We offer continuous health and availability monitoring (24x7x365) of many enterprise system components. We monitor events for the status of devices and also offer monitoring of programs and processes at the system level or within applications. We also offer monitoring of alerts, which are pre-set utilization thresholds within hardware, network or application components. All events and alerts are logged in our problem management system with customer specific action procedures. We also have the ability to determine root causes of problems when multiple events and alerts occur simultaneously. We offer reporting for in-depth analysis of areas such as system performance and capacity planning. Customized solutions are also offered.
Our application monitoring allows our customers to have a higher level of reliability from their enterprise applications. This service offers two kinds of application monitors: “yes / no” condition checks, and within range calculations or “threshold checks”. In the event that an action is required after a monitoring service is performed, then an alert procedure is activated. Monitoring checks are performed by automated tools and can be performed as frequently as desired, with each monitor having a unique schedule. A client’s custom monitors can also be performed.
“Yes / no” condition check monitors are often used to check if a process (in a UNIX environment) or service (in a NT environment) has been completed successfully. One example of this type of monitor might be to verify that the Oracle Listener is running, because without this service, the application cannot perform its tasks. In an MS Exchange environment, an example of a condition check would be to verify that no corrupt data exists in the data stores.
Within range calculations or “threshold checks” are a type of monitor where limits are set and a calculation is performed to determine if the service is with in the limits. An example of this type of monitor would be to verify that an application is using the percent of the CPU that has been determined to be normal. Another example is to calculate the disc space used by an application and verify that the calculated total is within the range of limits.
An alert procedure is activated when a monitor is performed and action is required. Alert procedures can include one or a series of actions. Electronic alert procedures can include an email and/or page to notify the appropriate person of the event. Operator action can be triggered by a pop-up window with specific operator actions specified. Escalation procedures are also specified for each alert. Escalation procedures, a separate alert procedure, are triggered when there is no response to the initial alert sequence. All alert procedures are tailored to meet the client’s requirement.
We offer monitoring services for many common databases including Oracle, MS-SQL, DB2, MySQL, and PostgreSQL. Our clients choose which aspects of the database they would like monitored. The following list highlights some common database monitoring selections:
We monitor each component of a data network system to verify that it is functioning properly. Each network system data line and hardware component is entered into our network management systems. These systems monitor each data line and hardware component of the network. With these systems, we are immediately notified if a network component is not responding properly. Our systems give our technicians the exact physical and topographic location of the problem component, and the data network carrier involved. At this time our staff notifies the carrier and begins diagnostic procedures with equipment at our Network Operations Center. We log all actions into our problem management system and follow the trouble report through completion. Our technicians notify the customer with each change in status until the problem is resolved.
We offer continuous data monitoring to detect security breaches. We present security intrusion detection options to our customers so that they can determine the level of exposure suitable to the application.
First level firewall management includes opening selected ports so that specific data traffic entry is permitted. Optionally, we can inspect data for detection of “hackers” or other breaches of security. These services include reading data packets at the firewall to determine action to be taken with that specific data. This action could include admission of the data or closing off of selected ports or the entire firewall.
We also provide comprehensive auditing services for your systems. We can perform a variety of audits, including aggressive scanning and intrusion attempts. We will document all vulnerabilities and provide recommendations for remediation.
Earthnet provides a variety of IDS’ (Intrusion Detection Systems) for your platform. Options include Host, Network, and Firewall based systems, as well as 3rd party IDS packages. We will install, configure, and train your IDS to provide comprehensive and reliable detection of threats.