• No results found

Business Intelligence Application Usage Profiling & Management

N/A
N/A
Protected

Academic year: 2021

Share "Business Intelligence Application Usage Profiling & Management"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

(1)

Business Intelligence Application Usage

Profiling & Management

Actionable usage metrics, predictive query controls, & automated user

guidance to increase BI performance, compliance & cost savings

(2)

Application Usage Management

Actionable usage metrics, query controls, & user guidance to increase BI

performance, compliance & cost savings

Managing the Unique Demands of BI, Data Warehouse, and Reporting Applications

Today, large and growing numbers of business people require access to information in order to manage and grow their businesses. This increasing demand for business intelligence (BI) information is creating significant IT challenges: unpredictable and resource-intensive query traffic, more BI and reporting applications and users to support, declining performance, frequent user errors, rapidly escalating database volumes, and continuing pressure to reduce costs.

Ensuring that BI, data warehouse, and reporting applications are performing to expectations and delivering value to the business is very challenging, new users come on-line, business questions change, and data rapidly changes. Success in this dynamic and unpredictable environment requires not only continuous BI activity monitoring, but also ongoing BI management.

Teleran Application Usage Profiling & Management

Teleran, a leader in application usage management software, delivers a patented product suite that provides comprehensive awareness and control of user behavior, application activity, and database usage. Teleran’s automated monitoring and user management capabilities enable IT to improve performance and manageability across all BI applications while reducing support and system costs.

ƒ iSight™ continuously documents who is using what applications to access what data, and

how the system is performing. It directs more efficient application/user management, database tuning, query analysis, compliance auditing, system resource management, capacity planning, and conversions. It also guides the application of iGuard query policies.

ƒ iGuard™ protects corporate data while optimizing business use of information with a

policy-based query management facility. iGuard improves IT efficiency by automatically preventing inappropriate, unauthorized or long-running queries before they reach the database and degrade system performance, return incorrect answers, or breach data security. iGuard

Messaging guides and trains BI application users with real-time messages associated with

iGuard policies. Messaging works independently of applications, improving user productivity while reducing helpdesk calls and support costs.

Teleran’s Access Architecture™ enables the company’s software suite to operate transparently and continuously on the network without degrading database or application performance.

(3)

System Level

Unlike “snapshot” system and database performance monitors, Access Architecture requires no resource-consuming “in the database” agents, traces or monitors.

“Application usage management involves understanding and managing how users access and interact with applications and data to improve the performance, quality, compliance and TCO of business-critical applications” – Claudia Imhoff, BI/DW Expert

Bridging Gap Between Managing BI Users & Monitoring System Level Resources

Teleran’s software products fill a gap that system level database and performance monitors do not address: understanding and managing user and application behavior. With Teleran, organizations can now "holistically" manage the entire BI application environment to get the greatest value from their investments in people, information, software and systems.

Data Level

Servers

Storage

BI Users

Tools such as Tivoli & Oracle Enterprise Manager deliver system level performance monitoring. Teleran usage profiling &

management fills the gap between managing users & database infrastructure.

Network DBMS

Application Databases Information Requesters

Network-based Transparent & Scalable

(4)

Essential Application Usage Profiling & Management Functions

1. iSight: BI / Data Warehouse Usage Reporting & Analysis

Actionable Usage Metrics to Increase Performance, Compliance & Cost Savings

iSight captures all user and application interactions with the database and logs them to Teleran’s InfoUse™ database, a published set of tables in the relational database of your choice. Usage information collected by iSight includes the queries and reports run, data objects accessed, application, IP addresses, database instance, and application, database or OS user IDs. iSight also captures statistics relating to the user’s experience with the query (time to first row, elapsed time of query, total number of rows, total number of bytes).

Identity Persistence Guarantees Visibility of Application Users

Tracking and managing usage by actual application user is critical for compliance and security management. Most applications today log into the database with a single “generic” database user ID. This effectively masks the true identity of the application user to the database and renders database level auditing and access controls ineffective. With Teleran’s ID Persistence feature, iSight can correlate the BI application or single sign-on user with the complete database transaction. Identity Persistence also enables iGuard policies to be applied by application user, user group or role for effective and granular policy enforcement.

