opEvents Prevents Event Storms During A Snowstorm

opEvents Prevents Event Storms During A Snowstorm

I dropped into a quarterly business review that one of the Account Managers was doing with one of our customers last week. I like to do this from time to time to hear it for myself directly from the customer. It helps me understand the customers and gives me an opportunity to discuss our platform post sale and integration.

This particular customer is a Telecommunications Carrier out of North America who runs a lot of wireless and fibre and are rapidly expanding.

The Head of Network Operations was on the call, and for the purposes of keeping the identity private, let’s call him Joe.

Joe talked about the snowstorms and how it impacts their network and field services team. The way it works is that the NOC team gets an alert, does some diagnosis and decides what process needs to occur. To send field service staff means that the problem is something that cannot be remotely fixed. Sending the team out in bad weather to work on wireless equipment is hard on the people who do the work, but at the end of the day, to quote Joe, “we pride ourselves on great customer service.”

Before this customer had opEvents installed, they would have a high rate of field service calls that would result in no fault found during snowstorms. This means that the field services team were not being sent to fix real field related problems. For any company with a field services team, you know how important it is to send these guys to real problems.

The impact for the customer was that to clear all the events would take days, with over 50% being false reports.

During recent snowstorms, opEvents would handle the alert and find the source problem. The NOC team then could send the field services team out in the snow to investigate and fix the problems. Joe said that the level of accuracy in the alerts was fantastic and the NOC and Field Services Team rebuilt their trust and had confidence that they were being sent to a real fault.

When Joe studied the impact that the Opmantek Platform brought to the table, opEvents reduced event storms to zero, deduplication was no longer a problem and only pushed real events to the team. Field service calls were reduced and the network was brought back to normal in half the time.

“We had a lot of competitors’ customers switch to us during the snowstorms. The amount of downtime we suffered was minimal as we were right on top of any faults, we knew where they were and their severity and deployed our field services team accurately. It puts us ahead of the market.”

3-Steps To Increase Your Automated Event Management

3-Steps To Increase Your Automated Event Management

Recent advances in Operational Process Automation at Opmantek means that our MSP customers can deliver exceptional value to their clients; exceeding their SLAs whilst becoming incredibly sticky.

Are you facing any of the challenges below?

  • Cost pressures as clients try to drive down prices.
  • Ability to meet your SLAs due to overworked technical teams.
  • Absolute reliance on one or two technicians to keep your clients happy.
  • Challenges in retaining level 3-4 technical resources.
  • Significant burdens in maintaining accreditation.
  • Managing increasingly complex client networks.
  • Retaining skills associated with client legacy networks.

Resolve these challenges with incredibly rapid ROI and amazingly low TCO

Opmantek has long believed that Operational Process Automation is one of the foundational pillars for a successful network management strategy. A key piece to this is ensuring that actions are undertaken in a consistent manner each time, with no variation from what is outlined as the standard protocol.

This will help you to:

  • Simplify the procedure
  • Reduce cost
  • Deliver consistent outcomes with your agreed SLAs

Through the use of “context sensitive event actions”, you may now replicate troubleshooting actions and escalation procedures, dynamically.

Example Use Case

1. Issue with Cisco Interface Identified

Here’s the event log for the entire network. Our event management system automatically parses incidents on your client’s networks into Events.

chevron_arrow_down
context_sensitive_actions_step1
2. Context sensitive action bar initiated

Once a specific event has been identified “Context Sensitive Actions” are displayed against the event either automatically or by guiding your NOC team through the steps to remediate.

chevron_arrow_down
context_sensitive_actions_step2
3. Cisco remediation commands executed

The system automatically creates a ticket in the system, pings the affected nodes and Troubleshoots (TS) the Cisco Interface. Once those actions conclude, the results are displayed on the event itself! The operator may now take further action or simply close out the Ticket.

context_sensitive_actions_step3

All of this can happen without the NOC or your client knowing there was ever an issue. Save time, save money and increase your clients’ satisfaction. If you’re interested in taking advantage of these incredible capabilities, please fill in the form below;

Book a Demo

¿Por qué Opmantek es la herramienta más segura para la gestión de tu red de TI?

¿Por qué Opmantek es la herramienta más segura para la gestión de tu red de TI?

El tema informático de moda en estos días sin duda ha sido el “hackeo” que ha sufrido la empresa proveedora de software Solarwinds en sus productos, y como no va ser tema de conversación si tiene en vilo a muchos de los gigantes tecnológicos de los Estados Unidos que son usuarios de esta marca.

