Improving the Customer Support Experience with NetApp Remote Support Agent

Size: px
Start display at page:

Download "Improving the Customer Support Experience with NetApp Remote Support Agent"

Transcription

1 NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP

2 TABLE OF CONTENTS 1 INTRODUCTION NETAPP SUPPORT REMOTE AGENT OVERVIEW FEATURES... ERROR! BOOKMARK NOT DEFINED. 2.2 FEATURES REMOTE SUPPORT AGENT COMPOENNTS NETAPP SUPPORT ARCHITECTURE REMOTE SUPPORT ENTERPRISE REMOTE SUPPORT AGENT DATA ONTAP INTERFACE AUTO CORE UPLOAD SECURITY SUMMARY Improving the Customer Support Experience with NetApp Remote Support Agent

3 1 INTRODUCTION Storage is a mission-critical component of any IT infrastructure, and customers expect a high level of SLA from their storage vendors. NetApp Support is responding to this challenge through support offerings that are built around people, process, and technology. Remote support automation is one key technology component that helps to reduce case resolution time and customer manual overheads. Remote monitoring and data collection are essential components of a remote support offering. NetApp Support statistics show a probability of greater than 50% to close a case within one day (likely within the first one to two hours) if a support engineer has access to required diagnostics data. Without access to proper diagnostic data (e.g., log files, perfstat, or AutoSupport), the probability of closing a case within one day drops to less than 35%. Downtime is expensive Retail Insurance Information technology Financial institutions Manufacturing Call location Telecommunications Credit card services Energy Retail brokerage $M/Hour Millions of dollars per hour in lost revenue NetApp customers, especially those with SupportEdge Premium contracts, expect minimal interaction with NetApp Support during case handling. Customers expect a high degree of remote support automation so they can minimize the amount of time they spend on the phone with Support. Data collection are timeconsuming tasks for Support because they need to find the customer to explain which data to collect and how to gather and send the data, and then wait for the data to arrive. This process is often repeated multiple times during the case triage cycle. 6.5 Core file handling can be another laborious customer task because customers must manually upload the files. For some NetApp controllers, the core file can be in the range of multiple gigabytes. Uploading these core files over a slow or unstable Internet link can be a challenge and a cumbersome task. 2 NETAPP REMOTE SUPPORT AGENT OVERVIEW 2.1 FEATURES The NetApp Remote Support Agent (RSA) is a fast, simple, and reliable design that supports three major features: Remote data collection RSA allows NetApp Support to remotely collect selected files from the /etc/log and /etc/crash directories. It also allows Support to remotely trigger an AutoSupport event on the customer s NetApp controller and return a complete AutoSupport log. Intelligent core handling When the NetApp system panics or reboots, the RSA intelligently uploads the core file to NetApp without customer intervention. A core file will only be uploaded if it is not corrupted and the panic signature does not match any known condition in NetApp s panic message database. Down appliance notification RSA will detect when a NetApp controller is down (e.g., not serving data) and will automatically open a case on the customer s behalf with NetApp Support. 3 Improving the Customer Support Experience with NetApp Remote Support Agent

4 2.2 REMOTE SUPPORT AGENT COMPONENTS The RSA has two major components: 1. Embedded agent within the NetApp controllers (Remote Support Agent) The RSA will be incorporated into the existing Remote LAN Management (RLM) card. The RLM is a service processor supported on the FAS and V 3000 and 6000 series. The RSA will be delivered as a firmware upgrade to the RLM. Customer will have the option of enabling or disabling the RSA during the RLM configuration process. Firmware updates of the RLM can occur without powering down the NetApp controller or requiring any Data ONTAP changes. 2. Back-end infrastructure residing at NetApp (Remote Support Enterprise) The RSA communicates with the Remote Support Enterprise (RSE), a back-end infrastructure residing within NetApp. Through the Remote Support Enterprise UI, a NetApp support engineer can issue data collection commands to the RSA and view the information returned. The RSE also provides a data store in which the collected data will be retained for 30 days before being deleted. Customer NetApp Support HTTPS Internet Firewall Firewall RSA Customer Data Repository Resides on RLM Secured access model Non-disruptive upgrade Functional even when appliance is down Appliance down notification Optimized CORE handling Remote data collection 4 Improving the Customer Support Experience with NetApp Remote Support Agent

