Community degli Architetti
Roma, 11 novembre 2010
Hotel Capo d’Africa
Smart Appliances
SALVATORE SERRA - Software IT Architect
[email protected]
© 2009 IBM Corporation
Agenda
Introduzione
• Cosa sono le “appliance”
• Benefici
• Tipologia
• Caratteristiche
2
© 2010 IBM Corporation
Wikipedia
Appliance may refer to a device with a narrow function
Computer / Hardware appliance, a computing device with a specific
function and limited configuration ability
Software appliance, software application combined with just enough operating system
(JeOS), a software appliance can be packaged in a virtual machine format as a virtual
appliance, allowing it to be run within a virtual machine container.
In computing, hardware acceleration is the use of hardware to perform some function
faster than is possible in software running on the general purpose CPU. Examples of
hardware acceleration include blitting acceleration functionality in graphics processing units
(GPUs) and instructions for complex operations in CPUs.
Ad es.
1. Storage Computing Appliances provide massive amounts of storage and additional higher
level functionality (ex: Disk mirroring and Data striping) for multiple attached systems using
the transparent local Storage area networks paradigm.
2. Java Computing Appliances transparently rehost Java applications, using techniques like
pauseless Garbage Collection and Optimistic Thread Concurrency to provide massive
amounts of usable memory and CPUs.
3. Network Computing (Internet) Appliances are general purpose routers which provide
firewall protection, Transport Layer Security, messaging, access to specialized networking
protocols (like the ebXML Message Service) and bandwidth multiplexing for the multiple
3
systems they front-end.
© 2010 IBM Corporation
Le appliance più diffuse
4
© 2010 IBM Corporation
Agenda
Introduzione
• Cosa sono le “appliance”
• Benefici
• Tipologia
• Caratteristiche
5
© 2010 IBM Corporation
Cosa pensano gli utenti.. …ops giocatori
Dipende da quello che ci vuoi fare, preferisco la ps3 almeno so sicuro che se metto un gioco
funziona e ci gioco subito
Ciao, con il PC puoi fare veramente di tutto, ma con le console, inserisci il CD e giochi,
senza preoccuparti di requisiti richiesti, instabilità, schede grafiche appropriate e soprattutto,
senza dover spendere un capitale, tutte le volte che bisogna aggiornare il PC, per poter far
girare decentemente giochi sempre più potenti.
Per me sono le console, sono fatte apposta per giocare, nessuna installazione del gioco e
poi....prima di giocare con un gioco per pc si deve vedere prima se il browser lo supporta.
6
© 2010 IBM Corporation
Benefici
Dipende da quello che ci vuoi fare, preferisco la ps3 almeno so sicuro che se metto un gioco
funziona e ci gioco subito
FACILITA’ DI INSTALLAZIONE
FACILITA’ D’USO
Ciao, con il PC puoi fare veramente di tutto, ma con le console, inserisci il CD e giochi,
senza preoccuparti di requisiti richiesti, instabilità, schede grafiche appropriate e soprattutto,
senza dover spendere un capitale, tutte le volte che bisogna aggiornare il PC, per poter far
girare decentemente giochi sempre più potenti.
FACILITA’ DI CONFIGURAZIONE
MANUTENIBILITA’
Per me sono le console, sono fatte apposta per giocare, nessuna installazione del gioco e
poi....prima di giocare con un gioco per pc si deve vedere prima se il browser lo supporta.
