Home Products & Services Professional Service Department

Professional Service Department

Comprehensive system integration expert

  • The only company in the industry with the capabilities of supporting the major three core platforms such as IBM Power platform (IBM i/AIX), Linux and Windows.
  • Offer the integrated technology from platform virtualization (Vmware/HyperV) to data storage virtualization (EMC Vplex, IBM SVC, Vmware VSAN) and extend to the virtualization technology of application containers.
  • Integrate the core database management of Oracle, DB2, and SQL with the cross-database information conversion technology.
    Support the creation and management of IBM MQ/WebSphere application middleware platform.
  • Integrate the EMC DataDomain reduction technology and DPS data protection technology to provide a comprehensive data protection network for enterprises.
    Integrate with the Microsoft SCOM to provide visual monitoring and operation audit management for cross-platform devices.
  • Strengthen the information defense capabilities of enterprises through the practical offensive and defensive technology between the Red Team and Blue Team.
    The CheckPoint information flow detection and prevention for enterprise network.
  • Integrate enterprise process flow and automatic management and deployment of computational resources.
    Establish the optimal management for the resources in the private cloud of enterprises.

Product description

Introduction of the department

On the basis of technical services, the Professional Service Department of Dimerco Data System Corporation focuses on enterprises’ information and data processing. Through our fully integrated service teams, we connect different products in the enterprise with their systematic relations and our cross-platform service teams integrate IT technology with customers’ business needs. We provide reliable IT services with the combination of stable teams. We are dedicated to maximizing the return on our customers’ IT investment with our professional technical services and our comprehensively and three-dimensionally integrated products.

Our best system integration team is composed of system planning experts and professional engineers. The team provides comprehensive cross-platform solutions for【operating platform, virtualization, heterogeneous platform, information security, monitoring and control, database services, and data backup】to fulfill enterprises’ service requirements of key application systems and provide the best technical support based on the platform structure.

Product description

High availability solutions
Design Architecture of the Active-Active Center
A specialist for comprehensive protection of digital assets
The heterogeneous platform data exchange solution IBM CDC
  • Features
  • • Through real-time monitoring and control, proactive problem identification and smart patch, to ensure the enterprise’s continuous operations of IBM i applications and maximize their continuous service time.
  • Functions
  • iCluster:
  • Journal Base software high availability redundancy architecture.
  • Fast switching in minutes, long-distance backup without interruption.
  • Higher efficiency in resource usage.
  • Real-time monitoring and control.
  • Proactively identify problem and smart patch.
  • Flexible structure with high support.
  • PowerHA:
  • Disk Mirror hardware high availability redundancy architecture.
  • Comprehensive redundancy architecture.
  • Fast backup switching.
  • Consistency in redundant data.
  • Full monitoring of the redundancy environment.
  • DB2 Mirror:
  • The active-active high availability redundancy architecture.
  • Realize the active-active at the database level.
  • Ultra-fast synchronization ‧ Architecture flexibility.
  • Web interface ‧ Easy management.
  • Object synchronization dashboard ‧ Accurately master every record.
  • Object comparison function ‧ Ensure consistency.
  • Features
  • The disaster backup in the IT data center has been implemented in the financial industry for many years. However, the business continuity and disaster backup have always been one of the important subjects for the digitalization of the domestic banking industry.

