An outage, for example, can require frequent, widely distributed progress updates for anxious users. A security violation, on the other hand, may mean limited sharing of circumstances, damage, and problem resolution. Regardless of the origin or nature of problems, analysis of the incident management process can break the process down into discernable steps, which can be documented and compared against an ideal process. Analysis of the gaps between the organization s process and the ideal can be used to develop remediation plans to improve performance. VISUALIZING THE IDEAL PROCESS In the ideal incident management process, each phase of the process operates like a clock. Confusion and misinformation do not exist. Communications are perfect. s are detected instantly and confirmed, and data is routed to the correct technical group, which quickly solves both known and unknown problems. Once solved, problems are sorted, collated, aggregated, and harmonized in a postmortem process. That process builds a knowledge base that is used to determine the root cause of the problem, enabling remediation and prevention of repeat occurrences. Of course, several obstacles stand in the way of the ideal incident management process. The organization may have institutional knowledge gaps resulting from poor organization or the introduction of new systems. Individual staff may not have the expertise or knowledge of organizational systems to handle incidents. The organization may not have the needed tools. An organization should carefully assess and prioritize its needs to gain the best results with the least effort. For example, lost passwords may take three minutes to reset, so improving this process would yield 10 I N F O R M A T I O N S Y S T E M S S E C U R I T Y W W W. I N F O S E C T O D A Y. C O M

3 FIGURE 1 Generalized Ideal Incident Management Help Desk Operational Personnel Detection Detection Resolution Net Ops Sys Ops DBA Storage Update Users Escalation in group or to vendor support resolved? 4 Management Systems 2 Sufficient clues or problem routing indications? Multicast the problem? Broadcast Specific Group Multi-Group 1 3 Isolated? Isolation Net Ops Sys Ops DBA Storage Update Users New clues or indicators? Escalate in group? Detection Detection Post Mortem Known Cause? Able to determine Root Cause? Track for Future Research/ Inform Relevant Users Incident and Root Cause Tracking Fix Root Cause Root Resolved 5 Phases 1. Detection Isolation 4. Resolution 5. Post-Mortem/Knowledgebase Building Input/ Output Service Decision Documentation Database Terminiation little gain on a per-user basis. On the other hand, the loss of an entire system might be a multihour or even multiday event involving all of the users in that organization. EXPLORING THE GENERALIZED IDEAL INCIDENT MANAGEMENT PROCESS The generalized ideal incident management process can be broken down into five key, general steps: 1. Detection Isolation 4. Resolution 5. Postmortem Analysis of the incident management process involves creating a flowchart that breaks these steps down in sufficient detail. An example of required detail is incident escalation. Escalation is a subtask of both the isolation and resolution steps, with user notification occurring at both those steps and the postmortem step. Some complex organizations, for example, those with separate subgroups to handle networks, systems, and security, may have or need a multilayer escalation process. Figure 1 shows the full life cycle of an incident, comprising the five key steps and related subtasks. The groups shown in the isolation and resolution steps are merely examples of groups that may be involved in L A W, I N V E S T I G A T I O N S, A N D E T H I C S 11

4 FIGURE 2 Detection Sources of Input Information Help Desk Operational Personnel Initial Input Data Management Systems Detection the full life cycle of a problem or in the development and management of the infrastructure itself. The discussion of each process step is accompanied by a list of potential gaps that can impede effective problem resolution. Your organization may have unique issues and methods that need to be understood beyond the suggested review points. PROBLEM DETECTION In the problem detection process, three types of information sources can feed information regarding the current incident: 1. A help desk function that receives notification from the end-user community that service is unavailable. 2. Operational personnel who detect a problem from the infrastructure perspective before service disruption is noticed by the end-user. 3. Fault management systems that monitor and detect incidents automatically trigger alerts based on system thresholds and system failures. These sources provide initial problem input data, as seen in Figure 2. This data influences how effectively the problem is routed among IT personnel. Detection: Gap Analysis Key Points Does the organization understand if and when a problem has occurred? Does the organization have any unique problem detection methods? Has the organization evaluated its technical toolkit from these viewpoints: view: Whether the organization has the necessary tools to account for each step of the incident management process from detection to postmortem Architecture view: Whether all architecture components within the IT infrastructure are being monitored proactively, both intraday and trend, and reactively for fault detection Organizational view: Whether each organizational subunit has, maintains, and monitors the necessary incident management tools Integration view: Whether the tools are effectively integrated with one another and into a central management framework (e.g., HP OpenView) Are there delays in understanding that problems are occurring? Is operational staff alert and ready during critical business hours? 12 I N F O R M A T I O N S Y S T E M S S E C U R I T Y

