Remote service in Digital Cinema

Size: px
Start display at page:

Download "Remote service in Digital Cinema"

Transcription

1 Barco Remote service in Digital Cinema Author Tom Bert Product Marketing Manager Barco Vincent Detourbe Product Manager Barco Page 1 of 15

2 INTRODUCTION Remote service is a term that covers many contexts. Depending on which features are added or omitted, the terms NOC (Network Operating Center) or RAM (Remote Asset Management) are also used. What it comes down to is enabling users to connect to devices that are out in the field. The devices reside at the exhibitor s site(s) and, normally, they are only connected to when something goes wrong and a service engineer has to travel to the device to repair it. Remote service, on the other hand, makes this connection: Remote: the user can collect device data from anywhere and at any time. Not only when standing next to the device, but also from a remote helpdesk or even while travelling (via a simple internet connection). Automatic: you don t have to send a service engineer to get the information the device can initiate a transfer of information itself. Real-time: you have access to up-to-date information on device performance, status, etc. With the growth of the internet and the number of devices connected to the network, remote service activity has grown significantly worldwide. The concept originated in the IT-world, where traffic (switches, routers, ) and devices (CPU-load, temperature, ) have been monitored through the (local) network for years now. More recently, remote service has found its way into other demanding markets such as healthcare, government and banking as well. Remote service gives you access to a new source of (real-time and accurate) data. In the past, remote access was regarded simply as a tool for troubleshooting problems on products deployed at customer sites. However, manufacturers and service providers are now realizing that remotely managing and servicing assets can drive innovations to business processes. Generating data directly from monitored products, without manual intervention, results in a high level of data integrity and real-time communication. All applications sharing in this data benefit, while what is actually done with the data is virtually unlimited. We will discuss this in greater detail later in this document. This document is intended for everyone involved with service in the Digital Cinema context. This can be an exhibitor or manufacturer whose equipment is being serviced remotely, or a service provider using remote service to perform his tasks. The Barco CineCare Web remote service platform has been built to be technologically secure but open with regard to use (since no VPN is needed). The intended audience described above can benefit from the features CineCare Web brings. We will elaborate on these benefits and features in this white paper. Page 2 of 15

3 What you should remember: remote service means that you don t have to be in your theater to know it s running well. Best practices What do other industries and companies achieve from implementing remote functionality? Some facts are provided in the figure below [1]: We see that best-in-class implementations yield: a 13% reduction in MTTR 1 an 11% reduction in service response time a 27% improvement in first call resolution rate a 23% improvement in asset uptime That gives you an indication of what you can expect. When considering stepping into remote service (as an operator or as a user), it s important to understand that implementing remote service is not an objective in itself. It s a tool for resolving existing issues, for improving the way you work today, and for developing new opportunities. Examine your current business (exhibition, maintenance, installation, integration, ) and identify the top 5 issues that you are faced with. As you read through this document, look for the ways that remote service can help you resolve them. At the same time, do understand that remote service can do much more than solve existing problems. It is an enabler for truly new ways of running your business. It can even change the very business you are in. We will highlight some of these 1 Mean time to repair (MTTR) represents the average time required to repair a failed component or device. Page 3 of 15

