Mobility in IT Operations GS Gruppen 29-05-2007. Optimizing Operations Automation –System i centric scheduling, monitoring, and notification –Security,

Slides:



Advertisements
Similar presentations
How We Manage SaaS Infrastructure Knowledge Track
Advertisements

Quality Management System (QMS) By Sky Software Co. LLC.
Enhanced XA Security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
1 Authority on Demand Flexible Access Control Solution.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Syslog for SIEM using iSecurity Real-Time Monitoring of IBM i Security Events.
Objectives Overview Define an operating system
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Monitoring Security With Standard SAP Tools Session Code 805 Sandi McKinney.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Thirteen Performing Network.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1 Audit Next Generation Monitoring, Compliance & QAUDJRN Reporting.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
A Guide to Getting Started
AMG Attendance System Product Description Copyright © 2009 AMG Employee Management, Inc.AMG Employee Management, Inc.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
PC Manager Meeting January 25, Today Updates –Next Meeting –Meeting Maker Upgrade –Windows Policy –Training –Licensing –Security –Tool Of The Month.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to Sharepoint.
Why Interchange?. What is Interchange? Interchange Capabilities: Offers complete replacement of CommBridge point-to-point solution with a hub and spoke.
MS Access Advanced Instructor: Vicki Weidler Assistant:
Ch 11 Managing System Reliability and Availability 1.
Classroom User Training June 29, 2005 Presented by:
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Robert Fourer, Jun Ma, Kipp Martin Copyright 2006 An Enterprise Computational System Built on the Optimization Services (OS) Framework and Standards Jun.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
TEAM Basic TotalElectrostatic ManagementAwareness&
Event Management & ITIL V3
1 Action Automated Security Breach Reporting and Corrections.
Computer Emergency Notification System (CENS)
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
Firewall End-to-End Network Access Protection for IBM i.
1 Authority on Demand Provide high authority “as-needed” with full Audit Trail.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
1 Command Control and Monitor CL Commands. 2 Command- The Need CL commands control nearly all IBM functionality Monitoring, controlling and logging CL.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Windows Small Business Server 2003 R2 Powering Small Businesses.
CONTRACT CONTROL. IPM Global – Why IPM Exists We believe Project Management Software should be easy to use. We believe Software should be flexible, and.
SOSY A/S Robot/REPORTS Optimering af iSeries Output GS Gruppen, 29. november 2001.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Storage ISM Management Pre-sales Product Training Materials Easy and Efficient WEU IT Solution Team.
DESKALERTS. INTERNAL COMMUNICATIONS | | DeskAlerts Enterprise Edition Features.
SQL Database Management
People Inc. from P&A Software
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Introduction to System Administration
Introduction to System Administration
Introduction to Operating System (OS)
Managing the IT Function
Printer Admin Print Job Manager
People Inc. from P&A Software
Chapter 2: Operating-System Structures
iSecurity AP Journal Training
Presentation transcript:

Mobility in IT Operations GS Gruppen

Optimizing Operations Automation –System i centric scheduling, monitoring, and notification –Security, disk usage, job accounting, and data management –Output management and distribution Software Development &Test –Change management and version control for software development –Test software for entire development process Data Replication –Multi-platform data transformation, integration, and distribution –Real-time System i mirroring Business Intelligence –Data access and analysis –Data extraction and reporting Productivity tools –Application optimization: Interactive and batch –Documentation –Database editing

SOSY’s Software Solutions Automation: The ROBOT Automated Operations Solution –Provided by Help/Systems, Inc. –SOSY’s largest business area Software Management –TBD –The TestBench Suite from The Original Software Company Data Replication – DataMirror Transformation Server and DataMirror iCluster Business Intelligence –SEQUEL from Help/Systems, Inc. Productivity Tools –GiAPA from iPerformance ApS –Abstract and EasyView from Help/Systems, Inc.

SOSY Facts and Figures Founded in licenses supported Users in 25 different countries IBM Business Partner First line support for all products in Copenhagen Centralized or decentralized support for users

SOSY Company Mission Your Partner in Optimizing Operations SOSY helps System i IT departments by providing counseling within operations regarding choice of software solutions and definition of implementation strategy Consulting covers entire process from pre-analysis through implementation, training, and follow up SOSY helps with IT compliance

Mobility in IT Operations What Is Possible Today? Notification via or SMS Browser interface ensures remote access

Mobility in IT Operations Which operational areas? Scheduling Monitoring of System i –Messages on message queues –Monitor critical resources –Monitor FTP, SECAUDLOG, QHST => Automate as many replies as possible Security monitoring Monitor disk space Centralize monitoring of multiple units Monitor attached Windows servers and clients

