The fastest, open, infrastructure-independent, advanced analytics SQL database
Securely access and analyze enterprise (and public) text, audio & video data
An intuitive hunt and investigation solution that decreases security incidents
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
Autonomous operations through a business lens
Intelligent automation for service desk, configuration, and asset management
SQL analytics solution handling large amounts of data for big data analytics
High-scale protection of sensitive data at rest, in motion, and in use across systems
Agile/DevOps management for continuous quality and delivery
Manage and track requirements from idea to deployment
Plan, track, orchestrate, and release complex applications across any environment
Enable all aspects of SCCM with enterprise grade scalability, security, and compliance
Automate deployments for continuous delivery with drag-and-drop simplicity
Govern application lifecycle activities to achieve higher quality
Unify test management to drive efficiency and reuse
Integrated, component-based test framework that accelerates functional test automation
Accelerate functional test automation across web, mobile, API, and enterprise apps
Discover, design, and simulate services and APIs to remove dependencies and bottlenecks
Shift-left functional testing using the IDE, language, and testing frameworks of choice
Reliable and efficient test automation for functional and regression testing
Centralized, omnipresent lab to develop, debug, test, monitor, and optimize mobile apps
Learn more about the LoadRunner Family of solutions
Cloud-based solution to easily plan, run and scale performance tests
Project-based performance testing to identify performance issues
Easy-to-use performance testing solution for optimizing application performance
Collaborative performance testing platform for globally distributed teams
Discover, design, and simulate services and APIs to remove dependencies and bottlenecks
Identifies security vulnerabilities in software throughout development
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Provides comprehensive dynamic analysis of complex web applications and services
Builds packages of change artifacts to speed up mainframe application development
Enable faster, efficient parallel development at scale
A development environment that streamlines mainframe COBOL and PL/I activities
Intelligence and analysis technology that provides insight into core processes
Fuel mobile apps, cloud initiatives, process automation, and more
Future-proof core COBOL business applications
Maintain and enhance ACUCOBOL-based applications
Deliver application access—anywhere
Maintain and enhance COBOL systems
Maintain and enhance RM/COBOL applications
Connect COBOL applications to relational database management systems
Derive incremental value with real-time, relational access to COBOL data
Unlock business value with real-time, relational access to ACUCOBOL data
Connect ACUCOBOL applications to relational database management systems
Automatically understand and analyze Micro Focus COBOL applications
Build COBOL applications using Agile and DevOps practices
Deploy COBOL applications across distributed, containerized or cloud platforms
Modernize core business system infrastructure to support future innovation
Manage agile projects using a collaborative, flexible, requirements and delivery platform
Manage requirements with full end-to-end traceability of processes
Automatically understand and analyze IBM mainframe applications
Capture, analyze, and measure the value, cost and risk of application portfolios
Build packages of change artifacts to speed up mainframe application development
Build and manage packages of change artifacts to speed up mainframe application development
Provide multiple change management interfaces to maintain mainframe apps
Build and modernize IBM mainframe COBOL and PL/I applications
Enable faster, efficient parallel development at scale
Fuel mobile apps, cloud initiatives, process automation, and more
Manage mainframe files for fast problem resolution
Easily test mainframe application changes using flexible infrastructure
Compare and manage mainframe data, text, and directory files
Connect Dev and Ops by automating the deployment pipeline and reduce feedback time
Centralize planning and control for the entire software release lifecycle
Orchestrate and integrate processes for faster software development and delivery
Detect changes, synchronizes multiple environments, and restores failed systems
Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud
Execute modernized IBM mainframe workloads under Microsoft .NET and Azure
Modernize IBM, HP, and Unix application access across desktop and mobile devices
Web-enable IBM and VT application desktop access, Java free
Modernize Unisys mainframe application desktop access
Modernize IBM, HP, and Unix application desktop access
Automate IBM, HP, and Unix application desktop access
Create new applications and workflows with Web services and APIs for IBM, HP, and UNIX applications
Fuel analytics platforms and BI applications with Unisys MCP DMSII data in real time
Centralize host access management with identity-powered access control and data security
Modernize file transfer with security, encryption and automation, within and across the firewall
Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points
Measure and manage terminal-based software deployment and usage
Centralize host access management with identity-powered access control and data security
Develop and deploy applications with a comprehensive suite of CORBA products
Build distributed applications at enterprise scale
Develop, deploy, and support CORBA 2.6 compliant middleware in C++ or Java
Connect applications on diverse operating environments
Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more
Provides secure file access and sharing from any device
Provides secure email, calendaring, and task management for today's mobile world
Backup and disaster recovery solution that ensures critical email is always available
Seven essential tools to build IT infrastructures, including secure file sharing
Provides secure team collaboration with document management and workflow features
Provides single sign-on for enterprises and federation for cloud applications
Protect your sensitive information more securely with multi-factor authentication
File Reporter and Storage Manager solution suite bundle
File Reporter for OES examines OES network file systems and delivers intelligent file insights so you can make the most intelligent business decisions.
