Infosim® Announces Release of StableNet® 7.5

Infosim StableNet Network Monitoring SoftwareInfosim®, the technology leader in automated Service Fulfillment and Service Assurance solutions, today announced the release of version 7.5 of its award-winning software suite StableNet® for Telco and Enterprise customers.

StableNet® 7.5 provides a significant number of powerful new features, including:

  • Dynamic Rule Generation (DRG); a new and revolutionary Fault Management concept
  • REST interface supporting the new StableNet® iPhone (and upcoming Android) app
  • Highly customizable dashboard in both the GUI and Web Portal
  • Enabling integration with SDN/NFV element managers
  • NCCM structurer enabling creation of optimized and well-formatted device configurations
  • New High-Availability (HA) infrastructure based on Linux HA technology
  • Syslog & Trap Forwarding enabling integration of legacy systems that rely on their original trap & syslog data
  • Open Alarms GeoMap enabling geographical representation of open alarms

StableNet® version 7.5 is available for purchase now. Customers with current maintenance contracts may upgrade free of charge as per the terms and conditions of their contract.

Supporting Quotes:

Jim Duster, CEO Infosim® ,Inc.

“We are happy that our newest release is again full of innovative features like DRG. Our customers are stating this new DRG feature will help them receive a faster ROI by improving automation in their fault management area and dramatically increase the speed of Root-Cause Analysis.”

Download the release notes here

Thanks to Infosim for the article.

Infosim® Global Webinar Day October 29th, 2015 StableNet® 7.5 – What’s New?

Infosim® Global Webinar Day October 29th, 2015 StableNet® 7.5 - What's New?

Join Harald Hoehn, Senior Developer and Consultant with Infosim®, for a Webinar and Live Demo on the latest information regarding StableNet® 7.5

This Webinar will provide insight into:

StableNet® 7.5 New Features such as:

  • New Web Portal [Live Demo]
  • New Alarm Dashboard [Live Demo]
  • New NCCM Structurer [Live Demo]
  • DRG (Dynamic Rule Generation) as a new and revolutionary Fault Management concept

StableNet® 7.5 Enhancements such as:

  • Enhanced Weather Maps [Live Demo]
  • Improved Trap- and Syslog-Forwarding [Live Demo]
  • Advanced Netflow Features [Live Demo]
  • Enhanced Support for SDN

But wait – there is more! We are giving away three Amazon Gift Cards (value $50) on this Global Webinar Day. To join the draw, simply answer the trivia question that will be part of the questionnaire at the end of the Webinar. Good Luck!

Infosim® Global Webinar Day October 29th, 2015 StableNet® 7.5 - What's New?
(Take a look at our previous Webinars here.)

Thanks to Infosim for the article.

CIO Review – Infosim Unified Solution for Automated Network Management

CIO Review

20 Most Promising Networking Solution Providers

Virtualization has become the life blood of the networking industry today. With the advent of technologies such as software-defined networking and network function virtualization, the black box paradigm or the legacy networking model has been shattered. In the past, the industry witnessed networking technology such as Fiber Distributed Data Interface (FDDI), which eventually gave way to Ethernet, the predominant network of choice. This provided opportunities to refresh infrastructures and create new networking paradigms.Today, we see a myriad of proprietary technologies, competing for the next generation networking models that are no longer static, opaque or rigid.

Ushering a new way of thinking and unlocking the possibilities, customers are increasingly demanding for automation from the network solution providers. The key requirement is an agile network controlled from a single source. Visibility into the network has also become a must-have in the networking spectrum, providing realtime information about the events befalling inside the networks.

In order to enhance enterprise agility, improve network efficiency and maintain high standards of security, several innovative players in the industry are delivering cutting-edge solutions that ensure visibility, cost savings and automation in the networks. In the last few months we have looked at hundreds of solution providers who primarily serve the networking industry, and shortlisted the ones that are at the forefront of tackling challenges faced by this industry.

In our selection, we looked at the vendor’s capability to fulfill the burning needs of the sector through the supply of a variety of cost effective and flexible solutions that add value to the networking industry. We present to you CIO Review’s 20 Most Promising Networking Solution Providers 2015.

