SlideShare a Scribd company logo
1 of 20
UC Insight with Log Analytics
Jeff Graham: LayerX Technologies CEO
Alex Lamont: Zenoss Sr. Product Manager
© 2016 All Rights
Reserved
CONFIDENTIAL
Zenoss at a Glance
• Founded in 2005; headquarters in Austin, TX
• Widely adopted unified monitoring and service analytics
platform for enterprise IT and managed service providers
• Provide IT Ops the application infrastructure visibility
and intelligence required to avoid service disruptions
• Global services and support partner network
• Offered on-premises and as a cloud service
"Zenoss represents the most credible replacement for the legacy
Big 4 systems management frameworks in the market."
- Bernd Harzog, The Virtualization Practice
© 2016 All Rights
Reserved
CONFIDENTIAL
LayerX Technologies
 Headquartered in Dallas, TX
◦ Founded 2005
 Patented Data Management Platforms
◦ Enterprise Log Analysis
◦ Advanced DashBoards and
Reporting
 Experienced Leadership Team
◦ Start-up, S/W Development,
Professional Services, M&A
◦ Nortel, Arrow Electronics, NEC,
Motorola, Accuvant
 Enterprise Customer/Partner Base
◦ 150+ Clients in Multiple Verticals
◦ MSP, Financial, Oil & Gas,
Healthcare, Hospitality, Tech
© 2016 All Rights
Reserved
CONFIDENTIAL
Zenoss UC Insight with Log Analytics
Unified Communications
• VoIP Quality Management
• Path Analytics
• Health Monitoring
• Fault Isolation
Log Analytics
• Index Any Data Format
• Search Across All Infrastructure
• Real-time Event Correlation
• In-Depth Custom Reporting
UC Insight with
Log Analytics
Powered By:
© 2016 All Rights
Reserved
CONFIDENTIAL
Zenoss UC Insight with Log Analytics
Combining the power and insight of Zenoss and LayerX
UC Insight with Log Analytics collects all data within a UC environment and indexes it under
a single architecture. Its powerful correlation engine can then extract that data, correlate it,
and take actions to view and analyze overall access, quality and performance.
Extend the Zenoss platform through deep Log Analytics of UC, Security,
Network and Application devices
• True Call Path Analysis
• Granular Search and Extraction (Forensic Inquiry)
• Layer 3 Impact Analysis
• Native Multi-Tenant Deployment Support
© 2016 All Rights
Reserved
CONFIDENTIAL
Unified Comms – True Application Integration
Drives Business Productivity
Identity Mgmt. (AD)/Network/Security
Open Standards Servers/Virtual Machines
Open Standards Communications Platform/Protocols
Messaging IM/Presence Collaboration CRM WEB Services
Contact
Center
Finance/HR
Business
Apps
© 2016 All Rights
Reserved
Unified Comms – Deployment Model
Requires Unified Application/Infrastructure MonitoringRequires Unified Application/Infrastructure Monitoring
Laptop
Video
Client
IP
Phone
Tablet
Smartphone
Laptop
Video
Client
IP
Phone
Tablet
Smartphone Laptop
Video
Client
IP
Phone
Tablet
Smartphone
© 2016 All Rights
Reserved
What is UC Insight with Log Analytics?
UC Application and Machine Generated Data
• Created by Applications Automatically
• Voice or Video Calls, RTCP, SIP Transactions, Servers, Network Devices
• Activity Records…....What Happened and When
Logs Can Contain
• Transaction Events / Performance Metrics, Thresholding Data, Diagnostic, Call Detail Records,
Security Events and even Power Utility Data
Log Analytics is the process of collecting this machine generated structured and
unstructured data from multiple sources, proactively correlating, analyzing and providing
new insights to rapidly solve issues.
Collect Correlate
Index &
Store
Analyze
Visualize &
Report
© 2016 All Rights
Reserved
Why UC Insight with Log Analytics?
Data Collection, Correlation and Analysis
• Returns Immediate Value About the Application
– UC Quality Management and Analytics
– IP Network and Service Performance
– Security Intelligence on Fraudulent or Nefarious Transactions,
– Security Attacks and Persistent Threats
– Customer Experience and SLA Breaches
Proactively Resolve Problems
• Eliminate the Need to Search Through Multiple Systems, Servers and Virtual Machines
Improve Customer / User Satisfaction
• Avoid The Services “Death Spiral”
• Correlating/Analyzing Logs as near to Real-Time Prevents Issues Before They Impact Critical
Services
