CREATING CERTAINTY Intelligent router tool, designed to create certainty in your network. 1COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Page 1 Capability Business Benefit Business Risk KEYBA Capabilities: Benefits V Risks Facilitation of Decision making Getting the right people together.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Know the Difference™ Incident Investigation Solution Martin Perlin Marketing Director, Evolven A HIGH STAKES RACE AGAINST TIME Prevent high impact IT environment.
Task / Effort Tracking solution PRA-VI INFOSOLUTIONS.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Introduction to Network Analysis and Sniffer Pro
Implementing a Highly Available Network
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
Requirements Capture and Specification IACT424/924 Corporate Network Design and Implementation.
Copyright © 2007 Advantica Inc. (USA Only) and Advantica Ltd. (Outside USA). All rights reserved by the respective owner. Benefits of an Integrated Compliance.
Best Practices – Overview
Desigo CCTM Your milestone in building management
Maintaining and Updating Windows Server 2008
Problem Management Overview
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID CISCO NETWORK CONNECTIVITY Center Network Connectivity Monitor 1.1.
Performance Management (Best Practices) REF: Document ID
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Know the Difference™ Release Validation Solution Martin Perlin Marketing Director, Evolven RELEASE WITH CONFIDENCE Prevent production outages and ensure.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
Performance Management (Best Practices) REF: Document ID
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
ACL: Introduction & Tutorial
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 KTN106 – KTN Account Team / Partner Presentation_ v1.1.ppt KTN Preparation for Account.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Know the Difference™ Disaster Recovery Verification Solution Martin Perlin Marketing Director, Evolven THERE WHEN NEEDED MOST? Verify consistency and integrity.
© British Telecommunications plc BT Managed Services Innovate
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Topic 5 Solarwinds Profiler.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Network Management Presentation HP Openview Christopher Scott December 10, 2004.
Current Practice for Network Analysis in CSTNet Chunjing Han CSTNET, CNIC
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Event Management & ITIL V3
Performance Management (Best Practices) REF: Document ID
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
WS2012 File and Storage Services Management Name Jeff Alexander Technical Evangelist – Windows Infrastructure Microsoft Australia
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Manage Operations Lights Out Control. License our technology, an industrial strength, unifying, centralized access and power management standard to Vendors.
Network Management Workshop Apricot 2010 Kuala Lumpur Managing network configuration with RANCID.
Cluster Consistency Monitor. Why use a cluster consistency monitoring tool? A Cluster is by definition a setup of configurations to maintain the operation.
Network design Topic 6 Testing and documentation.
Martin Otterson Copyright c 2004 OSIsoft Inc. All rights reserved. WiredCity an OSIsoft Company Change the Business Paradigm.
Software Quality Assurance and Testing Fazal Rehman Shamil.
Unit 17: SDLC. Systems Development Life Cycle Five Major Phases Plus Documentation throughout Plus Evaluation…
Route Selection Using Policy Controls
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Performance Management (Best Practices) REF: Document ID
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Maintaining and Updating Windows Server 2008 Lesson 8.
Network Management Presentation HP Openview. OpenView Network Node Manager (NNM) Overview How it works Capabilities Technical and business benefits Summary.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Instructor Materials Chapter 8: Network Troubleshooting
Managing network configuration with RANCID
Microsoft Operations Management Suite Insight and Analytics
Challenges in Network Troubleshooting In big scale networks, when an issue like latency or packet drops occur its very hard sometimes to pinpoint.
Scrumium NetBrain Thursday, May 09, 2019.
Presentation transcript:

CREATING CERTAINTY Intelligent router tool, designed to create certainty in your network. 1COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED WHERE BLUE SKY THINKING STOPS, SERTUS TAKE OVER

CREATING CERTAINTY Sertus are a software vendor who specialise in developing pre and post network change tools for the IT environment. Sertus is a post-change assurance tool used to assist organisations with: - Pre and post network device configuration change verification. - Problem identification, isolation and historical review. Sertus evaluates the impact of pending configuration changes faster than any other tool and helps the network engineer mitigate service outage risks due to network change and device mis-configuration. It generates ‘pictures’ of network device status, analyses and compares state, executes change commands to single/multiple network devices. The Sertus tool is easy to integrate and simple to use within existing operational environments. Sertus can operate as standalone PC-based or local server based or integrated with existing management platforms such as Solarwinds, Ciscoworks, HP Openview and Tivoli. 2COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Who are/what is Sertus?