Robot/SCHEDULE Job Scheduler & Automatic Computer Operator Robot/CONSOLE Message, Resource, & Log Management Robot/AUTOTUNE Automatic Performance Monitoring & Tuning Robot/REPLAY Interactive Job Management Robot/UPS Support for Your UPS Hardware Robot/SPACE Disk Space Management Robot/CLIENT Client Operations Event Manager Robot/REPORTS Report Distribution, Archiving, & Viewing Robot/CPA Usage Reporting & Chargeback Robot/SAVE Automatic Backup & Recovery Robot/NETWORK Network Management Robot/ALERT SMS or Messages Robot/SECURITY User access, Exit Points, Profile exchange, Audits Robot/TRANSFORM OS/400 Spooled File and IFS File to PDF Transformation

Robot/SCHEDULE Job Scheduler & Automatic Computer Operator Robot/CONSOLE Message, Resource, & Log Management Robot/AUTOTUNE Automatic Performance Monitoring & Tuning Robot/REPLAY Interactive Job Management Robot/UPS Support for Your UPS Hardware Robot/SPACE Disk Space Management Robot/CLIENT Client Operations Event Manager Robot/REPORTS Report Distribution, Archiving, & Viewing Robot/CPA Usage Reporting & Chargeback Robot/SAVE Automatic Backup & Recovery Robot/NETWORK Network Management Robot/ALERT SMS or Messages Robot/SECURITY User access, Exit Points, Profile exchange, Audits Robot/TRANSFORM OS/400 Spooled File and IFS File to PDF Transformation

Robot/SCHEDULE Job Scheduler & Automatic Computer Operator Robot/CONSOLE Message, Resource, & Log Management Robot/AUTOTUNE Automatic Performance Monitoring & Tuning Robot/REPLAY Interactive Job Management Robot/UPS Support for Your UPS Hardware Robot/SPACE Disk Space Management Robot/CLIENT Client Operations Event Manager Robot/REPORTS Report Distribution, Archiving, & Viewing Robot/CPA Usage Reporting & Chargeback Robot/SAVE Automatic Backup & Recovery Robot/NETWORK Network Management Robot/ALERT SMS or Messages Robot/TRANSFORM OS/400 Spooled File and IFS File to PDF Transformation Robot/SECURITY User access, Exit Points, Profile exchange, Audits

Automation Not Just Monitoring! Enter Instruction Execute the Instruction Automation at the source!

Mobility in IT Operations  Robot products  Remote Notification via Robot/ALERT  Job scheduling and batch management with Robot/SCHEDULE  Message & Resource Management with Robot/CONSOLE  Monitor IP-devices with Robot/TRAPPER  Manage multiple System i with Robot/NETWORK  Security management with Robot/SECURITY  Monitor Windows PC’s with Robot/CLIENT

Robot/ALERT Notification You can send important messages –by –as SMS messages to your your GSM phone –to a whole list of people if many people should see the same message You can reply to messages remotely

2-way communication gives maximum flexibility Let Robot/ALERT send an SMS message to your GSM mobile phone or an Let the distribution depend on the time of the day The message can originate from: –Robot/CONSOLE’s message management –Error message from other Robot products, e.g. problems with a batch job controlled by Robot/SCHEDULE –Your own application Define recipients in Robot/ALERT Answer the message directly from your mobile phone ! Last important step for lights out operation! You will be notified when necessary.

Robot/SCHEDULE

Schedule Activity Monitor

View JSL Blueprint Option

Blueprint Documents Job Relationships

Import/Export Via XML To Other Systems

Forecast by Date Range

Job Monitor & Notification Possibilities

Mobility via a Browser Interface

Job Schedule List can be seen in a Browser Window

Good Morning Report can be seen in a Browser Window

The KEY to System i Message Management and Remote Control Robot/CONSOLE

Robot/CONSOLE Provides multiple OS/400 tools: –Resource monitoring –Log monitoring –Event notification –Message management –Message automation

Robot/CONSOLE Message automation –Answer, suppress, escalate messages –Turn important informational messages into response-required messages Provides historical database –Critical events –Everything from security to application errors

Automation at the Source MSGQ Robot/CONSOLE New Messages Responses Robot/ALERT Message Set Processing Resources Device, SBS, JOBQ QHST QAUDJRN FTP Robot/NETWORK

What Is A Message Center? Displays the important messages Can be part of a message queue Can represent many message queues Replaces having to look at a message queue

Graphical or green screen Provides notification and escalation Expert message centers Used by resource and log monitoring What Is A Message Center?

Message Sets The rules for how to handle a message Can simulate messages for testing Can hold and release message sets by command, or interactively Can group message IDs by job, by user, or by message file, using message groups

Message Sets Message tables let you assign common message IDs to a message set –Suppress –Answer with certain reply –Change all to specific color Message sets are optional

OPerator Assistance Language Developed in 1991 by Help/Systems Lets you write programming rules to manage messages Helps you handle many situations: –“File full” message –Record locks –Save-while-active –Disabled user profiles –Need to notify different application teams

Resource Monitoring Define one resource, or a group Expected status versus actual status Four priority levels History reports OPAL processing (optional) Supported by Robot/NETWORK

Add Resource – F6

Check Job Queue Depth

Check For Active Subsystem

Check for Active Job

Check for CPU used by Job

Security Audit Journal Monitoring Notification of system value changes Notification of user profile password violations Easier way to look at the audit journal Reports on security errors Message sets can manage and filter security errors, too!