Infosim Unified Solution for Automated Network Management

Today’s Networking technology though very advanced, faces a major roadblock—the lack of automation in the network management products. “These products are incapable of delivering a truly unified management approach as they are not an integrated solution but merely a collection of different programs bound together under one GUI to give them the appearance of an integrated solution,” notes Jim Duster, CEO, Infosim. Moreover, the need for continuously updating new device information, changes in configurations, and alerts and actions across these different toolsets are contributing to an ongoing financial burden for enterprises. Addressing these concerns with a unique network management solution is Infosim, a manufacturer of Automated Service Fulfillment and Service Assurance solutions.

Infosim offers StableNet, a unified solution developed and designed to cover performance management, fault management, and configuration management with a software that is engineered with a single code base and a consistent data model underneath. “StableNet is the only “suite” within the network performance management software industry,” claims Duster. The solution addresses the existing operational and technical challenges of managing distributed, virtualized, and mission critical IT infrastructures. “With this approach, we are able to create work flows in every unique customer business and industry to cover many processes efficiently,” he adds. For instance, StableNet monitors the production equipment of a manufacturing company. In case of an equipment failure, the error is being reported and StableNet delivers the root cause of the problem, while notifying an external service provider. The service provider’s technician can open an inspection window with StableNet, exchange the defective device and after re air, can provide feedback to the customer’s operations center.

For supporting the flexible deployment of StableNet, the company offers Infosim StableNet appliance, a high performance, preconfigured, security-hardened, hardware platform. “Appliances related to StableNet series reduce Total Cost of Ownership (TCO) by simplifying deployment, consolidating network infrastructure, and providing an extensible platform that can scale with your organization,” states Duster. StableNet also provides a low cost agent platform called the StableNet Embedded Agent (SNEA)—that enables highly distributed installations to support End-to-End (E2E) Visibility, Cloud Monitoring and Internet of Things. The deployment of SNEA is economical and is auto discovered at tactical collection points in networks, thus resulting into a low TCO for collecting and processing network performance actions and alerts.

Infosim StableNet is deployed across the networks of major players in the Telco and Enterprise markets including that of a German auto manufacturer. Acting as the client’s centralized system, StableNet reduced their toolset from over 10 disparate software and hardware offerings from multiple suppliers to less than four. This significantly reduced TCO while increasing service levels. “Siloed IT personnel who used to hide behind non-consolidated results from their individual solutions were all synchronized into one solution, speeding productivity, collaboration and communication,” states Duster.

Infosim is currently participating in advanced research projects on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) with several universities and leading industry device manufacturers. “The company applies 50 percent of its new software development resource to customer needs which assists customers in achieving milestones in vendor agnostic device support additions, industry specific capabilities, and features that were envisioned by real users,” asserts Duster.

For the years ahead, Infosim plans to build upon its product capability by automating the processes and activities that produce guaranteed service levels and reduce the consumption of human resources in the Network Operations Center (NOC). “Our vision is to enable the Dark NOC, which means a large percent of the non-value adding activities of network engineers can be automated in our product, freeing network engineers to work on proactive new innovations and concepts,” Duster concludes.

Thanks to Infosim for the article.

Unified Solution for Automated Network Management

Today’s Networking technology though very advanced,faces a major roadblock—the lack of automation in the network management products. “These products are incapable of delivering a truly unified management approach as they are not an integrated solution but merely a collection of different programs bound together under one GUI to give them the appearance of an integrated solution,” notes Jim Duster, CEO, Infosim. Moreover, the need for continuously updating new device information, changes in configurations, and alerts and actions across these different toolsets are contributing to an ongoing financial burden for enterprises. Addressing these concerns with a unique network management solution is Infosim, a manufacturer of Automated Service Fulfillment and Service Assurance solutions.

Infosim offers StableNet, a unified solution developed and designed to cover performance management, fault management, and configuration management with a software that is engineered with a single code base and a consistent data model underneath. “StableNet is the only “suite” within the network performance management software industry,” claims Duster. The solution addresses the existing operational and technical challenges of managing distributed, virtualized, and mission critical IT infrastructures. “With this approach, we are able to create work flows in every unique customer business and industry to cover many processes efficiently,” he adds. For instance, StableNet monitors the production equipment of a manufacturing company. In case of an equipment failure, the error is being reported and StableNet delivers the root cause of the problem, while notifying an external service provider. The service provider’s technician can open an inspection window with StableNet, exchange the defective device and after re air, can provide feedback to the customer’s operations center.