UPGRADABILITA’
TROUBLESHOOTING
7
© 2010 IBM Corporation
Benefici – La parola alle aziende
FACILITA’ DI INSTALLAZIONE
FACILITA’ D’USO
FACILITA’ DI CONFIGURAZIONE
MANUTENIBILITA’
UPGRADABILITA’
TROUBLESHOOTING
8
© 2010 IBM Corporation
Agenda
Introduzione
• Cosa sono le “appliance”
• Benefici
• Tipologia
• Caratteristiche
9
© 2010 IBM Corporation
Appliance Evolution
Analytics
Layer
Real Time BI
Key Performance Indicator
Integration
Layer
Application integration
Complex Transformation
Security Layer
SPAM, Authentication, Firewalls
Security Appliances
DataBase Monitoring
Storage Layer
Data storage and retrieval
Network Layer
Hardware Layer
Storage Appliances
Routers, Switches, Gateways
Routing Appliances
Servers
Operating System Appliances
10
©2007 Cast Iron Systems, Inc. • Confidential
© 2010 IBM Corporation
Appliance Delivery
Cloud
Virtual Appliances
Virtual Appliances
Physical Appliances
11
© 2010 IBM Corporation
Ambiti attualmente in uso
12
Source: IDC's Software Appliance End-User Surveys, 2008
and
2009
© 2010
IBM Corporation
Future aree di utilizzo
13
Source: IDC's Software Appliance End-User Surveys, 2008
and
2009
© 2010
IBM Corporation
L’evoluzione della domanda
14
Source: IDC's Software Appliance End-User Surveys, 2008 and 2009
© 2010 IBM Corporation
Tipologie
15
© 2010 IBM Corporation
Agenda
Introduzione
• Cosa sono le “appliance”
• Benefici
• Tipologia
• Caratteristiche
16
© 2010 IBM Corporation
17
© 2010 IBM Corporation
Security: XML-WebService Security Gateway - Esigenze
Help secure and govern XML and Web service implementations
Protect corporate assets with security and policy enforcement
Hardened, specialized easy-to-deploy SOA hardware.
Improve agility through ESB Messaging and Enrichment
Policy-driven approach to Web service management and SOA
governance.
Lower operational costs by Extending your connectivity
Requires minimal configuration, customization and management.
Security Processing
Routing
Transformation
New XML standard
Access control
update
Change purchase
order schema
18
© 2010 IBM Corporation
Security: XML-WebService Security Gateway - Caratteristiche
19
© 2010 IBM Corporation
Security: XML-WebService Security Gateway - Scenari
Security
XS40
Internet
20
IP Firewall
Application Server
© 2010 IBM Corporation
Security: Real-time Database Security & Monitoring - Esigenze
I riferimenti del “Provvedimento del Garante”...
...”funzioni tecniche propriamente corrispondenti o assimilabili a quelle di amministratore di
sistema (system administrator), amministratore di base di dati (database administrator) o
amministratore di rete (network administrator), laddove tali funzioni siano esercitate in un
contesto che renda ad essi tecnicamente possibile l'accesso, anche fortuito, a dati
sensibili e personali”
…”adottare specifici sistemi di autenticazione informatica basati su tecniche di strong
authentication”
...”tali soluzioni comprendono la registrazione, in un apposito audit log, delle operazioni
compiute, direttamente o indirettamente, sui dati di traffico e sugli altri dati personali a essi
connessi, sia quando consistono o derivano dall'uso interattivo dei sistemi, sia quando
sono svolte tramite l'azione automatica di programmi informatici”
...”i controlli devono comprendere anche verifiche a posteriori, a campione o su eventuale
allarme derivante da sistemi di Alerting e di Anomaly Detection, sulla legittimità e liceità
degli accessi ai dati effettuati dagli incaricati, sull'integrità dei dati e delle procedure
informatiche adoperate per il loro trattamento”
21
© 2010 IBM Corporation
Security: Real-time Database Security & Monitoring - Caratteristiche
Effettua sui DB operazioni di
monitoraggio e controlli di
sicurezza con l’utilizzo di
funzionalità di enforcement.
Individua tutti i database che
contengono dati sensibili e
recepisce come essi vengono
acceduti (da parte di
applicazioni, processi batch,
query ad hoc ecc..)
22
Offre una reportistica che
rappresenta il risultato di un
continuo e granulare
tracciamento e analisi di tutte
le attività effettuate sui DB
E’ in grado di seguire il
vulnerability management ovvero
effettua il delivery di funzioni di
sicurezza e di conformità di tutte
le piattaforme DBMS e le
applicazioni enterprise.
© 2010 IBM Corporation
Security: Real-time Database Security & Monitoring - Caratteristiche
Monitor
&
Enforce
Audit
&
Report
Critical
Data
Infrastructure
Discover
&
Classify
23
Assess
&
Harden
© 2010 IBM Corporation
Security: Real-time Database Security & Monitoring - Caratteristiche
La piattaforma deve permettere la protezione del database in tempo reale con un continuo
monitoraggio, attivo per la verifica completa.
