IBM Tivoli 系统管理白皮书
- 格式:pdf
- 大小:1.44 MB
- 文档页数:99
Chinese ITIL WhitepaperITIL白皮书主 编:左天祖副主编:刘 伟编 委(以姓氏笔画为序):冯立超 刘 多 李向阳杨 刚 钱 晨 雷 铮(加拿大)《ITIL白皮书》是根据《中国IT服务管理指南》中的有关内容整理而成的。
《中国IT服务管理指南》是在冠群电脑(中国)有限公司和上海联盈数码技术有限公司的赞助下,由左天祖和刘伟联合国内外IT服务管理领域的有关专家共同开发而成。
该书已由北京大学出版社于2004年3月份正式出版。
致谢顾问委员会(以姓氏笔画为序):Dave Bingham,富士通咨询,英国Jan van Bon,Inform-IT,荷兰John Peng,微软公司,美国Peter Bootsma,Quality Research,荷兰叶健,中国惠普有限公司朱赤红,汉道信息技术咨询有限公司朱海林,科索路信息技术有限公司孙强,赛迪顾问段永朝,中国计算机用户报社评审委员会(以姓氏笔画为序):主审:方皑,GE IT Solutions,加拿大评委(以姓氏笔画为序):Annie Xu,ITpreneurs,荷兰王东红,赛迪顾问刘丁,冠群电脑(中国)有限公司迟振,IBM(上海)全球服务部邢健,中国惠普有限公司沈丕豪,华讯网络系统有限公司何景维,华为技术有限公司巫健,和腾软件有限公司陆培炜,翰纬信息技术管理研究咨询中心杨凯程,联盈数码技术有限公司常威,上海信息化培训中心章斌,联盈数码技术有限公司潘九海,沃尔玛(中国)有限公司项目赞助单位(排名不分先后):感谢冠群电脑(中国)有限公司和上海联盈数码技术有限公司为本指南开发提供支持和赞助。
感谢上海联盈数码技术有限公司的杨凯程先生和冠群电脑(中国)有限公司的谢春颖女士为本指南的开发提供支持和帮助。
感谢国际IT服务管理论坛的CEO埃丹·拉维斯先生提供的支持和帮助。
感谢《中国计算机用户》周刊开辟“服务管理”专栏,为指南的开发提供交流平台。
IBM Tivoli Key Lifecycle ManagerSimplify, centralize and strengthen encryption key management for your enterpriseHighlightsSimplify, centralize and automate the encryption key management processEnhance data security and help facilitate compliance management of regulations and standards such as the Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA)Enhance flexibility with support for the new encryption key management—the Key Management Interoperability Protocol V1.0 (KMIP) from the OASIS standards group Business data is growing at exponential rates, and along with that growth comes a demand for securing that data. Enterprises have responded by implementing encryption at various layers—in the hardware, on the network and in various applications. This response has resulted in a series of encryption silos—some of it holding confi-dential customer data—with fragmented approaches to security, keys and coverage.Different applications across the enterprise often employ different methods of encryption. Some departments in the organization may use public-key cryptography while others use secret-key or hashes. Still others don’t encrypt data while it’s at rest (such as when it is stored on a device or in a database) but only when the data is in motion, using virtual private networks (VPNs) to secure the data pipeline.Key management for these encryption approaches is often similarly fragmented. Sometimes key management is carried out by department teams using manual processes or embedded encryption tools. Other times, the key management function is centrally managed and exe-cuted. In some cases, there is no formal key management process in place. This fragmented approach to key management can leave the door open for loss or breach of sensitive data.Deploy a simple solution to a complex problem IBM Tivoli®Key Lifecycle Manager provides a simple solution to the complex problem of key management. T raditionally, the more encryp-tion you deploy, the more keys you have to manage. And these keys have their own life cycles, separate from the data they’re protecting—and that life cycle has to be managed, from initialization and activationthrough expiration and destruction. Tivoli Key Lifecycle Manager can help you better manage the encryption key life cycle, allowing you to simplify, centralize, and strengthen your organization’s key management processes and reduce operational costs.T ogether with IBM’s innovative self-encrypting storage offerings, Tivoli Key Lifecycle Manager offers customers a proven solution that can address their concerns when a tape cartridge or disk drive is removed from the storage system and transported in-house or off-site. Lost storage media is not uncommon these days and brings with it enormous