We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byEmily Rimes
Modified about 1 year ago
CREATING CERTAINTY Intelligent router tool, designed to create certainty in your network. 1COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED WHERE BLUE SKY THINKING STOPS, SERTUS TAKE OVER
CREATING CERTAINTY Sertus are a software vendor who specialise in developing pre and post network change tools for the IT environment. Sertus is a post-change assurance tool used to assist organisations with: - Pre and post network device configuration change verification. - Problem identification, isolation and historical review. Sertus evaluates the impact of pending configuration changes faster than any other tool and helps the network engineer mitigate service outage risks due to network change and device mis-configuration. It generates ‘pictures’ of network device status, analyses and compares state, executes change commands to single/multiple network devices. The Sertus tool is easy to integrate and simple to use within existing operational environments. Sertus can operate as standalone PC-based or local server based or integrated with existing management platforms such as Solarwinds, Ciscoworks, HP Openview and Tivoli. 2COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Who are/what is Sertus?
CREATING CERTAINTY If are any of these apply to you: Under pressure to reduce operational costs and improve change engineer productivity? Facing the challenge of managing growth in network change volumes within the current network change window and/or constrained operational budgets? Being requested to contribute to quicker time-to-market lead times re network change performance, to enable faster revenue turn-up and release of new products and services? Looking to improve network change quality and mitigate customer service outages related to network change activities? Struggling to verify the validity and accuracy of complex and/or large network config change files or duplicate changes to multiple devices? Under compliance scrutiny for risk and impact control of network changes and looking for a robust solution? Grappling with skill shortages and inefficient technical escalations?....then work smarter by using Sertus 3COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Why consider using Sertus?
CREATING CERTAINTY Improved Engineer efficiency: Up to 500% reduction in the time required to augment a network change, test it’s validity, detect errors and rectify. - Reducing network change activities from hours to minutes. Better protection and risk mitigation of Severity 1 customer outages and potential SLA penalty payments. - Service outages can impact annual revenues by up to 4% (source Aberdeen Group 2008) Greater throughput of scheduled network change events for a given change window period and fixed level of change engineer resource. Improved operational config visibility and incident understanding of ’before and after’ outage investigations. - Contributing to drastically reduced time to fix times and improvement of MTTR. Effective problem identification and resolution: Detailed Sertus test output files can easily be compressed and shared with internal escalation teams and/or external vendor TAC/CoE groups. 4COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Key business benefits from using the Sertus tool
CREATING CERTAINTY Sertus is an intelligent router/switch output comparison change tool. Traditional network change processes can take up to 8 hours per change: Sertus intelligent comparator and filtering reduces post change check times to around typically 20 minutes or less: Overall change now only takes 1 hour! 5COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does SERTUS 2.5 work - 1 Engineer runs commands on the router to capture router state Engineer captures all command outputs and stores them in a text file to compare against files after the change is completed Pre- Network Change (15mins) Engineer carries out network change At this stage, engineer may carry out checks to confirm that the changes they wanted to make have been applied successfully Network Change (20 mins.) The engineer now runs the same commands as the pre- change and stores the results Now the engineer makes an attempt to try and compare the pre and post files Post-Network Change (2~8 hours )
CREATING CERTAINTY Sertus can carry out comparisons between the outputs of different router vendors using the same common interface: Sertus Interpreter currently takes outputs for Cisco, Juniper and Open Source BSD/Zebra/Quagga. Other vendor command line interfaces can be developed on request. 6COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 2 Engineer uses Sertus Scripter to get the data from the network devices Retrieved data is parsed (Sertus Interpreter) and analysed (Sertus Comparer) Analysed data is presented to engineer
CREATING CERTAINTY 7COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 3 Command line set examples: Show ip xx Show ip bgp xx Show ip ospf xx Show Multicast xx Show Switch xx Show Open BSD xx Scripting commands Junos commands Filtering of gathered device output data, for example: Show all config changes Show only routes with next hop changes. Identify mission critical routes and flag only missing routes, post the change. etc
CREATING CERTAINTY 8COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED How does sertus work - 4 Sertus: Is non-intrusive to the network to access device information. Does not use SNMP or device traps to collect device config information. Uses normal device command line interface syntax to gather data and run scripts.