Logging and Analysis of Usage Data

iSight automatically creates, configures, and maintains its usage database or Knowledge Base. At installation and then periodically, iSight models the system catalogue tables of the database(s) and applications to which it is profiling access. This enables iSight (as well as other Teleran products) to maintain a current understanding of users, applications and database objects, and their relationships including tables, columns, views, joins, indexes, stored procedures, and others. To minimize the Knowledge Base size, iSight can automatically ignore specified repetitive set-up queries, applications, and maintenance processes that are not useful to capture and can also periodically purge specified data.

Web-based Usage Reporting & Analysis Improves IT Productivity

iSight includes a web-based reporting package, delivering over 80 categorized reports that analyze InfoUse data. In addition, InfoUse is an open and well documented database that is easily accessed by any SQL query tool. iSight reports provide “out-of-the-box” value by answering essential BI management questions:

(5)

ƒ Performance What reports and queries are long-running and why?

ƒ User Management Who are your problem users?

ƒ Application Tracking What applications are in use? What licenses are not being used?

ƒ Data Usage What tables, columns or Universes are most used or never used?

ƒ Service Levels Is the average query time during peak periods meeting the SLA?

ƒ Database Tuning Are joins, indexes, and aggregates optimized for actual usage?

ƒ Application Quality Do some queries produce incorrect results?

ƒ Maintenance When can updates occur with least disruption to users? ƒ Compliance Are security/privacy policies being followed?

ƒ Budgeting Are system costs fairly allocated to groups based on actual usage? "iSight is our ‘eyes and ears’ to understand and optimize how our business users are leveraging our information." - Bob Sickenger, IT project lead, MetLife

iSight Reporting

(6)

Sample Application Usage Tracking

Sample User Analysis

(7)

Sample Compliance/Privacy Reporting

Sample Resource Utilization by Group

(8)

iSight Cost-Effectively Delivers Value to Both IT & Business

iSight’s Web-based usage reporting and analysis facility provides essential, easily distributable BI management information for key organizational roles including analysts, application managers, DBAs, systems staff, IT management as well as business unit managers. Here are examples of how iSight reports are distributed and used in one of the world’s leading financial services firms:

ƒ BI Application Liaisons / Business Analysts

BI application liaisons in each business department receive usage profiling and user error reports to ensure that applications are being used effectively and to identify where user assistance or training may be required.

ƒ Application / Data Warehouse Managers

Application managers receive summarized performance, resource use, and exception reports that guide the allocation and management of system and staff resources as well as assist in budgeting and capacity planning.

ƒ Compliance Staff

Compliance staff use iSight to monitor adherence to compliance policies and to address audit and reporting requirements.

ƒ DBA / IT Staff

DBAs and IT system staff use iSight reports and analyses to identify and resolve performance and user problems. These reports give DBAs actionable detail to maintain application performance and quality, and to identify when and where to use point-in-time system-level database administration tools.

ƒ IT Management

Managers receive summarized iSight service level reports to monitor commitments to the business and compliance audit reports confirming data privacy policies are being followed.

ƒ Business Unit Managers

Business unit managers use iSight reports to identify what information their staff values and to confirm that analytical applications are actually being used as intended. Business

managers also receive iSight chargeback reports that calculate charges based on actual use.

2. iGuard: Automated Query & User Controls

Prevents Problem Queries Before They Waste Time & Resources

No matter how much planing and support goes into BI, data warehouse, and parameterized reporting applications, end-users unknowingly and inevitably issue inappropriate or "runaway" queries that degrade performance, deliver inaccurate results, or breach data privacy policies.

(9)

iSight exception reports identify these user/query problems and direct the application of iGuard query control policies and Automated Helpdesk messages.

iGuard operates in conjunction with iSight on the Teleran Access Server. It automatically applies selected query control and user management policies via its patented high speed policy engine. iGuard identifies queries that violate active policies and prevents those queries before they reach the database. At the same time, Teleran’s Automated Helpdesk facility instantaneously sends a customizable message to the user that guides them on ways to improve the efficiency and effectiveness of their query.

Minimizes Helpdesk & Support Costs

This approach dynamically “tunes” the user, improving their productivity while minimizing help desk calls and IT support costs. Those queries that do not violate a policy pass through to the database for processing. iGuard performs its user management capability independently, but aware of databases and applications, protecting the system and users from a wide range of inappropriate, inaccurate, and resource wasting queries.