For supporting the flexible deployment of StableNet, the company offers Infosim StableNet appliance, a high performance, preconfigured, security-hardened, hardware platform. “Appliances related to StableNet series reduce Total Cost of Ownership (TCO) by simplifying deployment, consolidating network infrastructure, and providing an extensible platform that can scale with your organization,” states Duster. StableNet also provides a low cost agent platform called the StableNet Embedded Agent (SNEA)—that enables highly distributed installations to support End-to-End (E2E) Visibility, Cloud Monitoring and Internet of Things. The deployment of SNEA is economical and is auto discovered at tactical collection points in networks, thus resulting into a low TCO for collecting and processing network performance actions and alerts.

Infosim StableNet is deployed across the networks of major players in the Telco and Enterprise markets including that of a German auto manufacturer. Acting as the client’s centralized system, StableNet reduced their toolset from over 10 disparate software and hardware offerings from multiple suppliers to less than four. This significantly reduced TCO while increasing service levels. “Siloed IT personnel who used to hide behind non-consolidated results from their individual solutions were all synchronized into one solution, speeding productivity, collaboration and communication,” states Duster.

Infosim is currently participating in advanced research projects on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) with several universities and leading industry device manufacturers. “The company applies 50 percent of its new software development resource to customer needs which assists customers in achieving milestones in vendor agnostic device support additions, industry specific capabilities, and features that were envisioned by real users,” asserts Duster.

For the years ahead, Infosim plans to build upon its product capability by automating the processes and activities that produce guaranteed service levels and reduce the consumption of human resources in the Network Operations Center (NOC). “Our vision is to enable the Dark NOC, which means a large percent of the non-value adding activities of network engineers can be automated in our product, freeing network engineers to work on proactive new innovations and concepts,” Duster concludes.

Thanks to CIO Review for the article.

Top Three Policies in Network Configuration Management

When a network needs repair, modification, expansion or upgrading, the administrator Network Configuration Management refers to the network configuration management database to determine the best course of action.

Top Three Policies in Network Configuration ManagementThis database contains the locations and network addresses of all hardware devices, as well as information about the programs, versions and updates installed in network computers.

A main focus to consider when discussing network configuration management is Policy checking capabilities. There are three key policy checking capabilities which should not be ignored, and they are as follows

  1. Regulatory Compliance Policy
  2. Vendor Default Policy
  3. Security Access Policy

Regulatory compliance policy

The obvious one is regulatory compliance policy. If you have a network configuration system you should always implement a regular checking system to ensure consistency with design standards, processes and directives with internal and external regulators.

In the past people would use manual processes this is something that was time intensive, costly, inaccurate and more importantly, your business was at risk and open to potential attacks through not having the desired real-time visibility.

Now thanks to the infamous cloud this is all a thing of the past.

Vendor default policy

Vendor default policy is a best practice recommendation to scan the configurations of your infrastructure devices and to eradicate potential holes so that the risk can be mitigated. Furthermore so that the infrastructure security access is maintained to the highest possible levels.

Such holes may arise due to your configuration settings being overlooked. Sometimes a default username and passwords, or SNMP ‘public’ and ‘private’ community strings etc. are not removed, leaving a hole in your security for potential attacks.

Security Access Policy

Access to infrastructure devices are policed and controlled with the use of AAA (Authentication, Authorization, Accounting), TACACS+, RADIUS servers, and ACLs (Access Control Lists) so as to increase security access into device operating systems.

It is very important therefore that the configuration elements of infrastructure devices have the consistency across the managed estate. It is highly recommended to create security policies so that the configurations of security access can be policed for consistency and reported on if changed, or vital elements of the configuration are missing.

Thanks to NMSaaS for the article. 

Network Configuration Management is a Key Component in Business Today

NMSaaS Network Configuration ManagementNetwork configuration management is the process of organizing and maintaining information about all the components of a computer network.