direct and indirect costs for those who lose sensitive information. With IBM System Storage®self-encrypting offerings and Tivoli Key Lifecycle Manager, customers no longer have to worry about losing sensitive information should tapes gets misplaced or stolen. Additionally, support for the new stan-dard KMIP allows IBM Tivoli Key Lifecycle Manager to manage encryption keys for not only IBM self-encrypting storage devices but also a number of non-IBM encryption solutions, hence allowing you to efficiently management encryption keys for your enterprise.Centrally manage encryption keysTivoli Key Lifecycle Manager serves keys at the time of use to allow for centralized storage of key material in a secure location, a unique approach that supports multiple protocols for key serving and manages certificates as well as symmetric and asymmetric keys. Users can also centrally create, import, distribute, back up, archive and manage the life cycle of those keys and certificates using a customizable graphical user interface (GUI).Tivoli Key Lifecycle Manager’s transparent encryption imple-mentation means that keys are generated and served from a centralized location and are never sent or stored “in the clear.” The embedded encryption engine in the IBM self-encrypting tape offerings encrypt and decrypt the data asit enters and leaves the drive at native tape speeds, whichmeans both faster and more secure handling of data.IBM Tivoli Key Lifecycle Manager provides a wizard to guide administra-tors through the keystore configuration process.Tivoli Key Lifecycle Manager enables customers to group devices into separate domains for improved and simplified management. It allows multiple administrators with different roles and permissions to be defined. Also, by default, the groups of devices only have access encryption keys defined within their group. These role-based access control features enable separation of duties, mapping of permissions for what actions against which objects, and enforcement of data isola-tion and security in a multitenancy environment. This also enhances security of sensitive key management operations. Enable strong authentication, strong securityThese rich capabilities are made possible by strong authenti-cation between IBM storage systems and Tivoli Key Lifecycle Manager. The drives are manufactured with a built-in unique certificate. When the drives are mounted, information about the hardware serial number and environment is digitally signed by the drive and then sent to the centralized manager, which in turn validates the signature on the generated key pair through the certificate authority.The final step in the process happens when Tivoli Key Lifecycle Manager checks to make sure the device is valid by verifying that it exists in the drive table. Any unknown device is rejected or placed into a queue to be approved by the administrator. With this strategy, a rogue device cannot be deployed on the network and used to intercept organiza-tional data.In addition to strong authentication, there is also strong security between the storage device and Tivoli Key Lifecycle Manager. The software generates a session key using the generated key pair from the storage device. Using a pre-generated key, the software then sets an encryption key to be used for an individual cartridge on the storage device. Finally, the software wraps the encryption key with the session keyand returns the key to the device.Tivoli Key Lifecycle Manager provides step-by-step screens to help administrators set security options.This approach to encryption can dramatically increase data