CREATING CERTAINTY If are any of these apply to you: Under pressure to reduce operational costs and improve change engineer productivity? Facing the challenge of managing growth in network change volumes within the current network change window and/or constrained operational budgets? Being requested to contribute to quicker time-to-market lead times re network change performance, to enable faster revenue turn-up and release of new products and services? Looking to improve network change quality and mitigate customer service outages related to network change activities? Struggling to verify the validity and accuracy of complex and/or large network config change files or duplicate changes to multiple devices? Under compliance scrutiny for risk and impact control of network changes and looking for a robust solution? Grappling with skill shortages and inefficient technical escalations?....then work smarter by using Sertus 3COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Why consider using Sertus?

CREATING CERTAINTY Improved Engineer efficiency: Up to 500% reduction in the time required to augment a network change, test it’s validity, detect errors and rectify. - Reducing network change activities from hours to minutes. Better protection and risk mitigation of Severity 1 customer outages and potential SLA penalty payments. - Service outages can impact annual revenues by up to 4% (source Aberdeen Group 2008) Greater throughput of scheduled network change events for a given change window period and fixed level of change engineer resource. Improved operational config visibility and incident understanding of ’before and after’ outage investigations. - Contributing to drastically reduced time to fix times and improvement of MTTR. Effective problem identification and resolution: Detailed Sertus test output files can easily be compressed and shared with internal escalation teams and/or external vendor TAC/CoE groups. 4COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Key business benefits from using the Sertus tool

CREATING CERTAINTY Sertus is an intelligent router/switch output comparison change tool. Traditional network change processes can take up to 8 hours per change: Sertus intelligent comparator and filtering reduces post change check times to around typically 20 minutes or less: Overall change now only takes 1 hour! 5COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does SERTUS 2.5 work - 1 Engineer runs commands on the router to capture router state Engineer captures all command outputs and stores them in a text file to compare against files after the change is completed Pre- Network Change (15mins) Engineer carries out network change At this stage, engineer may carry out checks to confirm that the changes they wanted to make have been applied successfully Network Change (20 mins.) The engineer now runs the same commands as the pre- change and stores the results Now the engineer makes an attempt to try and compare the pre and post files Post-Network Change (2~8 hours )

CREATING CERTAINTY Sertus can carry out comparisons between the outputs of different router vendors using the same common interface: Sertus Interpreter currently takes outputs for Cisco, Juniper and Open Source BSD/Zebra/Quagga. Other vendor command line interfaces can be developed on request. 6COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 2 Engineer uses Sertus Scripter to get the data from the network devices Retrieved data is parsed (Sertus Interpreter) and analysed (Sertus Comparer) Analysed data is presented to engineer

CREATING CERTAINTY 7COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 3 Command line set examples: Show ip xx Show ip bgp xx Show ip ospf xx Show Multicast xx Show Switch xx Show Open BSD xx Scripting commands Junos commands Filtering of gathered device output data, for example: Show all config changes Show only routes with next hop changes. Identify mission critical routes and flag only missing routes, post the change. etc

CREATING CERTAINTY 8COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 4 Sertus: Is non-intrusive to the network to access device information. Does not use SNMP or device traps to collect device config information. Uses normal device command line interface syntax to gather data and run scripts.

CREATING CERTAINTY 9COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Network Scenario and Sertus Demo Can be provided at a customer-site meeting

CREATING CERTAINTY 10COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED The End Questions? For more information visit