Improving the Customer Support Experience with NetApp Remote Support Agent
|
|
|
- Marvin Carr
- 9 years ago
- Views:
Transcription
1 NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP
2 TABLE OF CONTENTS 1 INTRODUCTION NETAPP SUPPORT REMOTE AGENT OVERVIEW FEATURES... ERROR! BOOKMARK NOT DEFINED. 2.2 FEATURES REMOTE SUPPORT AGENT COMPOENNTS NETAPP SUPPORT ARCHITECTURE REMOTE SUPPORT ENTERPRISE REMOTE SUPPORT AGENT DATA ONTAP INTERFACE AUTO CORE UPLOAD SECURITY SUMMARY Improving the Customer Support Experience with NetApp Remote Support Agent
3 1 INTRODUCTION Storage is a mission-critical component of any IT infrastructure, and customers expect a high level of SLA from their storage vendors. NetApp Support is responding to this challenge through support offerings that are built around people, process, and technology. Remote support automation is one key technology component that helps to reduce case resolution time and customer manual overheads. Remote monitoring and data collection are essential components of a remote support offering. NetApp Support statistics show a probability of greater than 50% to close a case within one day (likely within the first one to two hours) if a support engineer has access to required diagnostics data. Without access to proper diagnostic data (e.g., log files, perfstat, or AutoSupport), the probability of closing a case within one day drops to less than 35%. Downtime is expensive Retail Insurance Information technology Financial institutions Manufacturing Call location Telecommunications Credit card services Energy Retail brokerage $M/Hour Millions of dollars per hour in lost revenue NetApp customers, especially those with SupportEdge Premium contracts, expect minimal interaction with NetApp Support during case handling. Customers expect a high degree of remote support automation so they can minimize the amount of time they spend on the phone with Support. Data collection are timeconsuming tasks for Support because they need to find the customer to explain which data to collect and how to gather and send the data, and then wait for the data to arrive. This process is often repeated multiple times during the case triage cycle. 6.5 Core file handling can be another laborious customer task because customers must manually upload the files. For some NetApp controllers, the core file can be in the range of multiple gigabytes. Uploading these core files over a slow or unstable Internet link can be a challenge and a cumbersome task. 2 NETAPP REMOTE SUPPORT AGENT OVERVIEW 2.1 FEATURES The NetApp Remote Support Agent (RSA) is a fast, simple, and reliable design that supports three major features: Remote data collection RSA allows NetApp Support to remotely collect selected files from the /etc/log and /etc/crash directories. It also allows Support to remotely trigger an AutoSupport event on the customer s NetApp controller and return a complete AutoSupport log. Intelligent core handling When the NetApp system panics or reboots, the RSA intelligently uploads the core file to NetApp without customer intervention. A core file will only be uploaded if it is not corrupted and the panic signature does not match any known condition in NetApp s panic message database. Down appliance notification RSA will detect when a NetApp controller is down (e.g., not serving data) and will automatically open a case on the customer s behalf with NetApp Support. 3 Improving the Customer Support Experience with NetApp Remote Support Agent
4 2.2 REMOTE SUPPORT AGENT COMPONENTS The RSA has two major components: 1. Embedded agent within the NetApp controllers (Remote Support Agent) The RSA will be incorporated into the existing Remote LAN Management (RLM) card. The RLM is a service processor supported on the FAS and V 3000 and 6000 series. The RSA will be delivered as a firmware upgrade to the RLM. Customer will have the option of enabling or disabling the RSA during the RLM configuration process. Firmware updates of the RLM can occur without powering down the NetApp controller or requiring any Data ONTAP changes. 2. Back-end infrastructure residing at NetApp (Remote Support Enterprise) The RSA communicates with the Remote Support Enterprise (RSE), a back-end infrastructure residing within NetApp. Through the Remote Support Enterprise UI, a NetApp support engineer can issue data collection commands to the RSA and view the information returned. The RSE also provides a data store in which the collected data will be retained for 30 days before being deleted. Customer NetApp Support HTTPS Internet Firewall Firewall RSA Customer Data Repository Resides on RLM Secured access model Non-disruptive upgrade Functional even when appliance is down Appliance down notification Optimized CORE handling Remote data collection 4 Improving the Customer Support Experience with NetApp Remote Support Agent
5 2.3 NETAPP SUPPORT INTERACTION NetApp Support interacts with the RSA via a simple user interface on the RSE. The RSA is tightly integrated with NetApp s case flow process. During case triage, the case information screen highlights the presence of the RSA to the NetApp support engineer. The support engineer can then access the RSE to perform remote data collection or look at data already collected. The RSE user interface is behind NetApp s firewall and can only be access by NetApp Support personnel. The simple yet functional UI is encapsulated into a single screen and contains the following sections: RSA configuration summary Shows status of the agent, firmware level, and contact frequency with the NetApp controller. NetApp controller summary Shows model information, status of the controller, and whether AutoSupport is enabled. Recent activities Displays all recent activities, alarms, and events from the RSA. Remote data collection Enables the support engineer to remotely trigger a complete AutoSupport upload to NetApp, collect a file listing from /etc/crash and etc/log directory, and upload specific files from either /etc/log or /etc/crash directory. Uploaded files and status Displays a list of recently uploaded files or files in the process of being uploaded and their status. 5 Improving the Customer Support Experience with NetApp Remote Support Agent