4 opportunities in this white paper. Be sure to challenge your remote service provider on them during discussions! WHAT S IN IT FOR ME? Some of the benefits described below are available from multiple suppliers, out of the box. Others are only accessible on selected systems, and still others are for the future and are added here to create awareness on the opportunities of remote service. As mentioned above, many people have a narrow definition of remote service: watching green and red traffic lights on a dashboard, or logging in remotely to reboot. But a well-designed remote service tool goes far beyond that to bring opportunities for dramatically changing the way you go about your business. Some examples are included below. For exhibitors Ease of mind: some end-users regard their projection equipment as a black box that shows their movies, and they re not familiar with the technology under the hood. By assuring them that their equipment is being looked after carefully 24x7, they are more confident in the investment they are making. But this monitoring shouldn t be passive: remote functionality provides the opportunity to optimize system performance dynamically, based on actual usage needs and requirements. System uptime: by preventing failures and being able to react quicker (e.g. remotely, no need to travel or ship) the system s total uptime increases. This is also facilitated by the faster problem resolution: the customer (and the service team) needs to spend less time on the phone. This setup also speeds the replenishment of consumables: so, you keep less stock on-site and you access the correct spare parts more quickly. OPEX 2 /TCO 3 : Fewer on-site personnel are needed thanks to remote service. By this we mean the personnel that the exhibitor employs to manage and/or maintain his theater setup. The gain from outsourcing this service to a remote and centralized site is obvious. 2 Operating expense (OPEX) is an ongoing cost for running a product, business, or system. For example, the annual costs for paper, toner, power and maintenance are a photocopier s OPEX. For larger systems, OPEX may also include the cost of workers and facility expenses. 3 Total cost of ownership (TCO) is a financial estimate to help consumers and enterprise managers determining the direct and indirect costs of a product or system. Page 4 of 15

5 Accuracy of maintenance and licenses: maintenance typically has a periodic nature a service engineer is sent every 3, 6 or 12 months. There are several reasons why this system is sub-optimal: the maintenance is often too late (failure before maintenance) or too early (device not used heavily). Furthermore, it s hard to keep the regular periodicity (e.g. during maintenance, a new error is detected, which has to be solved in a return visit, which is sooner than the next scheduled maintenance). By performing maintenance more in line with actual usage, the customer knows that the equipment is being kept in optimal condition. Guaranteed software updates: checks can be made remotely (without intervention by the end-user) to make sure that the equipment is running the latest version of the software. Specialized reporting: the user can generate the data he needs for discussions within his organization (e.g. the data can be used to calculate investments required for the coming year(s)). In addition, this data is sometimes required by auditors. General ergonomics: Based on our customers organizations and needs, our remote service application is organized like a theater or like a network (Network > Theaters > Screens > Devices per screen). For integrators and service providers Pro-active maintenance: Maintenance and service becomes pro-active instead of reactive. Remote service enables you to find a problem before the end-user does. By monitoring signals from the devices and applying correlation analysis as necessary, you can predict component failures and do preventive maintenance. By preventing errors or finding the root cause very easily, the MTTR drops significantly which improves uptime and availability to the customer. Higher number of first-time fixes: The number of first-time fixes increases by enabling the service engineer to diagnose the problem remotely. Even if he finds that he needs some additional software upon arrival at the customer site, he can download it through the system. Service efficiency: It s hard to achieve perfectly efficient service: diagnosis and repair cannot always be done in the same intervention, the diagnosis is not always right the first time, etc. Remote service can help improve service efficiency by making new tools (remote diagnosis, diagnostic companion, ) and functionalities (configuration management, ) available, and the service organization can perform new tasks and speed up existing ones. As Page 5 of 15

6 described above, faster service leads to higher device and system uptime. Service revenue opportunities: By being able to bill service on the time, resources and equipment actually consumed, everyone will always receive a correct price. Exhibitors will always pay the correct price based on accurate usage reports, which will assure them of fair pricing. Furthermore, because of the new opportunities that are developed, new types of service revenue (non-existent today) are generated: for example, consider a pay-as-you-grow model, where the usage is logged and billed through the remote connection. Visibility into asset performance: By having accurate info on the as-is situation (and its history) at the customer s site, you are better prepared when you meet with the exhibitor. He will now have all the necessary data available to respond to questions and serve the customer better. Prove SLA 4 compliance: you can present hard data to existing as well as to new users to prove that SLA compliance has been achieved. In turn, the exhibitors can also verify this data through their own interface. This will enhance the renewal of existing contracts as well as the generation of new opportunities. Inventory management: keeping track of where all systems, devices and their components are (worldwide) can help reduce working capital and create value for customers. Life cycle management: logging and updating the actions a device or system goes through during its lifetime, starting from the earliest stages (installation) and continuing until EOL. By enabling this, you gain access to a centralized source of data on the device which can be used for correlation or warranty. Software and firmware patching and upgrades: an important aspect of service is keeping the systems up-todate. Remote service allows updates to be made almost instantly on a worldwide scale. 4 A Service Level Agreement (SLA) is the part of a service contract where the level of service is formally defined. In practice, the term SLA is sometimes used to refer to the contracted delivery time, or performance, of the service. As an example, internet service providers will commonly include SLAs within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. Page 6 of 15