When a network needs repair, alteration, development or advancements, the administrator refers to the network configuration management database to determine the best course of action.

This database contains the locations and network addresses of all hardware devices, as well as information about the programs, versions and updates installed in network computers.

There are many advantages you have while implementing configuration management such as:

  • Minimizing configuration errors.
  • Minimizing downtime.
  • Optimizing network security.
  • Improving the processes of maintenance, repair, and expansion and upgrading.

Companies such as Cisco have been developing network configuration applications for years now and they feel it is a necessity and not an option in business today.

By using it, it allows you to roll out configuration changes to numerous network devices within minutes rather than hours, or even days. Push out a config change in real time or schedule it for after hours.

It makes you take advantage of the central repository for all network devices by automatically backing up your configurations. This automated approach allows you to sleep at night knowing that you can always have the most up to date configurations of your devices.

The web interface quickly gives you a user friendly snapshot of the status of your devices providing you the knowledge of what devices are backed up, not backed up, have start/run conflicts, etc.

One of the main leaders in the tech industry Infosim has come out with statement saying that

“Through 2015, 80% of outages impacting mission-critical services will be caused by people and process issues, and more than 40% of those outages will be caused by change, configuration, release integration and hand-off issues.”

This can all be easily avoided by using one of our configuration applications. To find out more get in contact with the team.

NMSaaS Network Configuration Management

Thanks to NMSaaS for the article.

Infosim Global Webinar Day- A View Of Infosim® StableNet®

It´s good to be #1!

A view of Infosim® StableNet® based on criteria and results of the EMA Radar™ for Enterprise Network Availability Monitoring System (ENAMS): Q3 2014

Join John Olson, VP Technical Services Americas and Paul Krochenski, Regional Manager for a webinar on: “A view of Infosim® StableNet® based on criteria and results of the EMA Radar™ on ENAMS: Q3 2014”. This webinar will provide you with comprehensive insight into the strengths and advantages of Infosim® StableNet® based on the following criteria of the EMA Radar™ on ENAMS:

  • Deployment & Administration
  • Cost Advantage
  • Architecture & Integration
  • Functionality
  • Vendor Strength

A recording of this webinar as well as a free download of the “EMA Radar™ for ENAMS Summary and Infosim® Profile” will be available to all who register!

Register today and reserve your seat in the desired timezone:

AMERICAS, Thursday, September 25th, 3:00pm – 3:45pm EDT (GMT-4)
EUROPE, Thursday, September 25th, 3:00pm – 3:45pm CEST (GMT+2)
APAC, Thursday, September 25th, 4:00pm – 4:45pm SGT (GMT+8)

Thanks to Infosim for the article.

Network Configuration & Change Management Best Practices with StableNet®

Solution Strengths

  • comprehensive solution for Configuration, Performance and Fault Management
  • unified code base eliminates need for fault prone module/product integration
  • ultra scalable architecture, nothing gets added that could impact scalability
  • End-to-End awareness delivers automated dependencies, root cause and
  • delivers massive automation benefits
  • ROI in months, not years

A truly ‘‘Vendor Agnostic“ Solution

  • supports many different network hardware manufacturers, including Cisco, Huawei, Juniper, Ixia, Junisphere, HP, Redback, Enterasys, Alcatel, RAD, and Foundry
  • powerful device interaction scripting engine allows rapid support for new manufacturers or device models without development delays or major upgrades
  • delivers the same level of functionality for all devices regardless of manufacturer

Why do we need NCCM?