CREATING CERTAINTY 9COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED Network Scenario and Sertus Demo Can be provided at a customer-site meeting
CREATING CERTAINTY 10COPYRIGHT © 2010 SERTUS NETWORKS LIMITED - ALL RIGHTS RESERVED The End Questions? For more information visit www.sertusnet.com
Know the Difference™ Release Validation Solution Martin Perlin Marketing Director, Evolven RELEASE WITH CONFIDENCE Prevent production outages and ensure.
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
Network design Topic 6 Testing and documentation.
Know the Difference™ Disaster Recovery Verification Solution Martin Perlin Marketing Director, Evolven THERE WHEN NEEDED MOST? Verify consistency and integrity.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Know the Difference™ Incident Investigation Solution Martin Perlin Marketing Director, Evolven A HIGH STAKES RACE AGAINST TIME Prevent high impact IT environment.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Performance Management (Best Practices) REF:www.cisco.com Document ID
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Martin Otterson Copyright c 2004 OSIsoft Inc. All rights reserved. WiredCity an OSIsoft Company Change the Business Paradigm.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Requirements Capture and Specification IACT424/924 Corporate Network Design and Implementation.
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
© British Telecommunications plc BT Managed Services Innovate
ACL: Introduction & Tutorial 1. Fraud Data Analysis Examples of Fraud tests in ACL: Comparing employee addresses with vendor addresses to identify.
IT Service Management Best Practices – Overview 2/15/2006 John A. Underwood and Steve Sobiech.
Event Management & ITIL V3. Service Desk Service Operation Processes Technical Support Groups Incident Management Problem Management Access Management.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID CISCO NETWORK CONNECTIVITY Center Network Connectivity Monitor 1.1.
ITIL Problem Management Overview© Pink Elephant. All Rights Reserved. 1 1 Problem Management Overview Ensures stability in services, by identifying and.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
SOLARWINDS PROFILER Topic 5 - Slide 1 -. Learning Objectives Describe the value of Storage Profiler to a lead or customer »Describe the top customer.
Manage Operations Lights Out Control. License our technology, an industrial strength, unifying, centralized access and power management standard to Vendors.
Network Management Presentation HP Openview. OpenView Network Node Manager (NNM) Overview How it works Capabilities Technical and business benefits Summary.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Implementing Changes in BGP Policy.
Network Management Presentation HP Openview Christopher Scott December 10, 2004.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Matt Ayers Senior Program Manager Microsoft Corporation WCL403.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Page 1 Capability Business Benefit Business Risk KEYBA Capabilities: Benefits V Risks Facilitation of Decision making Getting the right people together.
Cluster Consistency Monitor. Why use a cluster consistency monitoring tool? A Cluster is by definition a setup of configurations to maintain the operation.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Change Manager.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Created by the Community for the Community Building a RFID solution in BTS 09.
WS2012 File and Storage Services Management Name Jeff Alexander Technical Evangelist – Windows Infrastructure Microsoft Australia
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—5-1 Implementing a Highly Available Network Implementing Network Monitoring.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
1 Theophilus Benson*, Aditya Akella*, Aman Shaikh + *University of Wisconsin, Madison + ATT Labs Research.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Current Practice for Network Analysis in CSTNet Chunjing Han CSTNET, CNIC
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 KTN106 – KTN Account Team / Partner Presentation_ v1.1.ppt KTN Preparation for Account.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Mitigating Layer 2 Attacks Securing Layer 2 Access.
© 2017 SlidePlayer.com Inc. All rights reserved.