    The so-called “active-active” data center refers to both of the data centers being in operation, hence it is called the “active-active center,” and they are a mutual redundancy for one another.
  • Features of the active-active center:
  • It makes full use of resources to prevent waste of resource, as one of the data centers is idle all year round. Through resource integration, the service capacity of the “active-active” data center will be twice as much.
  • If one of the “active-active” data centers has a downtime while the other data center is still in operation, the downtime situation will not be noticed by users.
  • Dimerco Data System has long-term business operations for the financial industry and large enterprises; hence, we have extensive experience in the IT design architecture with active-active center. Through the integration of the following active-active technology, we can help our customers and provide them with dynamic computation resources, automatic load balance and uninterrupted high availability services.
  • F5 GTM
  • Cisco OTV and VXLAN layer 2 connectivity
  • VMware NSX virtual network
  • IBM/EMC /VMware virtual storage
  • HPE Synergy/Server
  • Database Oracle DG/SQL Always on/DB2 HADR
  • Functions
  • F5 GTM:
  • The application of health monitoring on the site.
  • Disaster recovery/transfer of traffic continuity.
  • Maintain continuous application and delivery.
  • DNS resolution.
  • VMware NSX & Cisco layer 2 connectivity:
  • Centralized management and API control of layer 2 to layer 7 of the network.
  • Network security functions.
  • Create IT automation.
  • Storage virtualization (IBM/EMC/VMware vSAN):
  • Integrate storage facilities of different brands.
  • Flexible architecture expansion.
  • Fast data transfer.
  • Data backup without any downtime.
  • Highly efficient disk access.
  • High availability disk architecture.
  • Storage and management tools:
  • Multifaceted: various performance indicators can be viewed on the server and storage.
  • Forecast: forecast of future growth, TCO analysis report, analysis of storage equipment Pool Usage.
  • Visualization: server, fiber switch, and storage equipment can be included in the monitoring and draw a system topology.
  • HPE Synergy
  • The management application device adopts UEFI and HPE iLO, and the entire architecture is updated.
  • Use iLO for managing and accessing the remote system to realize the unattended operation.
  • With the outstanding response capability of the user interface, it can improve performance and realize a faster large-scale life cycle operation.
  • Features
  • In this era of information explosion, the amount of data worldwide is rapidly increasing and enterprises’ internal structured and unstructured data have become intangible digital assets for the enterprises. How to provide these intangible assets with comprehensive data protection and long-term protection and expansion plans has become a major task.
  • Dimerco Data System cooperates with DELL EMC DPS to propose a comprehensive protection plan for digital assets. This protection plan can help companies to speed up the process of protection operations and the best deduplication Datadomain products can save backup storage space, reduce the bandwidth requirements, and achieve the goal of simplified management.
  • Dimerco Data System can also offer the best integration capability in the industry, from mainframes to virtual platforms, from various databases to innovative application platforms, from personal computers to mobile devices, and we can provide the centralized and automation backup and convenient recovery of endpoints to assist enterprises to stipulate the highest-level protection plan for the sustainable operations of enterprises.
  • Functions
  • Backup optimization
  • The deduplication technology with changeable length can save space and network requirements up to seven times compared to other products in the industry.
  • The flat redundancy architecture of Client Direct overcomes the performance bottleneck of storage nodes, and hence it can complete the backup within a shorter time and expand the scope of protection more flexibly.
  • It is highly integrated with VMware products. Through the vProxy backup mechanism, it can provide a large amount of VM backup requirements in a short time.
  • It conducts a full backup every time. With the capability of high deduplication, a full backup is even faster than our peer competitor’s differential backup.
  • Restore and backup upgrade
  • The media is fully equipped with cache disks to ensure the performance of real-time mounting.
  • The continuous copying and writing function with the one-click for backup activation has significantly strengthened the VM platform backup requirements.
  • Redundancy is on standby at all times, to reduce the time in recovery operation of the backup system in case of disaster.
  • With the backup technology capabilities of large-scale systems, the universal restore of AS/400, AIX system, and database DBA execution, to provide a comprehensive disaster recovery plan.
  • Backup integration capability
  • Integrate Informix, DB2, Oracle, MS SQL, My SQL, SAP HANA backup/redundancy solutions.
  • Integrate office application systems such as AD, Exchange, SCOM, SCCM, etc., to ensure the protection services of users’ applications.
  • Integration of AS/400, AIX, Unix, etc., a support team with backup technology for large-scale systems.
  • Integration of users’ platforms and automatic backup for personal computers with Windows 10, Mac, Linux. A Web recovery interface is also provided for authorization control, to facilitate management and convenience.
  • Integration of tape, disk, and media management system of cloud storage.
  • Upgrade of data security
  • The offline mechanism of backup media will not appear in the media management of the server, to block the paths of malicious attacks.
  • Enable the Retention Lock function to protect data from being encrypted or deleted.
  • The Sheltered Harbor Project offers data isolation and protection, ensures the portability of data, verifies the capability of data recovery, and the continuity of critical services, to provide the respective industries with the best technology for reference.
  • Features
  • • As a cross-database duplication solution, the IBM InfoSphere Change Data Capture (CDC) supports real-time data duplication amongst heterogeneous databases, which fulfills the requirements for data disaster recovery or the post-application of heterogeneous database duplication in the HA environment.
  • Functions
  • The heterogeneous database has different perspectives.
  • Diverse data duplication model.
  • Management console with real-time notification of the copying and writing status.
  • New applications of the read/write splitting architecture.
Intelligent Monitoring Platform
Automation solutions for the cloud platform
New Generation Information Security Joint Protection
Professional services for the new generation database
  • Features
  • An exclusive monitoring solution for the modern IT architecture.
  • Includes a full range of Windows/Linux/AIX/Redhat/solaris/suse/IBM i, etc.
    Various middleware IIS/WAS/Weblogic and various databases (Oracle/SQL/DB2/mysql/ PostgreSQL/MongoDB, etc.) Our solutions are able to provide you with active monitoring in the most complicated environment as well as the visibility required for the management of performance, events, and alerts.
