Power-AIT

Service Catalog

Level 1

Monitoring – 1-of-a Kind Micro Appliance

  • Host is “UP” and on the network
  • CPU State
  • Disk / ASP State
  • Database State
  • Login Service
  • Number of jobs in the system
  • Current Active Jobs in the System
  • Temporary Storage Used by Jobs
  • CPU Load
  • CPU Used by Jobs
  • Free Storage
  • Unanswered Messages
  • OutQ Files, Writer, and Status

Additional Offerings

Level 2

Controlling – Humans do the Controlling
(Includes Level 1)

  • Control & Remediate problems in real-time

ServIT has over two decades as a service provider in the AS400 ecosystem. Utilizing our internal workforce, we will control and remediate issues in real-time before they impact your business and your bottom line.

Level 3

High-Availability / Disaster Recovery
(Includes Level 1 & 2)

  • Ensure Role-Swap-Readiness
  • See High-Availability Flier*

We utilize custom-built systems and run our own daily checks. We leverage decades of experinece as an HA/DR provider to ensure your continuity plan is always in a state of role-swap-readiness. Ask us which solution is right for your enterprise.

Level 4

Renewals & Vendor Management
(Includes Level 1 -3)

  • Don’t want the hassle of keeping up with your support renewal agreements?

With over 20 years of experience as a VAR managing the complexities of a relationship with IBM, ServIT will manage and maintain version upgrades and support-level renewals.

Level 5

ServIT Cloud Offerings
(Includes Level 1 -4)

  • Facility constraints? 
  • Need to make better use of CapEx?

ServIT can leverage one of multiple cloud solutions that tailor fit to your business needs.

Level 6

Hardware Maintenance
(Includes Level 1 -4)

We do it like it used to be done. We will never mail you a box of parts and tell you to fix it yourself.

SAMS

ServIT Asset Monitoring Systems

ServIT set out to design a custom tool to address a well-known gap in the ability of our clients to monitor, manage, and report within their AS/400 environment. During our development process, the capabilities of this system continued to grow and evolve. We discovered not only had we succeeded in developing the tool we set out to build, but we now had the ability to monitor everything in the AS/400’s complete dependency stack. That is when the SAMS was born.

The SAMS (ServIT Asset Monitoring System) is a purpose-built micro appliance allowing an in-depth view into your entire AS/400 ecosystem including, all of the systems and services that make it available to your people and your processes.

The SAMS is simple. After an initial onboarding that usually takes less than an hour, all you have to do is plug the SAMS into a port on your switch. Within minutes, we will be able to monitor availability from your ISP to your Firewall to the Switch, to the Port, to the Ethernet Connection, to the AS/400 to the Subsystem, and to the Job or Process — as high-level or as granular as is required.

While the form-factor remains small, its capabilities are HUGE.

iSysmon

In addition to our micro appliance-based monitoring, ServIT has also developed the best agent-based AS400 hardware monitoring tool in the industry – iSysmon. Information is useless unless it’s actionable. iSysmon provides a real-time, granular, 360° view into how your AS400 is performing in your environment allowing you to be proactive in your management and fine-tuning of your AS400 instead of spending your time putting out fires.

IBM Power & iSeries

Availability Management

Used to ensure application systems stay available. This usually means making sure everything is up for use under the conditions of service level agreements (SLAs).

  • Host is “UP” and on the network
  • CPU State
  • Disk / ASP State
  • Database State
  • Login Service

Capacity Management

Make sure that the resources are performing to your standards within predetermined standards, within the predetermined limits.

  • Number of jobs in the system
  • Current Active Jobs in the System
  • Temporary Storage Used by Jobs
  • CPU Load CPU Used by Jobs
  • Free Storage
  • Unanswered Messages
  • OutQ Files, Writer, and Status

Information Security Management

Aims to ensure the confidentiality, integrity and availability of an organization’s information.

  • Reporting
  • Apply PTFs
  • Auditing
  • User Profile Authority
  • Advisement of best practices and opportunities for improvement

IT Service Continuity Management

Defines and plans all measures and processes for unpredicted events.

  • Third-Party Backup Solutions
  • Native Tape Backups
  • HA Redundancy
  • Restore & Role-Swap Testing

Service Level Agreement

Agreed upon target level of service. Ensure that IT and customers have a clear expectation of the level of service to be delivered.

  • Proactive Initial Response Times
  • Talk to humans
  • Agreed upon metrics

Vendor Management

Save the customer time. Best effort (not guaranteeing an SLA). Ensure Service Level with vendor. Act as a go between other vendors and IT needs.

  • Client Advocacy
  • Liaison between client and 3rd parties
  • Hardware Maintenance Renewal
  • VAR (ServIT)
  • Renew SWMA

Change Management

Enable beneficial changes to be made, with minimum disruption to IT services.

  • Application, O/S, and Hardware Changes
  • Updates
  • Rollback Procedures

Renewals Management

Track and process renewals and subscriptions.

  • Manage Expirations of HWMA, SWMA, and License Keys
  • Notifications prior to expiration period

Knowledge Management

Aims to gather, analyze, store and share knowledge and information within an organization.

  • Complete onboarding and baselining of systems and processes
  • Documentation of relevant procedures
  • Identification of any “hotspots” which may require further attention

Transition Planning (Lifecycle)

Any IT movement carried out in a coordinated way.

  • Utilize information during the initial onboarding and periodic compliance updates as a baseline
  • Advisement regarding near-term and long-term goals for infrastructure and systems sustainability

Configuration Management

Track the configurations and the relationship s between various components.

  • Baselines and thresholds for measured availability and performance parameters
  • Subsystems Running
  • Jobs in Subsystem with proper status

Password Management

  • Encrypted Credential Management through our toll PMP
  • Baseline and Periodic Credential Policy Enforcement Auditing