security while simplifying encryption key management. Users don’t need to know anything about encryption in order to realize the benefits. Administrators can easily man-age a smaller set of more secure keys. And performance isn’t impacted because each storage device has hardware built into it that performs at wire speed without latency. Not having to change other processes, install more hardware, or reconfigure software to support it means that the security is kept simple and straightforward.Leverage flexible implementation options Tivoli Key Lifecycle Manager can be applied at different levels to simplify key management while meeting the unique needs of your organization.For organizations that manage keys within separate silos, Tivoli Key Lifecycle Manager can simplify complex key distribution and management, reducing administrative burdens within each silo.For organizations that want centralized control andpolicy-driven key management, Tivoli Key Lifecycle Manager offers consolidated management of keys across domains, supports standards that extend management to both IBM and non-IBM products, and integrates well into existing security team methodologies.For organizations taking a hybrid approach, such as central-ized management for storage only, Tivoli Key Lifecycle Manager can make compliance reporting much easier, and can enhance key backup and recovery processes in caseof disaster. This approach also enables organizations to establish administrative access based on roles—in this case, storage security.Simplify key configuration and management tasksTivoli Key Lifecycle Manager provides an easy-to-use,web-based GUI that helps simplify key configuration and management tasks. With this GUI, administrators can easily create keystores, assign keys and certificates, and manage the life cycle of both from a centralized console.The software itself is typically installed on your most secure and highly available server or dedicated workstation. Once installed, the GUI allows administrators to perform basic local key life cycle management on the drives, and offers not only configuration and setup tools, but also audit and compliance support. The software provides three ways to add encryption-enabled devices: Auto-discovery of encryp-tion-capable devices, discovery with administrator’s approval or manual addition. Once added, default keys are assigned. The GUI also allows administrators to implement key retention for backed-up data and to address rules for regula-tory compliance and legal discovery. In case of disaster, the administrator can provide a set of keys that can unlock encrypted backups and make them available for use again. The administrator can configure rules for automated rollover of certificates or groups of keys so that new encryption keys are used automatically based on a configurable schedule. In this way, administrators can limit the amount of data which is encrypted with particular keys, minimize exposure when a key is compromised, and facilitate erasure of data by deleting relevant keys when data is set to expire.Achieve quick time to value withwizard-based assistanceTivoli Key Lifecycle Manager uses a wizard-based guide to help administrators through a series of simple, task-based screens. The first task is to create a keystore, which is then used to hold all the keys and certificates managed by Tivoli Key Lifecycle Manager. T o configure a keystore, the adminis-trator enters relevant information about it into the system, such as its name, the keystore type, the path where it will be stored, and its password.Once the keystore is created, the