The business requirement was to migrate Legacy Network and Security devices to Advanced Technology Platforms. Port-level and perimeter level security, with Advanced Security Appliances and Content filtering implemented.

Offerings

Digital Consumerization
  • Self-Service, market place for independent IT assets and service bundles
  • Metering and chargeback to any level of organizational unit hierarchy
  • Multi-currency and multi-lingual interfaces for distributed environment
  • Ability to offer IaaS, PaaS and SaaS service bundles through catalog management
  • Service catalog creation for custom offerings around VDI and workspace computing
  • Service Design and Provisioning
  • Service Aggregation and consolidation
  • Cloud orchestration
  • API based integration with other modules / tools
  • Reports and dashboards
Enterprise IT Infrastructure Monitoring
  • Proactive monitoring of IT Assets spread across hybrid estates
  • Automated enrollment of provisioned instances with defined parameters / thresholds
  • Custom reports and dashboards
Application performance Management
  • Monitoring of synthetic and non-synthetic transactions
  • Custom reports and dashboards
ITIL v3 compliant ITSM Ticketing
  • Entire range of ITIL v3 compliant services
    • Service Request Management
    • Incident Management
    • Problem Management
    • Change Management
    • Knowledge Management
    • Configuration Management Database
  • ITSM Reports for compliance
  • Custom reports and dashboards
Automation and Orchestration
  • Automated Service Request Fulfillment
  • Automated remediation for Standard Operating Procedure driven Incident Management
  • Automated patch management for approved patches / fixes
  • Mass roll-out of patches / updates
  • Automated Application release management
  • Updation of automated actions in the ITSM ticketing tool for audit and reporting purposes
  • Automated enrollment of workloads in Monitoring tool, CMDB and parameters to be monitored in the monitoring tool
  • Custom workflows development for automation based on incident analysis
Privilege Identity Management
  • Integration with Enterprise authentication to enable access governance
  • Ensure secure access that cannot be reused for increased security
Reporting and Dashboards
  • Multi-tenant Custom portal
  • Role based access control
  • Integration with existing tools through API’s
  • Widgets, dashlets and portlet features to customize dashboards based on preferences

Resources