  • a recent Gartner study projected that “Through 2015, 80% of outages impacting mission-critical services will be caused by people and process issues, and more than 40% of those outages will be caused by change/configuration/release integration and hand-off issues.” (Ronni J. Colville and George Spafford Configuration Management for Virtual and Cloud Infrastructures)
  • Enterprise Management Association reports that 60% of availability and performance issues/errors are the result of misconfigurations
  • without a comprehensive plan to automate the repetitive and error prone “day to day” tasks, most organizations will face downtime and service failures due to something that could have been prevented

The StableNet® NCCM and VLM Framework

Infosim StableNet NCCM and VLM Framework

Best Practice #1 – Auto-Discovery Configuration Backup

  • when discovering the network infrastructure hardware components it is essential that the software IOS image, along with the startup and running configuration files, are backed up as part of the initial discovery process
  • having the ability to perform configuration backup is a fundamental requirement of any NCCM system however, having the flexibility to perform additional ‘show’ type commands as part of the configuration backup process to capture current snapshot states of the operating device is of huge benefit as additional device and operational performance data can also be collected and tracked at the same time
  • StableNet® has this capability built into its NCCM module and so can subsequently track and report against previous and current operational states

Best Practice #2 – Automated Alerting

  • it is essential to know when your infrastructure has been backed-up successfully, or if backups have failed, and more importantly why they have failed
  • StableNet® has the capability to send notification updates of backup configuration job successes, failures, and why the job failed notifications can be emailed to targeted audiences, alerted via SMS (providing an SMS gateway is available), and via the Web & GUI clients
  • having up-to-date and current device configuration of your infrastructure is paramount in the mitigation of potential catastrophic failure as it is a key component for the restoration of failed, or misconfigured, infrastructure

Best Practice #3 – Configuration Backup Scheduling

  • once an infrastructure has been discovered and the configuration of that infrastructure estate is backed-up and being operationally managed, then you should look to employ a best practice backup schedule
  • it is important to plan a backup schedule for implementation from day 1, and then fine-tune the schedule through the knowledge of the change analytics overtime
  • most devices can also send syslog or traps when the configuration is changed, and this event can then automatically trigger a backup process to be initiated

The NCCM –Policy Compliance and Governance Structure

Infosim StableNet NCCM Policy Compliance and Governance Structure

Policy Compliance

  • many organizations today have configuration and security policy rules that require compliance checking to ensure consistency with design standards, processes and directives with internal and external regulators
  • using manual processes is not recommended, as it is time-intensive, costly, inaccurate and more importantly, your business could be at risk and open to potential attacks through not having the desired real-time visibility
  • the policy compliance and governance engine within the NCCM module of StableNet® allows corporations to create policies electronically in order to scan/analyze configurations of the infrastructure environment so as to produce accurate and timely compliance and violation reporting analytics
  • whether you need to meet PCI, ITIL, FCAPS, ISO27001, SOX, NSA Security Guidelines or other business continuity or regulatory standards StableNet® can help greatly with simplifying the process, drastically reduce your risk, and drive compliance consistency throughout your infrastructure ensuring sustained levels of service availability

Best Practice #4 – Regulatory Compliance Policy

  • governments and industry regulators require organizations to conform to standard best practices in order to become compliant with these regulations such as PCI, ISO27001, FCAPS, ITIL, SOX, HIPPA, and others, device configuration should conform to these standards
  • StableNet® assists greatly with this regulatory requirement automatically checking for compliance to the rules defined reports on policy compliance and violations are available out-of-the-box

Best Practice #5 – Vendor Default Policies

  • vendors ship devices with default configuration enabled to assist with out-of-the box implementation
  • the default configuration settings are overlooked a lot of the time when the device in question is installed within the organizations infrastructure common settings, for example around default username and passwords, or SNMP ‘public’ and ‘private’ community strings etc. are not removed, leaving a hole in your security for potential access to attacks
  • therefore, it is a best practice recommendation that you create policies to scan the configurations of your infrastructure devices to eradicate these potential holes in order that the risk can be mitigated and infrastructure security access is maintained to the highest possible levels

Best Practice #6 – Security Access Policy

  • access to infrastructure devices are policed and controlled with the use of AAA (Authentication, Authorization, Accounting) TACACS+, RADIUS servers, and ACLs (Access Control Lists) so as to increase security access into device operating systems
  • it is very important therefore that the configuration elements of infrastructure devices have the consistency across the managed estate it is highly recommended to create security policies so that the configurations of security access can be policed for consistency and reported on if changed, or vital elements of the configuration are missing
  • StableNet® has the flexibility in-built to create these policy types and maintain the consistency required – this is also an NSA guideline requirement