"As our user community grows, iGuard policies have enabled us to guide and support more people at a reduced cost, maximizing the business value of our applications."

Joe Pomerantz, First Vice President, Merrill Lynch

Improves Query Performance, IT Productivity & System Efficiency

iGuard protects the database from the common user errors and inefficient query behavior that slow application performance and consume IT staff time with repetitive manual trouble-shooting and problem resolution processes. Using the iGuard "point and shoot" Policy Wizard, policies are selected from the iGuard policy library and tailored to address specific query issues associated with user groups, applications, and database objects. Here are several iGuard policy examples:

ƒ Do not do a SELECT from the claims table without a REGION code. (System resources are wasted if regional claims analysts query claims history for the entire country.)

ƒ Do not permit a join between TABLE A and TABLE B without column A. (Queries issued without an indexed column are too resource intensive.)

ƒ During the day shift, do not permit unqualified access to TABLE A and TABLE B, but permit access during the evening and night shifts. (Maintains peak period performance by deferring long-running queries to off-peak times.)

ƒ Do not join a fact table to itself. (Stops Cartesian joins or "runaway" queries from wasting system resources and reducing user productivity.)

ƒ Do not allow a SELECT * from a fact table without a WHERE clause. (Prevents unconstrained queries from consuming significant system resources.)

(10)

ƒ Do not allow specified users or user groups access to specified tables, columns and rows. (Enforces data level access rules to adhere to information privacy policies and regulations.) iGuard policies can also prevent user errors that generate inaccurate or misleading results.

ƒ Do not join two fact tables to each other without qualifiers (Prevents incorrect results.)

ƒ Do not join TABLES A and B (Prevents a "Chasm Trap", a many-to-one-to-many join that results in incorrect answers.)

Delivers Control & Flexibility with Test, Advise & Active Policy Modes

iGuard policies can be placed in Test, Advise or Active modes. In Test or “simulation” mode policies do not prevent queries, but the system records and reports on what queries would have been acted upon and how these policies can improve performance, accuracy, or security when activated. In Advise mode queries are not prevented, but users receive Automated Helpdesk messages associated with specific policies that will guide them in best query practices or remind them of corporate data privacy policies in place. Active mode allows policies to prevent queries when violated and simultaneously send Automated Helpdesk messages.

iGuard Messaging -

Real-time User Guidance

Trains Users, Improves Performance, & Reduces IT Support Costs

iGuard Messaging addresses common BI and reporting user problems that drive up support demands and reduce productivity. Using real-time customizable text messages, Messaging works in conjunction with iGuard and guides users to more effectively and efficiently access and interact with data. Whenever an iGuard Policy is triggered by an inappropriate query, an iGuard message is instantaneously sent to the user, independent of the application used, suggesting how he or she can adjust or improve their query.

(11)

Improves How Users Interact with Applications and Data

iGuard Messaging has proven to increase the quality of user interaction with information. Users appreciate the instantaneous guidance delivered by Helpdesk messages. It assists them in getting faster more accurate answers, reduces their frustration, and improves their productivity. From IT’s perspective, iGuard messaging minimizes the time helpdesk and DBA staff spend dealing with common and recurring end-user query problems, directly reducing helpdesk, training, and IT support costs.

"Teleran’s user communications capability helps business users be more efficient and smarter in using information.” - Matt Pohl, Data Warehouse Director, Corporate Express

The following are example messages associated with iGuard policies.

ƒ Performance “This query will run for more than 3 hours. Please further constrain your query or schedule it to run overnight using the query scheduler.”

ƒ User Guidance “Joining these tables will produce a very large result set. Add a ‘where’ clause and try again.”

ƒ Priority Schedule “Only Finance can access P&L tables at quarter-end, 9:00 – 11:00 a.m.”

ƒ Maintenance “Table X is being updated right now. Run your query after 1:00 p.m.”

ƒ Query Accuracy “Joining tables A and B will produce incorrect results. Try again using

tables A and C.”

ƒ IT Query Alerts “A data security policy has been activated two times by the same user. Look at today’s security audit report for more details.”