5 FIGURE 3 : Decision Instances : Types Sufficient clues or problem routing indications? Broadcast Detection Specific Group Isolation Multicast the problem? Multi-Group Knowledge Management (via Post Mortem Feedback ) Has the primary data source been identified? If the help desk is the fastest source of problem detection, tools and operational personnel may need improvement. What is the quality of data received from all sources? Is alarm correlation employed to prevent repeats of alarms that may distract personnel? Are problems closely tracked by logging time-stamped actions? PROBLEM ROUTING During the problem routing process, the initial input data is used to determine whether there are sufficient clues or problem routing indicators to route the problem to the appropriate information technology group, that is, the group with the expertise to effectively isolate and resolve it. Figure 3 shows how problem routing occurs, depending on initial incident input. The broadcast approach is executed when there is insufficient information to determine that a specific IT group should address the problem. All IT groups receive initial incident information and collectively decide which group or groups should own the problem. The owner or owners are then assigned responsibility for problem isolation. When sufficient information exists, a decision is made to determine whether to disperse the information to specific multiple groups (multigroup approach) or to an individual group (specific group approach) for further incident response. Knowledge management plays a vital role in diagnosing the problem and effectively routing it to the appropriate groups. Incident knowledge is integrated into the problem routing process as it becomes available through a feedback mechanism that incorporates postmortem analysis and other knowledge base sources. As the knowledge base increases, incidents can be categorized, isolated, and resolved more quickly, decreasing overall incident response time. The expanded knowledge base also filters false positive information that can potentially have IT groups follow incorrect approaches toward incident response. s can be categorized into these types: Trivial forgotten passwords, software requests, user log-in problems L A W, I N V E S T I G A T I O N S, A N D E T H I C S 13

6 Many organizations have the talent required to work through problems, but connecting the talent to the problem is often the key issue toward achieving a timely resolution. ntrivial three subtypes: User outage a loss of service to the user System outage no loss of service to the user, but a specific system is out of service Pre-outage indicators system alerts such as high CPU utilization or high error rates; or human indicators, such as user reports that an application is behaving slowly Enterprise problems that affect a large number of users and systems, such as an enterprisewide or Internet outage. Using these designations allow more effective problem escalation, and, in times of overload, give guidance for a triage process. An organizational function designated as the problem coordinator should have overall responsibility for incident management and coordination efforts. This role is particularly important in a multigroup situation to ensure proper escalation at routing and in the later stages of isolation and resolution. : Gap Analysis Key Points Is there a way to understand the scope of an incident? Have incidents been categorized into trivial, nontrivial, and enterprise? Is problem routing organized, or does one person often end up sweating over it alone in a room? Is there a preplanned escalation process if a problem lingers? Is there a role equivalent to the problem coordinator to drive an incident to resolution? Is triage employed in any formal manner when needed? Are event correlation tools in place to factor seemingly unrelated events into the actual cause to speed routing to the correct group? Is there a knowledge base from which to operate? Is it formal, electronic, and accessible to all who may need it? Or, is it embedded in the minds of certain key personnel, and thus subject to their availability and lost when they are gone from the organization? Are problems closely tracked by logging time-stamped actions? PROBLEM ISOLATION The isolation process begins once a problem has been routed to the appropriate IT group or groups. Several decision instances and additional steps are used to achieve problem isolation as seen in Figure 4. The process is characterized by iterative steps that attempt to further pinpoint the source of the incident, as well as areas affected by the outage. If there is sufficient information to determine what the problem is, a decision instance is reached, at which it is determined whether escalation should be executed within the IT group involved in prior problem routing. The problem can either be assigned to the appropriate IT group with the expertise to isolate the problem, or the process can continue by escalation within the IT group involved in the routing phase. Many organizations have the talent required to work through problems, but connecting the talent to the problem is often the key issue toward achieving a timely resolution. The problem coordinator plays a key role in this stage to keep the process moving. The escalation process is iterative until the problem has been isolated and is ready for resolution by the correct group or groups. If there are not enough indicators to formulate an approach toward problem isolation, the IT group assigned during the problem routing process executes an escalation step and sends a multicast to other IT groups for insight and support. The main objective of this process is to isolate the problem quickly and accurately. It is vital that the process not linger with a person or group that is not equipped to understand the problem correctly. 14 I N F O R M A T I O N S Y S T E M S S E C U R I T Y W W W. I N F O S E C T O D A Y. C O M

7 Isolation: Gap Analysis Key Points Is there an effective methodology for problem isolation? Is there a tight escalation schedule for unresolved issues? Does each group maintain an escalation schedule to bring more talent to a problem in a timely manner? Is there a role equivalent to the problem coordinator to drive an incident to resolution? Is triage employed in any formal manner when needed? Are event correlation tools in place to factor seemingly unrelated events into the actual cause to speed routing to the correct group? Is there a knowledge base from which to operate? Is it formal, electronic, and accessible to all who may need it? Or, is it embedded in the minds of certain key personnel, and thus subject to their availability and lost when they are gone from the organization? Is there a means to effectively communicate problem status to users when appropriate? Are problems closely tracked by logging time-stamped actions? PROBLEM RESOLUTION In the problem resolution process shown in Figure 5, IT groups that have isolated the problem redirect their efforts toward resolution. When the resolution process is nontrivial and requires additional resources and time, the user community is notified that the problem resolution process is active. Escalation procedures are then executed within the group assigned to resolve the issue and, if applicable, vendor support can be reached for further technical guidance or assistance to achieve resolution. The identified IT groups responsible for problem resolution should have adequate resources and technical expertise to resolve the incident. This process flow will iterate until a resolution has been achieved. Resolution: Gap Analysis Key Points Is there an effective methodology for problem isolation? Have service level agreements been established with vendors to ensure their FIGURE 4 Isolation : Decision Instances : Isolation Steps Isolated? Broadcast Isolation Net Ops Sys Ops DBA Storage New Clues or Indicators? Specific Group Resolution Isolated? Multi-Group Isolation L A W, I N V E S T I G A T I O N S, A N D E T H I C S 15