Provides secure file access and sharing from any device
Protects your key business systems against downtime and disaster
Simplifies resource management on a Storage Area Network and increases availability
File, print, and storage services perfect for mixed IT environments
Cloud-based endpoint backup solution with file sync and share, and analytics
Package, test, and deploy containerized Windows apps quickly and easily
Seven integrated products to help track, manage and protect endpoint devices
Provides reports that integrate licensing, installation and usage data
Provides automated endpoint management, software distribution, support, and more
Delivers identity-based protection for devices and features total protection
Proactive laptop and desktop data protection to automatically lock out threats
Automates patch assessment and monitors patch compliance for security vulnerabilities
Streamlines and automates the way you provide IT services to your business
Cloud-based, scalable archiving for regulatory, legal, and investigative needs
Archive all business communication for case assessment, search, and eDiscovery
Automate employee data and communication monitoring to meet regulatory compliance and internal initiatives
Mitigate risk across social media channels to meet regulatory compliance obligations
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Address the ever-changing needs of network data management
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Structured data archiving to retire outdated applications and reduce data footprint
Identity-driven governance of data & access
SaaS-based file analysis on all of your unstructured data
Respond to litigation and investigations quickly, accurately, & cost-effectively
SaaS-based file analysis on all of your unstructured data
Identify, analyze, and manage your data; then establish policies to protect your data properly and efficiently, in use and throughout its lifecycle, and ensure data preservation.
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Address the ever-changing needs of network data management
Structured data archiving to retire outdated applications and reduce data footprint
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Securely access and analyze enterprise (and public) text, audio & video data
Backup and disaster recovery for diverse, dynamic, and distributed enterprise
Automate provisioning, patching, and compliance across the data center
Discover and manage configuration items (CIs) in Hybrid IT environments.
Simplify fulfillment automation and enforce governance
Automate and manage traditional, virtual, and software-defined networks
The first containerized, autonomous monitoring solution for hybrid IT
Automate IT processes end-to-end
Build, secure, and scale automated business processes across the enterprise
Engaging end-user experience and efficient service desk based on machine learning
A comprehensive threat detection, analysis, and compliance management SIEM solution
An intelligent log management solution that eases compliance burdens and accelerates forensic investigation for security professionals
A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.
Download and deploy pre-packaged content to dramatically save time and management
A future-ready data platform that transforms data chaos into security insight.
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM
A comprehensive Security Orchestration Automation Response platform with cognitive automation, investigation service desk, process orchestration and SOC analytics.
Persistent file encryption, complete control, and visibility to simplify unstructured data security
Format-preserving encryption, tokenization, data masking, and key management
Omni-channel PCI compliance and data protection for end-to-end payments security
Email, file, and Office 365 protection for PII, PHI, and Intellectual Property
Saas cloud email encryption to protect information on Office 365
The full solution for secure automated file transfer management inside and across perimeters
Identifies security vulnerabilities in source code early in software development
Provides comprehensive dynamic analysis of complex web applications and services
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Gain visibility into application abuse while protecting software from exploits
Provisions and governs access to unstructured data
Provides an LDAP directory with incredible scalability and an agile platform
Provides automated user access review and recertification to remain compliant
Delivers an intelligent identity management framework to service your enterprise
Provides single sign-on for enterprises and federation for cloud applications
Move beyond username and passwords and securely protect data and applications
Multi-factor Authentication for all your IBM z/OS end points
Integrate the host with your modern security framework
Adapt the authentication and access experience to the risk at hand.
Enables users to reset their passwords without the help of IT
Streamlines authentication for enterprise apps with a single login experience
Protect and manage access to your APIs.
Enables IT administrators to work on systems without exposing credentials
Limits administrative privileges and restricts directory views to specific users
Edit, test and review Group Policy Object changes before implementation
Protect critical data, reduce risk and manage change with Change Guardian
Extend the power of Active Directory to Linux resources
Unify and centrally manage policies across multiple platforms.
Protect critical data, reduce risk and manage change with Change Guardian
Finds and repairs configuration errors that lead to security breaches or downtime
Provides easy compliance auditing and real-time protection for IBM iSeries systems
Protect your network and messaging system from malware, viruses, and harmful content
Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile
Cloud-based endpoint backup solution with file sync and share, and analytics
Package, test, and deploy containerized Windows apps quickly and easily
Provides reports that integrate licensing, installation and usage data
Provides automated endpoint management, software distribution, support, and more
Delivers identity-based protection for devices and features total protection
Proactive laptop and desktop data protection to automatically lock out threats
Automates patch assessment and monitors patch compliance for security vulnerabilities
Streamlines and automates the way you provide IT services to your business
Seven integrated products to help track, manage and protect endpoint devices
Help you embed security throughout the IT value chain and drive collaboration between IT operations, applications, and security teams.