administrator can configure different devices to use certain communication protocols including Key Management Interoperability Protocol. For example, for secure communications between Tivoli Key Lifecycle Manager and a drive, the administrator can create a self-signed SSL certificate, request a certificate from a third-party provider, or use an existing certificate. The ability to use any of these options gives the administrator the power to work within an existing security policy or set of procedures, or respond quickly to local conditions.Administrators also have the option of setting the audit level (from low to high) and setting other key serving parameters, such as TCP port, SSL port and timeouts.Once the SSL configuration is complete, devices can be added to the system. The devices appear in the Tivoli Key Lifecycle Manager Key Administration and are ready for use as a secure storage endpoint. The keys associated with the device can then be managed through the GUI, including making updates, expiring or destroying the keys. The Tivoli Key Lifecycle Manager Key Administration Welcome Page provides critical notices to the administrator including infor-mation about last backups, available protocols, and notices of expiring certificates.Deploy a unified key management strategyTivoli Key Lifecycle Manager enables a unified key manage-ment strategy that can help better secure your data, with performance you need to support your critical business func-tions. Built on open standards, including Key Management Interoperability Protocol, the solution enables flexibility and facilitates vendor interoperability. Its intuitive interface enables quick time to value, while its innovative approach can help dramatically reduce the number of keys administrators have to manage. By enabling centralized management of strong encryption keys throughout the key life cycle, Tivoli Key Lifecycle Manager can help minimize the risk of expo-sure as well as helping to reduce operational costs.For more informationT o learn more about IBM Tivoli Key Lifecycle Manager, contact your IBM representative or IBM Business Partner, or visit: /tivoli/products/key-lifecycle-mgrAbout Tivoli software from IBMTivoli software offers a service management platform for organizations to deliver quality service by providing visibility, control and automation—visibility to see and understand the workings of their business; control to effectively manage their business, help minimize risk and protect their brand; and automation to help optimize their business, reduce the cost of operations and deliver new services more rapidly. Unlike IT-centric service management, Tivoli software delivers a common foundation for managing, integrating and aligning both business and technology requirements. Tivoli software is designed to quickly address an organization’s most pressing service management needs and help proactively respond to changing business demands. The Tivoli portfolio is backed by world-class IBM Services, IBM Support and an active ecosystem of IBM Business Partners. Tivoli clients and Business Partners can also leverage each other’s best practices by participating in independently run IBM Tivoli User Groups around the world—visit ©Copyright IBM Corporation 2010IBM Corporation Software GroupRoute 100Somers, NY 10589U.S.A.Produced in the United States of AmericaSeptember 2010All Rights ReservedIBM, the IBM logo, , and Tivoli are trademarks orregistered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and otherIBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (®or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at thetime this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at /legal/copytrade.shtmlOther product, company or service names may be trademarks or service marks of others.References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates.Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided.The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation.Plea s e Recycle。
