Cloud Eye – Safeguarding your infrastructure:
The objective of the Cloud Eye service offering is to proactively monitor and avoid any unplanned downtime for your business. Futurenet monitors clients’ IT infrastructure with a dedicated team located at the monitoring centers supported by a team in Chennai.
The Cloud Eye solution is initiated with an appliance being installed at your Data Center to collect information from your devices such as Generator, UPS, Servers, Storage, Network, Fire wall, etc. If there is a problem with the smooth functioning of any of these devices, an alert will be triggered so that corrective action may be taken immediately and proactively.
How Cloud Eye works - The Process:
Step 1: Futurenet will conduct a detailed audit of the Customer Data Center to understand the critical failure points.
Step 2: The feasibility of monitoring the devices to cover the critical failure points will be then assessed.
Step 3: Cloud Eye appliance is installed at the Customer Data Center.
Step 4: Cloud Eye is configured to analyze events and signal when pre-defined threshold levels are breached.
Step 5: The escalation matrix is set up for information dissemination.
Step 6: Reports are configured and automated to be sent out every day.
Step 7: Data from the various devices are collected and analysed by experts at Futurenet who then provide recommendations for prevention of downtime. This is sent to the client as a Monthly Analysis Report.
Cloud Eye Service offerings:
|Server Availability||Diagnose and correct issues before they become a problem||Proactive problem fixing|
|Server Performance – CPU, MEM, Virtual Memory||Regular Maintenance as per Schedule||Fix unexpected problems|
|Usage & Service Availability Status||Report submitted basis Schedule||Fix Unknown problem|
|Services Availability Status||Abnormal Events informed to Client & issues fixed with RCA||Patches|
|Disk Usage||Services running||Move from field force to centralized expertise|
|Event Logs||Event log analysis||Trigger Alerts|
|Server Security / Hacking||Server utilization||Root Cause analysis|
|Spam Hit||Uptime||Ensure non-recurrence|
|Mail Queue Monitoring||Windows updates||Remote support for Desktop / Laptop Problems|