  • The full-platform focused visual management.
  • Internal and external auditing regulations and compliance.
  • Smart computation loading analysis and forecast.
  • Functions
  • The full-platform visualization monitoring management solution enables easy and comprehensive monitoring for servers and applications
  • We have the intuitive dashboard and user interface.
  • The respective event management is combined with system lights to display and verify the priority of the problem status.
  • The server monitoring setting can be easily set in a few minutes.
  • The automated audit reports can quickly verify the requirements of internal and external audit
  • Collection and normalization of centralized logs.
  • Automatic alert and warning notification.
  • Comprehensive monitoring of the audit report documents.
  • Operation status of system loading; resource analysis and management report for performance and capacity
  • Detection and diagnosis of alerts, and analysis of performance problem for system loading.
  • Provide real-time historical data query and report; provide the establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provide the most comprehensive and secure data protection; comply with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establish the key management mechanism and achieve the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.
  • IBM i-i Watch
  • Real-time monitoring of system and hardware status.
  • Automatic send email, SMS, and LINE notification in real time.
  • Can integrate customers’ application system monitoring messages (MSGF/MSGID).
  • Settings of real-time notification (function maintenance such as various monitoring and alert conditions/information of informer).
  • Multiple IBM i servers can be monitored with a single screen at the same time.
  • Features
  • Application with the digital foundation defined by VMware software for innovation on your selected cloud
  • Our solutions are based on industry-leading technology, and we have integrated the best virtualization computation, storage, network and comprehensive cloud management technology at the same level. With the utilization of our common operating environment, it can quickly implement, manage, connect and protect various programs in the data centers, clouds, and devices.
    With the comprehensive understanding of regulations, processes and products in the industry, Dimerco Data System has developed a full range of IT management platforms for enterprises:
  • SDDC - Software-defined data center
  • SDN - Software-defined networking
  • SDS - Software-defined storage
  • PKS - Pivotal Container Service
  • Dimerco Data System Cloud Management Platform
  • Functions
  • The cutting-edge cloud integration software VMware:
  • Automated resource delivery application.
  • Software-defined delivery vSAN, HCI data center.
  • Software-defined delivery performance monitoring.
  • Software-defined delivery centralized event analysis.
  • The containerized Tanzu K8S management.
  • Desktop cloud in the information security area.
  • Hybrid cloud (AWS/Azure) to carry on the enterprise data center.
  • The one and only one-stop cloud management platform in the industry:
  • Automated resource deployment on the main three platforms (VMware, Hyper-v, AIX).
  • Integrate user’s self-served applications and operations (backup, snapshot, firewall, and load balance).
  • Integrate enterprise SSO certification mechanism.
  • Integrate enterprise’s internal auditing process.
  • The audit report development service in accordance with regulations.
  • Integrate the DevOps agile development process flow management.
  • Features
  • Dimerco Data System Corporation proposed the new generation information security joint protection solution in order to ensure our customers’ information security. The core concept of the solution refers to the protection architecture proposed by Gartner: the Adaptive Security Architecture, to achieve the best protection process against the threat through four uninterrupted cycles (forecast, prevention, detection, and response).
  • Forecast:
  • Find the existing vulnerabilities of the organization through the risk analysis of the Red Team rehearsal, penetration test and external monitoring conducted by external experts, to reduce the attack on the organization by patching or strengthening the protection capabilities in this aspect.
  • Prevention:
  • Adopt various advanced protection technologies (sandbox, behavior identification, MITRE ATT&CK intrusion strategy analysis, CDR, encryption algorithm and IOT protocol identification, etc.) in common intrusion channels (network, email and endpoint) to reduce the possibility of intrusion.
  • Detection:
  • The AI automation analysis is able to quickly find the unknown potential threats, while improving the organization’s threat protection ability and reducing the management cost.
  • Response:
  • With the AI analysis results and help from our experts and consultants, customers can quickly carry out threat relief, vulnerability patch, information sharing or threat identification and investigation.
  • Functions
  • Assistance from experts and consultants
  • Penetration test service.
  • Red Team attack rehearsal service.
  • Risk analysis of external network information security.
  • AI Endpoint Monitoring (CyCarrier Technology)
  • Integrate with the artificial intelligence endpoint protection solution.
  • AI information security and health checkup service.
  • Threat incident identification and investigation service.
  • Network gateway protection (CheckPoint)
  • Smart IOT device identification.
  • Quickly interpret and analyze threat information and immediately update the security features.
  • Threat extraction of suspicious file on the network (CDR).
  • Detection of fraudulent websites.
  • Virtualized security monitoring.
  • Applications and API threats and security protection (WAF)
  • Automated robot protection.
  • Dynamic data with confusion encryption protection.
  • API attack protection.
  • Data protection solution (Gemalto)
  • Database encryption, complying with regulations.
  • The network endpoint packet encryption prevents sniffing.
  • Cloud encryption enhances cloud security.
  • The life cycle key management, with division of responsibility and authorization.
  • IBM i information security and audit solutions
  • Control the FTP connection operations.
  • Control the database connection (customer’s applications use JDBC)/DDBC/OLEDB to connect to IBM i server for operations.
  • Control the data transfer (5250 FileTransfer) for connection operations.
  • Daily automatic/manual generation of connection logs/file access reports.
  • Sheltered Harbor Plan
  • The backup data is encrypted and unchangeable, and it is separated from the existing backup data.
  • Offline backup to ensure that it cannot write to the backup data.
  • In line with the financial security mobile plan – establish a sheltered harbor for the security of business operation data.
  • Features
  • In the modern day, enterprises require high-performance databases for online data processing, data storage, and to conduct analysis for the enterprises.