8 FIGURE 5 Resolution : Decision Instances : Resolution Steps Resolved? Isolation Resolution Net Ops Sys Ops DBA Storage Escalate in Group or to Vendor Support Post Mortem Update Users Resolution support once their responsibility is identified? Is there a tight escalation schedule for unresolved issues to bring more talent to a problem in a timely manner? Is there a role equivalent to the problem coordinator to drive an incident to resolution? Is there a knowledge base from which to operate? Is it formal, electronic, and accessible to all who may need it? Or, is it embedded in the minds of certain key personnel, and thus subject to their availability and lost when they are gone from the organization? Is there a means to effectively communicate problem status to users when appropriate? Are problems closely tracked by logging time-stamped actions? Are there facilities to test problem resolution ideas without affecting functioning production systems? POSTMORTEM Once the problem has been resolved, affected users are informed that service is available, and the postmortem process is initiated. During the postmortem process shown in Figure 6, IT groups responsible for resolution continue the incident management process by determining whether the root cause of the incident is known or determinable. If so, the information is tracked in a centralized repository that can be accessed by IT groups involved in incident management. An attempt to fix the root cause can be made by leveraging known root cause information, technical expertise, and environment characteristics. Whether the exercise is successful or not, the detailed steps and fixes are stored in the incident and root cause tracking repository for linkage into the problem routing process. An essential element of the postmortem process is the link between the incident and root cause tracking repository, or knowledge base, and the problem routing process. Knowledge transfer must occur in order to influence and minimize overall incident response time, specifically the time involved in determining who actually should be responsible for the process management of an incident. routing requires the intelligence to rapidly query the repository for common symptoms, characteristics, repeated occurrences, and other factors. As a result, IT groups should strive for a collaborative approach to incident management. Educating front-end support 16 I N F O R M A T I O N S Y S T E M S S E C U R I T Y

9 FIGURE 6 Postmortem Inform Relevant Users Track for Future Research/ Resolution Execute Post Mortem Incident and Root Cause Tracking Repository/ Database Root Resolved Fix Root Cause Known Cause? Able to determine Root Cause? Post Mortem personnel in the routing, isolation, and restoration phases can speed up the entire process by reducing time gaps caused by lack of data points against which problem symptoms can be compared. Postmortem: Gap Analysis Key Points Is a formal postmortem process in place? Does the group meet on a regular schedule to review issues? Does the postmortem group meet immediately following a major incident? Is there a knowledge base system in which to enter postmortem results? Is it formal, electronic, and accessible to all who may need it? Or, is it embedded in the minds of certain key personnel, and thus subject to their availability and lost when they are gone from the organization? As new techniques for troubleshooting and problem resolution are learned are they entered into the knowledge base? Is the knowledge base readily accessible to everyone throughout the process? Are repeat problems approached with the thought that there may be a root cause generating the issue (e.g., if servers keep failing in a rack in the data center, the root cause may be faulty power to that rack)? Is the knowledgebase built such that trends can be determined using a database that allows reporting on the various fields? All information about a problem must have a place in the database to allow both trending and root-cause analysis through harmonization, aggregation, and decomposition processes. Is there an organizational focus on root cause analysis and resolution? Is closure reported to relevant users following problem resolution? Is there an effective means of user notification? Do tools effectively feed the postmortem and problem resolution process? SYSTEM RESILIENCE AND ITS EFFECT ON PROBLEM RESOLUTION Users measure performance by their own view of the availability of the system in question. High availability will result in good perception, and low availability in poor perception. That said, there are limits to the effectiveness of any incident management L A W, I N V E S T I G A T I O N S, A N D E T H I C S 17

