Tag Archives: management

ManageEngine launches cloud-based remote monitoring and management solution 

ManageEngine, the enterprise IT management division of Zoho Corporation, has launched Endpoint Central MSP Cloud, which it says brings the advantages of the cloud’s scalability, flexibility, and efficiency to the remote monitoring and management (RMM) of endpoints for managed service providers (MSPs). The launch also completes the first stage of the company’s vision for a… Read more »

The post ManageEngine launches cloud-based remote monitoring and management solution  appeared first on Cloud Computing News.

Six Steps for Choosing a Software Vendor for your Start-Up

You’ve decided to take the plunge. Your dream business is on its way to make it big and you’re scaling up rapidly. As a startup entrepreneur you’re conscious of your costs – bottom-line matters the most to you and outsourcing is the answer.

For your business, every decision that you take not only affects you immediately but can have rippling effects. It is important then that these decisions are taken after carefully considering the impact, yet you may not enjoy the luxury of time in this competitive business landscape.

As a budding business house, there are a few challenges that you will face – tight budgets, short turnaround times, robust software support, right skills and people resources, high focus on business development and competitive pricing norms. Most of these challenges will remain, but when it comes to choosing your software vendors, here are six steps that can ease your decision:

Understand your requirements
An in-depth analysis of how software is going to support your business is most critical. You not only need to understand your current requirements, but as a start-up your growth curve is exponential. You would need to have a sense of direction of where the business is headed and how your requirements will change. This will then be helpful for you to match your needs with the offerings of the vendors you screen.

Is the vendor flexible enough?
Sometimes you will have to choose between an extremely well-known name that provides you with a standard set of software offerings or an isv that is more willing to tweak systems as per your requirements. This will probably give you much more flexibility as you grow, enhance or modify your software requirements in a dynamic business environment.

How open are communication channels?
One of the biggest challenges you may face with vendors is the lack of open channels that can help cater to fast moving changes in your systems. Transparent communication channels, no language barriers and 24 by 7 customer support should be top of your list when selecting vendors.

Do they have the right people?
Do they have the right skills and people resources? Are they able to retain these people? Are their teams able to provide expert counsel to you in matters of software, emerging technologies and project management?

Confidentiality and security?
Does your software vendor provide you with a sense of peace when it comes to managing your data? Look at testimonials from other users and conduct a proper survey on how vendors manage their own security, confidentiality and look at legal agreements carefully before signing on.

Expansion capabilities and hidden costs?
Will the software vendor be able to support rapid expansion, do they have open architectures that facilitate growth and revisions? Look at all hidden costs clearly; articulate as much as is possible at the outset. But also do a professional ethics check to see that the vendor adheres to corporate norms when unwritten requirements crop up.

To know more about software vendors please click here.

The Operational Consistency Proxy

#devops #management #webperf Cloud makes more urgent the need to consistently manage infrastructure and its policies regardless of where that infrastructure might reside

f5friday

While the potential for operational policy (performance, security, reliability, access, etc..) diaspora is often mentioned in conjunction with cloud, it remains a very real issue within the traditional data center as well. Introducing cloud-deployed resources and applications only serves to exacerbate the problem.

F5 has long offered a single-pane of glass management solution for F5 systems with Enterprise Manager (EM) and recently introduced significant updates that increase its scope into the cloud and broaden its capabilities to simplify the increasingly complex operational tasks associated with managing security, performance, and reliability in a virtual world.

f5em2.0AUTOMATE COMMON TASKS

The latest release of F5 EM includes enhancements to its ability to automate common tasks such as configuring and managing SSL certificates, managing policies, and enabling/disabling resources which assists in automating provisioning and de-provisioning processes as well as automating what many might consider mundane – and yet critical – maintenance window operations.

Updating policies, too, assists in maintaining operational consistency across all F5 solutions – whether in the data center or in the cloud. This is particularly important in the realm of security, where control over access to applications is often far less under the control of IT than even the business would like. Combining F5’s cloud-enabled solutions such as F5 Application Security Manager (ASM) and Access Policy Manager (APM) with the ability for F5 EM to manage such distributed instances in conjunction with data center deployed instances provides for consistent enforcement of security and access policies for applications regardless of their deployment location. For F5 ASM specifically, this extends to Live Signature updates, which can be downloaded by F5 EM and distributed to managed instances of F5 ASM to ensure the most up-to-date security across enterprise concerns.

The combination of centralized management with automation also ensures rapid response to activities such as the publication of CERT advisories. Operators can quickly determine from the centralized inventory the impact of such a vulnerability and take action to redress the situation.

INTEGRATED PERFORMANCE METRICS real-time-app-perf-monitoring-cloud-dc

F5 EM also includes an option to provision a Centralized Analytics Module. This module builds on F5’s visibility into application performance based on its strategic location in the architecture – residing in front of the applications for which performance is a concern. Individual instances of F5 solutions can be directed to gather a plethora of application performance related statistics, which is then aggregated and reported on by application in EM’s Centralized Analytics Module.

These metrics enable capacity planning, troubleshooting and can be used in conjunction with broader business intelligence efforts to understand the performance of applications and its related impact whether those applications are in the cloud or in the data center. This global monitoring extends to F5 device health and performance, to ensure infrastructure services scale along with demand. 

Monitoring includes:

  • Device Level Visibility & Monitoring
  • Capacity Planning
  • Virtual Level & Pool Member Statistics
  • Object Level Visibility
  • Near Real-Time Graphics
  • Reporting

In addition to monitoring, F5 EM can collect actionable data upon which thresholds can be determined and alerts can be configured.

Alerts include:

  • Device status change
  • SSL certificate expiration
  • Software install complete
  • Software copy failure
  • Statistics data threshold
  • Configuration synchronization
  • Attack signature update
  • Clock skew

When thresholds are reached, triggers send an alert via email, SNMP trap or syslog event. More sophisticated alerting and inclusion in broader automated, operational systems can be achieved by taking advantage of F5’s control-plane API, iControl. F5 EM is further able to proxy iControl-based applications, eliminating the need to communicate directly with each BIG-IP deployed.

OPERATIONAL CONSISTENCY PROXY

By acting as a centralized management and operational console for BIG-IP devices, F5 EM effectively proxies operational consistency across the data center and into the cloud. Its ability to collect and aggregate metrics provides a comprehensive view of application and infrastructure performance across the breadth and depth of the application delivery chain, enabling more rapid response to incidents whether performance or security related.

F5 EM ensures consistency in both infrastructure configuration and operational policies, and actively participates in automation and orchestration efforts that can significantly decrease the pressure on operations when managing the critical application delivery network component of a highly distributed, cross-environment architecture.

Additional Resources:

Happy Managing!


Connect with Lori: Connect with F5:
o_linkedin[1] google  o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1] google

Related blogs & articles:


read more