Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF...

12
Page 1 of 12 SERVICE MANAGEMENT _____________________________________________________________ Mangesh Amale, Director

Transcript of Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF...

Page 1: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 1 of 12

SERVICE MANAGEMENT

_____________________________________________________________Mangesh Amale, Director

Page 2: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 2 of 12

About Velox Solutions:-

We are one of the India's premier IT Services and Solutions Company delivering "End to End" Integrated IT infrastructure, Network Infrastructure, Network Security & IT Monitoring Solutions to its customers.

Velox is an enterprise monitoring and cyber security company and has acquired global best processes & practices through an ISO 9001:2008 certification. The company has

been recently selected by world class “CIO Review Magazine” as India’s Top 20 Most Promising Business Intelligence Solution Provider 2017, an article on Velox has been published in “CIO Review Magazine,” in their February 2017 issue.

Page 3: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 3 of 12

PREFACE:

IT service management (ITSM) refers to the entirety of activities – directed by policies, organized and structured in processes and supporting procedures –

that are performed by an organization to design, plan, deliver, operate and control information technology (IT) services offered to customers.

ITIL (Information Technology Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services

with the needs of business. Core IT Helpdesk is based on Information Technology Infrastructure Library

(ITIL) & IT service management (ITSM) framework, which focuses on aligning IT services with the needs of business. Core Helpdesk is a game changer in turning IT teams from daily fire-fighting to delivering awesome customer

service. It provides great visibility and central control in dealing with IT issues to ensure that businesses suffer no downtime. Core Helpdesk, in the context of

IT, is a department inside an organization that is responsible for answering the technical questions of its users. Most major IT companies have set up help desks to respond to quires from their customers.

INTRODUCTION:

Service management in the manufacturing context, is integrated into supply

chain management as the intersection between the actual sales and the customer point of view. The aim of high performance service management is to optimize the service-intensive supply chains, which are usually more complex

than the typical finished-goods supply chain. Most service-intensive supply chains require larger inventories and tighter integration with field service and third parties. They also must accommodate inconsistent and uncertain

demand by establishing more advanced information and product flows. Moreover, all processes must be coordinated across numerous service locations

with large numbers of parts and multiple levels in the supply chain. Among typical manufacturers, post-sale services (maintenance, repair and

parts) account for less than 20 percent of revenue. But among the most innovative companies in service, those same activities often generate more than 50 percent of the profits.

Service Management is an intangible product that brings utility or value to the

customer. Service Management is thus a managerial discipline focused on a customer and a service. Service management is multidisciplinary field which is

Page 4: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 4 of 12

related to many other management fields. Services must be managed

throughout their lifecycle. Services may take various forms, the basic principles of their management are common to all types of services. Service Management is often associated only with fields of information and communication

technologies, where has at its roots (IT Service Management).

Benefits of Service Management: The main drivers to establish or optimize its service management practices are

varied:

High service costs can be reduced, i.e. by integrating the service and products supply chain.

Inventory levels of service parts can be reduced and therefore reduce

total inventory costs. Customer service or parts/service quality can be optimized. Increasing service revenue.

Reduce obsolescence costs of service parts through improved forecasting. Improve customer satisfaction levels.

Reduce expediting costs - with optimized service parts inventory, there is no need to rush orders to customers.

Minimize technician visits - if they have the right part in hand, they can

fix the problem on the first visit. Total Service Management is the tool through which company can

optimise inventory, avert Over stocking or stock out situation and also

improves right quantity at right time through integration of Kanban & Two bin System with Service management.

Page 5: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 5 of 12

SUMMARY FEATURES OF SecureIT:

SecureIT is an ideal security and life-support tool, which aids in maintaining track of user activities in a computer with a facility of sending regular updates

to authorized individuals. This information can assist in defining policies for information exchange, to defining and understanding the psychology of

criminals operating. The unique feature of tapping individual keystrokes gives an added advantage of monitoring the conversation right from MSN messenger to a normal e-mail. This feature of SecureIT can revolutionize the way

monitoring and security is being done. SecureIT installed in the computer, allows the administrator to monitor the

activity of the user. It also keeps tracks of individual file and the time of access and changes made to it. This monitoring could be done even through mobile

phone, as the user needs to log on to the website which could be done both by mobile as well as computer. It shall provide also provide an analysis of the users work style of using the computer and along with the amount of time

devoted on accessing individual URL, files. This monitoring technology could trace any illegal activities happening in computer system i.e. e-communications, monitoring, filtering, and control solution enabling effective

management of Internet usage in desktop and server-centric environments. SecureIT monitors web browsing, file transfers, news, chat, Internet Messaging,

e-mail and web-mail, including all encoded attachments. SecureIT can both monitor e-communications based on keywords and phrases, thereby protecting against the loss of confidential information, transmittal of unacceptable

content and access to inappropriate web sites. In sensitive environments, SecureIT can also be used to restrict user or group access to only approved

external and internal sites.