ƒ User Notification “The Sales application has new customer information. Call the Help Desk

to schedule training.”

ƒ Data Security “You are not authorized to access salary data.”

Teleran System Architecture - Scalable, Flexible

Software Solution

The Teleran System consists of three server processes: the Teleran Access Proxy Server, the Administrative Server and the Report Server. The System also includes an Administrative

Console (GUI) and requires access to a relational database (Teleran Knowledge Base). Teleran’s software components are written in Java and operate efficiently on a wide range of distributed (Windows, UNIX, LINUX) and mainframe operating systems.

(12)

Teleran Access Proxy Server

The Teleran Access Proxy Server (Tserver) resides on the TCP/IP network logically between the SQL-generating applications and back-end application databases. The Tserver acts as a “pass-through” access proxy that logs (iSight) and controls query and report activity (iGuard). As a network-based proxy, the Tserver does not require the installation of any "in-the-database" agents, traces or monitors. It can be deployed on an application or mid-tier server or co-housed on the same physical server as the application database. One Tserver can profile and manage access to multiple database instances on one or more physical servers.

The Tserver’s iSight process asynchronously logs query activity including SQL statements, application name, application or database user ID, IP address, report name, BI metadata objects accessed. It also logs result set metrics including time to first row, elapsed time of the query, database objects accessed, and total number of rows and bytes returned. The Tserver logs this information to the Teleran Knowledge Base, a published set of tables in the relational database of your choice.

Teleran Architecture and Processes

Teleran Administrative Server

The Teleran Administrative Server (Aserver) manages on-going Teleran system administration processes that can be scheduled or launched on a manual or event basis. These periodic processes include: 1) Modeling the system catalog tables of both the application and the application database or data warehouse, 2) Analysis of the logged query and report activity, and The Aserver can be co-housed with the Tserver or installed on another physical server on the network. It requires access to both the Teleran Knowledge Base and the application database.

(13)

1) Modeling

At installation and then periodically, the Aserver interrogates the system catalogue tables of both the application and the database or data warehouse. This process maintains a current model in the Teleran Knowledge Base of all database and application objects and their relationships including user IDs, reports, BI metadata, tables, columns, views, joins, indexes, stored procedures, and others. The modeled application and database information is stored in the Teleran Knowledge Base. Modeled data informs the analysis of logged activity for iSight as well as the application of site-specific query and user controls via iGuard.

2) Analysis

The analysis process will continually or periodically parse and associate logged SQL activity with result set metrics, application metadata and database objects accessed. It then populates iSight reporting tables housed in the Teleran Knowledge Base.

Teleran Report Server

The Teleran Report Server (Rserver) is a Java Servlet Engine that manages the creation, scheduling, retrieval and storage of the Web-based iSight Reports. It can be installed on any server class hardware available on the network and requires access to the Teleran Knowledge Base.

Teleran Knowledge Base

The Teleran Knowledge Base can be a stand alone database instance on the network or a schema within an existing database or data warehouse. It stores query/report activity, Teleran system configuration data, application and database system catalogue information, and usage activity reporting tables. Teleran Knowledge Base tables are automatically created in the specified database during the Teleran installation process.

Teleran Administrative Console

The Teleran Administrative Console resides on one or more Windows desktops and is used to configure, control, and monitor the Tserver process, manage Aserver processes and to apply iGuard query control policies and Automated Helpdesk user messages. The Administrative Console requires network access to the Tserver, the Aserver, the Teleran Knowledge Base, and the application database or data warehouse.

Architecture Summary

ƒ Small footprint Java service

ƒ No database agents or traces that slow performance

ƒ No application programming required

(14)

ƒ Supports DB2 Distributed and Mainframe, Oracle, MS SQL Server

Teleran Customer Success

The following Teleran customer case study describes the benefits and return on investment organizations have gotten from licensing and deploying Teleran software products. Teleran’s unique combination of protection, performance improvements and operational cost savings delivers measurable returns and material business benefits.

In 2006 GE Money needed to ensure that its consumer credit card data warehouse was in compliance with the Payment Card Industry (PCI) Data Security Standardthat required auditing and securing the use of personal financial data. This critical application was also incurring database performance problems, violating customer service level agreements and impairing productivity of 600 credit analysts worldwide.