10 Implementing resilience improvements places a greater burden on operational personnel and the tools they use to understand that a failure has occurred and to restore systems. process. matter the quality of the process, when things fail users will note it. To create a positive user perception, outages visible to the user community must be kept to a minimum. If applications and systems have resilience if an effective incident management process can restore them in minimal time users perception of the incident management process will be much higher than if they don t. This will be true even if failures occur. While normal operations proceed from the client viewpoint, in the background IT can restore the failed systems and bring the application back to a state of full resilience. When a system is designed to be highly available, there is the presumption that the extra time and money spent on it bring value to the provider and system users, specifically uptime in the face of failure. If, however, the system fails to be as available as expected, then the value invested was wasted. Two points should be remembered regarding resilient systems: 1. Element failure does not equal system failure. 2. Good system design does not equal good system implementation. If a resilient system is properly designed and built, single failures internal to the system, or full site failures, do not affect users in a dramatic way. System engineers and administrators can detect, isolate, and restore the system to full resilience without interfering with user functions. Testing must be performed to ensure that the desired resilience exists and has not diminished over time due to environmental changes or other causes. In addition, proper implementation and maintenance are critical to the perception of the incident response capability. If systems are considered to be warm standby, a failure equals user downtime. Murphy s Law tells us that if a failure occurs, it will be at the worst possible time with the greatest consequences, including lower confidence in the user community and loss of customers and revenue. Adding resilience should be considered when downtime is costly or generates poor user perception. Keep in mind that although resilience improves user perception, it also takes away one of the three key sources of problem detection, the user. Therefore, implementing resilience improvements places a greater burden on operational personnel and the tools they use to understand that a failure has occurred and to restore systems. ENHANCING THE INCIDENT MANAGEMENT PROCESS: AN EXAMPLE One of our clients had a number of perceptions about its incident management process. These perceptions included: The organization s staff comprised highquality people. Good tools were in place. The organization was aligned around its systems. However, the client also saw that: Outages were significantly longer than they should have been. Users were dissatisfied. Through analysis of the incident management process, the client realized that: The problem routing process tended to stall rather then escalate. Users were rarely informed of problem status, prompting excessive calls to the help desk and technical managers. Extended outages tended to be much longer than needed because of a failure to route problems in a timely manner and triage between problem types. Postmortem activities were not conducted on a regular basis. An organized and accessible knowledge base did not exist. Although there were islands of data and highly knowledgeable people that acted as the knowledge base, many data points were never captured as institutional knowledge. 18 I N F O R M A T I O N S Y S T E M S S E C U R I T Y W W W. I N F O S E C T O D A Y. C O M

11 FIGURE 7 Incident and Response Alignment Types Detection Isolation Resolution Post Mortem Trivial -1 rmal time to process trivial incidents Post Mortem n-trivial: Pre-Outage Indicators 15 min 15 min Isolation and Resolution Times Post Mortem within 1 day n-trivial: System Outage 15 min 15 min Isolation and Resolution Times Post Mortem within 1 day n-trivial: User Outage 15 min 15 min Isolation and Resolution Times Post Mortem within 1 day Enterprise Time to resolve enterprise incidents Same-Day Post Mortem Coordinator assumes responsibility, if problem not resolved Relevant Broadcast -1 Relevant Broadcast Many trivial problems may constitute an enterprise problem improvements recommended centered on: Creating a problem coordinator role to ensure the organization and its talents were applied to problems in an effective manner. Creating an intranet page to provide problem status to users. This vastly reduced repeat calls to the help desk and to managers and key personnel involved in problem resolution. In certain cases, improving application resilience to improve user perception of quality. Establishing a regular and emergency postmortem process. Creating a formal knowledge base populated with institutional knowledge and postmortem results and making it widely available. Emphasizing event coloration and root cause analysis. Instituting a formal escalation process based on whether problems are trivial, nontrivial, or enterprise. Figure 7 shows the formal problem coordinator role and the alignment of the incident process with each problem type. The result was an improved process that, when needed, involved the problem coordinator to focus the problem. This reduced large time gaps created when problem routing stalled. In one case, a problem was in the wrong group for two-and-a-half hours before finally getting to the right personnel. Once there, the problem was resolved in 45 minutes. The client also instituted a formal triage process to focus resources in times of stress. To facilitate communications between various groups and the problem coordinator, an instant messaging system was employed, which was already in use in the organization. One out-of-the-box problem detection issue noted was that large numbers of trivial incidents were not being correlated into a root cause that was an enterprise issue. For example, prior to process improvement, a large number of users failing to access a service would be viewed simply as minor incidents, perhaps a bad day with lots L A W, I N V E S T I G A T I O N S, A N D E T H I C S 19

12 Symptoms must be reviewed to achieve knowledge of root cause issues. of individual password issues. In reality, this was symptomatic of an application that had encountered a strange state of rejecting new log-ins, but allowing established users to maintain service. Once realized after an excessive amount of time the application log-in issue was able to be resolved. Symptoms must be reviewed to achieve knowledge of root cause issues. TOWARD AN EFFECTIVE INCIDENT MANAGEMENT PROCESS Many organizations recognize the need to improve their incident management process. Others are a major incident away from the same realization. Often, the complexity of the incident management process will mirror the complexity of the organization. In some cases analysis of an organization s network group, systems group, and security group will all be needed, with common touch points such as help desk issues and the postmortem process. Improvements should be taken on incrementally and absorbed into the organization, while maintaining a holistic view of the environment. Done right, analysis of the incident management process can deliver rapid return on investment in the form of improved coordination, reduced downtime, and improved user satisfaction. Finally, strong consideration should be given to enhancing application and system resilience. Because this can be a complex undertaking, focus on core applications where downtime equals loss of revenue. This will ensure that the results are worth the effort. Also consider enhancing data resilience. Being able to recover the maximum amount of data in the event of a failure, or maintain a complete data set mirrored in more than one location, can be key to maintaining both user satisfaction and revenue streams. System malfunctions and failures can be merely annoyances, or enterprise-shaking crises. By analyzing and understanding the effectiveness of their incident management process, organizations can better equip themselves to resolve problems quickly and prevent them from escalating and recurring. Deloitte Development LLC. Used by permission. The views presented in this journal are those of the authors and do not necessarily reflect the views of the publisher, the (ISC) 2, or of the journal s board of advisers. Information Systems Security (ISSN X) is published bi-monthly by Auerbach Publications, CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, FL Editorial offices: Auerbach Publications, 270 Madison Avenue, New York, NY Subscription rates: $175/year in the U.S., U.S. possessions, and Canada. For prices elsewhere, please inquire. Periodicals postage paid at Boca Raton and other mailing offices. Printed in U.S. Copyright 2004 CRC Press LLC. All rights, including translation into other languages, reserved by the publisher in the U.S., Great Britain, Mexico, and all countries participating in the International Copyright Convention and Pan American Copyright Convention. Product or corporate names may be trademarks or registered trademarks, and are only used for identification and explanation, without intent to infringe. This journal contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or the consequences of their use. part of this journal may be reproduced in any form by microfilm, xerography, or otherwise or incorporated in any information retrieval systems without the written permission of the copyright owner. Authorization to photocopy items for internal or personal use, or the personal or internal use of specific clients, may be granted by CRC Press LLC, provided that $20.00 per article photocopied is paid directly to Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA USA. The fee code for users of the Transactional Reporting Service is ISSN X/04/$20.00+$0.00. The fee is subject to change without notice. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Postmaster: Send address changes to Information Systems Security, 2000 N.W. Corporate Blvd., Boca Raton, FL I N F O R M A T I O N S Y S T E M S S E C U R I T Y

