SlideShare una empresa de Scribd logo
1 de 16
September 2011

                 1
What We Do

•Minicom has 20+ years of technology innovation.
•HQ in Jerusalem, Israel, with offices in Europe, Asia & USA
•NA HQ Linden, NJ

Today, Minicom focuses on
•Remote Access Management (RAM) solutions
•High-end IP & analog KVM




                                                               2
Value Proposition

•   Centralization of out-of-band & in-band remote access
•   Management of access in heterogeneous IT environments
•   Increase of control & security
•   Maintenance of airflow management
•   Reduction of mistakes by remote admins
•   Decrease of MTTR
•   Maximization of existing IT investments




                                                            3
Remote Access

    The ability to log onto a network
    from a distant location.
    Generally, this implies a computer, an
    Internet connection, and some
    remote access software or hardware
    to connect to the network. The
    remote access software or hardware
    dials in directly to the network server
    and enables the user to take control
    of the remote server or device
    (i.e., home, desk, etc.)



                                              4
Why Remote Access to the Data Center?



•Increase Operational Efficiency

•Power/Cooling Efficiency

•Security




                                          5
RAM: Critical Piece of the DCIM Pie

                                      • DCIM – Data Center Infrastructure
                                          Management
                      Remote
                      Access          • Without a Remote Access Management
        Power
      Management
                    Management            strategy in place DCIM is not complete

                                      •All the other pieces are compromised if
   Asset                   Airflow          you can’t manage access.
Management               Management

                                      • Minicom is the only vendor to
                                       offer a management solution that:
       Capacity      Change
      Management   Management
                                           increases security & efficiency
                                           Extends ROI
                                           Prevents vendor lock-in
 Data Center Infrastructure
      Management Pie
                                                                                   6
Components of                                                              Remote Access
                                           WOL      ILO
                                Web
                                Target                    IPMI
                            RDP SSO
                                                                 DRAC
        SSH                                         Service
                      VNC                                             HP
                                                  Processors
       In     Telnet                                                       Black
                                                                           Box
      Band                                                     3rd Party
                                Access        Power              PDU
                                              Control                        Eaton
             SSH                Services
                                                                             Server
                                                                             Tech
         VMware
                                             16
                                              `                               APC
         Environmental                 KVM
                                                                              New
                                   Serial &   KVM
             Custom                    Serial
                                  Control                             PoC          OOB
                                            Access

               Digi          Console                       IP KVM
              Avocent        Servers             IP
                                              Gateway
                        HP
                            BelkinOpen            Analogue
                                  Gear New        KVM Switch

                                                                                           7
Remote Access Challenges


•Adopted organically
    •As needed, without clear strategy

•New security concerns
    •Spreadsheets, post its, “in my head”

•Inefficient use of tools
    •Reduce calls, emails, copy/paste




                                            8
Benefits RAM

                                 Reduce downtime and
                                  optimize IT service
                                      availability


                                                         Give 24/7 access to
             Increase Security
                                                        entire IT infrastructure




                                                                    Allow centralized access
Increase operational                   Enhance                       to servers/devices not
     efficiency                      productivity                     physically connected




                                                                                               9
RAM’s Role in DC Problem Solving

                  DC Management
                                  Remote
      Capacity       Asset                      Power        Change
                                  Access
     Management    Management                 Management   Management
                                Management




 Problem                                                       Disaster
Resolution                      Application                    Recovery

                                  Minicom
                                    On-
                                  Demand
                                  Access



         Facilities                                IT
                  DC Infrastructure                                       10
AccessIT™
                 Revolutionizing Remote Access

AccessIT™ is a secure web based
management system for single
sign-on access to the
organization’s servers, power and
network devices. AccessIT™ is an
open, vendor neutral system. It
consolidates all in-band and out-
of-band access protocols and
services onto one interface thus
providing IT staff with real time
remote control of the entire IT
infrastructure.                     Single Sign-On Control of:

                                    Servers
                                    Virtual machines
                                    Service Processors
                                    PDUs
                                    Serial console servers
                                    KVM switches
                                    Network devices             11
AccessIT™ - Highlights
   Increase operational efficiency                            Increase security
                                                                   One IP address, username, password
       One web access portal to all IT users