7 HOW DOES A REMOTE SERVICE SYSTEM WORK? Now that we have covered why (or why not) you should look into remote service ( What are my top 5 issues today? ) and what improvements remote service can bring, it s time to dig deeper into how such a system is set up. Where does it come from? The convergence of four technology trends has enabled the development and wide adoption of remote services: Trend 1: The proliferation of increasingly intelligent assets. The decreasing cost of processing power has allowed manufacturers to build products with increasingly sophisticated software applications, network connectivity, user interfaces, and software system controls. For example, Barco Digital Cinema projectors present more than 600 parameters to the outside world. With more and more complex systems in the field, the organizations responsible for maintaining these systems have a growing challenge on their hands. Trend 2: The pervasive Internet. The declining cost and increasing coverage of the Internet allows companies to leverage public networks as a backbone for business use: for internal, B2B 5, and, ultimately, machine-to-machine communications. Trend 3: The ongoing integration of business systems. Policies prescribing standards for computing platforms, protocols, databases, and IT tools have made it easier for service providers to align various business processes from multiple functional areas. Trend 4: The growing acceptance of the SaaS6 (software as a service) model. SaaS is quickly becoming the preferred method for organizations to adopt and consume enterprise software. With this on-demand delivery model, organizations avoid the initial investment in software licenses and IT infrastructure, the tedious process of installing and integrating the software, as well as maintenance, upgrade and patch installations, troubleshooting, and capacity planning. As a result of these trends, more companies have begun to realize that there is a broader vision for product connectivity, 5 Business-to-business (B2B) denotes commercial transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. 6 Software as a service (SaaS), sometimes referred to as on-demand software, is a software delivery model in which software and associated data are centrally hosted on the cloud. SaaS is typically accessed by users using a thin client via a web browser. Page 7 of 15

8 one that goes beyond basic remote access tools and even beyond the service organization. Remote Service is that missing link handling connectivity and data collection so that you can focus on driving your core business. Design features As not all suppliers use the same configuration, we are using the Barco CineCare Web configuration as a reference in this document. CineCare Web has been designed based on the following key features: Secure: data security has been critical since Day 1 of cinema digitization. Even though the data flowing across the remote service network is not the feature film content, the business-critical info that is transferred must be 100% secured. A remote service system transfers data and interaction (with both the helpdesk and the equipment), and all of this traffic needs to be encrypted, traced and protected. You don t want secure information regarding your cinema to fall into the wrong hands; and you certainly don t want those wrong hands to hack into your network. CineCare Web achieves this security in multiple ways (as explained below). Scalable: while connecting to 1 cinema or even 10 is feasible, it can be challenging to connect to 20. Typical remote service setups run over VPN (Virtual Private Network) connections. In the cinema environment, the remote user s computer is added to the local theater network, which enables him to work as if he were local. But this has 2 drawbacks: for the cinema owner, it s impossible to distinguish between the remote user and the local users, which makes it hard to trace who is doing what in your network; for the service provider, maintaining multiple VPN connections is logistically cumbersome (this requires managing different logins, passwords, security tokens Barco s CineCare Web remote service platform does not use VPN. All connections are initiated from the equipment outbound. This means that when you want to add a new device, all you need to do is hook it up to the network: it will find its way to the server, identify itself and be added to your managed assets. This also means that all data transfer and interaction are initiated by, and linked to, the devices. The theater owner can easily trace which user performed which action on which device. Furthermore, all activity and visibility on the network is limited to those devices. Page 8 of 15

