ICS internal O & M audit Solution

Source: Internet
Author: User

According to relevant statistics, in the past five years, the annual growth rate of domestic data center construction investment has exceeded 20%, and various industries are planning, constructing and transforming their data centers. However, with the development of information technology and the explosive growth of information, data centers are facing unprecedented challenges. Among them, how to ensure the stability and reliability of the IT infrastructure operation management of the data center and the security of data information has become the most important and tricky issue for the data center operation managers.

At this time, the Operations Manager of the data center will find that, through a complete set of online O & M audits, the security of the entire O & M process can be ensured conveniently and efficiently, managers will be freed from complicated O & M management and enjoy the wonderful process of security O & M.

To meet the security O & M requirements of data center operation managers, dexun technology has released the ICS internal O & M audit solution, which adopts centralized management to exist and act on the entire life cycle of O & M management. Compared with other O & M security management solutions, this solution has the following advantages.

First, from scattered O & M operations to centralized O & M management, a convenient and efficient one-stop management method is achieved.

This solution uses the joint deployment platform of ICS2000 and VOS to address the diversified existing data center O & M tools, uncentralized O & M personnel, scattered regions, and cross-network management features, provides unified installation, deployment, and centralized management of multiple O & M tools and multiple client programs. O & M personnel only need to establish a connection with the corresponding O & M channel through the B/S WEB management platform portal, which can implement centralized and one-stop O & M services for all target management devices in the data center. This centralized O & M management mode greatly reduces the workload of O & M personnel and significantly improves the O & M management efficiency of the data center.

Second, we adopt the identity management and authentication mechanism to actively prevent and control data before O & M.

This solution provides a complete set of identity management and authentication mechanisms, which firmly controls the access portals of the data center WEB management platform and verifies the validity and legitimacy of all login user identities one by one, strengthen the Security Prevention of Operation sources to achieve proactive prevention and control management before operation access, greatly reducing the risk of leakage of important business information data.

In addition, this solution supports both local WEB management platforms and third-party authentication channels, such as Radius, RSA SecureID authentication, and LDAP/AD domain, it also enhances the flexibility and convenience of user operations and reflects the strong compatibility and scalability of the system.

Third, implement real-time monitoring in O & M using desktop monitoring, and respond quickly and efficiently.

This solution provides multiple Session access management methods, such as proxy and bypass listening, to actively, proactively, and directly implement security control over the business operations of data center O & M personnel. For core business operations or key target devices, O & M personnel only need to monitor the desktops of one or more devices online in real time through the monitoring window, and support multi-channel monitoring screen matrix window round-robin switching and playback. During the monitoring process, in the event of any exception or violation, the O & M personnel can immediately switch to the device takeover status and end the illegal session by force "interruption. The solution uses an operation policy that monitors and blocks illegal operations in real time during access sessions, effectively killing the security risks caused by operations in the data center's network to the bud, it fundamentally eliminates the expansion and spread of hazards.

Fourth, it supports security audit operations after O & M to trace and reproduce O & M operations.

This solution supports remote graphical security audit for all O & M behaviors in the WEB management platform, such as protocol O & M, WEB access, client access, and database access. During the session, all operation steps and operation details are recorded and presented to the data center auditor. At the same time, this solution supports keyword locating, key database statements, and audit video Association playback, which enables fast locating, precise tracking, and real reproduction of O & M operations, it helps auditors to troubleshoot illegal O & M operation nodes and trace fault responsibilities, and promotes refined and standardized O & M security management for data centers.

Figure 1 architecture of the internal network O & M audit Solution

This internal network O & M audit solution deploys ICS2000 + VOS in the IT Operation Network of the data center, without the need to adjust or change the original network architecture of the data center, IT enables centralized management of O & M operations by O & M administrators and security audit of the entire O & M process, and establishes a comprehensive O & M audit system for the data center.

Figure 2ITInfrastructure Network O & M audit system diagram

The application of this solution can meet the Intranet security requirements of users in different dimensions to the maximum extent, and reduce the complexity and work intensity of the Intranet O & M audit operations, this service ensures O & M security for large data centers and various enterprises and institutions, and eliminates hidden risks.

Artists Discover Beauty, create beauty, and ultimately transmit the feeling of beauty to people. Like artists, dexun technology developers have designed and created an ICS internal O & M audit solution that is easy to operate, efficient to run, and secure and reliable, bringing the beauty of the process to data center managers. With the application of this solution, users can enjoy the beauty of the process with peace of mind and achieve security O & M.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.