Published on 29-Aug-2012
In the last decade, this South American retail chain more than doubled in size. Key to its success is its ability to track sales, revenue, replacement of goods, and deliveries in near real time. But for data to flow where it’s needed, IT staff must maintain 99.99 percent availability of the data processing network and in-store systems. To achieve this goal, the retailer uses a high-availability environment based on IBM hardware and software. Integrated Service Management solutions from IBM help staff diagnose and resolve issues in 30 percent of the time and achieve 99.99 percent availability
IT staff at this South American retail chain must maintain 99.99 percent availability of the company’s data processing network and in-store systems. Any interruptions in service availability can affect the company’s ability to respond quickly to market changes and deliver a high-quality shopping experience.
As part of a multi-phase project, the company is building centralized and intelligent dashboards using IBM software to consolidate critical IT and security alerts. These dashboards are vital in helping staff reduce the time and cost to identify and resolve problems that impact operations, strengthen compliance with PCI-DSS and corporate security policies, and ease consolidation during mergers.
·Enables staff to diagnose and resolve issues in 30 percent of the time and achieve 99.99 percent availability, ·Reduces operational costs through increased staff productivity, Strengthens compliance with PCI-DSS and corporate security policies
In the last decade, this South American retail chain more than doubled in size. Key to its success is its ability to track sales, revenue, replacement of goods, deliveries, and more in near real time. But for the data to flow where it’s needed, IT staff must maintain 99.99 percent availability of the data processing network and in-store systems. Any service interruption can affect the company’s ability to respond quickly to market changes and deliver a high-quality shopping experience.
To support online, near-real-time transaction processing across its operations, the retailer implemented a high-availability environment based on the IBM System z® platform, IBM Power Systems™ and IBM DB2® database software. Next, the company worked with IBM Tivoli® Software Services and local partners to deploy an Integrated Service Management solution that delivers greater visibility, control and automation in managing service availability and security compliance.
As part of this project, the company is building centralized, intelligent dashboards using IBM Tivoli software to consolidate critical IT and security alerts into regional and enterprise views across its distributed, heterogeneous network. These dashboards are helping reduce the time and cost to identify and resolve problems, strengthen compliance with PCI-DSS (Payment Card Industry-Data Security Standard) and corporate security policies, and ease consolidation during mergers.
In phase one, IBM Tivoli Business Service Manager distributed software consolidates hardware and software configuration data from stores. This gives staff a constant view of the status of mainframe and distributed resources, including store printers, point-of-sale systems and timecard machines, so they can immediately see if a resource is online or offline. After migrating to the latest version of Tivoli Business Service Manager, IBM Tivoli Application Dependency Discovery Manager was used to dynamically update the dashboard views. Later, an additional dashboard was built using IBM Tivoli Netcool®/Impact to consolidate online event information from stores and from regional telco operators.
The retailer also uses IBM Tivoli Access Manager for e-business to help secure access to its Intranet portal and virtual store and provide authentication, authorization and single sign-on for online customers and employees. In the next phase of the project, Tivoli Security Information and Event Manager was integrated into the event dashboard to correlate and consolidate information from Tivoli Access Manager for e-business along with security events from the network, mainframe and distributed servers. This helps staff quickly recognize and respond to security incidents, consistently enforce security policies, and maintain PCI-DSS compliance.
Finally, network diagnostics data collected by IBM Tivoli Network Manager is being fed into IBM Tivoli Netcool/OMNIbus to provide a single view of network operations across all stores. Tivoli Netcool/Impact enriches these events with business content to provide operators with actionable information for improved event handling and faster mean time to resolution.
· Enables staff to diagnose and resolve issues in 30 percent of the time and achieve 99.99 percent availability
· Reduces operational costs through increased staff productivity
· Strengthens compliance with PCI-DSS and corporate security policies
For more information
To learn more about IBM service management solutions, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/tivoli
Products and services used
IBM products and services that were used in this case study.
Tivoli Security Management for z/OS, DB2 Extenders V9.5 for IBM i, Tivoli Netcool/OMNIbus, Tivoli OMEGAMON DE on z/OS, Tivoli OMEGAMON DE for Linux on zSeries, Tivoli Network Manager IP Edition, Tivoli Application Dependency Discovery Manager, Tivoli Netcool/Impact, Tivoli Business Service Manager, Tivoli OMEGAMON for z/VM, Tivoli Access Manager for e-business, Tivoli Monitoring, Tivoli Security Information and Event Manager
Software Services for Tivoli
© Copyright IBM Corporation 2012 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America August 2012 IBM, the IBM logo, ibm.com, Netcool, POWER6, System z, Tivoli, z/OS and zVM are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. The content in this document (including currency OR pricing references which exclude applicable taxes) is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. TIC14249-USEN-00