SlideShare una empresa de Scribd logo
1 de 11
IT Foundation Managementfor IT Operations An Effective and Efficient Systems Management Approach Your business is built on IT
IT Foundation Management Security Foundation Closing the Foundation Gap ,[object Object]
 Record the 5 Ws
 Complete forensic historyIT Operations Foundation Doing More with Less Universal, integrated environment• Optimized automated process •  Secure remote management• SECURITY IT OPERATIONS VIRTUALIZATION IT Foundation Management COMPLIANCE FOUNDATION IT SERVICES Compliance Foundation Meeting Intent & Interpretation ,[object Object]
 Detect compliance events
 Build auditable historyIT Services Foundation Delivering on Commitments Sense and Respond in real-time•  Correlate across the architecture•  Proactively manage and protect•                                           TDi Technologies                                                    Your business is built on IT
What is the IT Foundation? The IT Foundation includes all of your: Servers… Network Gear… SANS… Operating Systems… Blades… Networks… Databases… Appliances… Virtual Machines… Environment… And is supported by: Michael… VM Administrator I’m Joe… Solaris Systems Administrator Steve, I’m a SANS Administrator Cheryl, Oracle DBA… Hi. Raphael. Network Administration Dave, Independent Consultant Chris here… Tools Manager Hi I’m Tania, Linux Systems Administrator                                           TDi Technologies                                                    Your business is built on IT
IT Foundation Management Privileged Interfaces DELIVERS A COMMON:  Foundational System  Operations Approach  Security Model  Compliance Practice DRIVING:  Dramatic Simplification  Automation of Repetitive Actions  Common Practices  Continuous Improvement  Transparency  Reliability  Quality YIELDING:  Reduced Cost  Better Service  Greater Agility  Improved Governance  Reduced Risk  Command and Control Privileged Actors Michael… VM Administrator         I’m Joe… Solaris Systems Administrator Steve, I’m a SANS Administrator Cheryl, Oracle DBA… Hi. Raphael. Network Administration Dave, Independent Consultant Chris here… Tools Manager Hi I’m Tania, Linux Systems Administrator                                           TDi Technologies                                                    Your business is built on IT
Simplification, Oversight, and Management Transparency and Oversight Simplification Improved Maintenance Improved Maintenance Simplification Transparency and Oversight ,[object Object]
Encodes and automates common tasks
Provides universal operations methodology

Más contenido relacionado

La actualidad más candente

Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
CTI Group
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and isms
Septafiansyah P
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
Gabby Nizri
 

La actualidad más candente (20)

Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
DotComGuy MSP Presentation
DotComGuy MSP PresentationDotComGuy MSP Presentation
DotComGuy MSP Presentation
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
Compliance in Virtualized Environments
Compliance in Virtualized EnvironmentsCompliance in Virtualized Environments
Compliance in Virtualized Environments
 
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?What's New with Ivanti’s Enterprise Licensing Agreement?
What's New with Ivanti’s Enterprise Licensing Agreement?
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Integrating sms and isms
Integrating sms and ismsIntegrating sms and isms
Integrating sms and isms
 
DevOpsDays Chicago 2014 - Controlling Devops
DevOpsDays Chicago 2014 -  Controlling DevopsDevOpsDays Chicago 2014 -  Controlling Devops
DevOpsDays Chicago 2014 - Controlling Devops
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015
 
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
Data Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the FittestData Recovery Best Practices - Survival of the Fittest
Data Recovery Best Practices - Survival of the Fittest
 

Similar a TDi Technologies - IT Foundation Management (IT Operations)

WhatisInfrastructureOptimizationandWhydoICare.ppt
WhatisInfrastructureOptimizationandWhydoICare.pptWhatisInfrastructureOptimizationandWhydoICare.ppt
WhatisInfrastructureOptimizationandWhydoICare.ppt
iswarianagarajan
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Team
vblackwell
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
Gene Kim
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
Jeffery Walker
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
baselsss
 

Similar a TDi Technologies - IT Foundation Management (IT Operations) (20)

IT Managed Services
IT Managed ServicesIT Managed Services
IT Managed Services
 
WhatisInfrastructureOptimizationandWhydoICare.ppt
WhatisInfrastructureOptimizationandWhydoICare.pptWhatisInfrastructureOptimizationandWhydoICare.ppt
WhatisInfrastructureOptimizationandWhydoICare.ppt
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Team
 
Liberate Your IT Team
Liberate Your IT TeamLiberate Your IT Team
Liberate Your IT Team
 
2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a2011 09 19 LSPE Dev Ops Cookbook 1a
2011 09 19 LSPE Dev Ops Cookbook 1a
 
Merritt One Managed Services
Merritt One Managed ServicesMerritt One Managed Services
Merritt One Managed Services
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales MessagingPuppet Channel Sales Training Webinar: Puppet Sales Messaging
Puppet Channel Sales Training Webinar: Puppet Sales Messaging
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
2011 06 15 velocity conf from visible ops to dev ops final
2011 06 15 velocity conf   from visible ops to dev ops final2011 06 15 velocity conf   from visible ops to dev ops final
2011 06 15 velocity conf from visible ops to dev ops final
 