Traccia tutte le attività del database, compresa l'esecuzione di tutti i comandi SQL su tutti gli
oggetti del database, eseguiti dagli utenti o dalle applicazioni.
Crea un repository centralizzato per l’audit di tutti i DB
Effettua verifiche
• Su login/logout
• eccezioni di sicurezza come login falliti ed errori SQL
• di estrusione (identificazione dei dati sensibili restituiti dalle query).
Compliance Workflow Automation: permette la creazione e la distribuzione di report ad un team di
supervisione, con la possibilità di effettuare elettronic sign-off, escalation e commenti;
Privacy Sets (gruppi di oggetti sensibili); Gruppo e Alias Builder;
Correlation Alert (violazioni registrate in base all’analisi dei dati raccolti in un determinato periodo
di tempo); Incident Manager, documentazione elettronica (manuali guardium).
Generazione di allarmi in tempo reale (SNMP, SMTP, Syslog, CEF).
Permette Policy Builder e Baseline, drag-and-drop report;
Integrazione con SIEM e la gestione dei log dei sistemi (ArcSight, EnVision, Sensage, MARS,
Tivoli TSIEM etc.)
24
© 2010 IBM Corporation
Blocking Access Without Inline Appliances
“DBMS software does not protect data from administrators, so DBAs today have the ability to
view or steal confidential data stored in a database.” Forrester, “Database Security: Market Overview,” Feb. 2009
Application Servers
SQL
Privileged
Users
Oracle, DB2,
MySQL, Sybase,
etc.
Issue SQL
S-GATE
S-GATE
Hold SQL
Outsourced DBA
Connection terminated
Policy Violation:
Drop Connection
Check Policy
On Appliance
Session Terminated
25
© 2010 IBM Corporation
Security: Real-time Database Security & Monitoring - Scenari
26
© 2010 IBM Corporation
Real-time Database Security & Monitoring
Integration
Application Servers
Oracle EBS, SAP, Siebel,
Cognos, PeopleSoft, etc
Privileged User Authorized
Change Control Process
Alerts to SIEM
- Tivoli, ArcSight, EnVision, etc
Directory Services
(Active Directory, LDAP, etc)
Decode Application Users
Using DB Pooled Connection
Send Alerts
To SIEM
Authentication
Group Upload
Reports & Policies
Long Term Storage
Tivoli TSM, EMC Centera
FTP, SCP, etc
IT Service Management
- Remedy, Peregrine, etc
Backups and
Long Term Storage
Sensitive
Data
- ---- - - - - ----- - - - - - - -
Data Leak &
Data Classification
27
Silent Installs &
Deployment Packaging
Software Deployment
Tivoli, RPM’s, Native Distributions
SNMP Monitoring Systems
Tivoli Netcool, Openview, etc
Vulnerability Assessment
-CVE #’s, CIS Benchmark, STIG
© 2010 IBM Corporation
Security: Intrusion Prevention - Esigenze
Proteggere l’organizzazione grazie all’individuazione e gestione delle
minacce sia sulla rete interna che sul perimetro ad es: Worms, Spyware, Peer
to peer (P2P), Denial of service (DoS) and distributed denial of service (DDoS),
Botnets, Targeted attacks against Web applications, Proprietary or sensitive
data leaving the network, Cross-site scripting, SQL injection, Buffer overflow,
Web directory traversal
Impedire le intrusioni e proteggere tutti I sistemi
Monitorare e gestire in modo centralizzato la sicurezza operativa
Investigare e rispondere agli eventi sicurezza
28
© 2010 IBM Corporation
Security: Intrusion Prevention - Caratteristiche
Virtual Patch: scherma le network con target potenzialmente a rischio dagli attacchi che
sfruttano le vulnerabilità presenti, permettendo così un migliore controllo del processo di
gestione del patching dei sistemi;
Client-Side Application Protection: protegge i client sulla rete da attacchi che indirizzano
vulnerabilità applicative diffuse come MS Office, Adobe e Web Browsers;
Web Application Protection: protegge i web server da attacchi applicativi sofisticati come
SQL Injection, Xsite scripting, PHP file include, Cross Site Request Forgery;
Threat Detection and Prevention: rileva e previene intere classi di minacce come anche
specifici exploit volti a sfruttare vulnerabilità presenti;
Data Security: rileva e notifica il transito sulla rete di informazioni confidenziali non cifrate
come carte di credito, codici fiscali, ed informazioni sensibili in genere.