6 3 ARCHITECTURE The RSA architecture consists of an embedded agent within the NetApp system owned by the customer and the RSE that is hosted at NetApp. The RSA, running on the RLM service processor, will initiate a secure, authenticated connection to the RSE and provide NetApp Support with remote access to logs, core files, and other diagnostic information. The RSA architecture also provides customers with complete control to audit RSA usage and disable all features via a single CLI command. 3.1 REMOTE SUPPORT ENTERPRISE The RSE is a Web application that communicates with the RSA. The RSE provides NetApp Support with a user interface for device interaction and monitoring. The RSE application runs on clustered hardware to provide high availability and performance. The RSE uses an Oracle backend database with both the database and file systems residing on NetApp storage systems. The RSE infrastructure is tightly integrated with NetApp Support s SAP CRM tools to provide seamless interface for automatic case generation and case handling workflow integration. The RSE monitors the heartbeat of the RSA on a constant basis. The RSE can dynamically configure the duration of heartbeat monitoring based on these scenarios: First-time device registration if the NetApp system has SupportEdge Premium entitlement, heartbeat monitoring will be set to every five minutes. Heartbeat monitoring is set to every 24 hours if the system does not have SupportEdge Premium entitlement. Case creation upon specific case creations for the NetApp system, heartbeat monitoring will be increased to 10 seconds for a duration of 24 hours, after which it will return to the default 5-minute rate. RSE UI access by NetApp Support the heartbeat check rate will automatically be changed to 10 seconds when NetApp Support accesses the RSE UI to perform remote data collection. This will allow NetApp Support to interact quickly with the NetApp system during case triage. 3.2 REMOTE SUPPORT AGENT The RSA is delivered to customers as a firmware extension of the RLM service processor. The RSA code is compact and resides within RLM s flash memory space. RLM Overview The RLM is a service processor integrated into FAS and V 3000 and FAS6000 series. It continuously monitors the storage controller and provides platform management capabilities, including console redirection, monitoring, logging, and alerting. Upon detection of a downappliance event at the controller, the RLM will trigger an AutoSupport notification to NetApp Support. The RLM is implemented as a small form-factor embedded microcomputer, with a dedicated Ethernet interface. It is powered by standby voltage, which is available as long as the system has input power to at least one of the system s power supplies. The RLM has its own embedded operating system that runs independent of Data ONTAP. These features allow the RLM to stay operational regardless of the operating state of the storage controller. This architecture also 6 Improving the Customer Support Experience with NetApp Remote Support Agent
7 allows the RLM firmware to be updated asynchronously from Data ONTAP and in a nondisruptive manner. Remote Support Agent The RSA extends the current feature set of the RLM to include remote support automation. Like the RLM, the RSA is only supported on FAS and V 3000 and 6000 systems. The RLM has its own Ethernet port. The RSA uses this port to provide an outbound authenticated communication channel from a customer location to NetApp over HTTPS. The RSA periodically connects to the RSE at NetApp and provides notification to NetApp of events of interest such as a change in a monitored server state. It also downloads and processes commands from NetApp to upload log files and core files or to trigger Data ONTAP AutoSupport. The RSA constantly monitors its own configuration by running health checks. This health monitor will send out an alert to the RSE if errors are detected in the configuration (e.g., userid/password errors and connection failure between RSA and the NetApp controller). The RSA is intelligent enough to send any alert once when the error is detected (no repeated alerts). The RSA is very efficient on network bandwidth. When the RSA sends its heartbeats every five minutes back to the RSE, these packets are on the order of less than a kilobyte of data. Unlike other remote monitoring architectures, the RSA does not perform data collection on a regular interval basis and will only collect data on demand (e.g., when requested by NetApp Support in the context of case handling). Even the log and core files it collects are compressed before they are sent to NetApp. 3.3 DATA ONTAP INTERFACE The RSA provides log and core file collection from Data ONTAP. The RSA does not have direct hardware access to this data, but uses various interfaces to proxy its requests to Data ONTAP. The RSA only collects data from the /etc/log and /etc/crash directories, which reside on the root volume of Data ONTAP. RSA access to these directories is through FilerView which is a part of Data ONTAP. NetApp Support can also use the RSA to trigger on-demand AutoSupport on the NetApp system. Having the most recent AutoSupport data helps Support improve case resolution time. To trigger an AutoSupport, RSA uses a telnet/rsh protocol to issue this command over the local customer network to the NetApp system. The AutoSupport triggered by RSA is the standard Data ONTAP AutoSupport and uses standard AutoSupport settings. This AutoSupport message is uniquely identified by a Subject line of "Remote Support Agent triggered ASUP". 3.4 AUTO CORE UPLOAD Even with compression, core files on some NetApp systems can approach 4GB to 20GB+ in size. Core file handling can be a cumbersome task when the customer has to copy the core file from the NetApp system to an intermediate host and transfer it to NetApp. Sending a large core file over the Internet can take many hours. To minimize transmission issues over unreliable networks, some customers in the past had to manually break apart large core files into multiple pieces before sending them to NetApp. NetApp, in return, had to reassemble these pieces into a 7 Improving the Customer Support Experience with NetApp Remote Support Agent