9 Easy-to-use and open: as mentioned above, remote service has its origin in the IT world. Historically, the type of data that is accessed and the way it is presented to the user has been geared toward people with a technical IT profile. The cinema industry is different: we care about different things, we operate at different times, and we need something attuned to our sector. Not all remote service providers succeed in offering this, and so the use of their tool is limited to a specialized in-house team. CineCare Web, on the other hand, has been built especially for the cinema industry and its specific needs. Intelligent: collecting massive amounts of data is useless if you don t create value from that information. One of CineCare Web s core components is a business intelligence aggregation layer, which allows you to look at data across multiple dimensions (a historical overview, an overview across multiple sites, ). With intelligent filtering on both the device and the server levels, it applies cinema intelligence to cinema information. Terminology Some terms are common in remote service. We introduce them here and explain how they are implemented in the CineCare Web setup. Agent: software that is installed per theater to translate the device-specific (projector, server, ) data to a protocol that is ready to be safely sent over a network connection. The agent continuously monitors important data, using business rules to determine what data should be sent and what constitutes an important event or alert. Agents optimize the use of communication bandwidth and allow the system to operate even if the internet connection is temporarily not available. The type of data processed by the agent can be simple and standardized (data values, notifications, ), but it can also be more complex (business rules). From a maintenance viewpoint, the agent is just one of the software components in the system. It can be updated with new versions remotely, without the need to reboot or re-configure the system. Gateway: the level of aggregation above the devices, the gateway collects information from all the monitored assets in the theater and sends it from the customer s networks onto the internet using certified security protocols. The gateway uses the agent (which is installed on the gateway PC) to set up a secure connection, monitor and maintain the security level, and give the exhibitor insight into the connection. Page 9 of 15

10 Service Center: the central data- and hosting-center where all the remote device data is captured. Built for maximum security and uptime, the service center stores data securely and also hosts a number of applications that permit interfacing to this data. Barco s application hosting has 1000 unique users logging in every week and 2,000,000 remote access minutes per month. Over the first 12 months, it achieved an uptime of %. Based on cloud computing principles, the hosting center is perfectly scalable to manage the growing number of connected assets and users. Connection: the network connection between the remote site (and its gateway and assets) and the Service Center. Data is sent securely over the Internet using HTTPS with SSL or AES encryption. This is the same protocol used to surf to secure websites (e.g. online banking). To achieve the necessary level of connectivity and security, this connection is bi-directional (send and receive) but can only be agent-initiated. The agent always initiates a connection ( Is there a message for me on the server? ), followed by an acknowledgement (e.g. Yes, we have a software update ready ). All inbound communication is blocked except for the specific responses to the agent triggers, so that no special ports are left open on the network, ensuring that the enduser s site cannot be penetrated by hackers or other unwanted visitors. Layout The illustration below shows how the CineCare Web system is set up and how the components are interconnected to enable fast and reliable remote service. Page 10 of 15

11 The upper half of the illustration shows the centralized equipment; a potential exhibitor site is shown at the bottom left; and the internet ( the cloud ) and the connected users (worldwide) are shown in the center and at the bottom right. The agent and the gateway PC have a so-called heartbeat frequency : that is, they do not send out data continually; instead, they use the available network capacity intelligently. Critical data is sent out very often to give you access to up-todate status information. Data that doesn t change doesn t require bandwidth consumption and is polled less often. Furthermore, intelligent rules are added that tune the outbound connectivity to the actual device status (e.g. certain data fields are updated only when their values change). The data and applications in the hosting center are accessible to users worldwide. All they need to start using the applications is an internet connection and a browser. Remote service stack Below, we depict how the different parts of the systems interact in a layered approach: Page 11 of 15