GE licensed Teleran software to address both their compliance and database performance issues. By implementing Teleran iSight and iGuard, GE met their PCI audit and control requirements and saved over $800,000 in compliance costs versus developing an in-house solution as they had originally planned. To address their performance issues, GE deployed iGuard policies to better control resource wasting SAS queries and unpredictable ad hoc

analyses. iSight auditing was used to tune the database model based on actual application usage patterns. In addition, iSight ensured that Universes were synchronized with ongoing changes at the database. With Teleran, GE data warehouse performance improved by 25%, enabling GE to meet service levels required by customers and employees.

William Klancko, IT Leader, GE Corporate

“At GE Money Teleran products enabled the company to satisfy PCI compliance demands and allowed us to increase system capacity and performance by 25%. As a result, GE Money is planning on rolling out Teleran products enterprise-wide. Teleran provided GE Money several advantages over competitive products in the market. These included:

ƒ Supporting multiple database technologies on multiple server platforms, enabling enterprise deployment

ƒ Capturing more data about the users, applications, database and users’ queries

ƒ Offering active usage policy management

ƒ Providing a non-intrusive architecture that did not consume database system resources

(15)

Conclusion

BI, data warehouse, enterprise reporting, and analytical applications are subject to unpredictable query patterns, changing user demands, and the inevitable user-created query problems that degrade performance, diminish productivity, and reduce service levels. Regardless of how much planning goes into these applications, user requirements change, databases grow, batch windows expand, user errors occur, and query volumes increase. The challenge: how to continuously manage the performance, user satisfaction, and value of this dynamic use while minimizing support staff, maintenance, and system resource costs. Teleran’s objective is to help organizations meet these challenges with products that deliver essential BI and data warehouse management disciplines.

Teleran’s software products provide comprehensive awareness and management of user behavior, application activity, and database usage. They uniquely complement system level monitors and database utilities, bridging the gap between understanding and managing users and managing underlying database and system resources. With Teleran, organizations can now cost-effectively manage their entire BI, data warehouse and reporting environments to get the greatest value from their investments in people, information, and infrastructure.

Teleran Technologies, Inc. 333A Route 46 West Fairfield, NJ 07004 973.439.1820 Phone 973.439.1821 Fax info@teleran.com www.teleran.com

Teleran Technologies is the leading provider of software for ensuring the performance, compliance, and cost efficiency of business intelligence (BI) data warehouses, CRM, Web-based and other enterprise applications. Through end-to-end knowledge of the application environment⎯users, queries,

applications and databases⎯Teleran software aligns IT processes with business needs, improving compliance, reducing costs and enhancing business performance and productivity.

Founded in 1996, Teleran pioneered the concept of activity monitoring and management for data warehouses and analytic applications with its patented “policy engine” and management process. Today the company provides solutions for many of the world’s leading companies, including Allstate, Bristol-Myers Squibb, Citibank, CNA, GE, Mayo Clinic, Merrill Lynch, MetLife, Sun Microsystems, US Army, Unisys, Vanguard and Wachovia.

References

Related documents

Secondary bond market intervention by EFSF has a twofold objective. First, it serves to support the functioning of the debt markets and appropriate price formation in

National Conference on Technical Vocational Education, Training and Skills Development: A Roadmap for Empowerment (Dec. 2008): Ministry of Human Resource Development, Department

Among these models in present study CERES-rice and WOFOST model were used for prediction of grain and straw yield of different rice cultivars under different environment and

The MSCEIT has been used in current research to investigate EI in pre-service teachers (Concoran & Tormey, 2013), the role of intelligence, personality, and EI to resilience

innovation in payment systems, in particular the infrastructure used to operate payment systems, in the interests of service-users 3.. to ensure that payment systems

Al-Hazemi (2000) suggested that vocabulary is more vulnerable to attrition than grammar in advanced L2 learners who had acquired the language in a natural setting and similar

The total coliform count from this study range between 25cfu/100ml in Joju and too numerous to count (TNTC) in Oju-Ore, Sango, Okede and Ijamido HH water samples as

Christ before Pilate at the trial of Jesus revealed one of his last claims. Jesus and his word are ultimate truth. The Pontius Pilate and Jesus exchange set the two positions