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Incident Management help topics for printing HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Incident Management help topics for printing Document Release Date: July 2014 Software Release Date: July

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide

HP Service Manager. Software Version: 9.34 For the supported Windows and UNIX operating systems. Processes and Best Practices Guide HP Service Manager Software Version: 9.34 For the supported Windows and UNIX operating systems Processes and Best Practices Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal

More information

MEASURING FOR PROBLEM MANAGEMENT

MEASURING FOR PROBLEM MANAGEMENT MEASURING FOR PROBLEM MANAGEMENT Problem management covers a variety of activities related to problem detection, response and reporting. It is a continuous cycle that encompasses problem detection, documentation

More information

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for NetIQ November 2008 IT Management

More information

Closed Loop Incident Process

Closed Loop Incident Process Closed Loop Incident Process From fault detection to closure Andreas Gutzwiller Presales Consultant, Hewlett-Packard (Schweiz) HP Software and Solutions 2010 Hewlett-Packard Development Company, L.P. The

More information

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind vce.com VCE SUPPORT OVERVIEW VCE provides the world s most advanced converged infrastructure, offering unmatched simplicity while delivering the extraordinary efficiency and business agility made possible

More information

Problem Management Why and how? Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com

Problem Management Why and how? Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com Problem Management Why and how? Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com Page 1 Copyright, trademarks and disclaimers Serio Limited provides you access to this document

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

Business white paper. Top ten reasons to automate your IT processes

Business white paper. Top ten reasons to automate your IT processes Business white paper Top ten reasons to automate your IT processes Table of contents 4 Data center management trends and tools 4 Today s challenge 4 What is next? 5 Automating the remediation of incidents

More information

Problem Management: A CA Service Management Process Map

Problem Management: A CA Service Management Process Map TECHNOLOGY BRIEF: PROBLEM MANAGEMENT Problem : A CA Service Process Map MARCH 2009 Randal Locke DIRECTOR, TECHNICAL SALES ITIL SERVICE MANAGER Table of Contents Executive Summary 1 SECTION 1: CHALLENGE

More information

Published April 2010. Executive Summary

Published April 2010. Executive Summary Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must

More information

Infasme Support. Incident Management Process. [Version 1.0]

Infasme Support. Incident Management Process. [Version 1.0] Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary

More information

LANDesk Service Desk Certified in All 15 ITIL. v3 Suitability Requirements. LANDesk demonstrates capabilities for all PinkVERIFY 3.

LANDesk Service Desk Certified in All 15 ITIL. v3 Suitability Requirements. LANDesk demonstrates capabilities for all PinkVERIFY 3. LANDesk Service Desk LANDesk Service Desk Certified in All 15 ITIL v3 Suitability Requirements PinkVERIFY is an objective software tool assessment service that validates toolsets that meet a set of functional

More information

Incident Management: A CA IT Service Management Process Map

Incident Management: A CA IT Service Management Process Map TECHNOLOGY BRIEF: INCIDENT MANAGEMENT ITSM PROCESS MAP Incident Management: A CA IT Service Management Process Map Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION 1: CHALLENGE

More information

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

can you improve service quality and availability while optimizing operations on VCE Vblock Systems? SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Storage Assurance Audit Services OVERVIEW

Storage Assurance Audit Services OVERVIEW Storage Assurance Audit Services OVERVIEW Solution Brief From backup and recovery to capacity planning, when it comes to storage management, we've got you covered. The Storage Assurance Audit Services

More information

Implement a unified approach to service quality management.