Appliction Control: monitora l’utilizzo di applicazioni non autorizzate che possono causare
indirettamente esposizione a rischi di perdita di dati o propagazioni di virus; ne sono
esempio applicazioni basate su controlli Active-X, o come Instant Messaging, file Transfer, e
P2P in genere.
29
© 2010 IBM Corporation
Security: Intrusion Prevention Scenari
Security Information & Event Management
Local area
network
(LAN)
Perimeter
• Intrusion prevention
• Firewall
• Universal threat
management
30
•
•
•
•
•
•
Intrusion prevention
Anomaly detection service
Vulnerability management
Remediation
Compliance and risk mgmt
Vulnerability protection service
Hosted
environment
Web server
Mail server
• Host protection
(server and desktop)
• Layer 4 –7 protection
(content, URL, Web)
© 2010 IBM Corporation
31
© 2010 IBM Corporation
Business Processing: Connect Every Application - Esigenze
Rapida Integrazione Applicazioni
Trasparente deployment delle integrazioni (Cloud, Virtual, Physical)
Performance e Scalabilità
Facile manutenzione ordinaria ed evolutiva
32
© 2010 IBM Corporation
Business Processing: Connect Every Application - Caratteristiche
Integration-as-a-Service
Integration on Premise
Physical Integration Appliances
Virtual Integration Appliances
Cast Iron Cloud2™
What Our Integration Solution Does
33
Cloud apps using Web
Services, XML/HTTP(s)
Database Integration
Flat-file integration over
FTP, HTTP(s), E-mail
ERP, CRM, Customer
Support, Custom Apps
MQ Series / Tibco / ESB
Simple EDI
Graphical transformations
(XSLT generated)
Built-in validation functions
Custom validation
functions using Java
Scripting
Cross-reference lookups
Simple Data cleansing
Content-based routing
(Logic)
Data-driven business
logic
Error-checking and
handling
Configuration
Security
Performance
Accounting
© 2010 IBM Corporation
Business Processing: Connect Every Application - Caratteristiche
No Coding
34
Beyond Configuration
Preconfigured Templates
(TIPs)
©2010 Cast Iron Systems, an IBM Company • Confidential
© 2010 IBM Corporation
Business Processing: Connect Every Application - Scenari
CRM
Customer Master Integration
Business Problem
Replace six legacy CRM systems with
Siebel
Empower call center reps (CSRs) with
real-time information for delivering
superior customer service:
–
A/R, invoices , credit checks and order details
Reduce dependency on higher cost
resources
Shift higher skills to strategic/innovation
initiatives
Custom Code – not aligned with org
goals
Picture here
Custom
Custom Code
Code
Data Warehouse
Siebel Data Warehouse, E-commerce
35
© 2010 IBM Corporation
Business Processing: Connect Every Application - Scenari
CRM
Case Study – Customer Master Integration
Solution
Real-time and batch integration
A/R, credit, and sales info are
“pushed” to SFDC
Orders and quotes created in
eCommerce system are “pulled” real
time from data warehouse
Results
Reduced development from 4 to 1 FTE:
− $250k annual savings
− 80% reallocation in resources
Senior resources now assigned to
strategic initiatives
Increased CSR productivity & superior
customer experience
Data Warehouse
Siebel Data Warehouse, E-commerce
36
36
© 2010 IBM Corporation
Business Processing: Connect Every Application - Scenari
ERP
Case Study – Billing and Invoice Visibility
Business Problem
Complex Sales Orders
