How IBM Control Center works

Improve management of a distributed infrastructure

Central monitoring and configuration management provide visibility into file transfers and B2B processes across a supported infrastructure within the network. You can align server views with operational logic. Define schedules, processes, file names and other metadata through a simplified graphical user interface (GUI)—and defines user roles and security capabilities.

Increase customer satisfaction with transparency

You can provide LOB contacts proactive visibility into events that impact service level agreements (SLAs), including: web browser access with detailed dashboards, alerts and notifications about process failures and issues, single-click problem interrogation and the ability to create a rule based on current query.

Improve governance and compliance by monitoring

You can take advantage of continuous controls monitoring with near real-time notifications. Manage IBM Sterling Connect:Direct and IBM Control Center configurations, including change controls. Consolidate and normalize file transfer and process data from managed servers into a single SQL database. Capabilities also include embedded reporting for operational audits and proof of transactions.

Common unified interface

Enables you to create and delete configuration objects, and update multiple servers across different platforms. Also provides syntax checking and full text searches.

Reduced errors and downtime with verson control

Maintains distinct versions of objects that can be retained for auditing or restored, and provides an audit log that includes changes to configuration objects, showing changes and who made them.

Security policy tools improve compliance

Lets you assign user authorities and proxies for servers, and offers protected templates for configuration objects to compare across servers and platforms for improved compliance.

관련 제품

IBM Connect:Direct

불안정한 FTP에 대한 종속성을 극복하고 IT 자원을 절약합니다.

자세히 보기

IBM File Gateway

파일 전송을 다른 시스템 관리 애플리케이션과 통합

자세히 보기

IBM Secure Proxy

인터넷에서 파일 전송을 차단하는 DMZ 기반 애플리케이션 프록시

자세히 보기