    The IT team in the enterprise has the demands for performance of the database in a timely manner, to fulfill the needs of deployment, testing, analysis and the enterprises’ operations.

    With our professional database consultants and vertical integration services of IT infrastructure planning and design, Dimerco Data System provides individual and customized consultation services for all enterprises, enhancing system availability and security for the IT team to become an indispensable business partner.
  • The database service of the new generation can offer three major databases (SQL Server, Oracle, DB2) to our customers:
  • The centralized planning and creation of database.
  • Database upgrade and migration of heterogeneous platform.
  • Professional consultation services.
  • Database encryption.
  • Database monitoring dashboard .
  • Functions
  • The centralized planning and creation of database
  • Conduct the centralized planning based on customers’ needs and create an optimized database to save the authorization fees.
  • Design a high-availability database architecture with read/write splitting; conduct both onsite backup and remote backup to reduce downtime.
  • Database upgrade and migration of heterogeneous platform
  • Database upgrade and migration, and conversion of heterogeneous platform (SQL Server, Oracle, DB2).
  • Professional consultation services
  • Technical consultation around the clock and regular health checkup of database.
  • Advanced performance review and analysis report, and suggestions for adjustment based on the report.
  • The establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provides the most comprehensive and secure data protection; complies with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establishes the key management mechanism and achieves the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.
High availability solutions
Design Architecture of the Active-Active Center
A specialist for comprehensive protection of digital assets
  • Features
  • • Through real-time monitoring and control, proactive problem identification and smart patch, to ensure the enterprise’s continuous operations of IBM i applications and maximize their continuous service time.
  • Functions
  • iCluster:
  • Journal Base software high availability redundancy architecture.
  • Fast switching in minutes, long-distance backup without interruption.
  • Higher efficiency in resource usage.
  • Real-time monitoring and control.
  • Proactively identify problem and smart patch.
  • Flexible structure with high support.
  • PowerHA:
  • Disk Mirror hardware high availability redundancy architecture.
  • Comprehensive redundancy architecture.
  • Fast backup switching.
  • Consistency in redundant data.
  • Full monitoring of the redundancy environment.
  • DB2 Mirror:
  • The active-active high availability redundancy architecture.
  • Realize the active-active at the database level.
  • Ultra-fast synchronization ‧ Architecture flexibility.
  • Web interface ‧ Easy management.
  • Object synchronization dashboard ‧ Accurately master every record.
  • Object comparison function ‧ Ensure consistency.
  • Features
  • The disaster backup in the IT data center has been implemented in the financial industry for many years. However, the business continuity and disaster backup have always been one of the important subjects for the digitalization of the domestic banking industry.