Best Practice #7 – Service Design Rules Policy

  • Telco’s, ISPs/MSPs and Enterprise organizations have service types that maybe predefined i.e. Standard, Enhanced and Premium service types
  • creating design policy rules provides greater control around the service offerings, i.e. QOS settings for Enhanced service offerings, or a complete End-to-End service type, and ensures compliancy with the service delivery SLAs (Service Level Agreements)
  • StableNet® allows for the creation of design policing of your entire service portfolio giving you that peace of mind that your services are being provisioned and assured in the way they were designed

The NCCM –Configuration Change Management

Infosim StableNet NCCM Configuration Change Management

Best Practice #8 – Enabling of Real-Time Configuration Change Detection

  • configuration compliance policy for SNMP and Syslog is essential for the assurance of receiving notifications of changes to device configuration unauthorized configuration changes are common practice within all sizes of business and so it is extremely important to have the necessary controls in place to notify and mitigate when a change was committed

Best Practice #9 – Configuration Change Compare Management

  • having visibility of changes to the network infrastructure is essential for any NCCM implementation however, being able to compare configurations from previous known states is a powerful and quick way of identifying exactly what has changed, or been added, to a device configuration
  • StableNet® has this capability built into its NCCM module and so can subsequently track and report against previous and current operational states

Best Practice #10 – Bulk Configuration Change

  • automation is the important task in IT operations nowadays IT Managers are always looking for automating repetitive and time consuming tasks in order to reduce operational cost and improve productivity
  • StableNet® NCCM supports you in this task by automating bulk configuration and change management for network devices tasks can be scheduled and configuration changes can be executed for individual or groups of network devices it is possible to alert on configuration change or policy failures and restore a known good configuration as required

The NCCM – Vulnerability Management

Infosim StableNet NCCM Vulnerability Management

Best Practice #11 – Testing of New Vulnerabilities

      • when vulnerabilities are announced by vendors it is advisable to perform test checks within a lab or incubation environment to identify any false positives, false negatives, and potential service disruptions by performing this testing and eradicating any potential errors the results on your live database will result in greater accuracy and compliance across your infrastructure

Best Practice #12 – Maintaining Vulnerability Optimization

      • it is essential to Plan, Maintain, Optimize and focus on upholding accurate vendor updates
      • having a process in place whereby announcements are captured and applied to your existing vulnerabilities data is paramount in maintaining a highly optimized vulnerability management system
      • it is also important to note that once a vulnerability has been eradicated, or fixed, within your infrastructure you can not simply forget about it
      • a vulnerability you thought was secure could be re-introduced at any time via a new device being installed, or an off-net device being re-introduced to the infrastructure hence its good policy and practice to run daily scans and updates

Best Practice #13 – Testing of New Lifecycle Announcements

      • when EOS (End-of-Sale), EOL (End-of-Life), EOSS (End-of-Service-Support) lifecycle announcements are released by vendors it is advisable to perform test checks within a lab or incubation environment first to identify any false positives, false negatives, and potential service disruptions
      • by performing this testing and eradicating any potential errors the results on your live database will result in greater accuracy and compliance across your infrastructure

Thanks to Infosim for the article.

SDN: Configuration & Monitoring With StableNet®

Webinar_SDN_Configuration_&_MonitoringJoin Marc Scheib, Consultant at Infosim® and Thomas Hoehn, Developer at Infosim® for a Webinar and Live Demo featuring:

1. Cons of traditional networks & pros of SDN
2. OpenDaylight SDN Controller (Live Demo)

  • Showing SDN Testbed
  • Controller configuration via CLI
  • Backup of controller configuration
  • Using Device Info Commands

3. SDN Measurements with StableNet® (Live Demo)

  • Flow & Switch count
  • Port Traffic & Error measurements

Five Steps to Building Total Visibility and Control of your Cloud Infrastructure using StableNet®

Modern enterprise applications are engineered for agility and are heavily virtualized for frequent deployment over scalable IT infrastructure environments. The benefits of virtualized public\private cloud environments include flexibility, efficiency, and agile business enablement. Multiple factors such as varying workload requirements, or ‘just-in‐time’ provisioning require an accurate and scalable muti-functional management suite to mitigate the risk of compromising the environment. Infosim’s StableNet® unified management system provides the total visibility and control required for your cloud hosting infrastructure environment.

