A Technical Overview of VMT s Architecture: Virtual Infrastructure Management. Key Architecture Components



Similar documents
Can business executives expect a solid ROI from outsourcing the management of their IT infrastructure?

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Managed IT Solutions. More Reliable Networks Are Our Business

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

Vendor Audit Questionnaire

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management

Virtualized Security: The Next Generation of Consolidation

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

Proactive IT Solutions More Reliable Networks Are Our Business

Network Management and Monitoring Software

The Power Of Managed Services. Features

Remote Services. Managing Open Systems with Remote Services

Aventail Connect Client with Smart Tunneling

Unisys Internet Remote Support

CHOOSING A RACKSPACE HOSTING PLATFORM

Computer System Security Updates

Security appliances with integrated switch- Even more secure and more cost effective

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

How To Manage The Sas Metadata Server With Ibm Director Multiplatform

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Alcatel-Lucent Services

IBM PureFlex System. The infrastructure system with integrated expertise

Proactive Performance Management for Enterprise Databases

A Network Design Primer

Nine Considerations When Choosing a Managed Hosting Provider

Remote Vendor Monitoring

High Availability Solutions & Technology for NetScreen s Security Systems

Managed Security Services for Data

7i Imaging on Demand PACS Solution FAQ s

Call us today Managed IT Services. Proactive, flexible and affordable

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Customer Service Description Next Generation Network Firewall

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

Managed Security Services (MSS) based on Provisioned Security Services (PSS)

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Securing the Service Desk in the Cloud

SapphireIMS Business Service Monitoring Feature Specification

Secure, Scalable and Reliable Cloud Analytics from FusionOps

FIREWALL POLICY DOCUMENT

Information Technology Branch Access Control Technical Standard

Outgoing VDI Gateways:

Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts!

NVIRON SUPPORT SERVICES OVERVIEW

Sarasota Security Team Service Level Agreement (SLA)

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

Accelerating the Success of Healthcare Information Technology

Use of (Central) Load Balancers Code of Practice

SENIOR SYSTEMS ANALYST

Proactive. Professional. IT Support and Remote Network Monitoring.

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Enterprise Remote Monitoring

Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0)

TNT SOFTWARE White Paper Series

Private Cloud. One solution managed by Applied

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

Virtualization Essentials

100% Software that means business

MSP Service Matrix. Servers

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Information Services. Standing Service Level Agreement (SLA) Firewall and VPN Services

Client Study Portfolio

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Did you know your security solution can help with PCI compliance too?

SapphireIMS 4.0 BSM Feature Specification

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

How To Use Mindarray For Business

IBM AIX MANAGED SERVICES:

Managed Service Plans

ACI ON DEMAND DELIVERS PEACE OF MIND

NETGEAR ReadyNAS & Acronis Replicating an Acronis Vault between ReadyNAS Appliances

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

BMC s Security Strategy for ITSM in the SaaS Environment

Application Visibility and Monitoring >

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Outsourcing. w os WORKPLACE. it os IT SERVICE MANAGEMENT SERVICES BPO OUTSOURCING. ITO dos DATACENTER OPERATION SERVICES.

Networking Systems (10102)

Firewall and Router Policy

Mobile Admin Architecture

8. Firewall Design & Implementation

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Evaluating Internal and Outsourced Models for Network Monitoring

Transcription:

White Paper: Virtual Monitoring and Assessment A Technical Overview of VMT s Architecture: Virtual Infrastructure Management Virtual Infrastructure Management (VIM) is the technical architecture pioneered by VMT to address the IT operations needs of small and midsize businesses. The goal of VIM is to actively monitor a company s IT infrastructure to detect not only system failures, but detect problems before they occur. The objective is simple maximize uptime and information system integrity so the business can run smoothly. VIM is a layered architecture allowing 24/7 monitoring and assessment of the IT infrastructure components. Each layer of the architecture performs a critical function. The purpose of this white paper is to examine each part of the VIM architecture to explain its function and contribution to delivering maximum uptime performance. Key Architecture Components VMT s unique architecture is made up of two key components: the VIM Monitoring and the VIM Infrastructure Assessment. These two key components provide virtual checks and balances for a client s IT infrastructure. A company s IT infrastructure is comprised of many components including servers, operating systems, network software and hardware, and security systems that are complicated products. Most often, they come from different vendors. They are difficult to configure and difficult to maintain. The fact is that because of the myriad of variables that can impact an information system day-in-and-day-out, they are prone to break. When they break, your entire information system is impacted. And when your information system is impacted, so is your business. For any given IT infrastructure system, there are hundreds-to-thousands of checkpoints that need to be checked at various times. These checkpoints determine the general health of the system and warn administrators of any deviations from pre-established norms. It is still, however, more of an art than a science to monitor these activities and access their impact on the entire system. For example, an alert may indicate a problem in one part of the system. This particular problem has the potential to impact other parts of the overall information system in somewhat of a domino effect. As a result, system uptime and integrity could be damaged. Diagnosing and fixing these intricate problems require highly experienced technicians trained to know all aspects of the IT infrastructure. The VIM architecture is designed to anticipate and address the intricacies of IT infrastructure hardware and software. Let s look at each of the two major components of the VIM architecture.

