User`s guide

Technical white paper
4
comprehensive service automation solution. Cloud Service Automation (CSA) can leverage CloudSystem Matrix
infrastructure services, and adds applications to the supply layer. It also expands the system’s infrastructure capabilities: for
example, with CSA, HP CloudSystem Enterprise can support multiple hypervisorssuch as those from VMware, Microsoft,
KVM, and Xenwithin the supply layer. Cloud Service Automation also provides portal services for the demand layer, where
consumers or business users can request services. The software delivers IaaS and PaaS in a heterogeneous environment, as
well as virtual desktop infrastructure (VDI or “Desktop as a Service”) and XaaS. Cloud Service Automation manages the
entire cloud service lifecycle, including provisioning the infrastructure, whether by extension to oneor severalMatrix
Operating Environment resource pools, or from non-Matrix infrastructure pools. It also handles provisioning, patching, and
ensuring compliance of business and custom applications; managing and monitoring the cloud; and releasing resources
back to the cloud. Extensions allow adding further service assurance, enhanced security, storage management, and network
management.
HP CloudSystem Enterprise users can:
Broker and manage on-demand application and infrastructure services
Enforce compliance
Meet service-level agreements (SLAs) with performance and availability management
Secure data with multi-tenancy and role-based access
Deliver comprehensive, unified service lifecycle management
HP CloudSystem Enterprise components
Besides Cloud Service Automation, components of CloudSystem Enterprise that enable its capabilities include:
HP Operations Orchestration (OO)
OO coordinates communication between integrated products and managed devices.
HP Server Automation (SA)
SA deploys operating systems and policies to managed devices. It provides lifecycle server management and automated
application deployment, and automates tasks such as provisioning, patching, configuration management, and compliance
management. This software can also provision operating systems, and can automate the ongoing lifecycle management of
a deployed OS or application with policy-based patching and compliance capabilities.
HP Database and Middleware Automation (DMA)
DMA provides a content library for database and middleware management. It provisions application architectures onto
existing infrastructure, and can also manage those applications, providing pre-packaged workflows for application patching,
compliance, and code release. DMA eliminates the need for manual customization.
HP SiteScope
SiteScope provides agentless monitoring of infrastructure platforms and the key performance indicators (KPIs) of
applications. KPIs include CPU, disk, and memory usage, etc.
HP Universal Configuration Management Database (UCMDB)
UCMDB maintains accurate, up-to-date information regarding the relationships between infrastructure, applications, and
cloud services.
HP Matrix Operating Environment
Matrix Operating Environment supplies infrastructure services. Cloud Service Automation is thoroughly integrated with the
infrastructure services created by the Matrix Operating Environment and through this layer can burst to public cloud
services.
HP ArcSight overview
Enterprise Security Manager
HP ArcSight Enterprise Security Manager (ESM) is the premiere security event manager that analyzes and correlates every
operational event (login, logoff, file access, database query), or other event in order to support your IT team in every aspect
of security event monitoring, from compliance and risk management to security intelligence and operations. The ArcSight
ESM event log monitor sifts through millions of log records to find the targeted critical events, and presents them in real
time via dashboards, notifications, and reports, so you can accurately prioritize security risks and compliance violations. By
adding HP Reputation Security Monitor (RepSM), vetted reputation-based threat intelligence can be correlated with security
events to identify threats earlier and to detect and avert even the most sophisticated attacks.