IBM Storwize V7000 中端磁盘系统要点•为所有规模的企业提供先进的企业级存储功能•在控制成本的同时,支持您不断增长的业务需求•凭借到高性能固态驱动器的自动迁移将性能提高多达200%1•在单个系统中整合块级和文件级存储,以实现简单性和更高的效率•通过动态迁移实现近乎持续的应用程序可用性•支持更快速、更高效的数据拷贝以用于在线备份、测试或数据挖掘•提供灵活的服务器与存储管理•易于使用的数据管理采用图形用户界面和点击式系统管理功能•城域镜像和全球镜像在系统之间同步或异步地复制数据以提高备份效率•固态驱动器适用于要求高速度和快速数据访问的应用程序•RAID 0、1、5、6 和10在如今的存储管理环境下,打破复杂性升高和数据爆炸式增长的循环可能是一大挑战。
购买和管理存储的老办法已变得不那么有效。
由于资源的限制,无论物理存储资源还是人力资源,IT 组织必须迅速采取行动以优化和简化其基础架构。
不受控制的复杂性和增长随着时间的推移只会变成更大的问题。
中小型组织可能还面临着一系列的挑战:登录社区,观看相关视频(http://goo.gl/kPjjc)•有中断的迁移•难以部署分层存储•不能在服务器之间共享存储•孤立的服务器和存储管理工具导致生产效率降低、成本升高•不能像使用虚拟务器一样,将虚拟化存储用作工具来优化开支、资源和能力为了克服这些挑战并使企业能够应对瞬息万变的市场,IBM® Storwize® V7000 Unified 提供了与虚拟化服务器环境互为补充的虚拟化存储系统,具有无与伦比的性能、可用性、先进的功能和高度可扩展的容量,这在中端磁盘系统中是前所未有的。
Storwize V7000 Unified 是一个强大的中端磁盘系统,经过精心打造,不仅易于使用还可实现快速部署,而无需额外的资源。
Storwize V7000 Unified 将块级和文件级工作负载整合到单个存储系统中,以简化管理并降低成本。
VEsystem | 产品白皮书和信虚拟终端管理系统基于VOI的桌面虚拟化北京和信创天科技有限公司一、概述随着成本控制、可管理性、安全性以及业务连续性等方面压力的增加,传统的PC终端逐渐变得缺乏控制力,蓝屏死机、软件不兼容、驱动冲突、系统崩溃、病毒感染、黑客入侵、网络滥用、非法访问等众多终端问题严重影响了人们的工作效率。
不仅在企业,包括政府机关、保密部门、科研机构、银行与证券等单位IT部门都希望能找到一种更好的桌面管理解决方案,搭建更高效的桌面基础架构,将企业PC 架构从过时的桌面模式中解脱出来,改善IT服务,降低TCO,提高灵活性。
“和信”虚拟终端管理系统是一套基于VOI(Virtual OS Infrastructure)架构的桌面虚拟化产品,通过集中在数据中心的操作系统镜像来实现对终端PC桌面的统一管理和交付,管理数千台PC等同于管理一台PC桌面。
部署之后,终端PC遇到任何木马病毒只需重启系统就能够自动恢复到安全状态,还能够实现对应用程序、软件补丁、策略配置的实时分发和数据集中管理。
它能够在离线环境下正常运行,并保证PC桌面系统快速符合等保、分保等国家规范对终端管理的细粒度配置要求。
同时,它的部署完全不需要改变原来的网络结构和PC硬件,更不会影响原有业务应用,能够在短时间内平滑升级。
从根本上看,VOI桌面虚拟化技术和解决方案是可以帮助IT部门搭建更高效的桌面基础架构。
目前,许多领先企业都开始采用桌面虚拟化技术的集中化管理方式,将IT 从传统的分布式桌面管理模式中解脱出来,企业IT运营部门无需逐一维护终端硬件设备,操作系统、应用和数据管理以集中化的方式实现,这使得桌面管理更简单、软件迁移更简单、备份可靠性更高。
二、“和信”虚拟终端管理系统IBM的Steve Mills最早提出VOI(Virtual OS Infrastructure)架构思路,也是在传统桌面虚拟化模式上重大突破和延伸。
传统桌面操作系统是存储于本地并运行于本地,而基于虚拟操作系统架构(VOI)的终端虚拟化解决方案,就是将这些分散的终端软资源(含操作系统、客户应用策略、应用软件、客户数据)集中地在云端管理起来,进行有效地组织、安全地存储、按需地分配,并充分利用原有本地硬件资源。
Keeping Your Options Open:The Smart Strategy for Data ProtectionData protection shouldn’t lock you in. Get data protection for today that scales for tomorrow. Take a look at three options you need to consider:1. On-premise appliances2. Cloud services3. Hybrid on-premise appliances with cloud services1. How can a PBBA help me simplify backup and recovery?An enterprise-class PBBA can help automate backups with a simple, self-service solution soyou don’t have to worry about integrating and managing different devices or deal with the frustrations of tape backup.2. Why is a PBBA better than tape backup?If you have tape backup, you know its shortcomings: mechanical failures, incomplete restores,lots of manual work and long backup times. Your staff has to physically mount and unmount tapesand transport them offsite for storage. Then, when you need to restore data fast, your staff has to retrieve the tapes from storage.3. How fast can I restore in the event of a data failure?With an on-prem backup appliance, there’s no need to retrieve tapes from storage to get yourdata back. Plus, you don’t need to waste time physically mounting tapes. You can usually restore from your appliance in minutes—rather than hours or even days!4. What features should I look for in an enterprise-class PBBA?The first thing to consider is security. An enterprise-class appliance needs to provide dataencryption. You’ll also want a PBBA that minimizes