12 Many companies are active in Machine-to-Machine (M2M 7 ) communication, which is located at the bottom layer of our stack. They are typically less experienced in adding value to the raw data through business intelligence. Many companies are active in networking and network-connected devices. They are typically experienced in the middle layers of our stack, but have no solutions for the bottom and top layers. The Barco CineCare Web platform has been built to work on all layers. From our product expertise, to secure network connectivity, up to the intelligent reporting tools, CineCare Web brings everything needed to enable remote service for your Digital Cinema equipment. Security CineCare Web meets the most stringent security requirements, so that you feel confident that connections are secure and private and remote service can be performed effectively and routinely. CineCare Web is based on the only remote service solution to receive security certification from VeriSign. CineCare Web provides two-way communication based on Web Services standards including Hypertext Transfer Protocol (HTTP), Simple Object Access Protocol (SOAP), and extensible Markup Language (XML). 7 Machine-to-machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices of the same ability. M2M uses a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.), which is relayed through a network (wireless, wired or hybrid) to an application (software program), that translates the captured event into meaningful information (for example, items that need to be restocked). Such communication was originally accomplished by having a remote network of machines relay information back to a central hub for analysis, which would then be rerouted into a system like a personal computer. Page 12 of 15

13 No changes to the end-customer s IT security infrastructure are required to support remote monitoring and diagnostics. In addition, all communication between the service center and the theater is encrypted using Secure Sockets Layer (SSL) up to 168 bits. The agent initiates all communications in compliance with the secure computing environment at the device site. The only requirement is an Internet connection. (There is no need to set up expensive VPNs to implement CineCare Web or to compromise security by using dial-up communications.) Much of the information that travels across the public Internet uses plain text encapsulated within standard HTTP messages. Hackers can gain access to the network at a point close to the source or destination of the message and then capture and view the text of these HTTP messages with readily available tools. In contrast, CineCare Web supports the same standard SSL encryption that banks use for online transactions. SSL supports key length up to 168 bits and mutual authentication using certificates. It can also enable secret key AES 256-bit message encryption, which may be used with SSL to encrypt data beyond the DMZ 8. 8 In computer security, a DMZ (Data Management Zone) is a physical or logical sub-network that contains and exposes an organization's external services to a larger unsecured network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN), so that an external attacker has access only to equipment in the DMZ. Page 13 of 15

14 CONCLUSION We hope that this white paper demonstrates how broad the scope of remote service in cinema can be: the problems it solves, the processes it impacts, the functionality it provides, the value it adds, and the opportunities it brings. Remote Service is not a goal in itself but a means to an end. When considering stepping into remote services, carefully consider the goals you have set for your company and select a partner that helps you reach them. CineCare Web is the industry s most open and easy-to-use remote service product. It has been built with the cinema in mind to support every business. Page 14 of 15

15 REFERENCES [1] Aberdeen Group study: The Evolution of Remote Product Service and the Emergence of Smart Services, April Page 15 of 15

CineCare services. Ensuring cinema without worries

CineCare services. Ensuring cinema without worries CineCare services Ensuring cinema without worries Ensuring cinema without worries In all facets of our conversion from 35 mm to digital 2D and 3D projection, Barco has worked alongside us as a trusted

More information

A comparison of turnkey and standalone digital cinema projection setups

A comparison of turnkey and standalone digital cinema projection setups Barco A comparison of turnkey and standalone digital cinema projection setups Author Tom Bert Product Marketing Manager Barco Page 1 of 7 INTRODUCTION Since the introduction of digital projection in the

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Protecting systems and patient privacy

Protecting systems and patient privacy Protecting systems and patient privacy Philips Remote Services Security Remote services deliver the benefi ts of faster, easier problem resolution and less system downtime during troubleshooting and clinical

More information

Drive Down IT Operations Cost with Multi-Level Automation

Drive Down IT Operations Cost with Multi-Level Automation White White Paper Paper Drive Down IT Operations Cost with Multi-Level Automation Overview Reducing IT infrastructure and operations (I+O) budgets is as much on the mind of CIOs today as it s ever been.