                                                               Maximize ROI on IT investments
   Shorten resolution time and down time                          Multi-vendor
       Faster access and control when it counts the most
                                                                   Upgrade not replace
       Integrates Access and Power Control
                                                                   Avoid vendor lock-in
       In-band & out-of-band access




                                                                                                         12
KVM Product Current Portfolio - Overview

    IP and Analog
    CAT5 Switches
For Rack Management



      Multiuser
    IP and Analog
    CAT5 Switches
For Rack Management



     1U Drawer
  with IP or Analog
    CAT5 Switch



  KVM IP Gateways

KVM Cat5 Extenders

                                                           13
Daimler Trucking Case Study

• Small staff responsible for all North American Data Centers.
•Primary DC, DR DC with hundreds of nodes

•Constantly wasting time getting to problems

•AccessIT reduced MTTR by 25%

•OpEx kept in check




                                                                 14
They already chose…
Minicom serves some of the largest rack environments in the world and our solutions are daily used
                                 to manage millions of servers.




                                                                                               15
Thank you for your time




Remote Access. Simply Managed™   16

Más contenido relacionado

La actualidad más candente

FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexera
 
Pb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiPb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiBridget Deets
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services managementLilian Schaffer
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview Lilian Schaffer
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedThe Linux Foundation
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...IBM India Smarter Computing
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSoftchoice Corporation
 
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Banking at Ho Chi Minh city
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionBob Rhubart
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Jan Jackman Cloud as a Platform for Business Innovation and Growth
Jan Jackman   Cloud as a Platform for Business Innovation and GrowthJan Jackman   Cloud as a Platform for Business Innovation and Growth
Jan Jackman Cloud as a Platform for Business Innovation and GrowthMauricio Godoy
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011chaucheckpoint
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success storyMartin Rutkowski
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guidenajeeb625
 
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...We4IT Group
 

La actualidad más candente (20)

FlexNet Delivery Datasheet
FlexNet Delivery DatasheetFlexNet Delivery Datasheet
FlexNet Delivery Datasheet
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Pb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiPb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 Fyi
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embedded
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...
Comprehensive, converged integration platform: IBM Starter Kit for Cloud x86 ...
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing Update
 
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented Abstraction
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Jan Jackman Cloud as a Platform for Business Innovation and Growth
Jan Jackman   Cloud as a Platform for Business Innovation and GrowthJan Jackman   Cloud as a Platform for Business Innovation and Growth
Jan Jackman Cloud as a Platform for Business Innovation and Growth
 
Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011Check Point75 Makes3 D Security A Reality Q22011
Check Point75 Makes3 D Security A Reality Q22011
 
Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211Nx9500 spec-sheet-1211
Nx9500 spec-sheet-1211
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success story
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
 
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...
We4IT LCTY 2013 - Infra-Man - Deep Dive into IBM Sametime - Advanced Video Te...
 

Destacado

A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgEric Vanderburg
 
Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)Henry Van Styn
 
QSITE 2013 Conference RALfie project
QSITE 2013 Conference  RALfie projectQSITE 2013 Conference  RALfie project
QSITE 2013 Conference RALfie projectLindy (McKeown) Orwin
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resourcesmamboxena
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Securitysyrinxtech
 
ABB Future of mining; automating mining processes by Llewellyn Best
ABB Future of mining; automating mining processes by Llewellyn BestABB Future of mining; automating mining processes by Llewellyn Best
ABB Future of mining; automating mining processes by Llewellyn BestKeren Meers
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Digital Bond
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWSAmazon Web Services
 
Remote Access
Remote AccessRemote Access
Remote Accesszaisahil
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 

Destacado (11)

A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)Understanding remote access technologies (Nov 16, 2011) (beginner)
Understanding remote access technologies (Nov 16, 2011) (beginner)
 
Tally.net remote access_and_sms
Tally.net remote access_and_smsTally.net remote access_and_sms
Tally.net remote access_and_sms
 
QSITE 2013 Conference RALfie project
QSITE 2013 Conference  RALfie projectQSITE 2013 Conference  RALfie project
QSITE 2013 Conference RALfie project
 
