TSS Call Home: Electronic Service Agent

Similar documents
Electronic Service Agent TM. Network and Transmission Security And Information Privacy

System i and System p. Customer service, support, and troubleshooting

Information Technology Solutions. Managed IT Services

Connectivity Security White Paper. Electronic Service Agent for AIX and Virtual I/O Server (VIOS)

redcoal SMS for MS Outlook and Lotus Notes

Remote Services. Managing Open Systems with Remote Services

Common Remote Service Platform (crsp) Security Concept

Unisys Internet Remote Support

CareGiver Remote Support Information Technology FAQ

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

IBM. IBM Flex System Manager Service and Support Manager (Electronic Service Agent) IBM Systems. Version 1.3.2

Tk20 Network Infrastructure

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

ADM:49 DPS POLICY MANUAL Page 1 of 5

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM

IBM p5 590 and 595 DDR2 memory and miscellaneous features broaden your choices

IBM United States Hardware Announcement , dated September 11, 2013

Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Optus SMS for MS Outlook and Lotus Notes

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

CHIS, Inc. Privacy General Guidelines

EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N REV A03 October 5, 2010

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Agenda. How to configure

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Security Overview Introduction Application Firewall Compatibility

WhatsUp Gold v16.3 Installation and Configuration Guide

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Managed Service Plans

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Administration Catalog

IBM Cloud Manager with OpenStack

Information Technology Services

Remote Access Platform. Architecture and Security Overview

Xerox SMart esolutions. Security White Paper

POWER. Your Partners in Availability POWER

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Print Audit Facilities Manager Technical Overview

Print4 Solutions fully comply with all HIPAA regulations

Altus UC Security Overview

PrintFleet Enterprise 2.2 Security Overview

LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Cloud Services Catalog with Epsilon

DMZ Gateways: Secret Weapons for Data Security

Forward proxy server vs reverse proxy server

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Enterprise Broadband Customer Service Description

PrintFleet Enterprise Security Overview

DEPLOYMENT ROADMAP March 2015

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.

Improving the Customer Support Experience with NetApp Remote Support Agent

Security Policy Revision Date: 23 April 2009

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service

BOWMAN SYSTEMS SECURING CLIENT DATA

SECURELINK.COM REMOTE SUPPORT NETWORK

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Central Server Hosting Service Detail

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

SaaS Service Level Agreement (SLA)

HP Hardware Support Onsite 6-Hour Call-to-Repair Service HP Customer Support Contractual Service Package

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK

UBS KeyLink Quick reference WEB Installation Guide

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

Enable Connectivity for 3PAR Storage:

A Guide to New Features in Propalms OneGate 4.0

Protecting systems and patient privacy

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

How To Manage Your Information Systems At Aerosoft.Com

USB Ethernet Connectivity Kit

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

introducing The BlackBerry Collaboration Service

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

SysAidTM Product Description

CLOUD SERVICES FOR EMS

Cornerstones of Security

Accelerate with ATS DS8000 Hardware Management Console (HMC) Best practices and Remote Support Configuration September 23rd, 2014.

Windows Server 2003 default services

Retention & Destruction

Interwise Connect. Working with Reverse Proxy Version 7.x

Installing and Configuring vcenter Support Assistant

Enterprise Remote Support Network

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Mitel Performance Analytics

CRAY GOLD SUPPORT SUPPORT OPERATIONS HANDBOOK. GOLD-SOHB Page 1 of 22

GlobalSCAPE DMZ Gateway, v1. User Guide

IBM AIX MANAGED SERVICES:

IBM Tivoli Network Manager software

Hit Hanan & Faisal Faruqi Nexscience

Catapult PCI Compliance

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Providing Immediate ROI & Productivity Gains Cutting IT Support Costs and Increasing Operating Efficiency

IT Architecture Review. ISACA Conference Fall 2003

Brainloop Cloud Security

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

Transcription:

Technical Support Services Proactive support from a trusted provider you can rely on TSS Call Home: Electronic Service Agent 1