© 2016 All Rights
Reserved
UC Insight with Log Analytics Success Spiral
o Automated Problem Isolation
o Correlated Event Handling
o Focused Resolution Steps
o Problem Solved
o Customer is Happy
o Increased Margin as a Result of
Low Human Capital Involvement
o Customer Loves Your Service thus
is Happy to be a Reference
o Revenue Increases
o Margin Increases
o Business Flourishes
o Recurring Problems
o Extensive Human Capital
Deployed
o Unhappy Customers
o More Human Capital
Commitment
o Degraded Margin
o Customer Cancels
o Revenue and More Margin Loss
o Layoffs to Cut Costs
o More Customers Leave
o Business Dies
UC Insight ... ROI $$ Legacy Monitoring ... Wasted $$
© 2016 All Rights
Reserved
UC Insight ROI
UC Infrastructure Example
100 Managed Devices: Routers, Switches, Gateways, App
Servers, SBC, Firewall, etc.
Costs:
– Resolving and Event without Service Desk Escalation
– Resolving at the Service Desk
– Average Hourly Cost of Customer/End User Downtime
Per Device Events on a Per Month Basis
Per Device Resolution Utilizing UC Insight and Proactive
Correlation / Resolution
Inputs: The Most Conservative End of the Range Utilizing
Gartner and Other Research Firms
70% Annual Savings on Event Resolution Costs
Significant Productivity Enhancement
Increase in User Satisfaction
$0
$20,000
$40,000
$60,000
$80,000
$100,000
UC Insight Partial Correlation No Correlation
Annual Business and IT Costs
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Intuitive Dashboards Analyzing UC Call
Quality
Flexible Reporting on Call Quality
o Every Dashboard is also a Report
o Ad-Hoc or Scheduled with Multiple Reports for
a Workbook
o Full Multi Tenancy with Reporting by
Customer/Site/Location/Department
Drill Down into Location Data
Map Any Data to Specific Description /
Names
Cause Code 16 Shows as Call
Terminated Normal
Export any Graph to a Picture File
Export any Table to Excel or .CSV
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Provides Call Path Analysis
o Layer 3 Impact Interrogation of All Devices
Along the Call Path
SIP Stack Embedded to Read RTCP and
Header Registration
o All Data Received is Proactively Correlated
for Threshold / Window / Metric or
Performance Violations
o Events / Alerts with Detailed Descriptions are
Created and Presented to Zenoss
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Utilize NetFlow as a Resource
o Cross Reference Traffic with Call Quality
Issues
o Analyze Top Applications Correlated with
Bandwidth Consumption
Drill Into Specific Application Traffic
o Correlate Layer 3 Hop Latency with
Application Utilization
Flexible NetFlow Reporting
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Analyze Firewall Log Data
o Cross Reference Threat Activity
with UC Quality
o Analyze Top Applications
Correlated with Bandwidth
Consumption
Drill Into Threat Data
o Event/Alerts Based on Threats
and Behaviors
o Correlate with UC Infrastructure
Events/Alerts
Flexible Firewall/DNS/Threat
Reporting
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Session Border Controller
Log/Data
o Analyze Traffic Volumes and
Patterns
o Analyze Trunk Routes
o Protocol / Codec Utilization
Drill Into Specific Regions
o Correlate Bad Audio Calls and
Produce Events/Alerts
Flexible Reporting
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
S4B Analysis
o Voice and Video Endpoint
Performance Analysis
o Specific Events/Alerts
SDN Analysis through
the MS API
o Call Flow Diagnostics
MS Infrastructure
Performance
Flexible Reporting
© 2016 All Rights
Reserved
How LayerX Enhances Zenoss
Flexible Indexed Based
Log Search and
Extraction
o Highlight and Name
o No RegEx Skills Required
Search by Words, Time
and Boolean Logic
o Root Cause Data
Easy Audit and
Compliance Reporting
© 2016 All Rights
Reserved
What Makes UC Insight with Log Analytics Different
Secure Data Transport
Structure/Unstructured and
Streaming Data
Fully Multi-Tenant
Analytic Modeling
Unlimited Data
Dynamic Dashboards
Dynamic Search Queries
Rapid Time to Value
Volume...Variety…Velocity…Variability…Complexity
Problem Solved!
UC Insight with Log
Analytics
Powered By:
UC Insight with Log Analytics
Alex Lamont: Zenoss Sr. Product Manager
Jeff Graham: LayerX Technologies CEO
Q & A