Este gran agujero en la ciberseguridad cuyo alcance final aún no es conocido así como tampoco se conoce a los autores, ya ha dejado una gran cantidad de afectados como Cisco, Nvidia, Belkin, VMWare o Intel  (El mismo Microsoft lo es).

En el área gubernamental se menciona a la misma CISA como afectada, el DHS, la NNSA o el departamento de energía.

No se sabe a ciencia cierta que sucedió, ya que hasta el día de hoy se siguen descubriendo nuevos detalles e información al respecto.

 

Expertos en ciberseguridad coinciden en que este ataque fue preparado de una manera minuciosa y cocienzuda hacia los puntos neurálgicos de los sistemas, quedando demostrado lo frágil que son los mecanismos de ciberseguridad y lo inmaduros que estos aún son frentes a las amenazas bien planeadas.

 

Se menciona que la vía de acceso de los “hackers” fue el sistema Orion de Solarwinds -lo troyanizaron-, sustituyeron una actualización con un “malware” firmado con el sello oficial de Solar. Esto sucede cuando los clientes llevan a cabo el “update” para actualizar sus sistemas -lo cual  sería un proceso normal y común entre los usuarios de esta plataforma-.

Esto no lo hizo ningún novato, fue una mente experta que conoce muy bien el teje y maneje de la plataforma afectada.

El “hackeo” fue en cascada y una de las acciones fue confiscar el dominio utilizado para detener el ataque, pero no es la solución definitiva, es solo un paso para tapar esta gran fuga. Todavía tienen que pasar muchas horas de análisis y de enteder como pudo pasar esto y que nadie de Solarwinds se pudiera dar cuenta de lo que pasaba.

 

Muchos se preguntarán cual era el objetivo de este ataque y muchos también creerán que era el ataque a entidades privadas y de gobierno que utilizan este software, pero ¿acaso ¿será que el mismo fue dirigido a algo tan intangible como la confianza y la confiabilidad de la infraestructura crítica del mundo a través de un espionaje que insiste en estar haciendo trabajar horas extras a las centrales de inteligencia.? Al final del día solo podemos especular los motivos, pero lo que podemos hacer como empresas es siempre buscar las alternativas como Opmantek que gracias a su sistema basados ​​en LINUX el cual es bien conocido por ser seguro y menos susceptible de recibir este tipo de ataques y si adicionamos que Opmantek cuenta con un diseño de producto robusto y de clase empresarial, tu organización sería un objetivo difícil para los mismos.

How To Thrive In A Post-Covid Era: 10 Predictions For Enterprise Network Infrastructures

How To Thrive In A Post-Covid Era: 10 Predictions For Enterprise Network Infrastructures

An enterprise network serves as the foundation for reliably connecting users, devices and applications, providing access to data across local area networks and the cloud, as well as delivering crucial insight into analytics.

But in the wake of a year that was no doubt shaped by COVID-19 and the disruption it brought to the industry, how have enterprise networks been impacted, and what are the requirements moving forward?

What were previously technology nice-to-haves and future infrastructure intentions, are now swiftly becoming business imperatives.

In this blog, we’ll explore our top 10 predictions for network infrastructure in 2021.

 

1.   Cloud Application Delivery

 

The traditional office-based-model has no doubt permanently changed and flexible working arrangements brought forward by the pandemic will continue. A Boston Consulting study from last year found that 63% of employees want a hybrid model whereby they continue to work from home part of the time.

Organizations will further turn to the cloud for application delivery, placing an investment in remote connectivity and new security functionality.

 

2.   Businesses Turn to Big Data and Analytics

 

The requirement for businesses to be agile, change and adapt is more prevalent than ever, and decision-makers need to identify trends and ultimately stay ahead of the curve through outcomes-based strategies.

Big data is becoming an imperative tool in every organization’s arsenal, though its presence is superfluous without the appropriate means to disseminate and analyse it.

We predict this will drive the recruitment of data professionals and further, the simplification in data management through self-service means, accessible to non-data-professionals.

“It’s really about democratizing analytics. It is really about getting insight in a fraction of the time with less skill than is possible today.” – Rita Sallam, vice president and analyst at Gartner.

 

3.   The Year of Mass Adoption for Cognitive / Artificial Intelligence

 

With big data, comes big responsibility and moreover – big processing requirements, which is where AI will be heavily recruited.

2021 will be the year of mass adoption for AI, as businesses of all levels have experienced a paradigm shift into a digital-first model. Corporate networks have been tested through remote working arrangements, uncovering major reliability issues and security threats. IT leaders are looking for a set and forget solutions that automatically provide optimization and security, which is where software such as Opmantek’s NMIS, opEvents, opConfig and Open-AudIT can assist.