5 2.3 NETAPP SUPPORT INTERACTION NetApp Support interacts with the RSA via a simple user interface on the RSE. The RSA is tightly integrated with NetApp s case flow process. During case triage, the case information screen highlights the presence of the RSA to the NetApp support engineer. The support engineer can then access the RSE to perform remote data collection or look at data already collected. The RSE user interface is behind NetApp s firewall and can only be access by NetApp Support personnel. The simple yet functional UI is encapsulated into a single screen and contains the following sections: RSA configuration summary Shows status of the agent, firmware level, and contact frequency with the NetApp controller. NetApp controller summary Shows model information, status of the controller, and whether AutoSupport is enabled. Recent activities Displays all recent activities, alarms, and events from the RSA. Remote data collection Enables the support engineer to remotely trigger a complete AutoSupport upload to NetApp, collect a file listing from /etc/crash and etc/log directory, and upload specific files from either /etc/log or /etc/crash directory. Uploaded files and status Displays a list of recently uploaded files or files in the process of being uploaded and their status. 5 Improving the Customer Support Experience with NetApp Remote Support Agent

6 3 ARCHITECTURE The RSA architecture consists of an embedded agent within the NetApp system owned by the customer and the RSE that is hosted at NetApp. The RSA, running on the RLM service processor, will initiate a secure, authenticated connection to the RSE and provide NetApp Support with remote access to logs, core files, and other diagnostic information. The RSA architecture also provides customers with complete control to audit RSA usage and disable all features via a single CLI command. 3.1 REMOTE SUPPORT ENTERPRISE The RSE is a Web application that communicates with the RSA. The RSE provides NetApp Support with a user interface for device interaction and monitoring. The RSE application runs on clustered hardware to provide high availability and performance. The RSE uses an Oracle backend database with both the database and file systems residing on NetApp storage systems. The RSE infrastructure is tightly integrated with NetApp Support s SAP CRM tools to provide seamless interface for automatic case generation and case handling workflow integration. The RSE monitors the heartbeat of the RSA on a constant basis. The RSE can dynamically configure the duration of heartbeat monitoring based on these scenarios: First-time device registration if the NetApp system has SupportEdge Premium entitlement, heartbeat monitoring will be set to every five minutes. Heartbeat monitoring is set to every 24 hours if the system does not have SupportEdge Premium entitlement. Case creation upon specific case creations for the NetApp system, heartbeat monitoring will be increased to 10 seconds for a duration of 24 hours, after which it will return to the default 5-minute rate. RSE UI access by NetApp Support the heartbeat check rate will automatically be changed to 10 seconds when NetApp Support accesses the RSE UI to perform remote data collection. This will allow NetApp Support to interact quickly with the NetApp system during case triage. 3.2 REMOTE SUPPORT AGENT The RSA is delivered to customers as a firmware extension of the RLM service processor. The RSA code is compact and resides within RLM s flash memory space. RLM Overview The RLM is a service processor integrated into FAS and V 3000 and FAS6000 series. It continuously monitors the storage controller and provides platform management capabilities, including console redirection, monitoring, logging, and alerting. Upon detection of a downappliance event at the controller, the RLM will trigger an AutoSupport notification to NetApp Support. The RLM is implemented as a small form-factor embedded microcomputer, with a dedicated Ethernet interface. It is powered by standby voltage, which is available as long as the system has input power to at least one of the system s power supplies. The RLM has its own embedded operating system that runs independent of Data ONTAP. These features allow the RLM to stay operational regardless of the operating state of the storage controller. This architecture also 6 Improving the Customer Support Experience with NetApp Remote Support Agent

7 allows the RLM firmware to be updated asynchronously from Data ONTAP and in a nondisruptive manner. Remote Support Agent The RSA extends the current feature set of the RLM to include remote support automation. Like the RLM, the RSA is only supported on FAS and V 3000 and 6000 systems. The RLM has its own Ethernet port. The RSA uses this port to provide an outbound authenticated communication channel from a customer location to NetApp over HTTPS. The RSA periodically connects to the RSE at NetApp and provides notification to NetApp of events of interest such as a change in a monitored server state. It also downloads and processes commands from NetApp to upload log files and core files or to trigger Data ONTAP AutoSupport. The RSA constantly monitors its own configuration by running health checks. This health monitor will send out an alert to the RSE if errors are detected in the configuration (e.g., userid/password errors and connection failure between RSA and the NetApp controller). The RSA is intelligent enough to send any alert once when the error is detected (no repeated alerts). The RSA is very efficient on network bandwidth. When the RSA sends its heartbeats every five minutes back to the RSE, these packets are on the order of less than a kilobyte of data. Unlike other remote monitoring architectures, the RSA does not perform data collection on a regular interval basis and will only collect data on demand (e.g., when requested by NetApp Support in the context of case handling). Even the log and core files it collects are compressed before they are sent to NetApp. 3.3 DATA ONTAP INTERFACE The RSA provides log and core file collection from Data ONTAP. The RSA does not have direct hardware access to this data, but uses various interfaces to proxy its requests to Data ONTAP. The RSA only collects data from the /etc/log and /etc/crash directories, which reside on the root volume of Data ONTAP. RSA access to these directories is through FilerView which is a part of Data ONTAP. NetApp Support can also use the RSA to trigger on-demand AutoSupport on the NetApp system. Having the most recent AutoSupport data helps Support improve case resolution time. To trigger an AutoSupport, RSA uses a telnet/rsh protocol to issue this command over the local customer network to the NetApp system. The AutoSupport triggered by RSA is the standard Data ONTAP AutoSupport and uses standard AutoSupport settings. This AutoSupport message is uniquely identified by a Subject line of "Remote Support Agent triggered ASUP". 3.4 AUTO CORE UPLOAD Even with compression, core files on some NetApp systems can approach 4GB to 20GB+ in size. Core file handling can be a cumbersome task when the customer has to copy the core file from the NetApp system to an intermediate host and transfer it to NetApp. Sending a large core file over the Internet can take many hours. To minimize transmission issues over unreliable networks, some customers in the past had to manually break apart large core files into multiple pieces before sending them to NetApp. NetApp, in return, had to reassemble these pieces into a 7 Improving the Customer Support Experience with NetApp Remote Support Agent