power consumption, floor space and coolingrequirements to save energy, space and money. If you want to add cloud backup in the future,choose a PBBA that offers deduplication so only changed data is sent to the cloud—decreasingbackup time, freeing up bandwidth during replication, and reducing the cloud storage capacity needed and its associated costs.Seagate Technology | 1-800-SEAGATE | To simplify backups and restore data fast, consider on-prem appliances.On-prem enterprise-class purpose-built backup appliances (PBBAs) PBBAs can automate backups and speed restores. What features should you look for?Seagate Technology | 1-800-SEAGATE | | Seagate Technology LLC, 10200 South De Anza Boulevard, Cupertino CA 95014 U.S.A 5. Why do I need cloud backup?The cloud provides cost-effective backup and DR, archive, query and other less critical dataoperations. You pay only for the capacity you need, adding more capacity as your data volume grows.6. Is my data really safe and secure in the cloud?Your data is safe. Data can be encrypted onsite, in transit and at rest in the cloud—while youcontrol the encryption keys. Next, insist on an SSAE 16-certified data center, the gold standardfor security. Finally, if your organization requires dedicated space, you can get it. If you don’t need that level of security, consider lower-cost colocation.7. Can I simplify upgrades as the data volumes grow?Make sure your solution scales painlessly as data expands. Look for a cloud provider thatprovides scale-up architecture to add capacity to the same unit or scale-out architecturedesigned to add devices without disruption. “Clustering” allows you to add an appliance to a cluster and manage the entire cluster as a single vault via one management console.8. What happens if a disaster takes out my onsite systems?If a major disaster takes out your local data center, your organization can operate from thecloud without significant downtime (less than an hour with a 1-hour SLA) until you get your local systems up again.For low-cost backup and fast reliable DR, choose the cloud.Cloud backup and disaster recovery (DR)When disaster strikes, your data is safe in the cloud. Keep your business running when everything around you crashes.Choose the best solution for your environment today, keeping an eye on the future. As your needs change and expand, make sure you have a vendor like Seagate EVault that can grow with you every step of the way.Seagate Technology | 1-800-SEAGATE | | Seagate Technology LLC, 10200 South De Anza Boulevard, Cupertino CA 95014 U.S.A © 2015 Seagate Technology LLC. Seagate, Seagate Technology, and the Wave logo are trademarks or registered trademarks of Seagate Technology LLC or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. Complying with all applicable copyright laws is the responsibility of the user. Seagate may change, without notice, product offerings or specifications.1 Hybrid Cloud PBBAs Help to Manage and Secure Data Cost-Effectively. Phil Goodwin, IDC Research Director, Storage Systems and Software. August 2015.9. What exactly is hybrid cloud data protection?Hybrid cloud data protection means you get easy-to-manage, reliable local backup and fast restores combined with a cost-effective extra layer of protection in the cloud.10. What are some advantages of a hybrid cloud solution?With on-prem appliance and cloud backup integration, the cloud provides secondary backupfor your data should your local systems go down. The cloud can also provide you with “burstoperations,” giving you additional capacity for a brief period without having to add permanent extra capacity