Opmantek software is a key system used by IT operations teams across all industries — it acts as the dashboard of a car and tells them how fast everything is going and lets them know when something is faulty. It even predicts future faults, and that’s a big part of the AI. The longer you run our software, the smarter it gets — it learns about your IT Infrastructure and starts to automatically manage it better and deliver better information to the IT operations team.” said Danny Maher, Chairman of Opmantek .

 

4.   Hybrid Clouds in High Demand

 

Agility, speed, security, scalability and compliance are all considerations for IT decision-makers.

Though, there’s never a blanket / one size fits all solution for every business use case, and so the demand for hybrid cloud environments will continue to grow. The traditional model of cloud providers is that of a one-stop-shop. However, we predict as demand grows; cloud market leaders will introduce greater interoperability and further allow users to introduce cloud tools across their existing on-campus networks. Collaboration between cloud providers may even be on the cards as users demand greater flexibility.

 

5.   Networking Virtualization

 

Network virtualization offers many benefits by automating and simplifying processes, including network configuration flexibility, improved control over-segmentation, speed, increased security and cost savings.

According to research by Spiceworks, 30% of businesses currently use network virtualization technology — and an additional 14% plan to use it within the next 2 years.

 

6.   Unified Communication And Collaboration Tools Are Here To Stay

 

End-user adoption is often one of the greatest barriers for IT professionals looking to implement new software. However, seemingly overnight, employees were catapulted into a reality where unified communications as a service (UCaaS) was no longer just an occasional collaboration tool, but rather a necessity of the employment.

We have changed our habits and the way in which we do business. Even as the workforce begin to transition back to office or hybrid office/work from home environments, there’s no doubt that UCaaS is here to stay. Providers will introduce new functionality and continue to diversify their offering to accommodate hybrid working in 2021.

 

7.   WiFi Gets an Upgrade

 

Businesses and consumers alike want things faster, easier and more efficient, and WiFi is no exception. Enter WiFi 6e.

6e not only offers new airwaves for routers to use, but it doesn’t require overlapping signals.

One of the major benefits of 6e is a reduction in network congestion, specifically in areas where users are closely spaced.  As the pandemic continues to unfold, rush hour and crowded spaces are less of an issue, so it may be a waiting game as to when in 2021 we realise 6e’s true potential.

 

8.   IoT (Internet of Things) – More than just Alexa

 

As digital transformation is on the rise, so is IoT and its use cases. A SecurityToday article forecasted that by 2021 there would be 35 billion IoT devices installed worldwide.

IoT is already revolutionizing the way key industries do business, however, healthcare will double down in 2021. Reduced access to face-to-face medical contact has accelerated the need for remote care, and according to Allied Market research – the global internet of things in the healthcare market is expected to reach $332.672 billion by 2027.

 

9.   A Focus on Cybersecurity

 

In light of recent high profile cybersecurity attacks which infiltrated private companies, state and federal organizations by inserting malicious code into trusted software; cybersecurity and secure network monitoring will be paramount.

If you have data or services of value, you need to protect it properly. Keith Sinclair – CTO & Co-founder of Opmantek says, “It is critical to business continuity and data security that you have security controls in your environment to mitigate risk.”

 

10.    Infrastructure Management Software Leveraged

 

Application demands are continuing to grow and networks must respond. Network professionals must find means of simplifying these increasingly complex systems and environments. Here’s where automated network management software will be leveraged.

Opmantek Software serves to augment a network engineering or system administration role. As well as emulating actions that network engineers take within a network management system, it can also perform advanced maintenance tasks, assist in the interpretation of network data and communicate effectively with other digital systems in order to categorise, resolve and escalate potential network issues.

 

 

For more information about Opmantek and the services we provide, get in touch. Our network engineers are available to chat through specific issues you may be facing within your own network environment.

Book a Demo

[E-Book] How to Manage Capacity Before it Becomes a Problem

[E-Book] How to Manage Capacity Before it Becomes a Problem

This E-book will help you with a simple ‘follow the outline solution’ on how to properly manage capacity, so if you ever have to resolve capacity issues, you are ahead of the curve and ready to implement remediation.

Key Points Discussed:

  • Solutions to deal with Analysis Paralysis
  • How to detect capacity issues through Threshold Management
  • Using Opmantek Products to Manage Capacity
  • Simple Steps When Managing Capacity Issues as Incidents
  • Approaches to Baselining for Monitoring and Support

 

Get the E-Book