VIM Monitoring The VIM Monitoring provides a virtual window between VMT and the client site(s). On regular intervals, the VIM Monitoring poles multiple components of the client s IT infrastructure to determine its status. This system is capable of using a variety of communications links including the Internet and standard telecommunications methods. VIM Monitoring VIM Infrastructure Assessment Securit y Network Email Web Hardware Key architectural components of the Virtual Infrastructure Management architecture are the Monitoring and Assessment. These components have a virtual, panoramic view of all activities within your IT infrastructure. The goal of the VIM Monitoring is to detect system failures when (or before) they happen. It is better to detect problems before they become critical. While one appliance, or component, on the integrated network may be impacted, you do not want the entire system to be impacted. In today s world, computer system uptime means business is being conducted. Downtime means business is not. VIM Monitoring Functions: Baseline all devices Define normal operating thresholds for performance and security Configure event management system Ping (contact) each infrastructure component at pre-set intervals Monitor performance thresholds for acceptable values Monitor system integrity for acceptable values Monitor system security for acceptable values If exceptions exists, send alert Alert system emails VMT technician 2

The VIM Monitoring uses a variety of industry standard techniques to monitor and manage an IT infrastructure. Among the more common are: VIM Event Management Event Management is a highly proactive process that monitors ongoing activity of different network components, computer hardware systems and applications that comprise the infrastructure. Depending on how these components are configured, VIM event management tools continuously review event logs of the various devices on the network. The VMT tools are designed therefore to proactively look for problems. They check pre-set parameters for values outside the norm, or what has been defined as acceptable values. Hardware diagnostic systems run pre-defined tests to determine correct operational standards. health checking tools monitor and report values to determine whether intervention is needed. Both the hardware and health checking tools run automatically (once configured) and can, if instructed, make immediate adjustments to bring systems into compliance with pre-set standards. VMT operational and support staff use a Remote Control Console to view all activity on a client s network. Using VIM event management procedures, technicians can identify and route problems to specialists in a given operational discipline. VIM Exception-Based Management Exception based management is another technique used by VMT to provide timely identification, classification and notification of operational or application software issues. It is a proactive technique used to pinpoint critical problems that may impact the stability of an overall system, versus an expected spike in operations at given times of the day or during month end closing periods. VIM Security Control VMT works with all clients to establish a security policy. The procedures of these policies are updated frequently in response to business requirements. The VIM architecture uses sophisticated firewalls to protect the client infrastructure environment. A perimeter firewall and switch create a demilitarized zone (DMZ). This zone provides greater protection for the business by controlling traffic that comes from the Internet and between the various servers on a client s network. The internal firewall inspects traffic between the servers in the DMZ, the infrastructure and the back-end systems. A VPN firewall manages all remote access to the central systems, including specialized Internet applications. A fully redundant firewall solution can be implemented to ensure high availability particularly important for businesses that have a high dependency on their web site. VIM Infrastructure Assessment The VIM Infrastructure Assessment is made up of a variety of infrastructure diagnostic tools that help VMT technicians diagnose and fix system problems. The Infrastructure Assessment comprises standard tools provided by hardware and software vendors to maintain and tune their systems, as well as custom proprietary tools developed by VMT. The VIM Infrastructure Assessment includes tools for network management, server management, security management, desktop management, enterprise messaging, as well as for web site performance. 3

VIM Infrastructure Assessment : Configure vendor system management tools Assess location of exception (i.e. within operating system, database or applications) Diagnose and classify problem Estimate impact on overall system Fix problem (contact vendor/supplier if required) Return system to normal operation Adjust/re-set thresholds if required The VIM Infrastructure Assessment represents a complex matrix of tools that enable VMT technicians to balance the requirements of an entire IT infrastructure system. These tools enable the technicians to see exactly where problems occur and assess the surrounding interdependencies. One of the biggest challenges in system management is determining the exact location of a problem. Oftentimes, the true problem is hidden under layers of interlaced software components. The VIM Infrastructure Assessment is designed to find the problems/exceptions quickly and return the infrastructure to normal operation. Client s IT Operations Security Network Email Web Hardware VIM Monitoring VMT Operations VIM Infrastructure Assessment Security Network Emai l Web Hardwar e VMT monitoring and assessment capabilities monitor thousands of control points on all aspects of a client s IT infrastructure. 4

Conclusion The Virtual Infrastructure Management architecture has been engineered using the most advanced technology tools available combined with custom tools built by VMT. These tools have been tailored to meet the needs of small and midsize businesses. Our clients gain the power and flexibility of infrastructure management systems traditionally used only by the largest enterprises. VIM is flexible to meet the needs of many business models. Whether your business is accounting, manufacturing, engineering, architecture or a services industry, VIM can easily handle your infrastructure requirements. The VIM architecture enables the various components of VMT s V-NET Service Levels to be made available at an affordable price for small and midsize companies. About Virtual Management Technologies Founded in 2002, Virtual Management Technologies provides managed connectivity exclusively for small to midsize businesses that want to outsource their IT infrastructure. The company s V-NET service provides a stable, predictable and cost effective IT infrastructure environment for its clients. VMT is staffed by experienced IT infrastructure specialists with extensive knowledge of the complexities of managing large corporate information systems. This seasoned technical team has managed some of the most complex network, security and system monitoring challenges found in the IT world. They are ready now to share this experience with small and midsize companies. VMT provides infrastructure support for your Server Management, Enterprise Messaging, Disaster Recovery, Network Management, Security, Desktop Management and Citrix Server Support. VMT can be reached at 770-521-9153 or check the web site at www.vmtech.net. V-NET, Virtual Infrastructure Management (VIM), VIM Monitoring and VIM Infrastructure Assessment are registered marks of Virtual Management Technologies, Inc. Citrix is a registered trademark of Citrix s, Inc. Copyright 2006 Virtual Management Technologies, Inc. 5