Implement a unified approach to service quality management. Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional

More information

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Riverbed Performance Management

Riverbed Performance Management Riverbed Performance Management Messaging Framework Market trends and context Increasingly, business performance = application performance. Users rely on applications to reach customers, build products,

More information

Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies

Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies Problem Management Overview HDI Capital Area Chapter September 16, 2009 Hugo Mendoza, Column Technologies Problem Management Overview Agenda Overview of the ITIL framework Overview of Problem Management

More information

White Paper. Incident Management: A CA IT Service Management Process Map

White Paper. Incident Management: A CA IT Service Management Process Map White Paper Incident Management: A CA IT Service Management Process Map Peter Doherty Senior Consultant, Technical Service, CA, Inc. Peter Waterhouse Director, Product Marketing, Business Service Optimization,

More information

Taking the Service Desk to the Next Level BEST PRACTICES WHITE PAPER

Taking the Service Desk to the Next Level BEST PRACTICES WHITE PAPER Taking the Service Desk to the Next Level BEST PRACTICES WHITE PAPER Table of Contents Executive Summary...1 The Service Desk Evolves...2 What s Next?...2 Enabling Innovations...3 > Configuration Management

More information

Table of contents. Data tells no tales improving incident management with IT Analytics. White paper

Table of contents. Data tells no tales improving incident management with IT Analytics. White paper Data tells no tales improving incident management with IT Analytics White paper Table of contents Introduction...2 Incident Management (IM)... 2 Introducing IT Analytics... 3 Improving Incident Management...

More information

INFRASTRUCTURE MANAGEMENT IS NOT ENOUGH: THE NEW IT OPERATIONS IMPERATIVE

INFRASTRUCTURE MANAGEMENT IS NOT ENOUGH: THE NEW IT OPERATIONS IMPERATIVE INFRASTRUCTURE MANAGEMENT IS NOT ENOUGH: THE NEW IT OPERATIONS IMPERATIVE ABSTRACT Infrastructure management is not enough to ensure enterprise applications are meeting business goals. Why? Because users

More information

IBM Tivoli Network Manager software

IBM Tivoli Network Manager software Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services

More information

Pragmatic Business Service Management

Pragmatic Business Service Management Pragmatic Business Service Management Written by Quest Software, Inc. White Paper Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected

More information

IntelliNet Delivers APM Service with CA Nimsoft Monitor

IntelliNet Delivers APM Service with CA Nimsoft Monitor IntelliNet Delivers APM Service with CA Nimsoft Monitor 2 IntelliNet Delivers APM Service with CA Nimsoft Monitor ca.com Email communications are vital to the productivity, collaboration and safety of

More information

SOLUTION WHITE PAPER

SOLUTION WHITE PAPER SOLUTION WHITE PAPER BMC Service Resolution: Bridging the Gap between Network Operations and the Service Desk Improve service availability and mean time to repair (MTTR) while prioritizing event resolution

More information

LANDesk Service Desk. Outstanding IT Service Management Made Easy

LANDesk Service Desk. Outstanding IT Service Management Made Easy LANDesk Service Desk Outstanding IT Service Management Made Easy Deliver Outstanding IT Services to Employees, Citizens and Customers LANDesk Service Desk enables organizations to deliver outstanding IT

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Five Fundamental Data Quality Practices

Five Fundamental Data Quality Practices Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION

More information

CUSTOMER GUIDE. Support Services

CUSTOMER GUIDE. Support Services CUSTOMER GUIDE Support Services Table of Contents Nexenta Support Overview... 4 Support Contract Levels... 4 Support terminology... 5 Support Services Provided... 6 Technical Account Manager (TAM)... 6

More information

DEMONSTRATING THE ROI FOR SIEM

DEMONSTRATING THE ROI FOR SIEM DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new

More information

CAPTURING UNTAPPED REVENUE: How Customer Experience Insights Improve Remarketing and Customer Recovery Efforts

CAPTURING UNTAPPED REVENUE: How Customer Experience Insights Improve Remarketing and Customer Recovery Efforts CAPTURING UNTAPPED REVENUE: How Customer Experience Insights Improve Remarketing and Customer Recovery Efforts Hilary Salazar, Product Marketing Manager, Tealeaf TABLE OF CONTENTS Executive Summary...1

More information

Solution White Paper BMC Service Resolution: Connecting and Optimizing IT Operations with the Service Desk

Solution White Paper BMC Service Resolution: Connecting and Optimizing IT Operations with the Service Desk Solution White Paper BMC Service Resolution: Connecting and Optimizing IT Operations with the Service Desk Improve service availability, mean time to repair (MTTR), and cross-team communications while

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

Communicate: Data Service Level Agreement. Author: Service Date: October 13. Communicate: Data Service Level Agreementv1.

Communicate: Data Service Level Agreement. Author: Service Date: October 13. Communicate: Data Service Level Agreementv1. Communicate: Data Service Level Agreement Author: Service Date: October 13 Communicate: Data Service Level Agreementv1.1 Page 1 of 12 Contents 1. Scope 3 2. Service Definitions 3 3. Service Provision 3

More information

How To Create A Help Desk For A System Center System Manager

How To Create A Help Desk For A System Center System Manager System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and

More information

Achieving ITSM Excellence Through Availability Management

Achieving ITSM Excellence Through Availability Management Achieving ITSM Excellence Through Availability Management Technology Concepts and Business Considerations Abstract This white paper outlines the motivation behind Availability Management, and describes