Remote access to electronic resources
Remote access to electronic resourcesRemote access to electronic resources
Remote access to electronic resources
 
Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
ABB Future of mining; automating mining processes by Llewellyn Best
ABB Future of mining; automating mining processes by Llewellyn BestABB Future of mining; automating mining processes by Llewellyn Best
ABB Future of mining; automating mining processes by Llewellyn Best
 
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
 
(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS(NET405) Build a Remote Access VPN Solution on AWS
(NET405) Build a Remote Access VPN Solution on AWS
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Remote access service
Remote access serviceRemote access service
Remote access service
 

Similar a Remote Access Management

Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center networkInterop
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introductionelisasson
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introductionelisasson
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCentergrudolphi
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...elisasson
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudnooralmousa
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automationsubtitle
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerAdvanced Logic Industries
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft Private Cloud
 

Similar a Remote Access Management (20)

Managing change in the data center network
Managing change in the data center networkManaging change in the data center network
Managing change in the data center network
 
Minicom's KVM Catalogue 2011
Minicom's KVM Catalogue 2011Minicom's KVM Catalogue 2011
Minicom's KVM Catalogue 2011
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introduction
 
Minicom introduction
Minicom introductionMinicom introduction
Minicom introduction
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
TenduitRIMCenter
TenduitRIMCenterTenduitRIMCenter
TenduitRIMCenter
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
Hisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloudHisham Dalle - Zero client computing - taking the desktop into the cloud
Hisham Dalle - Zero client computing - taking the desktop into the cloud
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
The Guardian
The GuardianThe Guardian
The Guardian
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Electric Cloud
Electric CloudElectric Cloud
Electric Cloud
 
V mware view
V mware viewV mware view
V mware view
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automation
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Systems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManagerSystems Resource Management with NetIQ AppManager
Systems Resource Management with NetIQ AppManager
 
Advanced Platform
Advanced PlatformAdvanced Platform
Advanced Platform
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 

Remote Access Management

  • 2. What We Do •Minicom has 20+ years of technology innovation. •HQ in Jerusalem, Israel, with offices in Europe, Asia & USA •NA HQ Linden, NJ Today, Minicom focuses on •Remote Access Management (RAM) solutions •High-end IP & analog KVM 2
  • 3. Value Proposition • Centralization of out-of-band & in-band remote access • Management of access in heterogeneous IT environments • Increase of control & security • Maintenance of airflow management • Reduction of mistakes by remote admins • Decrease of MTTR • Maximization of existing IT investments 3
  • 4. Remote Access The ability to log onto a network from a distant location. Generally, this implies a computer, an Internet connection, and some remote access software or hardware to connect to the network. The remote access software or hardware dials in directly to the network server and enables the user to take control of the remote server or device (i.e., home, desk, etc.) 4
  • 5. Why Remote Access to the Data Center? •Increase Operational Efficiency •Power/Cooling Efficiency •Security 5
  • 6. RAM: Critical Piece of the DCIM Pie • DCIM – Data Center Infrastructure Management Remote Access • Without a Remote Access Management Power Management Management strategy in place DCIM is not complete •All the other pieces are compromised if Asset Airflow you can’t manage access. Management Management • Minicom is the only vendor to offer a management solution that: Capacity Change Management Management  increases security & efficiency  Extends ROI  Prevents vendor lock-in Data Center Infrastructure Management Pie 6
  • 7. Components of Remote Access WOL ILO Web Target IPMI RDP SSO DRAC SSH Service VNC HP Processors In Telnet Black Box Band 3rd Party Access Power PDU Control Eaton SSH Services Server Tech VMware 16 ` APC Environmental KVM New Serial & KVM Custom Serial Control PoC OOB Access Digi Console IP KVM Avocent Servers IP Gateway HP BelkinOpen Analogue Gear New KVM Switch 7
  • 8. Remote Access Challenges •Adopted organically •As needed, without clear strategy •New security concerns •Spreadsheets, post its, “in my head” •Inefficient use of tools •Reduce calls, emails, copy/paste 8
  • 9. Benefits RAM Reduce downtime and optimize IT service availability Give 24/7 access to Increase Security entire IT infrastructure Allow centralized access Increase operational Enhance to servers/devices not efficiency productivity physically connected 9
  • 10. RAM’s Role in DC Problem Solving DC Management Remote Capacity Asset Power Change Access Management Management Management Management Management Problem Disaster Resolution Application Recovery Minicom On- Demand Access Facilities IT DC Infrastructure 10
  • 11. AccessIT™ Revolutionizing Remote Access AccessIT™ is a secure web based management system for single sign-on access to the organization’s servers, power and network devices. AccessIT™ is an open, vendor neutral system. It consolidates all in-band and out- of-band access protocols and services onto one interface thus providing IT staff with real time remote control of the entire IT infrastructure. Single Sign-On Control of: Servers Virtual machines Service Processors PDUs Serial console servers KVM switches Network devices 11
  • 12. AccessIT™ - Highlights  Increase operational efficiency  Increase security  One IP address, username, password  One web access portal to all IT users  Maximize ROI on IT investments  Shorten resolution time and down time  Multi-vendor  Faster access and control when it counts the most  Upgrade not replace  Integrates Access and Power Control  Avoid vendor lock-in  In-band & out-of-band access 12
  • 13. KVM Product Current Portfolio - Overview IP and Analog CAT5 Switches For Rack Management Multiuser IP and Analog CAT5 Switches For Rack Management 1U Drawer with IP or Analog CAT5 Switch KVM IP Gateways KVM Cat5 Extenders 13
  • 14. Daimler Trucking Case Study • Small staff responsible for all North American Data Centers. •Primary DC, DR DC with hundreds of nodes •Constantly wasting time getting to problems •AccessIT reduced MTTR by 25% •OpEx kept in check 14
  • 15. They already chose… Minicom serves some of the largest rack environments in the world and our solutions are daily used to manage millions of servers. 15
  • 16. Thank you for your time Remote Access. Simply Managed™ 16