on-prem.11. Is it possible to offload all our backup and DR to a managed service provider?A managed service provider (MSP) can take care of all your data backup and DR needs todayand eliminate complex and disruptive upgrades as you grow. Here are some things to look for:• Option to keep data in your own data center or in your service provider’s private cloud• Self-healing automated data dispersal technology that guarantees data is optimallydistributed within one or more geographically dispersed data centers with failover enablement • Separate data and metadata distribution and storage12. Is there an advantage to working with a single vendor for our hybrid cloud solution?A single vendor ensures that your on-prem and cloud solution is optimally integrated andmanagement is centralized through one console. In terms of security, when working with morethan one vendor “you get the least common denominator between them to provideinteroperability.”1 Even if both have good security, you may not be able to take advantage of it if the systems are incompatible.If you choose a hybrid cloud solution, choose one that gives you simple, centralized control andmanagement—no matter what kind of environment you have (physical-to-virtual, virtual-to-virtual,etc.). Insist on end-to-end encryption and physical data center security. Optimize your systems withdeduplication, compression and full support.Do you want more information? Visit our website or call us at 866-766-2186.PBBAs and cloud team up to give you the best of both worlds.Hybrid cloud data protectionAs businesses grow, they often find that fast local restores and low-cost secure cloud backup offer the perfect blend that grows with them.。
IBM ECM 行业解决方案白皮书一、背景介绍IBM企业内容管理(Enterprise Content Management,ECM)是一种综合性的解决方案,旨在匡助企业有效管理和利用其海量的电子和纸质文档。
本白皮书将重点介绍IBM ECM行业解决方案,包括其定义、优势、应用场景以及相关案例分析。
二、定义IBM ECM行业解决方案是IBM基于其强大的企业内容管理技术和经验,为特定行业提供的定制化解决方案。
通过整合企业内部和外部的信息资源,IBM ECM行业解决方案匡助企业实现信息的高效管理、共享和利用,提升业务流程的自动化和效率。
三、优势1. 强大的内容管理能力:IBM ECM行业解决方案提供全面的内容管理功能,包括文档管理、记录管理、数字资产管理等,能够满足企业对不同类型信息的管理需求。
2. 高度可定制化:IBM ECM行业解决方案可根据不同行业的特点和需求进行定制化开辟,满足企业个性化的业务流程和信息管理要求。
3. 全面的安全性和合规性:IBM ECM行业解决方案采用先进的安全技术和策略,确保企业信息的安全性和合规性,符合相关行业的法规和标准要求。
4. 强大的数据分析能力:IBM ECM行业解决方案提供丰富的数据分析工具和功能,匡助企业从海量信息中挖掘有价值的数据洞察,支持决策和业务优化。
四、应用场景1. 金融行业:IBM ECM行业解决方案可匡助银行、保险公司等金融机构实现电子合同管理、客户信息管理、风险合规管理等,提升业务效率和客户满意度。
2. 创造业:IBM ECM行业解决方案可匡助创造企业实现产品生命周期管理、供应链管理、质量管理等,提升生产效率和产品质量。
3. 医疗行业:IBM ECM行业解决方案可匡助医院、医疗机构实现电子病历管理、医药信息管理、医疗质量管理等,提升医疗服务质量和效率。
4. 零售业:IBM ECM行业解决方案可匡助零售企业实现库存管理、供应链管理、客户关系管理等,提升销售效率和客户体验。
IBM Tivoli软件系统管理白皮书目 录 序 (3)一、企业IT系统管理面临的挑战 (4)二、IBM Tivoli系统管理核心技术 (9)1.系统管理结构 (10)2.面向业务影响的系统管理 (16)3.自主运算——实现自我管理 (20)4.资源管理模型和最佳实践 (28)5.集成的系统管理 (30)6.服务水平管理 (32)7.开放的系统管理 (36)8.快速部署 (37)三、IBM Tivoli系统管理解决方案 (38)1.网络管理解决方案 (38)2.企业系统监控管理解决方案 (43)3.业务影响管理解决方案 (46)4.Web管理解决方案 (48)5.企业资产管理解决方案 (51)四、IBM Tivoli软件产品列表 (55)五、IBM Tivoli系统管理用户实例 (57)1.中国网通 (57)2.美国Prudential保险公司 (61)六、附录:IBM Tivoli软件系统管理产品简介 (64)1.IBM Tivoli Monitoring 简介 (64)2.IBM Tivoli Monitoring for Databases简介 (68)3.IBM Tivoli Monitoring for Business Integration简介 (70)4.IBM Tivoli NetView 简介 (73)5.IBM Tivoli Switch Analyzer简介 (75)6.IBM Tivoli Enterprise Console 简介 (76)7.IBM Tivoli Risk Manager 简介 (79)8.IBM Tivoli Service Level Advisor 简介 (83)9.IBM Tivoli Business Systems Manager简介 (86)10.IBM Tivoli Configuration Manager简介 (88)11.IBM Tivoli Remote Control简介 (92)12.IBM Tivoli Workload Scheduler简介 (96)序今天,信息技术在中国各个行业中的应用都得到了前所未有的重视,“以信息化带动工业化”已为各级决策部门所共识,各个行业在IT行业大量投入,进行了很多的系统建设和应用开发。
因此,有效地管理IT资源已经不再仅仅是IT 部门或数据中心关心的问题。
对于许多企业来说,电子商务基础架构已经成为业务的重要组成部分。
由于电子商务基础架构涉及到企业内的许多元素,所以是否能够对跨越整个企业的IT资源和组件进行系统管理就变得尤为重要。