8 contiguous file once received. To ease core file handling work, the RSA automates the entire core upload process. The RSA is designed to provide reliable and resilient upload of core files, including mechanisms to handle upload failures. When a NetApp system panics, it dumps the memory content to disks and reboots. Data ONTAP then collects this memory content and saves it into a core file. Upon reboot, Data ONTAP sends a RPANIC AutoSupport message to NetApp that contains the panic message and related back trace code. This RPANIC AutoSupport message is parsed by the Panic Message and Backtrace Analyzer (PMBTA) back at NetApp. The PMBTA tool then analyzes the core signature and determines if it is a known issue. If a match is found, then uploading the core file is not required. If no match is found, the core file will be uploaded to NetApp Support for analysis. The RSE automates core upload by instructing the RSA to upload this core file to NetApp. To ensure data integrity, the core file has a checksum and the RSA also performs retries when it encounters network upload failures. After the core file has reached the RSE in its entirety, the core is moved to NetApp Support for processing and the core record in the corresponding support case is updated. In addition to automated core upload after a panic condition, the RSA allows NetApp Support to retrieve core files on demand from a list of all core files available on a NetApp system. Auto core uploading minimizes customer manual overheads. Furthermore, it enables NetApp Support to begin diagnostics much sooner than if the core were uploaded manually. Delays such as contacting and waiting for the customer to upload the core are eliminated. 3.5 SECURITY NetApp has taken an end-to-end approach in providing a secure, trusted, and verifiable infrastructure for the RSA. The customer has full control and visibility over all remote access events and activities. The customer can disable the connection to NetApp and all RSA features via a single CLI command Agent Security The RSA always initiates the connection to the RSE and not vise versa via an outbound only internet connection to NetApp. The RSA periodically connects to the RSE, downloads any action requests, and deposits the system status and results of previous requests. The RSA architecture does not allow NetApp to dial into a customer system. This is similar to how a Web browser opens a connection to a Web site and not the other way around. Communication between the RSA and NetApp is authenticated and encrypted with 128-bit Verisign SSL certificates. The RSA retains a copy of the NetApp public certificate to ensure that communication only occurs with NetApp. If the authentication fails, the connection is broken and no data is sent. RSA has no direct access to the root volume on the NetApp controller. It uses FilerView s HTTPS interface to request diagnostic data and core files from Data ONTAP. FilerView is hardcoded to only allow read access to "/etc/log" and "/etc/crash" directories on the root volume. Read access to other directories is prohibited. RSA also checks and rejects any file upload requests originating from RSE if they fall outside these two directories. 8 Improving the Customer Support Experience with NetApp Remote Support Agent
9 3.5.2 Remote Support Enterprise Security Access to the RSE is restricted to authorized NetApp Support personnel only. All NetApp Support s interactions with the RSE are recorded and auditable by the customer through NetApp s NOW site (please see screen example below). Logs and message files uploaded to the RSE are kept for 60 days and then erased Symantec Security Audit NetApp has partnered with Symantec to assess the security of the RSA to ensure it conforms to industry best practices. Symantec was chosen because of its leadership position in the security solution space. After a detailed analysis of the RSA, Symantec concluded that it provides a secure framework for data protection and meets industry security best practices. For more information, see the Network Appliance Remote Support Agent Security Assessment white paper by Symantec. To ensure continued adherence to security best practices, NetApp intends to contract with Symantec to perform security assessments on a regular basis for each update of the RSA. 9 Improving the Customer Support Experience with NetApp Remote Support Agent
10 4 SUMMARY NetApp Support statistics show greater than 50% case resolution within the first hour if Support has immediate access to appropriate diagnostic data. The RSA is designed to automate this data collection for NetApp Support. By deploying the RSA, customers will see improve case resolution time and system availability while minimizing their interaction with Support over the phone. The Remote Support Agent is a critical component of NetApp s support automation strategy NetApp. All rights reserved. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster, NOW, and Data ONTAP are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. 10 Improving the Customer Support Experience with NetApp Remote Support Agent