Need to integrate SaaS Applications
− salesforce.com (CRM)
− Netsuite (ERP)
Bidirectional integration needs:
Picture here
− sales orders from Salesforce opportunities
− Invoices from Netsuite
Complex data mapping & lookup rules
Manual data entry process was time
consuming and error prone
Competing Technologies
Custom Code: Minimal IT staff available
Scribe – implementation failed
Invoices
salesforce.com –SAP
Netsuite NetSuite
Salesforce.com
salesforce.com
37
37
© 2010 IBM Corporation
Business Processing: Connect Every Application - Scenari
ERP
Case Study – Billing and Invoice Visibility
Solution
Cast Iron integrates applications in realtime
Complex Sales Orders
Web-services based integration with
complex business rules for validation
Entire project completed without writing
any Custom Code
Results
Project completed in 24 working days
Eliminated errors due to manual process
Leveraging same Platform for database
integration needs
Invoices
NetSuite salesforce.com
38
38
© 2010 IBM Corporation
Business Processing: Connect Every Application - Scenari
HCM
Case Study – PeopleSoft Job Requisition Sync
A leading Commodities Exchange
Solution
Solution
Challenge
Challenge
Eliminate
EliminateManual
ManualProcessing
Processingand
andassociated
associatederrors
errorsand
and
delays
delays
—
—Update
Updatepositions
positionsand
anddepartments
departmentsfrom
fromHRMS
HRMStoto
TBE
TBE
—
Synchronize
— SynchronizeJob
Jobrequisitions
requisitionsbetween
betweenHRMS
HRMS&&TBE
TBE
— On-board employees faster
— On-board employees faster
Need
Needaasimple
simplebut
butstandards
standardsbased
basedscalable
scalablesolution
solution
Lack
Lackofofexpertise
expertisewith
withTaleo
TaleoAPIs
APIsand
andunderstanding
understandingofof
source
data.
source data.
Error
Errorand
andException
ExceptionHandling
Handlingrequired.
required.
Limited
LimitedITITresources
resourcesavailable
available
39 39
Cast
CastIron
IronIntegration
IntegrationAppliance
Appliance
Out-of-the-box integration with Taleo
Out-of-the-box integration with Taleo
Configurable and customizable
Configurable and customizable
Support
Supportfor
forcustom
customfields,
fields,attachments
attachmentsand
andexception
exception
handling.
handling.
Ability to Link candidates with requisitions.
Ability to Link candidates with requisitions.
Out-of-the-box
Out-of-the-boxsupport
supportfor
forPeopleSoft
PeopleSoft
Eliminated:
Eliminated:
—
—Manual
Manualmigration
migration
—
custom
code
— custom code
© 2010 IBM Corporation
Caratteristiche
40
© 2010 IBM Corporation
DataBase: PureScale Esisgenze
Unlimited Capacity
– Buy only what you need, add capacity
as your needs grow
Application Transparency
– Avoid the risk and cost of application
changes
Continuous Availability
– Deliver uninterrupted access to your
data with consistent performance
© 2010 IBM Corporation
DataBase: PureScale Caratteristiche
+
+
An integrated, high performance, scalable workload
optimized system for business transactional
workloads
IpAS extends the reliability and speed of DB2,
WebSphere Application Server, and Power 770
servers with PowerHA pureScale clustering
technology
IBM Power 770
drives up to 90% server utilization with industry-leading virtualization, lowers
energy consumption 70-90% with dynamic energy utilization, and provides
resiliency without downtime.