Help you to react faster and gain a competitive advantage with enterprise agility.
Accelerate your hybrid cloud outcomes with advisory, transformation and implementation services.
Application management services that let you out-task solution management to experts who understand your environment.
Strategic consulting services to guide your digital transformation agenda.
Fully functional use-case modeling, with pre-built integrations across the Micro Focus Software portfolio, showcasing real-life use-case
Expert security intelligence services to help you quickly architect, deploy, and validate your Micro Focus security technology implementation.
A service integration and management service that optimizes delivery, assurance, and governance in multi-supplier settings.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Mobile services that ensure performance and expedite time-to-market without compromising quality.
Get insights from big data with real-time analytics, and search unstructured data.
Comprehensive Big Data services to propel your enterprise forward.
All Micro Focus learning in one place
Istanbul Grand Airport (IGA) is a consortium company, founded to construct and operate Istanbul Airport for 25 years. The airport opened with its first commercial flight in October 2018. The airport hosts flights to more than 300 destinations with an annual capacity of 200 million passengers.
Industry
Location
Products
As a complete green-field project, Istanbul Grand Airport experienced very tight deadlines; the airport needed to be completed and open within four years of the start of construction. During the final year, one key objective was the design and implementation of the full IT infrastructure needed for running the airport in addition to supporting the IT service requirements of all onsite organizations. The overall IT project was broken down into 50+ sub-projects with different teams. The IT architecture was carefully designed to ensure there would be no single point of failure, since each IT component has availability and redundancy built in as standard.
The complexity of the airport environment puts a huge administrative burden on IGA. 750 different IT rooms and three datacenters house 5,000 servers and 6,500 network devices. 40,000 Internet of Things (IoT) devices such as security cameras, intercoms, AC units, lifts, and escalators are connected to the network. Each hour 100,000 health status data points are recorded, analyzed, and actioned, while 150,000 key metrics are constantly monitored.
It soon became clear to Emrah Bayarçelik, Infrastructure & Security Group Manager for IGA, that simply investing in human resources would not be sufficient to get the job done: “During the planning phase, we defined all IT and non-IT assets that make up our architecture. For the cloud automation project, we needed to consider our internal customers, the airport departments, but we also provide network services to everyone associated with the airport, such as airlines, ground services, food and beverage, duty-free, hotels, cargo companies, and medical facilities, including hospitals. We receive IT requests from them all. Our challenge was hiring qualified IT administration resources to manage these. We soon determined that we needed elasticity, automatic provisioning, easy management, and standardization of our IT processes.”
With an increasing number of IT and IoT endpoints and mounting integration complexity, IGA looked for a comprehensive cloud automation solution that worked seamlessly with monitoring and process automation. The chosen solution needed to provide multi-vendor Hypervisor support, physical and virtual server provisioning, ‘what-if’ modeling for a hybrid IT platform, and native integration with enterprise applications.
IGA prepared a proof of concept (POC) scenario for IT vendors to participate in. A technical scoreboard was created to present the findings for each vendor. Micro Focus teamed with local IT partners Duosis and Netaş to prepare a bid. Together, they demonstrated automated virtual and physical server provisioning directed by a standard workflow. This did not just include server OS provisioning, but also database and application installation and configuration. Mr. Bayarçelik was impressed: “Micro Focus, Duosis, and Netaş received the best technical score in the POC evaluation. Micro Focus was also fully compliant with our cloud project tender, provided out-of-the-box integration with our existing applications, and could provide a complete, single-vendor solution with the addition of its established suite of end-to-end monitoring and automation solutions.”
The IGA team worked closely with Micro Focus and the partners over the following six months to implement Micro Focus solutions at the heart of the IT architecture, following a defined project lifecycle. Micro Focus Hybrid Cloud Management (HCM) provides a self-service portal for delivering hybrid and multi-cloud resources and services. This is now used by internal customers to submit a server provisioning request. Previously, these requests were processed through IT administration. This was a manual, error-prone, and time-intensive process. Burak Çetinkaya, Datacenter & Network Manager for IGA, explains the automated process: “The request is received in the HCM portal which starts an end-to-end server provisioning process. Server installation includes agent installations, DNS registrations, IP and hostname settings, database and application installation and configuration. Incredibly, HCM completes the provisioning process automatically within minutes of receiving the request. We have provisioned nearly 850 virtual servers through this tried and tested method.”
