Ikon Managed Services

Click here to load reader

download Ikon Managed Services

of 43

  • date post

    07-Nov-2014
  • Category

    Technology

  • view

    1.528
  • download

    1

Embed Size (px)

Transcript of Ikon Managed Services

  • 1.
  • 2. Keross Philosophy
    • At Keross, we believe the key to business success is the ability to harness and understand conclusions inspired by several un-correlated events Synchronicity. For us, Synchronicity means success found through business and technical harmony which is why we created IKON Managed Services
  • 3. Keross Presence
    • Our client and partners span over more than 45 countries across 4 continents
  • 4. Some References
  • 5. Keross Portfolio of Services
    • Keross portfolio of services currently includes four lines of business:
      • Business Intelligence Services
      • Managed Infrastructure Services Vision 24/7
      • Managed Security Services Vigilant360
      • Managed Voice Services
  • 6.
  • 7.
        • Introduction
        • Monitoring and Notifications
        • Microsoft OS Monitoring and Management
        • UNIX OS Monitoring and Management
        • Networks Monitoring and Management
        • Databases Monitoring
        • Helpdesk Application
        • Reporting
        • Pricing Model
        • References
        • Contact
    AGENDA
  • 8. Advantages
    • Operational Cost reduction
      • Up to 40% reduction. ROIin less than 6 months. No investment, very low TCO.
    • Downtime Reduction
      • Anticipation of downtime, ProActive Monitoring and Active Support
    • Technical Flexibility
      • Independant of Customer environment and architecture
      • Free of charge customization
    • Adaptative Pricing
      • Customer Oriented Pricing to match budget requirements
  • 9. What We Provide
    • Monitoring and Availability Management
      • 24x7 automated network support, with user-defined notification and escalation rules
      • Proactively stop issues before they happen and reduce their impact
    • Performance Management
      • Reports for capacity planning and predictive analysis, so you can make informed decisions
    • Service Management
      • Measure the value you are getting from vendors and service providers
      • Requests and outages processing using best practices based on ITIL
    • Remote Diagnostics , Remote Control and On-site support
      • Notifications containing important information about the machine and network
      • Ability to take control of a device for immediate remediation
      • Local support
  • 10.
    • Systems Linux, Microsoft Windows , Mac, Z/OS, AIX
    • Networks Cisco, Juniper, Nortel, 3COM, CheckPoint, Fortigate, Netscreen
    • Security Firewall, IDS, IPS, log management
    • Databases Oracle, DB2, Microsoft SQL, MySQL
    • VoIP, IPT Cisco, Asterisk
    • Video Conf Cisco Tele P resen c e
    • Applications ERP, SAP, CRM , Core banking
    • Performance W EB , applications
    • Hardware Dell, HP, IBM
    • Mails Microsoft Exchange, Blackberry
    • BI Dashboard reports with misssion critical information
    • ServiceDesk Full ITIL compliant
    • New application can be developed in 2 weeks time free of charge
    Areas Of Interests
  • 11. KEROSS NOC Customer Notifications Reports Monitoring Management Third-party Applications How It Works
    • Probes and Agents
      • Execute monitoring and management tasks
      • Installed in customers network , behind firewall s
      • All communication is outbound from customers network
      • Secure data transfer using HTTPS and 128 bit encryption
    Central Server Internet facing self-contained appliance located on Keross, Partner or Customer servers
  • 12.
        • Introduction
        • Monitoring and Notifications
        • Microsoft OS Monitoring and Management
        • UNIX OS Monitoring and Management
        • Networks Monitoring and Management
        • Databases Monitoring
        • Helpdesk Application
        • Reporting
        • Pricing Model
        • References
        • Contact
    AGENDA
  • 13.
    • Operating System APIs
      • Agents query local OS for baseline health metrics
    • Log File Analysis
      • Agents scan application log files (XML & TXT) for regular expressions or strings
      • Windows Event Logs
    • TCP/IP
      • Port monitoring
    • WMI
      • Microsoft proprietary method of collecting data from Windows systems and applications
    • SNMP Service Engine
      • Collect performance and availability data from SNMP enabled devices (inc. CCTV cameras, UPS, environment control devices, etc..)
    • Syslog / SNMP Traps
      • Monitor log & trap data from monitored devices (i.e. firewalls)
    • ODBC
      • Monitor results of any query sent to an ODBC compliant database
    • EDF
      • API to allow for custom metric collection for devices which agents are not available (i.e. Backups, etc..)
    Industry Technologies
  • 14.
    • Methods
      • By email and SMS
      • One or many people
      • Customizable automatic escalation procedure
    • Usability
      • Based on configurable thresholds
      • Globally available for customer (from Internet)
      • Specific to customers and/or devices
    • Scheduling and escalation
      • Customizable schedules
      • Optional escalations, delays and repeats available
    Notifications
  • 15.
        • Introduction
        • Monitoring and Notifications
        • Microsoft OS Monitoring and Management
        • UNIX OS Monitoring and Management
        • Networks Monitoring and Management
        • Databases Monitoring
        • Helpdesk Application
        • Reporting
        • Pricing Model
        • References
        • Contact
    AGENDA
  • 16.
    • Remote Desktop Support
      • Attended remote desktop initiated by a customer user requesting technical support
      • Patching, GPO, configuration, NIC monitoring, hardware issues, etc...
    • Remote Control