ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
All Micro Focus learning in one place
Build the skills to succeed
Streamline software delivery for faster value
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Modernize Core Business Systems to Drive Business Transformation
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
Security at the core to everything you do; Operations, Applications, Identity and Data
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Access all products in CyberRes
Trusted, proven legal, compliance and privacy solutions
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Simplify Your IT Transformation
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
Access all products in IT Operations Management
Give your team the power to make your business perform to its fullest
Reduced MTTR through root-cause analysis
Management of various heterogeneous networks of many customers in a secure and proactive manner, meeting a variety of SLAs and ensuring security
DATAGROUP is one of Germany’s leading IT service providers. The company designs, implements, and operates business applications and infrastructures in IT Outsourcing. IT Solutions cover services such as software development, application development, IT consulting, Robotic Process Automation (RPA), and other technologies. With over 2,000 employees, DATAGROUP is represented in all commercial German metropoles.
DATAGROUP covers all IT aspects for its medium and large sized customers, including cloud enablement, leveraging Amazon Web Services (AWS) and Microsoft Azure environments. And all of this needs a secure and reliable network infrastructure.
DATAGROUP faces the challenge of operating both its internal networks and those of its customers in a secure and predictable manner. It must ensure that customers can view the status of their equipment, while at the same time ensuring complete separation from other customer environments. Devices from various vendors must be managed and monitored. A visualization of all devices and topologies is key to understanding relations and reducing MTTR (mean time to repair). Dashboards and reports are also required for both the internal network and for the individual customers. These contain not only monitoring information but also data about the performance and traffic flows of the network applications. A central management and patching of the devices and a central backup of the network configuration must also be possible.
In addition, DATAGROUP must ensure that the environment complies with their own and external security guidelines, thus ensuring security always. Another key requirement for a new solution is the ability to analyze the network environment with a detailed root cause analysis to determine what caused a failure.
When investigating the market, it was clear to DATAGROUP that Micro Focus Network Operation Management (NOM) has all the key features which are desired. NOM is the only network management solution that consolidates fault, performance, configuration, and compliance management. Jürgen Bühn, Network Management for DATAGROUP, comments: “Having one solution in Network Management that can manage fault, performance, configuration and compliance means we don’t have to spend time and budget to train staff on multiple tools. It also gives us a full overview of our own and customers’ environment, which always enables us to provide a clear status. The automated compliance management in NOM ensures the reliability and security of the environment continuously.”
At the beginning of the project the names of the network devices have been structured and homogenized. The new consistent naming concept facilitates the identification of customer, device role, and device location and makes it easy to handle the devices in technical tools. With this preparation the environment has been discovered and the topology has been visualized in automated topology maps (layer 2 and layer 3). The new device names helped a lot to define simple filters and accelerate the implementation. After that, the accounts were setup and the network devices were completely separated for security reasons. Immediately after discovery the continuous monitoring of the environment takes place and first results are presented via incidents and state changes of the objects. Additionally, the configuration and compliance management are executed, and performance data are collected.
As NOM is well integrated, performance data is automatically collected and stored – no extra effort to add devices and credentials in 3rd party tools. Dashboards are used to analyze performance problems and reports can be generated and scheduled to be automatically sent to internal and external customers.
DATAGROUP can now add traffic collection which enables analysis and optimization of traffic flows through the network.
The automatic and continuous discovery ensures up-to-date information for network management. The topology-based monitoring with the integrated root-cause analysis pinpoints the operating staff to important events. An immediate result was the identification of a faulty redundant power supply. The topology maps help to understand relations and speed up further analysis which lowers MTTR.
As devices are automatically added to the configuration management, configuration backup is done without user intervention – no more missing configuration backups or change records. The compliance of internal security requirements and external requirements like vulnerability checks (CVEs) guarantee a reliable and secure infrastructure.
Data about performance and traffic flows enable DATAGROUP network engineers to troubleshoot performance issues, perform capacity planning, and optimize traffic flows. Finally, the introduced network device naming convention facilitates improved communication.
Mr Bühn concludes: “We worked with implementation partner ITC. Their many years of experience in project planning and execution and their best practices helped us to implement NOM within a very short time and to achieve our goals.”