More Related Content

What's hot

Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 
GSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation Services
Martin Gold
 

What's hot (20)

Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud Networks
 
Accelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetAppAccelerate Your Enterprise Applications with ePlus and NetApp
Accelerate Your Enterprise Applications with ePlus and NetApp
 
Microsoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyesMicrosoft Azure Identity and ThousandEyes
Microsoft Azure Identity and ThousandEyes
 
Multi cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshareMulti cloud webinar 2019 - slideshare
Multi cloud webinar 2019 - slideshare
 
NetScout nGeniusONE overview
NetScout nGeniusONE overviewNetScout nGeniusONE overview
NetScout nGeniusONE overview
 
Modernizing Your DNS Platform with NS1 and ThousandEyes
Modernizing Your DNS Platform with NS1 and ThousandEyesModernizing Your DNS Platform with NS1 and ThousandEyes
Modernizing Your DNS Platform with NS1 and ThousandEyes
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
NXP Presentation @ ThousandEyes Connect London - June 13th 2019
NXP Presentation @ ThousandEyes Connect London - June 13th 2019NXP Presentation @ ThousandEyes Connect London - June 13th 2019
NXP Presentation @ ThousandEyes Connect London - June 13th 2019
 
ThousandEyes Overview
ThousandEyes Overview ThousandEyes Overview
ThousandEyes Overview
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
Maximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONEMaximize Software Investments with ePlus and Cisco ONE
Maximize Software Investments with ePlus and Cisco ONE
 
Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...Lessons from an AWS outage and how to detect root cause of cloud service disr...
Lessons from an AWS outage and how to detect root cause of cloud service disr...
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
 
Moving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT ResilienceMoving Beyond Disaster Recovery to IT Resilience
Moving Beyond Disaster Recovery to IT Resilience
 
GSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation Services
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 

Viewers also liked

Viewers also liked (7)

Iri growth summit_media and promotion effectiveness_v3
Iri growth summit_media and promotion effectiveness_v3Iri growth summit_media and promotion effectiveness_v3
Iri growth summit_media and promotion effectiveness_v3
 
Anton Yudintsev, Gaijin Entertainment
Anton Yudintsev, Gaijin EntertainmentAnton Yudintsev, Gaijin Entertainment
Anton Yudintsev, Gaijin Entertainment
 
5 Reasons Why Unified Marketing is Not a Myth
5 Reasons Why Unified Marketing is Not a Myth5 Reasons Why Unified Marketing is Not a Myth
5 Reasons Why Unified Marketing is Not a Myth
 
Marketing mix or attribution journey towards unified marketing analytics
Marketing mix or attribution   journey towards unified marketing analyticsMarketing mix or attribution   journey towards unified marketing analytics
Marketing mix or attribution journey towards unified marketing analytics
 
Data convergence & personalization in retail
Data convergence & personalization in retailData convergence & personalization in retail
Data convergence & personalization in retail
 
How PepsiCo's Big Data Strategy is Disrupting CPG Retail Analytics
How PepsiCo's Big Data Strategy is Disrupting CPG Retail AnalyticsHow PepsiCo's Big Data Strategy is Disrupting CPG Retail Analytics
How PepsiCo's Big Data Strategy is Disrupting CPG Retail Analytics
 
Towards Future Proof Customer Relations
Towards Future Proof Customer RelationsTowards Future Proof Customer Relations
Towards Future Proof Customer Relations
 

Similar to Lag. Crackle. Pause. Keeping Your Unified Communications in Check.

SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
Shahzad Khan
 
ISON Technologies Overview Presentation
ISON Technologies Overview PresentationISON Technologies Overview Presentation
ISON Technologies Overview Presentation
Chhavi Tiwari Sood
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is down
Compuware ASEAN
 
Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri Tobola
Jan Fried
 

Similar to Lag. Crackle. Pause. Keeping Your Unified Communications in Check. (20)

SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
Don't Be a Settler
Don't Be a SettlerDon't Be a Settler
Don't Be a Settler
 
Managed Services Marketing
Managed Services MarketingManaged Services Marketing
Managed Services Marketing
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
ISON Technologies Overview Presentation
ISON Technologies Overview PresentationISON Technologies Overview Presentation
ISON Technologies Overview Presentation
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Business Intelligent Reporting Process.pptx
Business Intelligent Reporting Process.pptxBusiness Intelligent Reporting Process.pptx
Business Intelligent Reporting Process.pptx
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Browser Diagnostics using dynatrace Ajax Edition
Browser Diagnostics using dynatrace Ajax EditionBrowser Diagnostics using dynatrace Ajax Edition
Browser Diagnostics using dynatrace Ajax Edition
 
The IT Chargeback Journey
The IT Chargeback JourneyThe IT Chargeback Journey
The IT Chargeback Journey
 
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
Elevate your Splunk Deployment by Better Understanding your Value Breakfast S...
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
 
How to stop fingerpointing when your application is down
How to stop fingerpointing when your application is downHow to stop fingerpointing when your application is down
How to stop fingerpointing when your application is down
 
Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?Hosted PBX- Should You Be a Provider or a Reseller?
Hosted PBX- Should You Be a Provider or a Reseller?
 
General Unikomm Ppt 2011
General Unikomm Ppt 2011General Unikomm Ppt 2011
General Unikomm Ppt 2011
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
 
Presentation
PresentationPresentation
Presentation
 
Invea - Jiri Tobola
Invea - Jiri TobolaInvea - Jiri Tobola
Invea - Jiri Tobola
 

More from Zenoss

More from Zenoss (20)

DevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS PresentationDevOps Introduction - AWS Boston Meetup - AWS Presentation
DevOps Introduction - AWS Boston Meetup - AWS Presentation
 
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
Integrating Operational Response Automation Into Your Code - AWS Boston Meetu...
 
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss PresentationTransforming IT Ops - AWS Boston Meetup - Zenoss Presentation
Transforming IT Ops - AWS Boston Meetup - Zenoss Presentation
 
Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS Zenoss as Core Element for Video QOS
Zenoss as Core Element for Video QOS
 
Zenoss as a Service: How to Get There
Zenoss as a Service: How to Get ThereZenoss as a Service: How to Get There
Zenoss as a Service: How to Get There
 
Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for You
 
Troubleshooting Zenoss: A Support Perspective
Troubleshooting Zenoss:  A Support PerspectiveTroubleshooting Zenoss:  A Support Perspective
Troubleshooting Zenoss: A Support Perspective
 
The Newgistics Digital Transformation Journey
The Newgistics Digital Transformation JourneyThe Newgistics Digital Transformation Journey
The Newgistics Digital Transformation Journey
 
TransUnion's Impact of Impact
TransUnion's Impact of ImpactTransUnion's Impact of Impact
TransUnion's Impact of Impact
 
Skeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting EvangelicalSkeptics in the Church of Data: Getting Evangelical
Skeptics in the Church of Data: Getting Evangelical
 
Product Overview: An Analytics Primer
Product Overview: An Analytics PrimerProduct Overview: An Analytics Primer
Product Overview: An Analytics Primer
 
Practical DMD Scripting
Practical DMD Scripting Practical DMD Scripting
Practical DMD Scripting
 
Leveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service ToolLeveraging the JSON API as a Self-Service Tool
Leveraging the JSON API as a Self-Service Tool
 
Lack of Automation Ruins Lives
Lack of Automation Ruins LivesLack of Automation Ruins Lives
Lack of Automation Ruins Lives
 
IT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNowIT4IT: Realize a Digital Strategy with ServiceNow
IT4IT: Realize a Digital Strategy with ServiceNow
 
Grainger: Our Rookie Year with Zenoss
Grainger: Our Rookie Year with ZenossGrainger: Our Rookie Year with Zenoss
Grainger: Our Rookie Year with Zenoss
 
Empathy in Monitoring
Empathy in MonitoringEmpathy in Monitoring
Empathy in Monitoring
 
Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK Developing ZenPacks the Right Way: Introducing the SDK
Developing ZenPacks the Right Way: Introducing the SDK
 
Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing Dev Talk: Event Manipulation and Testing
Dev Talk: Event Manipulation and Testing
 
Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Lag. Crackle. Pause. Keeping Your Unified Communications in Check.