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

MONyog White Paper. Webyog

MONyog White Paper. Webyog 1. Executive Summary... 2 2. What is the MONyog - MySQL Monitor and Advisor?... 2 3. What is agent-less monitoring?... 3 4. Is MONyog customizable?... 4 5. Licensing... 4 6. Comparison between MONyog and

More information

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER

Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Predictive Intelligence: Identify Future Problems and Prevent Them from Happening BEST PRACTICES WHITE PAPER Table of Contents Introduction...1 Business Challenge...1 A Solution: Predictive Intelligence...1

More information

IT Service Management

IT Service Management RL Consulting IT Service Management Incident/Problem Management Methods and Service Desk Implementation Best Practices White Paper Prepared by: Rick Leopoldi vember 8, 2003 Copyright 2003 RL Information

More information

Consequences of Poorly Performing Software Systems

Consequences of Poorly Performing Software Systems Consequences of Poorly Performing Software Systems COLLABORATIVE WHITEPAPER SERIES Poorly performing software systems can have significant consequences to an organization, well beyond the costs of fixing

More information

Tait Support Agreement. Assured network communications. Service Description

Tait Support Agreement. Assured network communications. Service Description Tait Support Agreement Assured network communications Service Description CONTACT INFORMATION Tait Communications Corporate Head Office Tait Limited P.O. Box 1645 Christchurch New Zealand For addresses

More information

& USER T ECH.C W WW. SERVICE

& USER T ECH.C W WW. SERVICE BUSINESS SERVICE & END USER EXPERIENCE MONITORING A UGUST 2, 2 010 A NTONIO ROLL LE V P OF PROFESSIONAL SEE RVICES W WW. GENERA TIONE T ECH.C OM W WW. RESOLV E -SYSTT EMS.CO M BUSINESS SERVICE & END USER

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

IBM Tivoli Service Request Manager

IBM Tivoli Service Request Manager Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate

More information

Application Performance Management

Application Performance Management A Secure-24 Business White Paper August 2015 Application Performance Management Secure-24 Application Performance Management as a Service Business Performance Equals Application Performance Executive Overview

More information

Physicians are fond of saying Treat the problem, not the symptom. The same is true for Information Technology.

Physicians are fond of saying Treat the problem, not the symptom. The same is true for Information Technology. Comprehensive Consulting Solutions, Inc. Business Savvy. IT Smar Troubleshooting Basics: A Practical Approach to Problem Solving t. White Paper Published: September 2005 Physicians are fond of saying Treat

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

ITIL A guide to problem management

ITIL A guide to problem management ITIL A guide to problem management What is problem management? The goal of problem management is to minimise both the number and severity of incidents and potential problems to the business/organisation.

More information

Top 10 Reasons to Automate your IT Run Books

Top 10 Reasons to Automate your IT Run Books Top 10 Reasons to Automate your IT Run Books DS12 Top 10 Reasons to Automate Your IT Run Books Run Book Automation is an emerging technology space that is being adopted by many of the largest, most sophisticated

More information

ITSM Process Description

ITSM Process Description ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

Root Cause Analysis Concepts and Best Practices for IT Problem Managers

Root Cause Analysis Concepts and Best Practices for IT Problem Managers Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer

More information

Availability Management: A CA Service Management Process Map

Availability Management: A CA Service Management Process Map TECHNOLOGY brief: AVAILABILITY MANAGEMENT Availability : A CA Process Map Malcolm Ryder ARCHITECT CA SERVICES Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 Simplifying ITIL How to Use the

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13

Customer Guide Helpdesk & Product Support. [Customer Name] www.four.co.uk Page 1 of 13 Customer Guide Helpdesk & Product Support [Customer Name] www.four.co.uk Page 1 of 13 Table of Contents HELP DESK AND PRODUCT SUPPORT SUMMARY... 3 1 FOUR HELP DESK STRUCTURE AND CALL ESCALATION... 6 2

More information

Yale University Incident Management Process Guide

Yale University Incident Management Process Guide Yale University Management Process Guide Yale University Management Process 1 of 17 Introduction Purpose This document will serve as the official process of Management for Yale University. This document

More information

Customer Evaluation Report On Incident.MOOG

Customer Evaluation Report On Incident.MOOG WHITE PAPER Customer Evaluation Report On Incident.MOOG (Real Data Provided by a Fortune 100 Company) For information about Moogsoft and Incident.MOOG, visit www.moogsoft.com. http://moogsoft.com 2011-2015

More information

Command Center Handbook

Command Center Handbook Command Center Handbook P r o a c t i v IT e Monitoring Protecting Business Value Through Operational Excellence Abdul A Jaludi Copyright 2014 Abdul A Jaludi abby@tag-mc.net www.tag-mc.net All rights reserved.