    The so-called “active-active” data center refers to both of the data centers being in operation, hence it is called the “active-active center,” and they are a mutual redundancy for one another.
  • Features of the active-active center:
  • It makes full use of resources to prevent waste of resource, as one of the data centers is idle all year round. Through resource integration, the service capacity of the “active-active” data center will be twice as much.
  • If one of the “active-active” data centers has a downtime while the other data center is still in operation, the downtime situation will not be noticed by users.
  • Dimerco Data System has long-term business operations for the financial industry and large enterprises; hence, we have extensive experience in the IT design architecture with active-active center. Through the integration of the following active-active technology, we can help our customers and provide them with dynamic computation resources, automatic load balance and uninterrupted high availability services.
  • F5 GTM
  • Cisco OTV and VXLAN layer 2 connectivity
  • VMware NSX virtual network
  • IBM/EMC /VMware virtual storage
  • HPE Synergy/Server
  • Database Oracle DG/SQL Always on/DB2 HADR
  • Functions
  • F5 GTM:
  • The application of health monitoring on the site.
  • Disaster recovery/transfer of traffic continuity.
  • Maintain continuous application and delivery.
  • DNS resolution.
  • VMware NSX & Cisco layer 2 connectivity:
  • Centralized management and API control of layer 2 to layer 7 of the network.
  • Network security functions.
  • Create IT automation.
  • Storage virtualization (IBM/EMC/VMware vSAN):
  • Integrate storage facilities of different brands.
  • Flexible architecture expansion.
  • Fast data transfer.
  • Data backup without any downtime.
  • Highly efficient disk access.
  • High availability disk architecture.
  • Storage and management tools:
  • Multifaceted: various performance indicators can be viewed on the server and storage.
  • Forecast: forecast of future growth, TCO analysis report, analysis of storage equipment Pool Usage.
  • Visualization: server, fiber switch, and storage equipment can be included in the monitoring and draw a system topology.
  • HPE Synergy
  • The management application device adopts UEFI and HPE iLO, and the entire architecture is updated.
  • Use iLO for managing and accessing the remote system to realize the unattended operation.
  • With the outstanding response capability of the user interface, it can improve performance and realize a faster large-scale life cycle operation.
  • Features
  • In this era of information explosion, the amount of data worldwide is rapidly increasing and enterprises’ internal structured and unstructured data have become intangible digital assets for the enterprises. How to provide these intangible assets with comprehensive data protection and long-term protection and expansion plans has become a major task.
  • Dimerco Data System cooperates with DELL EMC DPS to propose a comprehensive protection plan for digital assets. This protection plan can help companies to speed up the process of protection operations and the best deduplication Datadomain products can save backup storage space, reduce the bandwidth requirements, and achieve the goal of simplified management.
  • Dimerco Data System can also offer the best integration capability in the industry, from mainframes to virtual platforms, from various databases to innovative application platforms, from personal computers to mobile devices, and we can provide the centralized and automation backup and convenient recovery of endpoints to assist enterprises to stipulate the highest-level protection plan for the sustainable operations of enterprises.
  • Functions
  • Backup optimization
  • The deduplication technology with changeable length can save space and network requirements up to seven times compared to other products in the industry.
  • The flat redundancy architecture of Client Direct overcomes the performance bottleneck of storage nodes, and hence it can complete the backup within a shorter time and expand the scope of protection more flexibly.
  • It is highly integrated with VMware products. Through the vProxy backup mechanism, it can provide a large amount of VM backup requirements in a short time.
  • It conducts a full backup every time. With the capability of high deduplication, a full backup is even faster than our peer competitor’s differential backup.
  • Restore and backup upgrade
  • The media is fully equipped with cache disks to ensure the performance of real-time mounting.
  • The continuous copying and writing function with the one-click for backup activation has significantly strengthened the VM platform backup requirements.
  • Redundancy is on standby at all times, to reduce the time in recovery operation of the backup system in case of disaster.
  • With the backup technology capabilities of large-scale systems, the universal restore of AS/400, AIX system, and database DBA execution, to provide a comprehensive disaster recovery plan.
  • Backup integration capability
  • Integrate Informix, DB2, Oracle, MS SQL, My SQL, SAP HANA backup/redundancy solutions.
  • Integrate office application systems such as AD, Exchange, SCOM, SCCM, etc., to ensure the protection services of users’ applications.
  • Integration of AS/400, AIX, Unix, etc., a support team with backup technology for large-scale systems.
  • Integration of users’ platforms and automatic backup for personal computers with Windows 10, Mac, Linux. A Web recovery interface is also provided for authorization control, to facilitate management and convenience.
  • Integration of tape, disk, and media management system of cloud storage.
  • Upgrade of data security
  • The offline mechanism of backup media will not appear in the media management of the server, to block the paths of malicious attacks.
  • Enable the Retention Lock function to protect data from being encrypted or deleted.
  • The Sheltered Harbor Project offers data isolation and protection, ensures the portability of data, verifies the capability of data recovery, and the continuity of critical services, to provide the respective industries with the best technology for reference.
The heterogeneous platform data exchange solution IBM CDC
Intelligent Monitoring Platform
Automation solutions for the cloud platform
  • Features
  • • As a cross-database duplication solution, the IBM InfoSphere Change Data Capture (CDC) supports real-time data duplication amongst heterogeneous databases, which fulfills the requirements for data disaster recovery or the post-application of heterogeneous database duplication in the HA environment.
  • Functions
  • The heterogeneous database has different perspectives.
  • Diverse data duplication model.
  • Management console with real-time notification of the copying and writing status.
  • New applications of the read/write splitting architecture.
  • Features
  • An exclusive monitoring solution for the modern IT architecture.
  • Includes a full range of Windows/Linux/AIX/Redhat/solaris/suse/IBM i, etc.
    Various middleware IIS/WAS/Weblogic and various databases (Oracle/SQL/DB2/mysql/ PostgreSQL/MongoDB, etc.) Our solutions are able to provide you with active monitoring in the most complicated environment as well as the visibility required for the management of performance, events, and alerts.