DB2 pureScale
offers superior performance and scale-out efficiency
WebSphere Application Server
on POWER7 provides 73% better performance than a competitive
application server on Nehalem
42
© 2010 IBM Corporation
DataBase: PureScale Scenari – Smart Analytics Systems
Soluzioni DW “out of the box” preconfigurate
• Appliances: server + storage + software (IWH con DPF, Cognos )
• Architettura modulare, elevatissima scalabilità lineare
• Ottimo rapporto prezzo / prestazioni
Semplicità
• configurazioni pre-assemblate
e pre-testate
• rapidità di implementazione
• supportate come soluzione
integrata
Ottimizzazione
• bilanciamento delle risorse:
CPU, I/O, memoria, hdisk
• grande scalabilità orizzontale:
data partitioning con
architettura shared nothing
Flessibilità
• componibilità dei
“building blocks”
• hw affidabile e
non proprietario
Benefici
Benefici/ /Valore
Valoredidibusiness
business
43
• • Drastica
Drasticariduzione
riduzionedei
deitempi
tempieedello
dello
sforzo
per
la
realizzazione
sforzo per la realizzazionedella
della
soluzione
soluzione
© 2010 IBM Corporation
Caratteristiche
44
© 2010 IBM Corporation
Collaboration: Esigenze
Notes / Domino
Email, calendario, contatti,
applicazioni collaborative
Sametime
Rich client
Browser
Comunicazioni unificate,
instant messaging
Portal
Quickr
Protector
for Email Security
Mobile
Condivisione di contenuti
e servizi di team
MS Office
RSS / Atom
Protezione completa
per le email
Connections
Portal
Social software
per il business
Portale “enterprise”:
applicazioni composite
e servizi di integrazione
e-forms
Symphony
Strumenti di
produttività
• documenti
• presentazioni
• fogli elettronici
Live
Notes client
come front-end
a SAP
SaaS
45
© 2010 IBM Corporation
Collaboration: Caratteristiche
Foundations Server Appliance
■
■
■
■
■
■
■
■
■
■
■
■
46
Un appliance (hardware+software) ad alte prestazioni
Il sistema operativo del server è implementato sul chip
di memoria
È gestito da un pannello di controllo LCD facilissimo da
usare)
Ha unità di backup IDB (Integrated Disk Backup)
rimuovibili
Backup incrementale - Disaster Recovery
Network infrastructure, firewall, VPN, secure remote access
Sito Web pronto per i tuoi contenuti
File management , AntiVirus e AntiSpam
Lotus Symphony TM office productivity tools
Email e collaboration
Automazione dell'installazione dei client
Libera scelta del client: Lotus Notes®, Webmail e Microsoft® Outlook®
© 2010 IBM Corporation
47
© 2010 IBM Corporation
IT Infrastructure: Esigenze
Increasing Network Complexity
Explosive Complexity,
Growth in Devices...
… And Information
About Network
Increasing
Compliance Burden
• 200% device growth
• Proliferating network
heterogeneity
• Config size up to
length of a dictionary
• Increasingly
complicated to
blueprint network
• Unknown state of
devices, services
• “Temporary” accuracy
• Growing compliance
costs
• Failed audits (PCI-DSS,
SOX, HIPAA)
• Inconsistent policy
enforcement
Accelerating
Change Frequency
Workload,
Outpacing Personnel
Heightened Security
Needs
• Thousands of device
changes / shortening
maintenance windows
• Multiple OS & patches
upgrades
• Flat to moderate IT &
network budget
growth
• Avg. 1 tech per 250
branch routers
• ~20K CCIEs worldwide
• Decentralized network
access
• Limited management
visibility
• Ad-hoc security
Sources: Cisco, EMA, Gartner, Juniper Networks, Network World
48
© 2010 IBM Corporation
IT Infrastructure: Caratteristiche
Intelliden:Network configuration and change management (NCCM)
Discovery
Discovery
Real-Time Discovery
Scheduled & Ad-Hoc
Discovery
Security
Security &
&
Administration
Administration
Configuration
Configuration &
&
Change
Change
Management
Management
Compliance
Compliance
&
& Audit
Audit
Resource
Resource
Reconciliation
Reconciliation
Network
Network
Provisioning
Provisioning
Fine-Grained Security
Control
Always Accurate
Configuration
Always-on
Compliance
Standards-Based
Reconciliation
‘No-Scripts’ Network
Activation
Granular Control of
Device Access - by Role
& Config Command
Bulk Device
Upload
In-Band & Out-of-Band
Config Synch
Physical & Logical Device
Inventory
Multi-Protocol Support
Multi-Threaded NonBlocking Architecture
In-The-Field Extensions
for New Devices
State-Aware
Configuration
Operational, Security &
Regulatory Policies
Non-Discoverable Data
Augmentation
State-Aware Provisioning
Syntax, Semantics
Validation of Changes
Always-On Compliance
Device Data
Normalization
Pre-Provisioning
Validation
Telnet / Native Command
Support
Centralized Policy
Repository
Discrepancy
Analytics
Reusable Provisioning
Templates
Ad-hoc, Scheduled and
Recurring
Reusable Policy
Framework
Backup & Restore
Drag-and-Drop Rules
Design
Network Organization By
Device Realms
Centralized Security
Control
Policy Access Control By
Groups and Users
Rules-Based Notification
Support for Run-Time
