SlideShare uma empresa Scribd logo
1 de 9
US based Supply Chain Company
uses OpManager to manage 2500
devices across 50 locations
Reference Customer Implementation
A supply chain company that offers services ranging from
distribution center operations and transportation management to highly
sophisticated, technology-enabled solutions for product assembly, reverse
logistics and repair, materials management etc.
They manage more than 70 distribution centers and employ more
than 7,000 people worldwide.
Their network is distributed across 50 different
locations in the US
Their Expectations
• Unified network monitoring
solution to monitor the
entire IT.
• Network traffic analysis- To
monitor the network
bandwidth utilized across
their IT.
• Network Change and
Configuration Management
• WAN Management – To
visualize WAN links and spot
problematic links
After evaluation, their IT
team was very much
satisfied by OpManager
and its ease of use
So OpManager was
deployed to production
OpManager EE implementation
OpManager EE Architecture
NCM - 2500 Devices
NFA - 50 Interfaces
WAN RTT – 147 Monitors
2500 devices across 50 different locations
How did OpManager fulfill their expectations?
Benefits with OpManager
ManageEngine OpManager provides
• A single, powerful and centralized network management console
• Highly scalable & reliable engine that can scale up to 100,000 interfaces or
10,000 devices
• Flow–based network traffic analysis
• Automatic network configuration changes, take backups, restore
configurations across multiple vendor devices
• WAN RTT monitors for WAN link latency, bandwidth utilization, Round–Trip–
Time and other performance factors
Thank You
prince.jabakumar@zohocorp.com

Mais conteúdo relacionado

Mais procurados

Who Is ASE?
Who Is ASE?Who Is ASE?
Who Is ASE?
djburns
 
2423534563426
24235345634262423534563426
2423534563426
mshamisi
 

Mais procurados (11)

Wireless Technology in the Warehouse
Wireless Technology in the WarehouseWireless Technology in the Warehouse
Wireless Technology in the Warehouse
 
Power p1
Power p1Power p1
Power p1
 
Element Management System - www.nocvue.com
Element Management System - www.nocvue.comElement Management System - www.nocvue.com
Element Management System - www.nocvue.com
 
Who Is ASE?
Who Is ASE?Who Is ASE?
Who Is ASE?
 
iManage Govern Records Manager Upgrading to the Latest Version 2017-07-27
iManage Govern Records Manager Upgrading to the Latest Version 2017-07-27iManage Govern Records Manager Upgrading to the Latest Version 2017-07-27
iManage Govern Records Manager Upgrading to the Latest Version 2017-07-27
 
2423534563426
24235345634262423534563426
2423534563426
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
VMware monitoring must haves
VMware monitoring must havesVMware monitoring must haves
VMware monitoring must haves
 
Leading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManagerLeading American Entertainment Company implements OpManager
Leading American Entertainment Company implements OpManager
 
Al bahar visionLink Guide
Al bahar visionLink GuideAl bahar visionLink Guide
Al bahar visionLink Guide
 
controltrix - we make control solutions easier
controltrix - we make control solutions easiercontroltrix - we make control solutions easier
controltrix - we make control solutions easier
 

Destaque

apnic handling-network-abuse
apnic handling-network-abuseapnic handling-network-abuse
apnic handling-network-abuse
APNIC
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 
SAND - Small Autonomous Network Devices
SAND - Small Autonomous Network DevicesSAND - Small Autonomous Network Devices
SAND - Small Autonomous Network Devices
Tev Tlov
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
 

Destaque (20)

PLNOG15: Software Define Storage: mass storage solutions built on network inf...
PLNOG15: Software Define Storage: mass storage solutions built on network inf...PLNOG15: Software Define Storage: mass storage solutions built on network inf...
PLNOG15: Software Define Storage: mass storage solutions built on network inf...
 
apnic handling-network-abuse
apnic handling-network-abuseapnic handling-network-abuse
apnic handling-network-abuse
 
OpManager - A smart alternative to complex network management frameworks
OpManager - A smart alternative to complex network management frameworksOpManager - A smart alternative to complex network management frameworks
OpManager - A smart alternative to complex network management frameworks
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Introducing Intelligence Into Your Malware Analysis
Introducing Intelligence Into Your Malware AnalysisIntroducing Intelligence Into Your Malware Analysis
Introducing Intelligence Into Your Malware Analysis
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
 
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
 
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
 
Network Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case StudyNetwork Infrastructure Virtualization Case Study
Network Infrastructure Virtualization Case Study
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future RoadmapReversing & Malware Analysis Training Part 13 - Future Roadmap
Reversing & Malware Analysis Training Part 13 - Future Roadmap
 
Reversing & Malware Analysis Training Part 6 - Practical Reversing (I)
Reversing & Malware Analysis Training Part 6 -  Practical Reversing (I)Reversing & Malware Analysis Training Part 6 -  Practical Reversing (I)
Reversing & Malware Analysis Training Part 6 - Practical Reversing (I)
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware Virtualization
 
SAND - Small Autonomous Network Devices
SAND - Small Autonomous Network DevicesSAND - Small Autonomous Network Devices
SAND - Small Autonomous Network Devices
 
Distributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data StreamsDistributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data Streams
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to AndroidAdvanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 8 - Introduction to Android
 

Semelhante a Supply chain company manages 2500 network devices using OpManager

Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
jeronimored
 

Semelhante a Supply chain company manages 2500 network devices using OpManager (20)

Monitoring over 15,000 interfaces
Monitoring over 15,000 interfacesMonitoring over 15,000 interfaces
Monitoring over 15,000 interfaces
 
US-based Private Club Network uses OpManager to manage 1500 devices
US-based Private Club Network uses OpManager to manage 1500 devicesUS-based Private Club Network uses OpManager to manage 1500 devices
US-based Private Club Network uses OpManager to manage 1500 devices
 
Leading water and wastewater services in Australia manages 1000 devices using...
Leading water and wastewater services in Australia manages 1000 devices using...Leading water and wastewater services in Australia manages 1000 devices using...
Leading water and wastewater services in Australia manages 1000 devices using...
 
Managing 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single consoleManaging 4,000 devices across 20+ remote sites on a single console
Managing 4,000 devices across 20+ remote sites on a single console
 
US-based Paint Company uses OpManager to manage 1500 devices
US-based Paint Company uses OpManager to manage 1500 devicesUS-based Paint Company uses OpManager to manage 1500 devices
US-based Paint Company uses OpManager to manage 1500 devices
 
Network performance management using OpManager
Network performance management using OpManagerNetwork performance management using OpManager
Network performance management using OpManager
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service Providers
 
High Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for EnterprisesHigh Scalability Network Performance Management for Enterprises
High Scalability Network Performance Management for Enterprises
 
Opmanager "N/w monitoring tool"
Opmanager "N/w  monitoring tool"Opmanager "N/w  monitoring tool"
Opmanager "N/w monitoring tool"
 
manage engines "Opmanager" Network monitoring tool
 manage engines "Opmanager" Network monitoring tool  manage engines "Opmanager" Network monitoring tool
manage engines "Opmanager" Network monitoring tool
 
Atlantic Metro Channel Partners Presentation
Atlantic Metro Channel Partners PresentationAtlantic Metro Channel Partners Presentation
Atlantic Metro Channel Partners Presentation
 
ASPEN
ASPENASPEN
ASPEN
 
OpManager EE- Managing 30K Devices
OpManager EE- Managing 30K DevicesOpManager EE- Managing 30K Devices
OpManager EE- Managing 30K Devices
 
#i_shake Technical Architecture
#i_shake Technical Architecture#i_shake Technical Architecture
#i_shake Technical Architecture
 
Outsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docxOutsourced Network Operations Center (NOC) Services Provider hex641.docx
Outsourced Network Operations Center (NOC) Services Provider hex641.docx
 
FTC Group Presentation
FTC Group PresentationFTC Group Presentation
FTC Group Presentation
 
US based Aviation Service Company uses ManageEngine OpManager to manage 2500 ...
US based Aviation Service Company uses ManageEngine OpManager to manage 2500 ...US based Aviation Service Company uses ManageEngine OpManager to manage 2500 ...
US based Aviation Service Company uses ManageEngine OpManager to manage 2500 ...
 
How we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50kHow we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50k
 
Anuta Networks at Networking Field Day 14
Anuta  Networks at Networking Field Day 14Anuta  Networks at Networking Field Day 14
Anuta Networks at Networking Field Day 14
 

Mais de ManageEngine, Zoho Corporation

Mais de ManageEngine, Zoho Corporation (20)

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Último (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 

Supply chain company manages 2500 network devices using OpManager

  • 1. US based Supply Chain Company uses OpManager to manage 2500 devices across 50 locations Reference Customer Implementation
  • 2. A supply chain company that offers services ranging from distribution center operations and transportation management to highly sophisticated, technology-enabled solutions for product assembly, reverse logistics and repair, materials management etc. They manage more than 70 distribution centers and employ more than 7,000 people worldwide.
  • 3. Their network is distributed across 50 different locations in the US
  • 4. Their Expectations • Unified network monitoring solution to monitor the entire IT. • Network traffic analysis- To monitor the network bandwidth utilized across their IT. • Network Change and Configuration Management • WAN Management – To visualize WAN links and spot problematic links
  • 5. After evaluation, their IT team was very much satisfied by OpManager and its ease of use So OpManager was deployed to production OpManager EE implementation
  • 6. OpManager EE Architecture NCM - 2500 Devices NFA - 50 Interfaces WAN RTT – 147 Monitors 2500 devices across 50 different locations
  • 7. How did OpManager fulfill their expectations?
  • 8. Benefits with OpManager ManageEngine OpManager provides • A single, powerful and centralized network management console • Highly scalable & reliable engine that can scale up to 100,000 interfaces or 10,000 devices • Flow–based network traffic analysis • Automatic network configuration changes, take backups, restore configurations across multiple vendor devices • WAN RTT monitors for WAN link latency, bandwidth utilization, Round–Trip– Time and other performance factors