Realizing the IT Management Value of Infrastructure Management
|
|
|
- Dominic Ross
- 10 years ago
- Views:
Transcription
1 The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall
2 Realizing the IT Management Value of Infrastructure Management...1 Benefits of IM to Traditional IT Pain Points...1 ITIL/ITSM...1 Performance Management...2 Virtualization...3 Consolidation...3 Security...4 Business Continuity/Disaster Recovery...4 Summary...4 i
3 Copyright Statement 2008 Realtime Publishers, Inc. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers, Inc. (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers, Inc or its web site sponsors. In no event shall Realtime Publishers, Inc. or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 Realizing the IT Management Value of Infrastructure Management So far in this series, we ve covered how IT and infrastructure management have evolved separately from the core business and how, by aligning infrastructure management to meet the needs of the core business units, IT will regain value that will provide a lean and powerful business advantage. We ve eluded to IT management value but have focused up to this point on the message of IT s true value: meeting the needs of the business. In this article, we re going to expand our scope and talk about the benefits of infrastructure management in IT. We ll explore several of the most common pain points in IT today and how IT management tools, especially those that follow the Unified Service Model (USM), will enable your organization to significantly reduce the pain many in and IT are experiencing today. Benefits of IM to Traditional IT Pain Points IT management suffers from many distinct areas of pain that generally revolve around the complexity of infrastructure management. Whether it s the challenge of aligning infrastructure to meet the need of the business or the complexity associated with consolidating a data center, the common threads have always been team work, communication, and collaboration. When an organization has multiple IT management tools, each returning their own brand of results to different project teams, it can be nearly impossible to get people to work together to solve institutional problems such as ITIL adoption, compliance, virtualization, and consolidation. As we walk through each of these traditional pain points, think about your own infrastructure and how a centralized infrastructure management view that keeps all parties focused on a common vision might benefit your organization. ITIL/ITSM Throughout this series, we ve been focused on the needs of the customer. It should therefore not be surprising that one of the top-level pain points for IT aligns directly with this concern. Since business and IT separated, there has been a need to recapture a service-level understanding that meets the needs of business. IT s reaction has manifested in the form of IT Service Management (ITSM), which is the high-level discipline of managing IT service and delivery to a meet the needs of the customer. Over the past decade, the IT Infrastructure Library (ITIL) has become one of the most commonly used frameworks for enabling ITSM, and it is being embraced by widely. ITIL and ITSM surface as an area of pain in IT infrastructure management because it has been extremely difficult to align IT service functions (silos) to the needs of the business. In addition, there have been a large number of complications that have entered the ITSM arena over the past decade that have either served to complicate the issue or to distract IT managers from the goal of ITSM. Rapid technology growth such as the adoption of storage area networks (SANs), server virtualization, security responses to increasing technical complexity of security concerns, and regulatory compliance have all played their part, but the real heart of the matter is centered on expectations. 1
5 The business has an expectation that IT will perform without giving IT the benefit of knowing exactly to what level that performance is expected. The question hasn t been if IT can meet the service expectations, the question has been, How can we articulate the business need in a way that is clearly measurable within the IT infrastructure? The answer to this question has finally arrived. New enterprise IT management tools, specifically those that follow USM, provide a clear view into how IT services align to business needs and can enable views that are measurable to business goals. For example, if a business unit requires % uptime of their service, and their application uses many different servers on multiple platforms, spread across a few data centers with SAN storage in some, identifying and monitoring all those components to meet the business need can be made measurable by tools designed to work together to manage and monitor the infrastructure. Aligning monitoring is really just the beginning. All the functions aligned under the ITIL service function including Release Management, Change Management, Configuration Management, Incident Management, and Problem Management can benefit from IM tools that enable a 360 degree view of the infrastructure. Your business partners are most concerned about their impact from a business-centric view, but from an infrastructure management-centric view, the ability to research incidents and problems across the enterprise is not lost. In fact, these views can be customized for very specific problem management research and enable enterprise problem managers to identify common threads across the infrastructure easier than ever before. Performance Management The art of performance management includes network performance management as well as server and application performance management. Essentially, performance management is a disciplined approach to analyzing and controlling performance throughput and error rates. Individually, from the silo perspective, performance management can be tricky. Performance of the storage infrastructure and the performance of the network may both manifest as the same problem to end users, when in fact the problem can actually end up belonging to one of two or more distinct groups. ITSM tools that follow the USM vision enable a consolidated, simplified view of performance management from an enterprise end user perspective of performance but with the power to dig deeper into performance to manage the real concern. Some of the most challenging performance management issues often involve multiple performance impacts occurring to multiple infrastructure components simultaneously, so the ability to view infrastructure performance from a service-oriented view will greatly enhance the ability to track and report on performance issues from a business perspective as well as a silo perspective. With infrastructure management tools, you and your business partners are seeing the same metrics, and you can directly correlate business impact to performance issues as they occur. 2
