Technology Infrastrucataure Management Services (TIMS)
TIMC includes End-to-End Route Analysis 
TIMC Server
Skip Navigation Links Home Page : Cloud-based Remote Management Console

TIMC Capture Using Route Probes 

Technology Infrastructure Management Console© (TIMC) Server

The TIMC is a new, revolutionary technology infrastructure management architecture that provides proactive, 24/7 end-to-end management services for small businesses that have migrated (or that are in the process of migrating) their business-critical applications and databases to a Cloud Service Provider (CSP). The TIMC:

  • Operates in a proactive management mode, and in many instances will detect, isolate, and correct infrastructure-related problems before they disrupt services to end users.

  • Includes a Technology Infrastructure Management Service (TIMS) database that contains a detail inventory of all components included in the customer's technology infrastructure.

  • Includes Technology Infrastructure Management Information  that performs speed tests, route probes, and application probes at pre-defined scheduled intervals (up to four times per hour).

  • Receives realtime availability status and informational feeds from a variety of sources.

  • Includes a web application that can display realtime performance and availability statistics on any Internet browser.

  • Provides a variety of monthly, quarterly, annual, and on-demand performance and problem reports.

All performance and problem statistics are archived on the TIMC's archival database, and are available to customers upon request.

Technology Infrastructure Management Console (TIMC) 

Top 10 Benefits the Technology Infrastructure Management Console (TIMC)

  • It provides end user help desk support for all problems and inquiries related to your  technology infrastructure. (The performance and problem information contained on the TIMS database can be used by the help desk technician to determine if the problem being reported is a new or an existing problem. If it is a new problem, the technician will create a trouble ticket that includes all of the pertinent information regarding the problem.)
  • It is your single-point-of-contact with network hardware vendors, Internet Service Providers (ISPs), and End-Point Networking (EPN) device vendors. (Contact information for ISPs, CSPs, web hosting companies, and all hardware vendors are included in the TIMS inventory database. The fact that our TIMC specialist will know who to call and the exact nature of the problem will dramatically reduce the problem resolution phase.)
  • It greatly-simplifies your hardware requirements, and thus dramatically-reduces your hardware cost by streamlining and optimizing the hardware acquisition and hardware utilization processes. (The network and hardware performance statistics contained in the TIMS database can be analyzed to determine if LAN hardware and/or WAN link speeds needs to be upgraded. If so, a decision can be made whether to upgrade horizontally – by simply adding more of the same hardware or links, or vertically – by replacing the specified component with a larger, more powerful component of the same type or link with a faster link.)
  • It ensures that your cloud computing, web, social network, and legacy applications can be seamlessly and instantaneously accessed by your LAN-attached and/or WAN-attached end-point networking devices. (The TIMC's VPN connections are used to verify end-to-end connectivity of cloud computing servers, Internet hosting servers, social networks, and legacy application servers at predefined intervals, e.g., every 5 minutes.)
  • It provides a formable access security barrier that ensures employee-owned Bring-Your-Own-Devices (BYODs) are prohibited from accessing mission-critical business applications and databases located on cloud, web and legacy servers. (The TIMS inventory database will include all company-own Wi-Fi laptops, tablets, and smartphones, and will only allow these "registered" devices to access business-critical applications.)
  • It mitigates network intrusions by proactively identifying and blocking known hacker attacks such as varies Denial-of-Service (DoS) attacks including Win Nuke, flooding attacks, and smurfing attacks. (Log records from routers, managed switches, and WAPs are continuously analyzed to determine if intrusions attempts or other hacker attacks are in progress. If so, all information regarding the attack is captured and a intrusion-attack trouble ticket is created. An attempt will be made to identify the IP address and port number of the intruder, and if this is successful, this information along with the data captured during the intrusion attempt will be forwarded to the proper authorities.)  
  • It includes an online Technology Infrastructure Management Services (TIMS) database that contains all of your company's LAN hardware and company-owned end-point networking devices. (This database includes all pertinent information regarding the LAN and EPN devices owned by your company, including location, type, manufacturer, model number, serial number, Static IP address, MAC address, and date placed in services. This database is updated on an on-going basis and upon request, copies in Excel spreadsheet format can be sent to your accounting and asset management departments.)
  • It proactively monitors your Internet Service Providers (ISPs), Cloud Service Providers (CSPs), and selective TIMC web URLs to ensure that they are delivering the advertised network speeds and quality of service. (The TIMC performs speed tests and sends specially-configured route probe packets on a frequent, scheduled basis to determine the routing paths, download speeds, upload speeds, jitter, and latency of the links between the customer's WAN router and selected component within the Internet. These statistics are stored in the TIMS database and can be used for both analyzing problems and creating network performance reports. They are also archived on a SQL database so that the performance of these components can be tracked and/or compared on a monthly, quarterly, or annual basis)
  • It maintains image copies of the configuration of all routers, switches and WAPs, and this ensures that if one of these components fail; new component can be acquired, loaded with the backup configuration, and placed online. (This backup copy of the configuration can also be used if one of the devices has to be "hard reset" to the original factory configuration.)
  • It monitors the firmware release levels in all LAN components, and when a new firmware revision is released, it is downloaded and installed in the designated LAN component. (New firmware is periodically released by manufacturers to fix bugs and to add new functionality, and tracking the firmware release of each LAN component ensures that it is performing at maximum efficiency.)
  • It supports all major end-point devices such as PCs, MACs, tablets, smartphones, and other devices that support the IPv4/IPv6 protocol standards. (All end-point networking devices have identifying characteristics such as: 1.) static or DHCP assigned IP addresses, 2.) Media Access Control (MAC) addresses, and 3.) EPN device name. This information is logged into the TIMS database each time an EPN logs into the network. Other pertinent information such as the destination URL, length of session, and amount of data sent/received, is also captured.)
  • It includes two different client Virtual Private Network (VPN) implementations which will allow your traveling and telecommuting employees to securely access business-critical applications and databases residing on the LAN, WAN, and/or cloud computing servers. (The TIMS VPN implementations support up to fifty-five encrypted tunnels that offers the same level of access security to your travelling and telecommuting employees as is provided to your employees attached to the LAN via wired connections.).  
  • It provides proactive monitoring and problem management services to your branch offices and remote locations ensuring that all components of your technology infrastructure are performing at the highest level possible.  (Your new technology Infrastructure includes a gateway-to-gateway VPN implementation that is ideally suited for including the routers, switches, and WAPs located at branch offices and remote locations in the LAN.) 
  • It archives all performance statistics, problem logs, and SysLog records on a secure SQL Server 2012 database for up to one year. (This information can be used to create annual performance and problem reports that can be used for traffic growth projections and budgeting forecasts.)
  • It provides monthly, quarterly, annual, and on-demand performance and problem reports that can be used to identify problems or potential problems before they occur. (Summary versions of these reports can be viewed online or can be sent designated members of your staff electronically.)
The above is only ten of the many features of the TIMC. If you would like to learn more about any aspect of the TIMC, please call 623-979-1827 or 602-478-4778.

Click Here to get printable-version of benefits listed above.

 
Executive SummaryFree No-Obligation QuoteCompany ProfileContact UsJHB&A Web Services

©1997-2017 J. H. BARNES & ASSOCIATES, LLC. All Rights Reserved. Report problems regarding this site to webmaster@jhbarnes.com