Notas del editor

  1. Minicom offers local & remote control and access management solutions for the rack environment in the data center.Designed to increase operational efficiency, Minicom’s solutions provide IT managers with the speed, simplicity and security required for maximum up timeOur customers choose us because our solutions:Our RAM platform provides centralized out-of-band & in-band remote accessManage access in multi-vendor heterogeneous IT environmentsIncrease control and securityMaintain airflow management implementationsReduce mistakes by remote adminsDecrease resolution timeMaximize existing IT investments
  2. Minicom offers local & remote control and access management solutions for the rack environment in the data center.Designed to increase operational efficiency, Minicom’s solutions provide IT managers with the speed, simplicity and security required for maximum up timeOur customers choose us because our solutions:Our RAM platform provides centralized out-of-band & in-band remote accessManage access in multi-vendor heterogeneous IT environmentsIncrease control and securityMaintain airflow management implementationsReduce mistakes by remote adminsDecrease resolution timeMaximize existing IT investments
  3. Power management—I am spending a ton of $$ to send power to the rack, row how do I optimize? How much do have free?Asset management—what is the equipment that you have deployed?Capacity management- do you have the physical room in the rack for the new servers? Do you have the power capacity? Weight?Change Management—tracking where people move equipment around so you know where your assets are….Airflow management—is the environment optimized from a moisture or temp isn’t putting assets at risk
  4. Facility and IT people are both working in the white space---Traditionally, facilities role has been to make sure there is power and no leaks, while IT makes sure the servers were working and the appsBoth were working in virtually in silosIn the past IT would request 18 KW of power for new servers and facilities would do its best to deliver. But now pwr management tools allow facilities to know what the servers are running @ 25% capacityTo optimize your enterprise, you want facilities and IT speaking together under DC management--have 5 blocks under DC Management—Network mgmnt, server mgmnt, etcWithin RAM—1. discovery-I know it is out there, 2. I have tools that monitor how it is working, the environment, its power application, 3. get alerts of an issue. 4. HOW DO U GET IN TO ADDRESS THE ISSUE? RAM ALLOWS FOR QUICK, SECURE, SEAMLESS ACCESS—DON’T NEED THE IP, PW, UN FOR EVERY SERVER/DEVICE. (INCREASE EFFCICENCY, MORE SECURE) 5. once in, resolve & 5. analyze/optimize—We bridge the alert and resolution