8 contiguous file once received. To ease core file handling work, the RSA automates the entire core upload process. The RSA is designed to provide reliable and resilient upload of core files, including mechanisms to handle upload failures. When a NetApp system panics, it dumps the memory content to disks and reboots. Data ONTAP then collects this memory content and saves it into a core file. Upon reboot, Data ONTAP sends a RPANIC AutoSupport message to NetApp that contains the panic message and related back trace code. This RPANIC AutoSupport message is parsed by the Panic Message and Backtrace Analyzer (PMBTA) back at NetApp. The PMBTA tool then analyzes the core signature and determines if it is a known issue. If a match is found, then uploading the core file is not required. If no match is found, the core file will be uploaded to NetApp Support for analysis. The RSE automates core upload by instructing the RSA to upload this core file to NetApp. To ensure data integrity, the core file has a checksum and the RSA also performs retries when it encounters network upload failures. After the core file has reached the RSE in its entirety, the core is moved to NetApp Support for processing and the core record in the corresponding support case is updated. In addition to automated core upload after a panic condition, the RSA allows NetApp Support to retrieve core files on demand from a list of all core files available on a NetApp system. Auto core uploading minimizes customer manual overheads. Furthermore, it enables NetApp Support to begin diagnostics much sooner than if the core were uploaded manually. Delays such as contacting and waiting for the customer to upload the core are eliminated. 3.5 SECURITY NetApp has taken an end-to-end approach in providing a secure, trusted, and verifiable infrastructure for the RSA. The customer has full control and visibility over all remote access events and activities. The customer can disable the connection to NetApp and all RSA features via a single CLI command Agent Security The RSA always initiates the connection to the RSE and not vise versa via an outbound only internet connection to NetApp. The RSA periodically connects to the RSE, downloads any action requests, and deposits the system status and results of previous requests. The RSA architecture does not allow NetApp to dial into a customer system. This is similar to how a Web browser opens a connection to a Web site and not the other way around. Communication between the RSA and NetApp is authenticated and encrypted with 128-bit Verisign SSL certificates. The RSA retains a copy of the NetApp public certificate to ensure that communication only occurs with NetApp. If the authentication fails, the connection is broken and no data is sent. RSA has no direct access to the root volume on the NetApp controller. It uses FilerView s HTTPS interface to request diagnostic data and core files from Data ONTAP. FilerView is hardcoded to only allow read access to "/etc/log" and "/etc/crash" directories on the root volume. Read access to other directories is prohibited. RSA also checks and rejects any file upload requests originating from RSE if they fall outside these two directories. 8 Improving the Customer Support Experience with NetApp Remote Support Agent

9 3.5.2 Remote Support Enterprise Security Access to the RSE is restricted to authorized NetApp Support personnel only. All NetApp Support s interactions with the RSE are recorded and auditable by the customer through NetApp s NOW site (please see screen example below). Logs and message files uploaded to the RSE are kept for 60 days and then erased Symantec Security Audit NetApp has partnered with Symantec to assess the security of the RSA to ensure it conforms to industry best practices. Symantec was chosen because of its leadership position in the security solution space. After a detailed analysis of the RSA, Symantec concluded that it provides a secure framework for data protection and meets industry security best practices. For more information, see the Network Appliance Remote Support Agent Security Assessment white paper by Symantec. To ensure continued adherence to security best practices, NetApp intends to contract with Symantec to perform security assessments on a regular basis for each update of the RSA. 9 Improving the Customer Support Experience with NetApp Remote Support Agent