PPT for CEO.pptx
PPT for CEO.pptxPPT for CEO.pptx
PPT for CEO.pptx
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
Final Anintharan Cisco Ppt
Final Anintharan Cisco PptFinal Anintharan Cisco Ppt
Final Anintharan Cisco Ppt
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
Haloteq Presentation
Haloteq PresentationHaloteq Presentation
Haloteq Presentation
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
FH-Networking, LLC Services
FH-Networking, LLC ServicesFH-Networking, LLC Services
FH-Networking, LLC Services
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

TDi Technologies - IT Foundation Management (IT Operations)

  • 1. IT Foundation Managementfor IT Operations An Effective and Efficient Systems Management Approach Your business is built on IT
  • 2.
  • 4.
  • 6. Build auditable historyIT Services Foundation Delivering on Commitments Sense and Respond in real-time• Correlate across the architecture• Proactively manage and protect• TDi Technologies Your business is built on IT
  • 7. What is the IT Foundation? The IT Foundation includes all of your: Servers… Network Gear… SANS… Operating Systems… Blades… Networks… Databases… Appliances… Virtual Machines… Environment… And is supported by: Michael… VM Administrator I’m Joe… Solaris Systems Administrator Steve, I’m a SANS Administrator Cheryl, Oracle DBA… Hi. Raphael. Network Administration Dave, Independent Consultant Chris here… Tools Manager Hi I’m Tania, Linux Systems Administrator TDi Technologies Your business is built on IT
  • 8. IT Foundation Management Privileged Interfaces DELIVERS A COMMON: Foundational System Operations Approach Security Model Compliance Practice DRIVING: Dramatic Simplification Automation of Repetitive Actions Common Practices Continuous Improvement Transparency Reliability Quality YIELDING: Reduced Cost Better Service Greater Agility Improved Governance Reduced Risk Command and Control Privileged Actors Michael… VM Administrator I’m Joe… Solaris Systems Administrator Steve, I’m a SANS Administrator Cheryl, Oracle DBA… Hi. Raphael. Network Administration Dave, Independent Consultant Chris here… Tools Manager Hi I’m Tania, Linux Systems Administrator TDi Technologies Your business is built on IT
  • 9.
  • 10. Encodes and automates common tasks
  • 13. All Privileged User actions automatically recorded
  • 22. Improves efficiency TDi Technologies Your business is built on IT
  • 23. Simplification Example – Access Complexity With the Traditional Approach, Privileged Actors need to know… Log on? PuTTY? Absolute? Credentials? TeraTerm? ZOC? IP Address? SSH? CMDB? Commands? Tunnelier? WHERE? WHICH? WHAT? HOW? Terminal? Other DB? TELNET? etc? Other records? HTTP? Other? What syntax applies? With IT Foundation Management, Privileged Actors need to know… NAME
  • 24. Transparency and Oversight With IT Foundation Management… With the Traditional Approach… Access is enforced against Policy through IT Foundation Management All change records are available in real-time: recorded down to the key stroke Verification is simple and accurate: always We require access to be controlled We require changes to be documented I have records, but I do not have a means to verify them We are required to manually document changes Usually we do that immediately after making a change Sometimes things are very busy, and we have to document changes later on Sometimes changes just don’t get documented…. The system documents changes for us automatically: in real-time We don’t have to worry about documenting changes – we just concentrate on doing our jobs!
  • 25.
  • 28.
  • 33.
  • 36.
  • 37. IT Foundation Management… Traditional Approach… All Systems Standard Systems Critical Systems Remediate Faster – Fix More Root Causes Notification: 15 – 30 minutes Isolation: (with help) I figure it out Analysis: Rich context already there Remediation: Easy and Accurate Notification: 15 – 30 minutes Isolation: I have to figure that out Analysis: Time to hunt and dig… Remediation: Take my best shot Notification: Instant (milliseconds) Isolation: Automatic (by system) Analysis: Rich context already there Remediation: Easy and Accurate 30 30 30 15 15 15 45 45 45 0 60 0 60 0 60 MTTR MTTR MTTR TDi Technologies Your business is built on IT
  • 38. IT Operations Benefits Transparency Access policy enforced Change records auomatically captured Verification Maintenance One tool One method Powerful automation Comprehensive forensics Issue resolution directly supported Repetitive actions automated Mean Time to Repair Notification from minutes to milliseconds Isolation is automatic Analysis with rich context Remediation is easy and accurate Simplification Cost reduction (move repetitive work to system) Agility (common process, automation) Consistency (common process, unified method) TDi Technologies Your business is built on IT
  • 39. How to Engage TDi Technologies TDi Technologies Your business is built on IT