Page 6: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 6 of 12

SNAPSHOT OF THE PRODUCT

Page 7: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 7 of 12

Page 8: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 8 of 12

Modules Under SecureIT:

A. Network Monitoring System:

Link Up & Down Monitoring Link Monitoring (Packets & Jitter etc.) Network Bandwidth Utilization Automated Network Topology Network Traffic Analyzer Top Network Configuration Routing Table Information

Router Health Monitoring Router Backup & Restore OSPF Configuration VRF Latency Monitoring Syslog Monitoring Protocol Description :- TCP/UDP/ICMP/SNMP & IP details CRC & Event Log Manager VSAT /RF /Dongle / Wifi Monitoring Network Operation Alerts Firewall Monitoring Switch Monitoring LAN Monitoring – ATMs – Desktops Other IP Based Devices Reports & Graphs

B. Server Monitoring System: Server Health Monitoring Server Availability Uptime & Downtime Threshold Setting for CPU, RAM, Drivers Hardware Configuration Monitoring Files & Folder Monitoring – Use - Misuse List of Install/ Uninstall application Service Monitoring Analyzer Windows Service Level Monitoring Cluster Checks Threshold for CPU, Memory & Disk Utilization of Servers. Alerts on use of External USB devices

Hardware Inventory Color codes & Sound alert for misuse or fault System Login/Logoff Analyzer Data Leak Prevention – USB / Copy Remote Desktop Management SLA Escalation Matrix Server in LAN status Server status( On/Shutdown)

Compatible for Window – Unix & Linux Servers

Page 9: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 9 of 12

C. Desktop Monitoring System:

Desktop Health Monitoring Desktop Availability Uptime & Downtime Desktop status( On/Shutdown)

Threshold Setting for CPU, RAM, Drivers Hardware Configuration Monitoring

Files & Folder Monitoring Application Detection & Prevention Website Detection & Prevention

File & Content Copy Detection List of Install/ Uninstall Application

LAN Status Monitoring Utilization of Desktops. Alerts on use of External USB devices

Hardware Inventory Management System Login/Logoff Analyzer Internet Connection Monitoring

Window Patch Management Unauthorized System Login

Operating System Information Remote Desktop Management Color codes & Sound alert for misuse or

fault Alerts for CPU, Memory & Disk Reports & Graphs

D. Add On Modules – Database –VM – IIS –DHCP :

URL Monitoring Storage Monitoring DNS Monitoring – Telnet Status & URL Status

Skype Server Monitoring IIS Server Monitoring

VM Inventory & Monitoring Nutanix Server Monitoring DHCP Server Monitoring

Database Monitoring – MS SQL Server - Oracle Interface Reliability Monitoring. Configuration Backup & Scheduling.

Change Configuration Alerts using File Integrity. Inventory Management – Device Config, Serial No Make & Model etc.

Alert Engine for Highly Usage Resources Business Continuity Planning – BCP Multicast File Management - Patches Management & File Transfer

Page 10: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 10 of 12

E. Cyber Security Operation Centre – SOC

F. IT Helpdesk:

Automate & Manual Call logs. Ticket Tracking system

SMS & Email based call log

G. Core Knowledgebase: Articles Management Error & Resolution Recording

Error code & Message Management Tips & Tricks Alerts via SMS, Emails

Page 11: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 11 of 12

H. IT Asset Management: Track of Asset Entry as Warranty, AMC & Insurance expiry Alerts via SMS, Emails & Popup

Document Upload facility Deprecation Calculations

I. File Integrity:

Tracking Critical Files

Preventing Files Changes Preventing Deletion in file

Restoring Previous change files

J. Customer Relationship Management (CRM):

Customer Wise Query Handling Tracking of Query Resolution Alerts to Customer

MIS Reports to Management

K. Change Management System: Entry & Raising an request Single & Dual Authorization

Department wise Approval

L. ScanPlus Antivirus:

Effective Control over all Viruses Registry scanner-Cleaning &

Rebuilding USB Port Blocking Online Browsing Security

Email Scanning

M. ATM Terminal Security: White listing Application Full Hard Drive Encryption

BIOS Password Pre-boot Password USB Enable/Disable

LAN Monitoring

Page 12: Page 1 of 12velox.co.in/wp...Management-White-Paper-Ver3.1.pdf · Page 5 of 12 SUMMARY FEATURES OF SecureIT: SecureIT is an ideal security and life-support tool, which aids in maintaining

Page 12 of 12

Secured Monitoring Solution: SecureIT provides IT administrator a complete

360 degree view of entire IT Infrastructure & Network thereby increasing the manageability and reducing the workload.

Velox have continuously been working as a leading Products and Services company, catering innovative security

products in Information Technology in INDIA.

CONCLUSION:

Protection of critical information infrastructure is of prime importance to national security, economy, public health, and safety and as such, it has

become imperative to declare such infrastructure as 'protected' in order to restrict its access. SecureIT would help to super impose several gray areas that exist within the law and would help in enforcing the prevalent IT Act in an

entirely different form. The cyber crimes has increase in vast number SecureIT is an appropriate solution to it.

By means of this document we would bring safety to the assets / resources allocated. This safety & safeguard activity is carried in conjunction on

parameters defined. Real time measures with support of alert are being mapped to action taking team. Various MIS reports with defined analysis are being shared with stakeholders. Health of the assets / resources is being

monitored on regular interval of time. This solution is an aid to investigation & vigilance team to drill down on specific activity. Product is flexible in

incorporating new cyber law with any additional measures. We enable to block the assets outside the resources allocated; free access to outside devices such as external hard drive, pen drive is prohibited.

In today’s information age every enterprise need solutions which can help them

accelerate their work process in a secure way and at the same time following all the standards and regulations. We are specializes in providing solutions in

almost all verticals of IT. Starting from providing solutions in Network administration and management and also provides solutions for data security and storage.