  • The full-platform focused visual management.
  • Internal and external auditing regulations and compliance.
  • Smart computation loading analysis and forecast.
  • Functions
  • The full-platform visualization monitoring management solution enables easy and comprehensive monitoring for servers and applications
  • We have the intuitive dashboard and user interface.
  • The respective event management is combined with system lights to display and verify the priority of the problem status.
  • The server monitoring setting can be easily set in a few minutes.
  • The automated audit reports can quickly verify the requirements of internal and external audit
  • Collection and normalization of centralized logs.
  • Automatic alert and warning notification.
  • Comprehensive monitoring of the audit report documents.
  • Operation status of system loading; resource analysis and management report for performance and capacity
  • Detection and diagnosis of alerts, and analysis of performance problem for system loading.
  • Provide real-time historical data query and report; provide the establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provide the most comprehensive and secure data protection; comply with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establish the key management mechanism and achieve the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.
  • IBM i-i Watch
  • Real-time monitoring of system and hardware status.
  • Automatic send email, SMS, and LINE notification in real time.
  • Can integrate customers’ application system monitoring messages (MSGF/MSGID).
  • Settings of real-time notification (function maintenance such as various monitoring and alert conditions/information of informer).
  • Multiple IBM i servers can be monitored with a single screen at the same time.
  • Features
  • Application with the digital foundation defined by VMware software for innovation on your selected cloud
  • Our solutions are based on industry-leading technology, and we have integrated the best virtualization computation, storage, network and comprehensive cloud management technology at the same level. With the utilization of our common operating environment, it can quickly implement, manage, connect and protect various programs in the data centers, clouds, and devices.
    With the comprehensive understanding of regulations, processes and products in the industry, Dimerco Data System has developed a full range of IT management platforms for enterprises:
  • SDDC - Software-defined data center
  • SDN - Software-defined networking
  • SDS - Software-defined storage
  • PKS - Pivotal Container Service
  • Dimerco Data System Cloud Management Platform
  • Functions
  • The cutting-edge cloud integration software VMware:
  • Automated resource delivery application.
  • Software-defined delivery vSAN, HCI data center.
  • Software-defined delivery performance monitoring.
  • Software-defined delivery centralized event analysis.
  • The containerized Tanzu K8S management.
  • Desktop cloud in the information security area.
  • Hybrid cloud (AWS/Azure) to carry on the enterprise data center.
  • The one and only one-stop cloud management platform in the industry:
  • Automated resource deployment on the main three platforms (VMware, Hyper-v, AIX).
  • Integrate user’s self-served applications and operations (backup, snapshot, firewall, and load balance).
  • Integrate enterprise SSO certification mechanism.
  • Integrate enterprise’s internal auditing process.
  • The audit report development service in accordance with regulations.
  • Integrate the DevOps agile development process flow management.
New Generation Information Security Joint Protection
Professional services for the new generation database
  • Features
  • Dimerco Data System Corporation proposed the new generation information security joint protection solution in order to ensure our customers’ information security. The core concept of the solution refers to the protection architecture proposed by Gartner: the Adaptive Security Architecture, to achieve the best protection process against the threat through four uninterrupted cycles (forecast, prevention, detection, and response).
  • Forecast:
  • Find the existing vulnerabilities of the organization through the risk analysis of the Red Team rehearsal, penetration test and external monitoring conducted by external experts, to reduce the attack on the organization by patching or strengthening the protection capabilities in this aspect.
  • Prevention:
  • Adopt various advanced protection technologies (sandbox, behavior identification, MITRE ATT&CK intrusion strategy analysis, CDR, encryption algorithm and IOT protocol identification, etc.) in common intrusion channels (network, email and endpoint) to reduce the possibility of intrusion.
  • Detection:
  • The AI automation analysis is able to quickly find the unknown potential threats, while improving the organization’s threat protection ability and reducing the management cost.
  • Response:
  • With the AI analysis results and help from our experts and consultants, customers can quickly carry out threat relief, vulnerability patch, information sharing or threat identification and investigation.
  • Functions
  • Assistance from experts and consultants
  • Penetration test service.
  • Red Team attack rehearsal service.
  • Risk analysis of external network information security.
  • AI Endpoint Monitoring (CyCarrier Technology)
  • Integrate with the artificial intelligence endpoint protection solution.
  • AI information security and health checkup service.
  • Threat incident identification and investigation service.
  • Network gateway protection (CheckPoint)
  • Smart IOT device identification.
  • Quickly interpret and analyze threat information and immediately update the security features.
  • Threat extraction of suspicious file on the network (CDR).
  • Detection of fraudulent websites.
  • Virtualized security monitoring.
  • Applications and API threats and security protection (WAF)
  • Automated robot protection.
  • Dynamic data with confusion encryption protection.
  • API attack protection.
  • Data protection solution (Gemalto)
  • Database encryption, complying with regulations.
  • The network endpoint packet encryption prevents sniffing.
  • Cloud encryption enhances cloud security.
  • The life cycle key management, with division of responsibility and authorization.
  • IBM i information security and audit solutions
  • Control the FTP connection operations.
  • Control the database connection (customer’s applications use JDBC)/DDBC/OLEDB to connect to IBM i server for operations.
  • Control the data transfer (5250 FileTransfer) for connection operations.
  • Daily automatic/manual generation of connection logs/file access reports.
  • Sheltered Harbor Plan
  • The backup data is encrypted and unchangeable, and it is separated from the existing backup data.
  • Offline backup to ensure that it cannot write to the backup data.
  • In line with the financial security mobile plan – establish a sheltered harbor for the security of business operation data.
  • Features
  • In the modern day, enterprises require high-performance databases for online data processing, data storage, and to conduct analysis for the enterprises.