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

ION Networks. White Paper

ION Networks. White Paper ION Networks White Paper Examining New Options in Remote Connectivity for Managed Service Providers: Services SSL VPN vs. Traditional SSL VPN and IPSec VPN Written by: Tara Flynn Condon Steve Scrace Bill

More information

Information Technology Services

Information Technology Services Information Technology Services 2011 Services Guide 77 Accord Park Drive, Suite A10 Norwell, MA 02061 (781) 871-3662 A proactive, preventative approach to IT management. System downtime, viruses, spyware,

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Remote control/problem resolution

Remote control/problem resolution LANDesk Solution Brief: Remote control/problem resolution Solving real IT challenges. Solve user problems the first time anytime, anywhere The Challenge: One thing is certain in the modern enterprise:

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,

More information

Remote Control/Problem Resolution

Remote Control/Problem Resolution Remote Control/Problem Resolution Have the best of all worlds secure, reliable remote control with robust information gathering and problem resolution tools Solve user problems the first time anytime,

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Improving the Customer Support Experience with NetApp Remote Support Agent

Improving the Customer Support Experience with NetApp Remote Support Agent NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP-7038-0408 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 NETAPP SUPPORT REMOTE

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Xerox SMart esolutions. Security White Paper

Xerox SMart esolutions. Security White Paper Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation

More information

*Applies to eligible hardware and software. Contact your Cisco Certified Partner for details.

*Applies to eligible hardware and software. Contact your Cisco Certified Partner for details. Q & A Smart Care Service Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a smart, collaborative networkwide service that enables your partner to deliver proactive network monitoring,

More information

THE VALUE OF NETWORK MONITORING

THE VALUE OF NETWORK MONITORING THE VALUE OF NETWORK MONITORING Why It s Essential to Know Your Network Sponsored by Ipswitch I. Introduction All companies are different, but the value of their network to their business varies little.

More information

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N 300-006-009 REV A03 October 5, 2010

EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N 300-006-009 REV A03 October 5, 2010 EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N 300-006-009 REV A03 October 5, 2010 This technical note discusses the benefits, value, and implementation of EMC Secure Remote Support solutions

More information

The top 10 misconceptions about performance and availability monitoring

The top 10 misconceptions about performance and availability monitoring The top 10 misconceptions about performance and availability monitoring Table of contents Introduction................................................................ 3 The top 10 misconceptions about

More information

White Paper. Securing and Integrating File Transfers Over the Internet

White Paper. Securing and Integrating File Transfers Over the Internet White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure Network monitoring, management and maintenance 3M TM Network Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure Provides real-time

More information

Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs

Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs Providers of IT services, such as systems integrators, are expanding rapidly into the managed services arena, and becoming

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

CradleCare Support Agreement The Peace of Mind Plan

CradleCare Support Agreement The Peace of Mind Plan CRADLEPOINT // CRADLEPOINT SUPPORT AGREEMENT CradleCare Support Agreement The Peace of Mind Plan From initial device deployment to long-term maintenance and repair, the CradleCare Support Agreement offers

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

How To Use Mindarray For Business

How To Use Mindarray For Business Minder Network Performance Monitoring Monitor everything about your Network performance Discover, visualize and monitor your complete IT Infrastructure in less than an hour. Mindarray s Minder is a powerful

More information

Secure Remote Support

Secure Remote Support Secure Remote Support - Monitor, Manage, Configure remote assets - Cloud Based Data Collection Tom Peshek Program Manager Remote Services and Support - 5058-CO900G Remote Monitoring and Diagnostics Value

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

Ebook Review - NOVA Time 4000 SaaS

Ebook Review - NOVA Time 4000 SaaS The Elite Workforce Management Solution For state-of-the-art technology, leading-edge interfaces, and world-class support, NOVAtime 4000 Software as a Service (SaaS) is the Elite Workforce Management solution.

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Get their best. Are you talking to me?