良好的管理系统可以有效地监控操作系统环境、网络环境、数据存贮环境、信息安全环境和业务应用环境;良好的管理系统可以准确地定位和综合诊断系统异常的原因并提出修复的方案;良好的管理系统可以有力地为企业业务系统保驾护航,让业务应用高枕无忧,从而使企业IT部门可以将更多精力投入在提供服务和推动业务方面。
传统的IT管理大量依靠熟练管理人员的经验来评估操作数据和确定工作负载、进行性能调整及问题解决。
然而,在当今电子商务环境越来越复杂的情况下,新的策略需要获得最大化业务效率——这些策略使电子商务环境实现自修复和自调整成为可能。
这个需求特别是在当今IT经理面对诸如高的员工流转率和投资新IT资源的可用预算减少等挑战时,尤显突出。
在这种情况下,企业迫切需要对其IT环境进行有效的系统管理,确保业务的正常运行。
IBM Tivoli提供了优秀的IT系统管理软件,帮助用户稳定、可靠、方便、有效的管理企业级IT环境,其在系统管理领域的领先地位已经得到业界的广泛认可。
本文针对当今系统管理领域需求的新特点,阐述IBM Tivoli先进的系统管理解决方案。
企业IT系统管理面临的挑战IT系统管理已经有二十几年的历史,其发展历程已经从无序、混沌的运维管理,经过简单的对重要资源运行的自动监控,直至发展为企业级的IT系统管理。
图1:企业IT系统管理的构成当今,IT系统管理可以看成由服务支持和服务提供两部分工作组成。
服务支持是IT管理者每天进行的日常管理工作,工作重点偏重于IT技术;服务提供是将管理数据转化为决策信息,工作重点偏重于从业务视角来看待问题。
目前IT经理和IT管理人员有80%到85%的工作时间花费在服务支持方面,而这方面的工作大部分是日常的、重复的和低价值的;如何在保证系统正常运行的情况下,将更多的时间和精力节省出来,把日常的IT管理数据转化为服务提供的决策信息,进而更好地为业务系统服务,提高IT服务水平,是系统管理在电子商务新时期对我们提出的新的挑战。
随着企业规模的不断扩大,业务应用的持续增加,其IT基础设施的架构越来越复杂,单纯凭某个工具或某个人,已经不能胜任如此大的工作量和满足业务紧迫性的要求,必须有一整套的企业级的系统管理解决方案。
那么什么是企业级系统管理呢?企业级系统管理是管理一个企业的信息系统及其相关组件的一整套原理和工具,不仅是管理软件产品本身,而且还包括企业管理流程(Process)、企业管理规范 (Policy)、 企业业务(Business), 和将企业管理流程、企业管理规范及企业业务贯彻到软件产品中去的实施方法学。
企业管理流程定义了企业内部的报告流程、决策流程、问题处理流程等等。
企业管理规范定义了什么样的资源被什么样用户或用户组访问,定义了访问时间和访问权限;定义了什么样的参数需要监控,以及阈值、统计方法等。
企业管理需要围绕具体的业务进行管理,把管理员从以往不断跟踪IT技术以适应企业发展的工作模式中解脱出来,有更多的精力结合自己的业务去管理。
所以企业级的系统管理最终能够通过生成一个企业业务管理视图(Business View)来管理企业的IT系统。
实施方法学就是一套将企业管理流程、企业管理规划、企业业务(Business)落实到企业管理工具里去的理论基础。
图2:IDC对企业IT系统管理未来发展趋势的分析当然,企业系统管理的管理目标和管理功能也是不断发展、变化的。
从上图IDC对企业系统管理发展趋势的报告,我们可以看到,企业系统管理的目标,已经由进行个别资源监控、系统及网络管理、应用可用性保证阶段,正向着业务流程的优化方向发展;企业系统管理工具的功能,已经从数据收集、发现、状态监控、配置管理、实时性能监控,向着历史数据分析、决策分析、自动响应和高度容错方向发展。
这种企业IT系统的发展对系统管理的挑战,主要体现在如下八个方面:建立适当的管理架构企业规模不断扩大,业务不断增长,构成企业的IT基础架构不断变化和发展,这就要求系统管理的架构具有如下相适应的特点:z良好的框架结构,能够方便、容易地增加管理功能z能够灵活的添加被管理的节点z能够全面管理所有的资源z各管理功能之间共享管理数据如何管理IT系统对业务的影响IT系统管理的所有目的都是为业务系统保驾护航,保证其健康的运行。
在很多企业中,尽管可能已经部署了一定的监控工具,但是,由于这些监控工具都是针对某一个系统或资源设计的,相互之间无法很好的集成,给系统管理人员提供的控制台各种各样;更为严重的是,由于相互之间无法集成,其监控的管理信息就不能共享,导致误报警和报警重复等现象的发生;同时,由于这些工具都只是面向IT资源的监控、管理软件,即使发现问题,也不能将问题与真正的业务联系起来,也就不能判断此问题对业务的影响,无法判断解决问题时的优先级顺序,使影响关键业务的问题被耽搁,造成巨大的损失。
所有这些,都要求:z系统管理能够将IT管理与业务的运行联系起来;z IT系统管理能够将所有不同的管理工具的控制台进行统一和集成,实现信息共享;自主管理新一代随需应变的电子商务(eBusiness On Demand)的一个重要特性就是自主运算(Autonomic Computing)。
如今的系统管理,也需要引入自主运算的机制,实现:z自修复--检测潜在地错误并启动校正行动,以防止系统故障z自优化--自动优化资源利用率,以满足用户需要z自配置--根据需要动态配置,无需人工干预z自保护--自动执行安全策略/控制访问,检测并对恶意行为进行响应共享业界已有的最佳经验经过二十多年的发展,系统管理已经积累了大量的成功经验,如何将这些宝贵经验,利用到后续的系统管理之中,从而加快系统管理的见效周期,快速体现价值,就成为当今企业级系统管理的热点。
通常,这些成功经验中,应该包括如下方面:z确定哪些资源是监控和管理的重点;z这些资源处于什么状态是正常的,超过多少阈值即为异常;z当监控的资源出现异常时,通常应采取什么措施加以解决;实际上,这些方面的任何一个方面,都需要有大量的经过十几年、甚至几十年的实施、运行经验,才能提供高质量的专家建议。
统一、集成的系统管理企业级IT系统管理必须采用有效的方法,在整个企业范围内实施管理策略和流程。
系统管理所包含的不仅是对计算机资源实时的监控和控制,同时也包括对系统短期和长远变更的管理。
系统管理体系侧重在如何提供一个适合企业系统的、低风险的管理模式,设计、建构、实施一个统一、集成并可扩展的管理结构,实现对复杂的计算机系统有效的管理。
企业级系统管理面对的往往是异构的管理对象和多种管理需求。
如果没有一套统一、集成的管理系统,在网络、系统和服务发生变化时,或者管理任务发生变化时,将可能导致管理体系大的调整,管理员可能需要花费很长时间和精力重新学习新的管理技能,从而导致管理效率的下降。
最终导致管理工作实施的周期加长,管理错误增多。
统一和集成的管理将帮助最好的利用管理员的技能和精力,对系统进行高效、准确的管理。
一般来说,企业业务系统由多种系统共同组成,但对最终用户提供的是一致化的服务,因此在衡量系统运行时,服务质量是重要的标准,需要统一考核。
因此从管理系统能够提供的能力与考核标准上,需要对所有系统统一考虑,在管理系统的建设上必须考虑管理系统的集成,能够实现统一化的管理控制。
对服务水平的管理在企业级系统管理领域,一直困扰IT管理经理的一个问题,就是如何体现IT管理部门的价值。
每天无休止的加班,但换来的却是系统出现问题时,业务部门的抱怨和领导的不满,这就需要系统管理能够:z提供量化的IT管理效率的评测方法;z在问题影响业务的性能、产生严重后果之前,对其发展的趋势进行预测;系统开放性管理系统的开放性,是系统管理功能扩展的一个基础。
管理系统需要符合业界标准,以实现对各种资源的统一管理和与其它管理软件的集成。
同时管理系统需要开放开发接口,以方便扩展管理功能。
企业级IT系统管理需要基于开放的管理平台,遵循业界标准,并提供管理接口:z支持第三方厂商的应用集成,为系统管理的选型提供更高的灵活性z开放的API支持用户应用软件的集成,为系统管理的内容扩充提供发展余地管理系统的快速部署当前,企业都在向现代化管理方式迈进,如何有效的利用投资,快速将投资的效果体现出来,为企业的业务运行做出贡献,要求先进的企业系统管理解决方案具有:z快速部署的能力;z能够实现“开箱即用”的效果;二、IBM Tivoli系统管理核心技术IBM Tivoli是专业的企业级IT系统管理解决方案提供商,能够提供全线的、分别适应大中小型企业的、先进成熟的、集成性高的、具有自主计算功能的、智能化的、面向业务服务和新一代按需计算的电子商务的系统管理产品。