    The IT team in the enterprise has the demands for performance of the database in a timely manner, to fulfill the needs of deployment, testing, analysis and the enterprises’ operations.

    With our professional database consultants and vertical integration services of IT infrastructure planning and design, Dimerco Data System provides individual and customized consultation services for all enterprises, enhancing system availability and security for the IT team to become an indispensable business partner.
  • The database service of the new generation can offer three major databases (SQL Server, Oracle, DB2) to our customers:
  • The centralized planning and creation of database.
  • Database upgrade and migration of heterogeneous platform.
  • Professional consultation services.
  • Database encryption.
  • Database monitoring dashboard .
  • Functions
  • The centralized planning and creation of database
  • Conduct the centralized planning based on customers’ needs and create an optimized database to save the authorization fees.
  • Design a high-availability database architecture with read/write splitting; conduct both onsite backup and remote backup to reduce downtime.
  • Database upgrade and migration of heterogeneous platform
  • Database upgrade and migration, and conversion of heterogeneous platform (SQL Server, Oracle, DB2).
  • Professional consultation services
  • Technical consultation around the clock and regular health checkup of database.
  • Advanced performance review and analysis report, and suggestions for adjustment based on the report.
  • The establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provides the most comprehensive and secure data protection; complies with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establishes the key management mechanism and achieves the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.
High availability solutions
  • Features
  • • Through real-time monitoring and control, proactive problem identification and smart patch, to ensure the enterprise’s continuous operations of IBM i applications and maximize their continuous service time.
  • Functions
  • iCluster:
  • Journal Base software high availability redundancy architecture.
  • Fast switching in minutes, long-distance backup without interruption.
  • Higher efficiency in resource usage.
  • Real-time monitoring and control.
  • Proactively identify problem and smart patch.
  • Flexible structure with high support.
  • PowerHA:
  • Disk Mirror hardware high availability redundancy architecture.
  • Comprehensive redundancy architecture.
  • Fast backup switching.
  • Consistency in redundant data.
  • Full monitoring of the redundancy environment.
  • DB2 Mirror:
  • The active-active high availability redundancy architecture.
  • Realize the active-active at the database level.
  • Ultra-fast synchronization ‧ Architecture flexibility.
  • Web interface ‧ Easy management.
  • Object synchronization dashboard ‧ Accurately master every record.
  • Object comparison function ‧ Ensure consistency.
Design Architecture of the Active-Active Center
  • Features
  • The disaster backup in the IT data center has been implemented in the financial industry for many years. However, the business continuity and disaster backup have always been one of the important subjects for the digitalization of the domestic banking industry.

