Fast, reliable and efficient

Mission Control 24x7 Operations is an integral part of every Mission Control service and sustainably secures the availability and stability of your ICT infrastructure around the clock, 365 days a year. A team of certified Mission Control Security Engineers monitors your systems proactively and works with you according to clearly defined processes to resolve any issues and carry out routine maintenance tasks.

The key benefits of using Mission Control Security Services are:

  • 24x7 monitoring and proactive intervention
  • Incident handling (according to ITIL standards)
  • Security engineer annotations
  • Instant notifications via SMS/email
  • Compliance with your security policy
  • Mission Control Portal with comprehensive ticketing system and real-time view of configuration and operational key figures and statistics
  • Partnership with a high availability organization
  • Access to a global network of incident response and security teams (FIRST)

Certified by ITIL

The Information Technology Infrastructure Library (ITIL) is a customizable framework of best practices that promote quality computing services in the information technology (IT) sector.

ITIL addresses the organizational structure and skill requirements for an IT organization by presenting a comprehensive set of management procedures with which an organization can manage its IT operations. These procedures are supplier independent and apply to all aspects of IT infrastructure.


Core processes

Mission Control operates according to ITIL standards. The following diagram shows the core processes of Mission Control.

Core processes

A. Mission Control Engineers intervene proactively and contact customers and partners after an analysis of system activity and its security impact. Depending on the situation:

  1. The IT representative at the customer site opens a ticket and indicates the ticket type, i.e. request, maintenance, incident or change.
  2. Mission Control processes the ticket. Security Engineers coordinate and implement configuration changes and fixes for the customer site.

B. Customers initiate interaction with Mission Control:

  1. Clients, users and partners specify their security and policy requirements to selected site IT personnel or IT administrators.
  2. Then the IT representative opens a ticket and indicates the ticket type, i.e. request, maintenance, incident or change. Additionally, customers can open a purchase order.
  3. Mission Control processes the ticket. Security Engineers assess the security impact, communicate with the IT contacts at the customer site, and coordinate and implement configuration changes and fixes for the customer site.

Sign-off processes and audit trails are used because they are important to security. Mission Control also regularly evaluates and acts on customer feedback.

Go to top