Get their best. Are you talking to me? Get their best. Are you talking to me? Get their best. WE CONNECT YOUR MACHINES Talk2M is a Web service designed to address the growing need for broadband and wireless access for remote maintenance, diagnostics

More information

Best Practices for Implementing Global IoT Initiatives Key Considerations for Launching a Connected Devices Service

Best Practices for Implementing Global IoT Initiatives Key Considerations for Launching a Connected Devices Service Best Practices for Implementing Global IoT Initiatives Key Considerations for Launching a Connected Devices Service White Paper Jasper Technologies, Inc. 02 For more information about becoming a service

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

PAR EverServ Services

PAR EverServ Services PAR EverServ Services Maximize your return on investment with PAR EverServ Services For more than 30 years, ParTech, Inc. (PAR) has been designing, integrating, and managing leading-edge technology systems

More information

White Paper. Quantum StorageCare Guardian

White Paper. Quantum StorageCare Guardian Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Cisco SR 520-T1 Secure Router

Cisco SR 520-T1 Secure Router Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

E-Guide. Sponsored By:

E-Guide. Sponsored By: Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are

More information

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary

More information

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Remote MasterMind for Mobility 2.5. Mobile Device Management Software Remote MasterMind for Mobility 2.5 Mobile Device Management Software Remote MasterMind for Mobility 2.5 You have mobility devices in locations all across the area, state, or country. They are constantly

More information

Unisys Internet Remote Support

Unisys Internet Remote Support white paper Unisys Internet Remote Support Systems & Technology, CMP-based Servers Introduction Remote Support is a method of connecting to remotely located systems for remote administration, real-time

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Secure Virtual Assist/ Access/Meeting

Secure Virtual Assist/ Access/Meeting Secure Virtual Assist/ Access/Meeting Easy-to-use tools for secure remote support, PC control and collaboration Technical support by phone, email, chat and pre-installed remote support clients can be cumbersome,

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know I White Paper ERP and the Cloud: What You Need to Know Table of Contents Executive Summary... 3 Increased Interest in Cloud-Based ERP and SaaS Implementations... 3 What is Cloud/SaaS ERP?... 3 Why Interest

More information

Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect

Measuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect Measuring end-to-end application performance in an on-demand world Shajeer Mohammed Enterprise Architect Agenda 1 Introduction to CA 2 Application Performance Management and its Need 3 How CA Solutions

More information

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief HP End User Management software Enables real-time visibility into application performance and availability Solution brief Figure 1 HP End User Management lets you proactively identify application performance

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE

BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE 1 1EDI Source: BEYOND THE INITIAL CONNECTION WHAT THE CHANGING B2B EXCHANGE ENVIRONMENT MEANS TO YOU. For anyone in charge of automating

More information

Der Weg, wie die Verantwortung getragen werden kann!

Der Weg, wie die Verantwortung getragen werden kann! Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Maestro Managed Services from Silicon allows organisations large and small to forget about internal IT systems management and support and instead

Maestro Managed Services from Silicon allows organisations large and small to forget about internal IT systems management and support and instead Maestro Managed from allows organisations large and small to forget about internal IT systems management and support and instead focus on key business activities. Reduce IT expenses and improve productivity

More information

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase

24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk. itg CloudBase 24/7 Monitoring Pro-Active Support High Availability Hardware & Software Helpdesk Onsite Support itg CloudBase Pro-Active managed it support services for one single cost per month covers all aspects of

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS A Unified View of Network Monitoring One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS Executive Summary In the past few years, the enterprise computing technology has changed

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Improving Business Service Uptime. Proactive network performance management solutions ensure optimal business service for the Dynamic Enterprise

Improving Business Service Uptime. Proactive network performance management solutions ensure optimal business service for the Dynamic Enterprise Improving Business Service Uptime Proactive network performance management solutions ensure optimal business service for the Dynamic Enterprise Introduction It s hard to overestimate the importance of

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information