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

An ITIL Perspective for Storage Resource Management

An ITIL Perspective for Storage Resource Management An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage

More information

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES

OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES OPERATIONAL SERVICE LEVEL AGREEMENT BETWEEN THE CLIENT AND FOR THE PROVISION OF PRO-ACTIVE MONITORING & SUPPORT SERVICES IN CONFIDENCE TABLE OF CONTENTS 1 CONTACT DETAILS 1 1.1 The Client Contract Management

More information

Fifty Critical Alerts for Monitoring Windows Servers Best practices

Fifty Critical Alerts for Monitoring Windows Servers Best practices Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite

More information

Network Management Services: A Cost-Effective Approach to Complexity

Network Management Services: A Cost-Effective Approach to Complexity Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity

More information

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006

Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 The modern enterprise relies on its web sites to provide information

More information

Fixing First-Time Fix: Repairing Field Service Efficiency to Enhance Customer Returns

Fixing First-Time Fix: Repairing Field Service Efficiency to Enhance Customer Returns Fixing First-Time Fix: Repairing Field Service Efficiency to Enhance Customer First-time fix is one of the most vital metrics in gauging field service performance. While workforce utilization, productivity,

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Incident Management help topics for printing

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Incident Management help topics for printing HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Incident Management help topics for printing Document Release Date: December 2014 Software Release Date:

More information

Performance Management for Enterprise Applications

Performance Management for Enterprise Applications performance MANAGEMENT a white paper Performance Management for Enterprise Applications Improving Performance, Compliance and Cost Savings Teleran Technologies, Inc. 333A Route 46 West Fairfield, NJ 07004

More information

Ongoing Help Desk Management Plan

Ongoing Help Desk Management Plan Ongoing Help Desk Management Plan HELP DESK IMPLEMENTATION /MANAGEMENT The Vendor shall provide in its Response to DIR a Help Desk Implementation Plan which shall include, but not be limited to: a. Customer

More information

ENTERPRISE SERVICE DESK (ESD) SERVICE DELIVERY GUIDE

ENTERPRISE SERVICE DESK (ESD) SERVICE DELIVERY GUIDE National Aeronautics and Space Administration NASA Shared Services Center Stennis Space Center, MS 39529-6000 www.nssc.nasa.gov Enterprise Service Desk Service Delivery Guide NSSDG-2410-0001 Basic Version

More information

Drive Down IT Operations Cost with Multi-Level Automation

Drive Down IT Operations Cost with Multi-Level Automation White White Paper Paper Drive Down IT Operations Cost with Multi-Level Automation Overview Reducing IT infrastructure and operations (I+O) budgets is as much on the mind of CIOs today as it s ever been.

More information

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0

ITIL by Test-king. Exam code: ITIL-F. Exam name: ITIL Foundation. Version 15.0 ITIL by Test-king Number: ITIL-F Passing Score: 800 Time Limit: 120 min File Version: 15.0 Sections 1. Service Management as a practice 2. The Service Lifecycle 3. Generic concepts and definitions 4. Key

More information

BMC ProactiveNet Performance Management Application Diagnostics

BMC ProactiveNet Performance Management Application Diagnostics BMC ProactiveNet Performance Management Application Diagnostics BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered with the U.S. Patent and

More information

Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency

Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency EXECUTIVE BRIEF Service Operations Management November 2011 Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency agility made possible David Hayward Sr.

More information

Help Desk Best Practices

Help Desk Best Practices Help Desk Best Practices As an IT service provider, you know the key to maintaining customer satisfaction is keeping IT functions running smoothly for your clients. While it isn t possible to have 100%

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

The Importance of Information Delivery in IT Operations

The Importance of Information Delivery in IT Operations The Importance of Information Delivery in IT Operations David Williams Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from

More information

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance An AppDynamics Business White Paper October 2013 How Much Revenue Does IT Generate? Correlating Revenue and Application Performance It s no secret that IT can be seen as a cost center in many organizations

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

ITIL A guide to incident management

ITIL A guide to incident management ITIL A guide to incident management What is incident management? Incident management is a defined process for logging, recording and resolving incidents The aim of incident management is to restore the

More information

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective VMware vcenter Log Insight Delivers Immediate Value to IT Operations VMware vcenter Log Insight VMware vcenter Log Insight delivers a powerful real-time log management for VMware environments, with machine

More information

10 Tips to Better Manage Your Service Team

10 Tips to Better Manage Your Service Team 10 Tips to Better Manage Your Service Team Service Management Recurring Services Solution Development & Mgmt Marketing & Sales Project Services Service Desk Field Services Managed Services Service Desk

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework IT Service Management How many times we felt that Business is looking to IT as Operations center not strategy enabler 1

More information

WHITE PAPER. Improving Operational Readiness for P25 Systems through Advanced Network Monitoring

WHITE PAPER. Improving Operational Readiness for P25 Systems through Advanced Network Monitoring WHITE PAPER Improving Operational Readiness for P25 Systems through Advanced Network Monitoring With the introduction of trunked radios systems over 20 years ago, public safety communications technology

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT

THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT WHITE PAPER: CONVERGED NPM/APM THE CONVERGENCE OF NETWORK PERFORMANCE MONITORING AND APPLICATION PERFORMANCE MANAGEMENT Today, enterprises rely heavily on applications for nearly all business-critical

More information

Best Practices in Web Performance Monitoring. Alistair A. Croll VP Products and Chief Strategy Officer Coradiant, inc.

Best Practices in Web Performance Monitoring. Alistair A. Croll VP Products and Chief Strategy Officer Coradiant, inc. Best Practices in Web Performance Monitoring Alistair A. Croll VP Products and Chief Strategy Officer Coradiant, inc. So you want to monitor things. But there are too many toys out there A top-down approach

More information