Step 1 – WAN Access to your Cloud Environment

The Wide Area Network (WAN) is a key component in the delivery path of your cloud services. It is essential that the WAN routing devices that allow your public and private cloud‐based traffic to flow in\out of your hosting Infosim Public Private Cloudenvironment have the appropriate management array of functionality in place to deliver the service visibility and application performance needed for measuring the service availability and ultimately the customer experience. Optimization of the WAN is a necessity for application prioritization and acceleration delivery; therefore, maximum visibility and control of the WAN access points to and from your cloud environment are absolutely paramount for maintaining high service availability.

StableNet® is a unified management solution and is therefore ideally suited for cloud infrastructure management. For the WAN element of your cloud hosting environment StableNet® provides an array of multi‐functional capabilities that deliver the complete wrap required to monitor, police, and control your environment proactively. For the WAN infrastructure this includes:

Infosim Vendor Management Systems

  • Inventory Management (e.g. Device types, cards, serial numbers etc.)
  • Topological Management (e.g. Network Topology Visualization)
  • Configuration Management (e.g. Config Backup\Restoration)
  • Policy Management (e.g. Configuration Policy & Governance Control)
  • Change Control (e.g. Configuration Lock-­‐Down Change Control)
  • Performance Management (e.g. Bandwidth, QOS, System, Interface Performance with Threshold Management)
  • Fault Management with RCA (e.g. Fault Correlation Management with unique Root‐Cause‐Analysis)
  • Service Visualization (e.g. Visualize your entire cloud service environment)

Having this level of management control is required for a truly complete proactive management service for your private and public cloud WAN access. With traditional or legacy element management systems, costs can escalate when having to procure and support this number of functional management systems, which ultimately increases in CAPEX and OPEX.

However, StableNet® is a unified management system with a wealth of integrated functionality that therefore makes it extremely cost effective, driving down CAPEX and OPEX requirements while differentiating your management capabilities and keeping your operating costs to a minimum.

Step 2 – LAN Infrastructure Interconnectivity

The Local Area Network (LAN) is a critical element for network traffic delivery within the cloud hosting or datacenter. Your entire WAN access and cloud server hosting platform environment will have been interconnected to Infosim Public Private Cloud 2your physical and virtual LAN switching network infrastructure. The LAN switching element is the backbone of your cloud hosting environment so any problems within this area will seriously affect your customers and partners IT services. Implementation of a management system that has a complete proactive monitoring solution will reduce the risk of potentially damaging service outages.

As stated in the previous section, StableNet® is a unified management solution and is therefore ideally suited for cloud infrastructure management. For the LAN element of your cloud hosting environment StableNet® provides an array of multi‐functional capabilities that provide the complete wrap required to monitor, police, and control your LAN environment proactively as well as visualize the entire hosting environment from a single view detailing all LAN interconnection to both the WAN access points and the server hosting systems. The LAN infrastructure includes:

Infosim Vendor Management Systems 2

  • Inventory Management (e.g. Device types, cards, serial Nos etc.)
  • Topological Management (e.g. Network Topology Visualization)
  • Configuration Management (e.g. Config Backup\Restoration)
  • Policy Management (e.g. Configuration Policy & Governance Control)
  • Change Control (e.g. Configuration Lock-­‐Down Change Control)
  • Performance Management (e.g. Bandwidth, QOS, System, Interface Performance, with Threshold Management)
  • Fault Management with RCA (e.g. Fault Correlation Management with unique Root‐Cause‐Analysis)
  • Service Visualization (e.g. Visualize your entire cloud service environment)
  • 802.1q Trunk Monitoring (e.g. Monitoring of critical LAN trunk interconnects)
  • SPAN\RSPAN Monitoring (e.g. Monitoring of SPAN\RSPAN)