Parameters
Synchronous &
Asynchronous
Reconciliation
Full MACD
Lifecycle Support
Intelligent Remediation
TMF MTOSI 2.0
Support
Exception
Handling
Telnet Terminal
Keystroke Logging
Integration with Inventory
and CMDB Apps
Integration with Service
Provisioning & Inventory
Apps
Non-Disruptive Rollback
Command Level
Parameter Control
Out-of-Band Change
Detection
Configuration Search &
Comparisons
Full Configuration
History
ACL Management
OS & Patch Management
Out-Of-The-Box Policies
Intelliden
Intelliden SmartModels™
SmartModels™
Robust
Robust Workflow
Workflow || Flexible
Flexible Reporting
Reporting || Open
Open APIs
APIs || Scalable
Scalable Platform
Platform || Multi-vendor
Multi-vendor Device
Device Support
Support
49
Network
Network Database
Database Of
Of Record
Record (DBoR)
(DBoR)
© 2010 IBM Corporation
IT Infrastructure: Caratteristiche
Intelliden:Network configuration and change management (NCCM)
50
Configuration Database
Of Record (DBoR)
• Persistent store of physical and logical
network resources and policies
• Maintains real-time device state
SmartModel™
Automation
• Standardized representation of native
device configuration interface.
• Models i/f syntax & behavior
Unified Platform
• Telnet, Native & SmartModel automation
• Single point of access for all changes
• Centralized record of all changes & policies
Always Accurate
Configuration
• CLI sent to devices validated against model
• Non-disruptive rollback
• Re-useable command templates
Fine-Grain Security
• Role-based access control of functions
against devices and commands
• Hierarchical network organization
Always-on
Compliance
• Support for regulatory, security and
operational policies
• Intelligent remediation, automated audit
© 2010 IBM Corporation
IT Infrastructure: Caratteristiche
Configuration & Change Mgmt
1
Full Control: Unified Platform Supports All Users, Organizations
2
Complete Accuracy: Intelliden SmartModel™ Prevents Outages, Errors
3
Reliable Execution: Network Database Of Record Always Current, Reliable
4
Flexible Access: Centralized Security Provides Fine-Grained Control
5
Zero Downtime: No Device Downtime For Configuration
Multiple user interfaces establish single point of network access for complete control, visibility, security
Standardized syntax, automated command order eliminate coding and scripting; SmartModel won’t permit errors
DBoR updates automated on every transaction; configurations versioned; access, security, user info logged
Device access defined by roles and/or configuration command; network organization defined by realms
Automated process accurately pushes difference only, leaving devices in service for most transactions
5
51
© 2010 IBM Corporation
IT Infrastructure: Caratteristiche
Compliance & Audit
1
Total Network Compliance: Single platform for Regulatory, Security,
Operations
2
Intelligent: Validation and Remediation using Intelliden SmartModels™
3
Re-Useable Policies: Increase Re-Use With Inheritance Across Components
4
Full Audit Trail: Automated Logging Of All Validations
5
Single platform to validate compliance requirements for regulatory, security and operational elements
Underlying XML model allows for fine grained inspection of configurations and automated remediation of violations
Single-change flow-through for ease of maintenance, speed of accurate compliance check across devices
All validations tracked, available and visible in multiple reports, with historical data and trends
Detailed Access Security: Fine-Grained Control Of Policy Creation, Deployment
User and group access control of Definitions, Rules, Policies and Process
5
52
© 2010 IBM Corporation
IT Infrastructure: Scenari
Monitor service quality and prioritize
work based on service impact
Portal: Business Service Management
and Consolidated Operations
Monitor KPIs, identify performance
bottlenecks and remediate before
they affect network service
Automate configuration tasks,
manage network change
proactively, ensure compliance
Increase operational efficiency
through event enrichment and
automation
Service Quality, SLA and
Customer Experience Management
Fault/Event
Performance
Configuration
Management
Management
Management
Enrichment &
Automation
Discovery & Data Collection
Radio Access
LTE, UMTS, GPRS,GSM,
CDMA, EVDO, WiMax
53
Wired Access
Core
Mobile (PS,CS),
Wireline, IP, NGN
VAS
Multimedia, IMS
IT Resources
and Applications
Consolidated view of your
entire infrastructure
including configuration
and dependency
information
© 2010 IBM Corporation
BT Virtual Data Center Provisioning
54
© 2010 IBM Corporation
55
© 2010 IBM Corporation
Real Time Business Intelligence : Esigenze
C-Level Priorities
Need for Information, Visibility & Control
Q. What are the top 3 improvements that need to be made
in your IT organization to better support your business?