IGA uses both public and private cloud environments, depending on which customer it serves. The Micro Focus suite of solutions enables IGA to manage this hybrid environment from one single interface, as Mr. Çetinkaya explains: “We are delighted that we don’t need to use different vendor tools in our multi-Hypervisor architecture. Our ‘what-if’ capacity modeling operates automatically through HCM without needing a Hypervisor console.”
He is equally impressed with the provisioning capabilities: “We provision physical and virtual servers from the same interface. HCM includes a library of over 8,000 workflows and actions to leverage and automate typical IT processes and repetitive actions. These are easily integrated into our own systems and increase our productivity immediately. We also leverage Operations Orchestration, a key component of the HCM suite, to transparently track all provisioning steps in orchestration flows.”
Post-Provisioning, Monitoring and Automation
After the server is provisioned, Micro Focus Server Automation takes over and installs antivirus, audit, backup, monitoring and vulnerability agents to provide maximum protection and monitoring. Automated patch management, including OS patches, is also part of Server Automation. Micro Focus Operations Bridge works in close partnership with Micro Focus Network Operations Management (NOM) to monitor all system endpoints.
When an event occurs, log correlation is critical in determining the level of alarm severity and the correct response. Every alarm is linked to many others. For instance, when a network switch is down, there will be a critical alarm for this, but also for all the endpoints connected to this device. This can cause confusion and duplication of effort in identifying the root cause of the problem. Operations Bridge and NOM hold the topology of all defined relationships and can easily determine where the resolution effort needs to be focused.
Operations Bridge Reporter (OBR) manages service availability and performance reporting. Micro Focus Universal CMDB Configuration Manager is deployed to monitor server inventories, analyze the OBR performance logs, and leverage ‘what-if’ modeling to confirm a healthy balance of resource usage after the provisioned server goes live. Full data analytics are provided by the Vertica Analytics Platform. This analytic data is used for predictive maintenance, operations planning, commercial area planning, and marketing purposes by the IGA operations departments.
The output from all Micro Focus solutions are captured in a clear visual representation of the real-time state of the three data centers. It shows values for capacity, datacenter sensors, network performance, cloud usage, and compliance. An executive dashboard shows a status summary of all IT and non-IT endpoints, giving a clear overview of the health of Istanbul Grand Airport.
Istanbul Grand Airport IT operations is still in its early stages, and the team have many plans for the future, to further automate and standardize IT processes, as Mr. Bayarçelik comments: “We will be defining additional automation rules within Operations Orchestration to include areas such as baggage handling and airport management systems, and are also planning to implement auto-remediation rules within Operations Bridge. Our cloud services portal will be extended to our external customers which will further streamline our service delivery.”
Implementing end-to-end cloud service provisioning and automation with Micro Focus and the partners has already delivered great benefits, as Mr. Çetinkaya comments: “We analyzed the time it took to provision servers without automation support, and calculated that HCM accelerates our delivery by 12 times. In addition, the full Micro Focus suite has increased our IT administrator’s productivity by 80 percent.”
The Micro Focus monitoring solutions enable full log correlation from both systems and networks. This pinpoints root cause more quickly, with less manual effort and reduces issue resolution time. Because the solution is so transparent, production issues are often highlighted and addressed before users are able to notice the concern, resulting in more robust systems.
Mr. Bayarçelik concludes: “To reduce IT administration effort and human resources, it was clear that we needed to simplify IT complexity in our infrastructure, through provisioning, process automation and standardization. Selecting the right vendor and implementation partner was key, and we are very pleased with our choice for Micro Focus, Duosis, and Netaş. The component parts of our IT infrastructure fit together perfectly and are as beautifully designed as the architecture of our airport terminal; ready to shape the future of aviation.”
We analyzed the time it took to provision servers without automation support, and calculated that HCM accelerates our delivery by 12 times. In addition, the full Micro Focus suite has increased our IT administrator’s productivity by 80 percent.
Selecting the right vendor and implementation partner was key, and we are very pleased with our choice for Micro Focus, Duosis, and Netaṣ. The component parts of our IT infrastructure fit together perfectly, and are as beautifully designed as the architecture of our airport terminal; ready to shape the future of aviation.
Incredibly, HCM completes the provisioning process automatically within minutes of receiving the request. We have provisioned nearly 850 virtual servers through this tried and tested method.
We analyzed the time it took to provision servers without automation support, and calculated that HCM accelerates our delivery by 12 times. In addition, the full Micro Focus suite has increased our IT administrator’s productivity by 80 percent.
Selecting the right vendor and implementation partner was key, and we are very pleased with our choice for Micro Focus, Duosis, and Netaṣ. The component parts of our IT infrastructure fit together perfectly, and are as beautifully designed as the architecture of our airport terminal; ready to shape the future of aviation.
Incredibly, HCM completes the provisioning process automatically within minutes of receiving the request. We have provisioned nearly 850 virtual servers through this tried and tested method.