Step 3 – The Secure Infrastructure Environment

The security infrastructure surrounding the hosted WAN and LAN environment will typically consist of firewalls, intrusion detection (IDS/IPS), logging analytical systems (SIEM\SEM, etc.), and appliances. While many of these systems have specific vendor element managers for the configuration, analytics, and reporting, they will also support standard SNMP (Simple Network Management Protocol), system event and alarm logging functionalities, among other capabilities. StableNet® is vendor agnostic and supports many of these appliance types (F5, Cisco, Juniper, Checkpoint, etc.). It is therefore very important these devices are managed in a way whereby the physical and virtual elements are visualized within the service topology, and the performance and change management controls are policed around threshold, event and alarm management. Management and policing of specific configuration criteria, for example Rule-Set policies, are crucial for maintaining proactive service availability. StableNet® functionality also extends to extensive logging and analytical reporting capabilities which, can be deployed in high‐availability to maximize resilience and redundancy.

Step 4 – The Physical & Virtual Hosting Platforms

The physical and virtual platforms are controlled and built via the automation & provisioning tools. Management of the hosting systems, both physical and virtual, their associated operating systems (e.g. Windows, Linux, StableNet Integrated Data BusSolaris etc.), and physical and virtual network interconnections into the LAN hosting infrastructure will also need to be configured for performance, threshold event and alarm management, with specific service KPIs and SLAs. Visualization of both the physical and virtual environments together with the real‐time performance is critical for proactive management. Therefore, speed of onboarding the management wrap around the virtualized platforms needs to be engaged during the automated build process.

StableNet’s® unified management system provides the complete array of functional capabilities required for monitoring and managing the hosting platforms within a cloud environment. More importantly it can also be integrated with a plethora of provisioning and automation tools that make it very attractive in this space due to enriched capabilities. The StableNet® API provides seamless integration to and from other functional tools so as systems are built the provisioning of the full proactive management capability is provisioned to your service assurance criteria.

Step 5 – Application Performance Monitoring

StableNet APM Pie ChartThe performance of the applications your customers are using is crucial to your customer experience, as it’s the experience of the service that is paramount to the success of your business. Being able to measure the performance of applications, used by both public and private cloud customers, and provide monitoring dashboards and reporting of the service performance is a standard requirement for any cloud service provider.

APM products in the market place today have a wealth of functionality that brings additional complexities and ultimately results in a costly operating model. StableNet’s® APM functionality is already integrated with other enriched capabilities that make troubleshooting and identification of root cause so much easier from a single product.

Many applications today are browser, or Web‐based, applications. StableNet® has the ability to configure pre-defined scripts that can interact with a Web‐based application and perform a suite of metric tests that are collected and analyzed for specific performance‐related, and problem determination monitoring and reporting requirements.

  • Web‐based Application MonitoringStableNet Service Experience
    • URL\Web Page Availability and Response Monitoring
    • Historical Performance
    • Performance Trending
    • Performance Analysis

Your business customers rely on Web‐based applications to generate sales, present market research, or provide services. The complexity of these applications means they are susceptible to performance issues and failures; therefore, it is imperative from the user experience that the application functionality be monitored in a way where the deployment of transactional script-­‐based monitoring enables:

  • Performance Monitoring of each Application Transaction Step
  • Identify Application Performance Congestion and failures
  • Optimize User Experience
  • Root-­‐Cause-Analysis through Event & Alarm Notification Management

Deployment of APM will drive down your MTTR (Mean-Time-to-Repair) and provide you the comfort of knowing your customers are experiencing great service application performance. It will also provide you with the confidence to offer customer application performance-based SLAs (Service Level Agreements) that will drive existing customer sales and increase your customer base.

StableNet Sys LogConclusion

There are many aspects to managing a cloud hosting environment. Stacking up individual element managers to perform specific functions for your OSS (Operational Support Systems) requirements is both costly in terms of capital expenditure outlay; for example, platform, software, annual software support for each element management system, and operational expenditure in terms of increased headcount and tool specialization for each system. The strategy for the 21st century is to deploy unified management solutions, whereby you maximize the functionality capabilities from a single system, thus driving down both your capital and operational expense. More importantly though is the benefit it provides. A unified management platform is a suite of multi-functional capabilities in a single product that therefore has seamless integration and cross-correlation built-in, enabling what we class as True-Visualization of your entire End-to-End cloud hosting environment.

Thanks to Infosim for the article.