Hang up your phone and let your systems do the talking Benefits: System contacts IBM Support for you Immediately uploads error logs Faster diagnosis and time to repair Improved availability for your systems Customized maintenance information End to end, automated, closed loop support process Features: Automatic reporting for your IBM Systems Secure, encrypted transmission to IBM Support Inventory at your fingertips Enables IBM Electronic Services Built into the HMC, AIX, IBM i, VIOS and PureFlex FSM for easy activation Integrated into the IBM Director Service and Support Manager Stand-alone version supporting System x Servers Stand-alone version supporting clients running Linux on POWER For POWER customers running IBM i or AIX, enables Performance Management 2

Reports errors and system inventory Superior support and service Customers can view systems descriptions online Electronic Service Agent : secure tool resides on client systems and automatically reports problems to IBM Support. Also transmits system information to IBM upon installation and as the environment changes. Customer: Using the IBM ID entered during activation, clients can view and utilize system information on the IBM Support Portal at: support.ibm.com IBM Support Center: analyzes problem details and inventory information and creates an action plan. If an onsite service call is required, the engineer will arrive with the necessary parts to quickly resolve the issue. we would have a disk go bad on a Friday night. No one would have known it had happened except for the fact that Electronic Service Agent called out and we got a call back from IBM alerting us to the problem. That protection alone, the risk prevention factor, makes the product hugely valuable to us." Nick Gimben, Sr. Systems Admin, Fossil Inc. 3

Automated hardware problem reporting Secure outbound communication Client systems Customer accessible IBM Support IBM Engineering Electronic Support Portal Customized support tools at: support.ibm.com Client Service and Call Management System Faster, more accurate problem resolution Performance management Capacity Upgrade on Demand Product improvement Proactive recommendations 4

What s in it for me? High availability Secure, 24x7 proactive monitoring: downtime avoidance Less personnel time gathering information and reporting problems Accurate fixes Faster on-site response with parts, location, and problem information Automatic sending of system logs for problem determination and resolution Enables proactive tools My Notifications: customized, proactive recommendations Performance Management: manage system capacity My Systems: compare firmware levels across your datacenter 5

Ross Mauri General Manager IBM Power Systems We recently completed an analysis of ESA on POWER6 processor-based Power 595 systems. One finding was dramatic: clients who didn t activate ESA account for 70 percent of unexpected machine outages. 6

Proven Security No customer business data is transmitted to IBM Connectivity Methods Internet Proxy & authenticating firewall support VPN /Dial-up (IBM i only) Security Protocols https (SSL and TLS) 128 bit encryption uses keys, certificates and tokens Secure storage of System Information Secure database Behind 2 firewalls, accessible by you Password Protection Accessible only by authorized IBM Support Representatives ESA and Call Home follow the industry norms for protecting data during network transport by using the Transport Layer Security (TLS) protocol. It also protects Call Home / IBM Support accounts by generating unique passwords for these accounts. Call Home uses protected channels (e.g. TLS, VPN) to transfer data from the HMC to IBM Support. The channels provide confidentiality and integrity protection of the data sent between the two entities. Atsec Information Security Corp. Oct 2008 assessment 7

Security - What information is sent to IBM? Problem Description Error information What happened? Associated Error logs More information on what happened System Description Profile Where do we dispatch the part? Company Name Contact Information Hardware What part do we send? Machine Type, Model, Serial Number Drawer, Bay, Slot, Part Number Software What Program Temporary Fix do we send? Operating System, Applications Versions, PTF levels, Configuration parameters Information Transmission Storage Usage 8

Security - How is the information sent into IBM? Connectivity Methods Internet VPN / Dial-up (IBM i only) Firewall Support Proxy firewall Authenticating proxy firewall Layers of Security Protocols https (SSL and TLS) encryption Certificates and tokens Unique authentication key Proprietary transaction protocol into IBM Information Transmission Storage Usage 9

Security - Call Home Information Paths INTERNET VPN MODEM Information Transmission Storage Usage 10

Security - How is information stored at IBM? Stored in the most secure firewall zone within IBM Stored in a DB2 database Customer access via IBM ID/password IBM access via intranet ID/password All access is tracked and logged Certified by IBM Security Policy Information Transmission Storage Usage 11

Security - IBM Infrastructure Information Transmission Storage Usage 12

Security - How is information utilized? Support Center to solve problems Customers via customized web portal Account Advocates for customer reviews Systems Availability Leaders for account management Service and Support Representatives (SSR) for account management Product Development for product improvement Proactive Support tools for customers Information Transmission Storage Usage 13

14