10 4 SUMMARY NetApp Support statistics show greater than 50% case resolution within the first hour if Support has immediate access to appropriate diagnostic data. The RSA is designed to automate this data collection for NetApp Support. By deploying the RSA, customers will see improve case resolution time and system availability while minimizing their interaction with Support over the phone. The Remote Support Agent is a critical component of NetApp s support automation strategy NetApp. All rights reserved. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster, NOW, and Data ONTAP are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. 10 Improving the Customer Support Experience with NetApp Remote Support Agent

Clustered Data ONTAP 8.3

Clustered Data ONTAP 8.3 Clustered Data ONTAP 8.3 Remote Support Agent Configuration Guide For Use with Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

White Paper. Quantum StorageCare Guardian

White Paper. Quantum StorageCare Guardian Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

MassTransit vs. FTP Comparison

MassTransit vs. FTP Comparison MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote

More information

Unisys Internet Remote Support

Unisys Internet Remote Support white paper Unisys Internet Remote Support Systems & Technology, CMP-based Servers Introduction Remote Support is a method of connecting to remotely located systems for remote administration, real-time

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

OnCommand Unified Manager 6.3

OnCommand Unified Manager 6.3 OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

Kerio Operator. Getting Started Guide

Kerio Operator. Getting Started Guide Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

FlexArray Virtualization

FlexArray Virtualization Updated for 8.2.1 FlexArray Virtualization Installation Requirements and Reference Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service...

More information

OnCommand Performance Manager 2.0

OnCommand Performance Manager 2.0 OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support

W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support Sponsored by: NetApp Brad Nisbet December 2008 Matt Healey IDC OPINION Global Headquarters:

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

Wyse Device Manager TM

Wyse Device Manager TM Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop

More information

OpManager MSP Edition

OpManager MSP Edition OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Internet-based remote support for help desks

Internet-based remote support for help desks Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2

More information

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient

More information

NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide

NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide Sachin Maheshwari, Anand Ranganathan, NetApp October 2012 Abstract This document provides

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group 2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

CTERA Portal Datacenter Edition

CTERA Portal Datacenter Edition User Guide CTERA Portal Datacenter Edition September 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means

More information

Best Practices: Extending Enterprise Applications to Mobile Devices

Best Practices: Extending Enterprise Applications to Mobile Devices Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2

More information

TimePictra Release 10.0

TimePictra Release 10.0 DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks

Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks Manage the Endpoints Palo Alto Networks Advanced Endpoint Protection Administrator s Guide Version 3.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

FlexPod Cooperative Support Model

FlexPod Cooperative Support Model FlexPod Cooperative Support Model Quick Reference Guide NetApp and Cisco share a long history of support collaboration with FlexPod, a data center solution that is unified, pretested, and validated. It

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Integration and Automation with Lenovo XClarity Administrator

Integration and Automation with Lenovo XClarity Administrator Integration and Automation with Lenovo XClarity Administrator Extend Management Processes to Existing Ecosystems Lenovo Enterprise Business Group April 2015 2015 Lenovo. All rights reserved. Introduction

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Clustered Data ONTAP 8.3 Administration and Data Protection Training

Clustered Data ONTAP 8.3 Administration and Data Protection Training Clustered Data ONTAP 8.3 Administration and Data Protection Training Format: Duration: Classroom, Online 5 days Description This course uses lecture and hands-on exercises to teach basic administration

More information

Xerox SMart esolutions. Security White Paper

Xerox SMart esolutions. Security White Paper Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

MySQL Enterprise Monitor

MySQL Enterprise Monitor MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,

More information

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Content Sharing Made Easy Media Exchange (MX) is a browser-based

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

The BiGuard SSL VPN Appliances

The BiGuard SSL VPN Appliances The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium

More information

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors BEST PRACTICES WHITE PAPER BMC BladeLogic Client Automation and Intel Core vpro Processors Table of Contents Introduction................................................... 1 About BMC.......................................................

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

system monitor Uncompromised support for your entire network.

system monitor Uncompromised support for your entire network. system monitor Uncompromised support for your entire network. CONTENTS. Introduction Uses How it works Site Manager PLUS! Network Watchdog System Requirements 4 5 6 7 8 9 10 system monitor INTRODUCTION.

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014 DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction

More information

Virtual Storage Console 5.0 for VMware vsphere

Virtual Storage Console 5.0 for VMware vsphere Virtual Storage Console 5.0 for VMware vsphere Installation and Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual

QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual Table of Content 1 Introduction... 3 1.1 Purpose... 3 1.2 Support Browser... 3 2 System Administration... 3 2.1 Login Page... 3 2.2 Overview

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA

TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA For EAD and TDM products Value-Adding Software Licenses ABOUT OneAccess OneAccess designs and develops a range of world-class multiservice routers for over 125 global service provider customers including

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

LifeSize Networker Installation Guide

LifeSize Networker Installation Guide LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information