Clustered Data ONTAP 8.3
Clustered Data ONTAP 8.3 Remote Support Agent Configuration Guide For Use with Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
White Paper. Quantum StorageCare Guardian
Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
MassTransit vs. FTP Comparison
MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote
Unisys Internet Remote Support
white paper Unisys Internet Remote Support Systems & Technology, CMP-based Servers Introduction Remote Support is a method of connecting to remotely located systems for remote administration, real-time
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
OnCommand Unified Manager 6.3
OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes
Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
FlexArray Virtualization
Updated for 8.2.1 FlexArray Virtualization Installation Requirements and Reference Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4
Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service...
OnCommand Performance Manager 2.0
OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support
W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support Sponsored by: NetApp Brad Nisbet December 2008 Matt Healey IDC OPINION Global Headquarters:
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Wyse Device Manager TM
Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop
OpManager MSP Edition
OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Internet-based remote support for help desks
Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2
CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION
1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient
NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide
NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide Sachin Maheshwari, Anand Ranganathan, NetApp October 2012 Abstract This document provides
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions
LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
EMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer
Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
CTERA Portal Datacenter Edition
User Guide CTERA Portal Datacenter Edition September 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity
Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Manage the Endpoints. Palo Alto Networks. Advanced Endpoint Protection Administrator s Guide Version 3.1. Copyright 2007-2015 Palo Alto Networks
Manage the Endpoints Palo Alto Networks Advanced Endpoint Protection Administrator s Guide Version 3.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
EMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
Managing Central Monitoring in Distributed Systems
Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
FlexPod Cooperative Support Model
FlexPod Cooperative Support Model Quick Reference Guide NetApp and Cisco share a long history of support collaboration with FlexPod, a data center solution that is unified, pretested, and validated. It
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Integration and Automation with Lenovo XClarity Administrator
Integration and Automation with Lenovo XClarity Administrator Extend Management Processes to Existing Ecosystems Lenovo Enterprise Business Group April 2015 2015 Lenovo. All rights reserved. Introduction
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Clustered Data ONTAP 8.3 Administration and Data Protection Training
Clustered Data ONTAP 8.3 Administration and Data Protection Training Format: Duration: Classroom, Online 5 days Description This course uses lecture and hands-on exercises to teach basic administration
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
MySQL Enterprise Monitor
MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.
Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Content Sharing Made Easy Media Exchange (MX) is a browser-based
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
The BiGuard SSL VPN Appliances
The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium
BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors
BEST PRACTICES WHITE PAPER BMC BladeLogic Client Automation and Intel Core vpro Processors Table of Contents Introduction................................................... 1 About BMC.......................................................
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP
Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software
system monitor Uncompromised support for your entire network.
system monitor Uncompromised support for your entire network. CONTENTS. Introduction Uses How it works Site Manager PLUS! Network Watchdog System Requirements 4 5 6 7 8 9 10 system monitor INTRODUCTION.
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
Virtual Storage Console 5.0 for VMware vsphere
Virtual Storage Console 5.0 for VMware vsphere Installation and Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual
QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual Table of Content 1 Introduction... 3 1.1 Purpose... 3 1.2 Support Browser... 3 2 System Administration... 3 2.1 Login Page... 3 2.2 Overview
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
TMA Management Suite. For EAD and TDM products. ABOUT OneAccess. Value-Adding Software Licenses TMA
For EAD and TDM products Value-Adding Software Licenses ABOUT OneAccess OneAccess designs and develops a range of world-class multiservice routers for over 125 global service provider customers including
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
LifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
How To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