  • 1. UC Insight with Log Analytics Jeff Graham: LayerX Technologies CEO Alex Lamont: Zenoss Sr. Product Manager
  • 2. © 2016 All Rights Reserved CONFIDENTIAL Zenoss at a Glance • Founded in 2005; headquarters in Austin, TX • Widely adopted unified monitoring and service analytics platform for enterprise IT and managed service providers • Provide IT Ops the application infrastructure visibility and intelligence required to avoid service disruptions • Global services and support partner network • Offered on-premises and as a cloud service "Zenoss represents the most credible replacement for the legacy Big 4 systems management frameworks in the market." - Bernd Harzog, The Virtualization Practice
  • 3. © 2016 All Rights Reserved CONFIDENTIAL LayerX Technologies  Headquartered in Dallas, TX ◦ Founded 2005  Patented Data Management Platforms ◦ Enterprise Log Analysis ◦ Advanced DashBoards and Reporting  Experienced Leadership Team ◦ Start-up, S/W Development, Professional Services, M&A ◦ Nortel, Arrow Electronics, NEC, Motorola, Accuvant  Enterprise Customer/Partner Base ◦ 150+ Clients in Multiple Verticals ◦ MSP, Financial, Oil & Gas, Healthcare, Hospitality, Tech
  • 4. © 2016 All Rights Reserved CONFIDENTIAL Zenoss UC Insight with Log Analytics Unified Communications • VoIP Quality Management • Path Analytics • Health Monitoring • Fault Isolation Log Analytics • Index Any Data Format • Search Across All Infrastructure • Real-time Event Correlation • In-Depth Custom Reporting UC Insight with Log Analytics Powered By:
  • 5. © 2016 All Rights Reserved CONFIDENTIAL Zenoss UC Insight with Log Analytics Combining the power and insight of Zenoss and LayerX UC Insight with Log Analytics collects all data within a UC environment and indexes it under a single architecture. Its powerful correlation engine can then extract that data, correlate it, and take actions to view and analyze overall access, quality and performance. Extend the Zenoss platform through deep Log Analytics of UC, Security, Network and Application devices • True Call Path Analysis • Granular Search and Extraction (Forensic Inquiry) • Layer 3 Impact Analysis • Native Multi-Tenant Deployment Support
  • 6. © 2016 All Rights Reserved CONFIDENTIAL Unified Comms – True Application Integration Drives Business Productivity Identity Mgmt. (AD)/Network/Security Open Standards Servers/Virtual Machines Open Standards Communications Platform/Protocols Messaging IM/Presence Collaboration CRM WEB Services Contact Center Finance/HR Business Apps
  • 7. © 2016 All Rights Reserved Unified Comms – Deployment Model Requires Unified Application/Infrastructure MonitoringRequires Unified Application/Infrastructure Monitoring Laptop Video Client IP Phone Tablet Smartphone Laptop Video Client IP Phone Tablet Smartphone Laptop Video Client IP Phone Tablet Smartphone
  • 8. © 2016 All Rights Reserved What is UC Insight with Log Analytics? UC Application and Machine Generated Data • Created by Applications Automatically • Voice or Video Calls, RTCP, SIP Transactions, Servers, Network Devices • Activity Records…....What Happened and When Logs Can Contain • Transaction Events / Performance Metrics, Thresholding Data, Diagnostic, Call Detail Records, Security Events and even Power Utility Data Log Analytics is the process of collecting this machine generated structured and unstructured data from multiple sources, proactively correlating, analyzing and providing new insights to rapidly solve issues. Collect Correlate Index & Store Analyze Visualize & Report
  • 9. © 2016 All Rights Reserved Why UC Insight with Log Analytics? Data Collection, Correlation and Analysis • Returns Immediate Value About the Application – UC Quality Management and Analytics – IP Network and Service Performance – Security Intelligence on Fraudulent or Nefarious Transactions, – Security Attacks and Persistent Threats – Customer Experience and SLA Breaches Proactively Resolve Problems • Eliminate the Need to Search Through Multiple Systems, Servers and Virtual Machines Improve Customer / User Satisfaction • Avoid The Services “Death Spiral” • Correlating/Analyzing Logs as near to Real-Time Prevents Issues Before They Impact Critical Services
