STEALTH Global 
Your Remote Infrastructure Management Service Provider 
Monitoring And Escalation

 
Stealth Global's monitoring and event management service provides a fully functional 24x7x365 Network Operations Center (NOC) responsible for isolating critical events, opening trouble tickets, and escalating the event's visibility within your organization. This service can be hosted entirely within Stealth Global's NOC or, portions can be integrated  with or hosted directly within your environment as required.

Around-the-clock continuity

 Click for details...Click for details...Click for details...Click for details...Click for details...In today's fiercely competitive business environment, companies require highly available systems to succeed.  Anything less is not an option. Maintaining such high service levels requires significant resources in terms of monitoring software components, infrastructure management staff, and an operations staff to watch for, evaluate, and manage events as they happen. In addition, such an infrastructure requires significant investments in business process and workflow.
Stealth Global's  Monitoring and Event Escalation service provides a turnkey solution combining highly skilled resources with best-of-breed technologies for capturing and reacting to issues throughout your environment to ensure the timely and complete remediation of problems. This infrastructure includes full lifecycle event processes, such as intelligent event filtering, multiple escalation paths, blackout windows, and ticket management to track events from time of issue to closure.
Wrapped around our Monitoring Infrastructure Management service, Stealth Global can provide a fully functional 24x7 monitoring infrastructure in a matter of weeks rather than months. Or, optionally, Stealth Global can act as a recipient of your existing monitoring infrastructure to provide a fully staffed Network Operations Center (NOC) at a fraction of the cost of building one from the ground up. Organizations not willing to staff for 24x7 workloads may consider our service for off peak coverage.

Features 

Below is a high-level overview of service features. As always, if you have any questions about this, or any of our services, please contact Stealth Global at 1-201-661-0692 or e-mail info@stealthglobal.com
  • Network Operations Center (NOC)
    • Hosted and staffed on-shore (USA)
    • Staffed 24x7x365
    • Reliable, redundant, and secure environment
    • Disaster recovery
  • Event management
    • Or be the recipient of events from your existing infrastructure
  • Root-cause and correlation analysis
    • Events are analyzed by staff to filter "noise"
    • Root-cause analysis ensure only the problem is reported, not every event
  • Service customization
    • Event filters, rules, blackout windows
    • Escalation paths and methods
  • Case management
    • Stealth Global  provides its own ticket management portal
    • Customized integration back to your own ticketing system
  • Periodic state-of-system reviews
    • Regularly scheduled interaction with your staff
    • Ensures service is meeting your needs
  • Event and case reporting
    • Report and trend event case trouble-ticket history

Delivery architecture

Through a combination of custom hardware and software technology and repeatable processes Stealth Global can quickly plug seamlessly into your environment, providing a safe secure channel for the delivery of events into Stealth Global's Customer Management Center (CMC) that adheres to, and is under the control of, your corporate security policies.
The following diagram provides a high-level logical view of a typical deployment--the specifics of a given deployment may vary depending upon the monitoring technologies deployed, and your corporate security infrastructure. 
 The following components are shown in the diagram above:
  • Agent/Agentless monitoring
    Although the diagram above shows the monitoring technology under Stealth Global management, this need not be the case; Stealth Global can wrap around your pre-existing monitoring infrastructure if desired.
  • E-Box
    Stealth Global's  e-Box is a black box appliance installed in the customer environment to provide a safe haven in which Stealth Global staff can perform updates, testing, and configuration without impacting your environment. In a typical customer, the e-Box will be firewalled such that it is the only direct communications path from Stealth Global and can only communicate with your internal environment via ports and protocols required for the monitoring service.  In some cases, multiple e-Boxes may be supplied to ensure redundant operation.
  • Data processing
    Here events collected from your environment are collected, filtered and analyzed to ensure that only critical events are escalated back within your environment. All events are stored for long term analysis and reported.
  • Customer Gateway
    Each customer is assigned a dedicated Portal that takes care of securing communications between Stealth Global and your corporate infrastructure. This Portal can either host your customized VPN client, or can contain Stealth Global's own standard IPSEC firewall solution. This approach ensures that all security policies are under your control and that all activity between Stealth Global customers is properly segregated.
  • Datastore
    All event traffic and case management history are retained in Stealth Global's long term datastore for analysis and trending.
  • Stealth ESM Portal
    The ESM portal is your view back into your environment. Here you may execute reports to trend the history of events and trouble tickets that have taken place in your environment. With the addition of our Visualization and Reporting service, the portal can also provide performance and capacity metrics that are produced by the monitoring environment.