(Top half of options shown)
Improved, integrated access to relevant
information/data
Need for access and
transparency- at all
levels of the stack
Real-time/near-real-time monitoring of
business performance
Faster development and deployment
of new business applications
Business insight and
performance
outcomes all the way
down to operations
Faster ability to affect operational changes
Improved performance of IT infrastructure
Speed is of the
essence
Lower application and/or maintenance costs
0%
10% 20% 30% 40% 50% 60%
Anticipate and better
support change
Source: IDC’s Services and Software Leading Indicators 2009
56
© 2010 IBM Corporation
Real Time Business Intelligence : Esigenze
Information Delivery Time Reduction
Accelerated Ability for Corrective Action
Business Activity/Event
HIGH
VALUE
Reducing
Reducingthe
thetime
timeto
toaction
action
Actionable Intelligence
Corrective Action
Datawarehousing
LOW
TIME
time to action
57
© 2010 IBM Corporation
Real Time Business Intelligence : Caratteristiche
All-in-one box that provides a hardware server
preconfigured with all software components..
OR Software/VM that is ready to be installed
on hardware provided by the customer
Includes: interactive dashboards, analysis,
reports, alerting, and data integration
Unlimited user licenses, dashboards, and
data sources
58
Immediate visibility & interaction
into business performance
Plugs into existing infrastructure
Fast, low cost deployment
Low maintenance
© 2010 IBM Corporation
Real Time Business Intelligence : Scenari
59
© 2010 IBM Corporation
Real Time Business Intelligence : Scenari
IBM Green Sigma Initiative
60
© 2010 IBM Corporation
Overview
Businesses in all industries are understand the critical need
to address environmental impacts
Key market drivers to ‘Go Green’
• Expanding regulation
• New business and gaining market share
• Growing awareness of corporate socially
responsible behavior
• Increasing costs (energy, waste, water,
transportation)
The IBM Green SigmaTM offering supports achieving
environmental and business goals through ongoing process
management and optimization using Lean Six Sigma
IBM Green SigmaTM spans solutions for
– Energy
– Water
– Waste Management
– Transportation
61
IBM Green SigmaTM methodology has already provided
significant cost savings and environmental benefits for IBM
and clients
© 2010 IBM Corporation
Green Sigma Carbon Console
Establish data collection plan and deploy mobile metering
capability as needed to perform Green SigmaTM based
statistical analysis, baseline and track energy use & identify
opportunities for improvement.
Establish working set of green KPIs especially carbon
emissions for energy management
Monitoring of Carbon Footprint
Electric consumption
1.Metering & Monitoring
Gas
3. Applied Statistical Techniques
Carbon emissions
2.Mgmt Systems
Carbon Console
Water
IBM Green Sigma TM
62
© 2010 IBM Corporation
Green Sigma Carbon Console
63
© 2010 IBM Corporation
Grazie !
WebSphere
DataPower
Appliances
WebSphere
CloudBurst
Appliance
Lotus
Lotus
Foundations
Foundations
IBM
CloudBurst
IBM Smart Cube
(IBM Smart Business
Software Pack)
(Computing Infrastructure
in a Box)
Smarter
Infrastructure
Infrastructure
Cognos Now!
Tivoli
Foundation
Appliances
Cognos Now!
InfoSphere
Information
Server Blade
ISS
Proventia Server
Intrusion
Prevention
System
ToInfoSphere
Be Updated
IBM
Smart
Analytics
Balanced
& Pure Scale Systems
Warehouse
64
© 2010 IBM Corporation