  • 10. © 2016 All Rights Reserved UC Insight with Log Analytics Success Spiral o Automated Problem Isolation o Correlated Event Handling o Focused Resolution Steps o Problem Solved o Customer is Happy o Increased Margin as a Result of Low Human Capital Involvement o Customer Loves Your Service thus is Happy to be a Reference o Revenue Increases o Margin Increases o Business Flourishes o Recurring Problems o Extensive Human Capital Deployed o Unhappy Customers o More Human Capital Commitment o Degraded Margin o Customer Cancels o Revenue and More Margin Loss o Layoffs to Cut Costs o More Customers Leave o Business Dies UC Insight ... ROI $$ Legacy Monitoring ... Wasted $$
  • 11. © 2016 All Rights Reserved UC Insight ROI UC Infrastructure Example 100 Managed Devices: Routers, Switches, Gateways, App Servers, SBC, Firewall, etc. Costs: – Resolving and Event without Service Desk Escalation – Resolving at the Service Desk – Average Hourly Cost of Customer/End User Downtime Per Device Events on a Per Month Basis Per Device Resolution Utilizing UC Insight and Proactive Correlation / Resolution Inputs: The Most Conservative End of the Range Utilizing Gartner and Other Research Firms 70% Annual Savings on Event Resolution Costs Significant Productivity Enhancement Increase in User Satisfaction $0 $20,000 $40,000 $60,000 $80,000 $100,000 UC Insight Partial Correlation No Correlation Annual Business and IT Costs
  • 12. © 2016 All Rights Reserved How LayerX Enhances Zenoss Intuitive Dashboards Analyzing UC Call Quality Flexible Reporting on Call Quality o Every Dashboard is also a Report o Ad-Hoc or Scheduled with Multiple Reports for a Workbook o Full Multi Tenancy with Reporting by Customer/Site/Location/Department Drill Down into Location Data Map Any Data to Specific Description / Names Cause Code 16 Shows as Call Terminated Normal Export any Graph to a Picture File Export any Table to Excel or .CSV
  • 13. © 2016 All Rights Reserved How LayerX Enhances Zenoss Provides Call Path Analysis o Layer 3 Impact Interrogation of All Devices Along the Call Path SIP Stack Embedded to Read RTCP and Header Registration o All Data Received is Proactively Correlated for Threshold / Window / Metric or Performance Violations o Events / Alerts with Detailed Descriptions are Created and Presented to Zenoss
  • 14. © 2016 All Rights Reserved How LayerX Enhances Zenoss Utilize NetFlow as a Resource o Cross Reference Traffic with Call Quality Issues o Analyze Top Applications Correlated with Bandwidth Consumption Drill Into Specific Application Traffic o Correlate Layer 3 Hop Latency with Application Utilization Flexible NetFlow Reporting
  • 15. © 2016 All Rights Reserved How LayerX Enhances Zenoss Analyze Firewall Log Data o Cross Reference Threat Activity with UC Quality o Analyze Top Applications Correlated with Bandwidth Consumption Drill Into Threat Data o Event/Alerts Based on Threats and Behaviors o Correlate with UC Infrastructure Events/Alerts Flexible Firewall/DNS/Threat Reporting
  • 16. © 2016 All Rights Reserved How LayerX Enhances Zenoss Session Border Controller Log/Data o Analyze Traffic Volumes and Patterns o Analyze Trunk Routes o Protocol / Codec Utilization Drill Into Specific Regions o Correlate Bad Audio Calls and Produce Events/Alerts Flexible Reporting
  • 17. © 2016 All Rights Reserved How LayerX Enhances Zenoss S4B Analysis o Voice and Video Endpoint Performance Analysis o Specific Events/Alerts SDN Analysis through the MS API o Call Flow Diagnostics MS Infrastructure Performance Flexible Reporting
  • 18. © 2016 All Rights Reserved How LayerX Enhances Zenoss Flexible Indexed Based Log Search and Extraction o Highlight and Name o No RegEx Skills Required Search by Words, Time and Boolean Logic o Root Cause Data Easy Audit and Compliance Reporting
  • 19. © 2016 All Rights Reserved What Makes UC Insight with Log Analytics Different Secure Data Transport Structure/Unstructured and Streaming Data Fully Multi-Tenant Analytic Modeling Unlimited Data Dynamic Dashboards Dynamic Search Queries Rapid Time to Value Volume...Variety…Velocity…Variability…Complexity Problem Solved! UC Insight with Log Analytics Powered By:
  • 20. UC Insight with Log Analytics Alex Lamont: Zenoss Sr. Product Manager Jeff Graham: LayerX Technologies CEO Q & A