Security Audit Journal Monitoring Setup

Security Audit Journal Monitoring

FTP Monitoring - Why? There’s no way to determine who is performing FTP transactions Only certain user profiles are authorized to use FTP Security auditors need the history of this type of activity Message sets are available for FTP events

FTP GET Function Is Now Response-Required

Robot/CONSOLE Reports Most Common Message Report Average Response Time FTP Activity Security Audit Reports Good Morning Report Summary of Critical Events at the Host Resource Exception Report

Robot/CONSOLE Summary … Robot/CONSOLE will monitor and automate your message queues Robot/CONSOLE will monitor your resources, security, FTP, and QHST Robot/CONSOLE will notify you if anything is wrong

Robot/TRAPPER  Monitor device and applications  Any network devices with IP address can be monitored  Four ping priorities available  Capture SNMP traps from devices  Requires Robot/Console

Capture SNMP traps and Ping Your Network with Robot/TRAPPER Two-Way GSM (Robot/ALERT )

Robot/NETWORK Interface Enables centralized management of Robot products – Message sets – Batch management – Disk space management Robot/ALERT on the host machine only

Display All Systems and Products At Once

Reply to Robot/CONSOLE Events

Web Browser Support

Status Center in Browser

Robot/SECURITY New addition to the Robot Automated Operations Solution

Product Overview Holds the key to protecting your system Exit Points Monitoring QAUDJRN Security Audits Profile Exchange Forensics Reporting Investigate

Exit Point Monitoring Highlights Different Modes –Log Only –No Logging –Lock all Server Access –All rules enforced—Normal –Learn what is being accessed User Lists and Individual Users are supported Object-level access can be controlled Set up schedules for access to servers

Security QAUDJRN Monitor Highlights Provides notification via , SMS, or a network for: –SV—System Value changes –PW—Password failures –CP—Profile changes –AF—Authorization failures

System Security Audit System i security configuration is complicated from initial setup to on-going maintenance Robot/SECURITY provides a comprehensive audit of the system security configuration The audit produces a report that compares current system security settings to best practices The audit report serves as documentation that can be used by an auditor It validates security for companies that need to pass a SOX or CobIT audit It pinpoints security vulnerabilities

Security Audit Highlights Comprehensive List of Security Audits Identifies potential security vulnerabilities Interrogates the following: –System Values –User Profiles –Object Authorities –Authorization Lists

Profile Exchange Customers often receive audit violations by providing too much authority to too many employees Auditors prefer that all object (*ALLOBJ) special authority be limited to just a few users Robot/SECURITY allows a user to request an exchange to a user profile with greater system access It minimizes the number of user profiles defined with strong special authorities You define if users can exchange to a higher authority: at any time, require real-time approval, or based on an access schedule Users can exchange to any user profile, not just profiles with *ALLOBJ authority

Forensic Utility Windows user interface for ease of use Interrogates several sources of information for job/user analysis –QAUDJRN—Very difficult to read without this tool –QSYSOPR –QHST –Robot product databases Displays detailed entries for date, time, user, and job selection

Robot/SPACE System i disk storage management made easy!

Robot/SPACE Overview Storage Audits Storage Collections Robot/CLIENT Collections Usage Trends Network Events Libraries IFS Files Objects Job and System Monitors

What does Robot/SPACE do? Monitors ASPs and iASPs Monitors Temporary Storage Collects disk space usage statistics for libraries and IFS objects Provides flexible reporting, graphing, comparing and trending of statistics Warns you when there is a problem Fixes problems automatically Helps you find problems quickly

Lists

Robot/CLIENT Integrates client and server management into the Robot Automated Operations Solution Automates Windows & UNIX clients or servers Monitors if PC’s are attached OK Monitors individual PC applications or services Upgrades/updates Windows programs OS/400 programs can initiate and control a task on your client or server with RCLEXEC Robot/CLIENT for Linux 2007

How Does Robot/CLIENT Work? System i centric approach Client software on selected PC’s Known Windows PC’s can be monitored, maintained Automation possible together with Robot/SCHEDULE and enterprise scheduling approach –PC maintenance jobs –PC monitoring –PC management

Conclusions on Mobility within IT Operations You decide which area(s) you want automate –Scheduling –Monitoring –Security –Disk space –System i control of Windows Solutions can be combined Mobility is ensured via –SMS – –Browser interfaces

Spørgsmål Chokolade