6 Consider a SAN performance management issue that manifests by way of a server going offline. Traditional troubleshooting begins with the offline server and expands out from that centralized point. Server engineers typically don t have access to network performance data; they operate within their silo and function strictly within their area of responsibility. Through infrastructure management, all metrics can be made available to all parties. Thus, rather than testing, executing, failing, and reassigning, the engineer assigned can view all metrics related to a device, subnet, or service (any view they desire), rapidly identify the performance issue, and engage the appropriate teammate to resolve the problem. Virtualization Virtualization is delivering a revolution of IT efficiency and is liberating many organizations from the drudgery of dedicated hardware and software solutions. From a high-level perspective, virtualization does two main things for infrastructure management. First, it significantly reduces the server hardware and complexity. Second, it drives the management of the service level to a slightly new degree of complexity in infrastructure management. Fortunately, this complexity is easily managed with the proper tools. Virtual servers offer IT managers total flexibility over the server environment. The server memory and disk space are shared between the virtual servers, which allows some level of freedom and adjustability. Rather than three servers all running at 25% utilization, for example, you may now have one physical server running at 75% utilization. But what happens when one system starts demanding more server or network horsepower? How do you ensure the optimum level of server hardware efficiency? Prior to consolidated infrastructure management tools, determining which applications function best within virtual environments was difficult. Today, however, an infrastructure manager can view the performance and utilization of systems by business function and by physical server, and drill down to the granular virtual server view. Consolidation In its most common use, the word consolidation typically refers to data center consolidation and is primarily focused on server or data migration; however, consolidation can take on many meanings depending upon the use and context. During data center consolidation efforts, every team responsible for the computing infrastructure must come to the table to lend a hand, including network, server, and storage engineers as well as project managers, risk managers, and service delivery managers anxious to ensure minimal impact on their line of business (LOB) partners. Ensuring the smooth transition of production systems throughout the consolidation process is one of the most challenging infrastructure management tasks and requires that all teams are marching to the beat of a common drum. It is at this time that a common perspective of the infrastructure can be most valuable. Infrastructure management tools that enable your teams to work together and share views of the infrastructure, and its associated metrics, from their perspective enable consolidation by limiting the amount of time spent in gathering data, maximizing the amount of time focused on consolidation efforts, and minimizing their impact to business partners. 3
7 Security Infrastructure management tools today aren t all about just IT. They also enable IT compliance with corporate policy, which often ties directly into enterprise release management. As updates become available for software such as hotfixes for operating systems (OSs) or new version releases for application software they will need to be deployed throughout the enterprise to ensure that all computer systems are up to date with the latest security fixes. Infrastructure management tools help provide a centralized view of compliance so that security administrators can quickly and easily identify which systems are up to date and which systems need to be updated. Business Continuity/Disaster Recovery Infrastructure management is absolutely essential to meeting the business continuity and disaster recovery needs of your business. Although your business partners see what the IT organization does as a service, the many pieces that converge to make IT function are disparate. As such, when stress is placed on a decentralized environment, maintaining focus can be an especially daunting task. Consider, for example, a small single location client/server application that utilizes SAN and whose business continuity plan is to recover at a secondary site from backup. If the power to the building were lost due to a fire or flood, recovery of environment at a secondary location may involve representatives from server engineering, network infrastructure, storage, and application support. Getting all these teams to act as one team is rarely more important than during a business continuity event. A single point infrastructure management view of the situation can be extremely valuable in this type of situation, as teams work together to share information and recover the system as quickly as possible with minimal downtime to the client. Summary Sound infrastructure management reduces the pain associated with IT management by ensuring that all your teams, regardless of their geographic location or technical discipline, are all using the same, valid, up-to-date information and metrics to make decisions. With this data, project teams can align goals across organizational departments, engineers can articulate business impact to internal business partners, and change management executives can help business managers plan for a forecast growth that is based on real business data rather than speculating how much storage or how many servers they might need to meet the three, four, or fifth year demand. 4
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Auditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Account Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
The Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Sallie Mae slashes change management costs and complexity with CA SCM
CUSTOMER SUCCESS STORY Sallie Mae slashes change management costs and complexity with CA SCM CUSTOMER PROFILE Industry: Financial services Company: Sallie Mae Customers: 23 million Student loan portfolio:
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
Service Catalog Management: A CA Service Management Process Map
TECHNOLOGY BRIEF: SERVICE CATALOG MANAGEMENT Catalog : A CA Process Map JULY 2009 Enrico Boverino SR PRINCIPAL CONSULTANT, TECHNICAL SALES ITIL SERVICE MANAGER ITAC CERTIFIED Table of Contents Executive
Server Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
Improving Service Asset and Configuration Management with CA Process Maps
TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION
Data Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
HR Outsourcing for SMBs
HR Outsourcing for SMBs The Essentials Series sponsored by Su ccessful HR Outsourcing Strategies... 1 Int ernal Analysis and Baselining... 1 Understanding Cost vs. Value of HR... 2 Identifying Core Competencies...
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
The Shortcut Guide To
tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns
The Shortcut Guide To. Availability, Continuity, and Disaster Recovery. Dan Sullivan
tm The Shortcut Guide To Availability, Continuity, and Disaster Recovery Chapter 3: Top-5 Operational Challenges in Recovery Management and How to Solve Them.. 33 Challenge 1: Scheduling and Monitoring...
White Paper. Business Service Management Solution
White Paper Business Service Management Solution Eric Stinson, September 2005 Executive Summary With services and Service Level Agreements (SLAs) being direct sources of revenue (or penalties) for service
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