    The so-called “active-active” data center refers to both of the data centers being in operation, hence it is called the “active-active center,” and they are a mutual redundancy for one another.
  • Features of the active-active center:
  • It makes full use of resources to prevent waste of resource, as one of the data centers is idle all year round. Through resource integration, the service capacity of the “active-active” data center will be twice as much.
  • If one of the “active-active” data centers has a downtime while the other data center is still in operation, the downtime situation will not be noticed by users.
  • Dimerco Data System has long-term business operations for the financial industry and large enterprises; hence, we have extensive experience in the IT design architecture with active-active center. Through the integration of the following active-active technology, we can help our customers and provide them with dynamic computation resources, automatic load balance and uninterrupted high availability services.
  • F5 GTM
  • Cisco OTV and VXLAN layer 2 connectivity
  • VMware NSX virtual network
  • IBM/EMC /VMware virtual storage
  • HPE Synergy/Server
  • Database Oracle DG/SQL Always on/DB2 HADR
  • Functions
  • F5 GTM:
  • The application of health monitoring on the site.
  • Disaster recovery/transfer of traffic continuity.
  • Maintain continuous application and delivery.
  • DNS resolution.
  • VMware NSX & Cisco layer 2 connectivity:
  • Centralized management and API control of layer 2 to layer 7 of the network.
  • Network security functions.
  • Create IT automation.
  • Storage virtualization (IBM/EMC/VMware vSAN):
  • Integrate storage facilities of different brands.
  • Flexible architecture expansion.
  • Fast data transfer.
  • Data backup without any downtime.
  • Highly efficient disk access.
  • High availability disk architecture.
  • Storage and management tools:
  • Multifaceted: various performance indicators can be viewed on the server and storage.
  • Forecast: forecast of future growth, TCO analysis report, analysis of storage equipment Pool Usage.
  • Visualization: server, fiber switch, and storage equipment can be included in the monitoring and draw a system topology.
  • HPE Synergy
  • The management application device adopts UEFI and HPE iLO, and the entire architecture is updated.
  • Use iLO for managing and accessing the remote system to realize the unattended operation.
  • With the outstanding response capability of the user interface, it can improve performance and realize a faster large-scale life cycle operation.
A specialist for comprehensive protection of digital assets
  • Features
  • In this era of information explosion, the amount of data worldwide is rapidly increasing and enterprises’ internal structured and unstructured data have become intangible digital assets for the enterprises. How to provide these intangible assets with comprehensive data protection and long-term protection and expansion plans has become a major task.
  • Dimerco Data System cooperates with DELL EMC DPS to propose a comprehensive protection plan for digital assets. This protection plan can help companies to speed up the process of protection operations and the best deduplication Datadomain products can save backup storage space, reduce the bandwidth requirements, and achieve the goal of simplified management.
  • Dimerco Data System can also offer the best integration capability in the industry, from mainframes to virtual platforms, from various databases to innovative application platforms, from personal computers to mobile devices, and we can provide the centralized and automation backup and convenient recovery of endpoints to assist enterprises to stipulate the highest-level protection plan for the sustainable operations of enterprises.
  • Functions
  • Backup optimization
  • The deduplication technology with changeable length can save space and network requirements up to seven times compared to other products in the industry.
  • The flat redundancy architecture of Client Direct overcomes the performance bottleneck of storage nodes, and hence it can complete the backup within a shorter time and expand the scope of protection more flexibly.
  • It is highly integrated with VMware products. Through the vProxy backup mechanism, it can provide a large amount of VM backup requirements in a short time.
  • It conducts a full backup every time. With the capability of high deduplication, a full backup is even faster than our peer competitor’s differential backup.
  • Restore and backup upgrade
  • The media is fully equipped with cache disks to ensure the performance of real-time mounting.
  • The continuous copying and writing function with the one-click for backup activation has significantly strengthened the VM platform backup requirements.
  • Redundancy is on standby at all times, to reduce the time in recovery operation of the backup system in case of disaster.
  • With the backup technology capabilities of large-scale systems, the universal restore of AS/400, AIX system, and database DBA execution, to provide a comprehensive disaster recovery plan.
  • Backup integration capability
  • Integrate Informix, DB2, Oracle, MS SQL, My SQL, SAP HANA backup/redundancy solutions.
  • Integrate office application systems such as AD, Exchange, SCOM, SCCM, etc., to ensure the protection services of users’ applications.
  • Integration of AS/400, AIX, Unix, etc., a support team with backup technology for large-scale systems.
  • Integration of users’ platforms and automatic backup for personal computers with Windows 10, Mac, Linux. A Web recovery interface is also provided for authorization control, to facilitate management and convenience.
  • Integration of tape, disk, and media management system of cloud storage.
  • Upgrade of data security
  • The offline mechanism of backup media will not appear in the media management of the server, to block the paths of malicious attacks.
  • Enable the Retention Lock function to protect data from being encrypted or deleted.
  • The Sheltered Harbor Project offers data isolation and protection, ensures the portability of data, verifies the capability of data recovery, and the continuity of critical services, to provide the respective industries with the best technology for reference.
The heterogeneous platform data exchange solution IBM CDC
  • Features
  • • As a cross-database duplication solution, the IBM InfoSphere Change Data Capture (CDC) supports real-time data duplication amongst heterogeneous databases, which fulfills the requirements for data disaster recovery or the post-application of heterogeneous database duplication in the HA environment.
  • Functions
  • The heterogeneous database has different perspectives.
  • Diverse data duplication model.
  • Management console with real-time notification of the copying and writing status.
  • New applications of the read/write splitting architecture.
Intelligent Monitoring Platform
  • Features
  • An exclusive monitoring solution for the modern IT architecture.
  • Includes a full range of Windows/Linux/AIX/Redhat/solaris/suse/IBM i, etc.
    Various middleware IIS/WAS/Weblogic and various databases (Oracle/SQL/DB2/mysql/ PostgreSQL/MongoDB, etc.) Our solutions are able to provide you with active monitoring in the most complicated environment as well as the visibility required for the management of performance, events, and alerts.
  • The full-platform focused visual management.
  • Internal and external auditing regulations and compliance.
  • Smart computation loading analysis and forecast.
  • Functions
  • The full-platform visualization monitoring management solution enables easy and comprehensive monitoring for servers and applications
  • We have the intuitive dashboard and user interface.
  • The respective event management is combined with system lights to display and verify the priority of the problem status.
  • The server monitoring setting can be easily set in a few minutes.
  • The automated audit reports can quickly verify the requirements of internal and external audit
  • Collection and normalization of centralized logs.
  • Automatic alert and warning notification.
  • Comprehensive monitoring of the audit report documents.
  • Operation status of system loading; resource analysis and management report for performance and capacity
  • Detection and diagnosis of alerts, and analysis of performance problem for system loading.
  • Provide real-time historical data query and report; provide the establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provide the most comprehensive and secure data protection; comply with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establish the key management mechanism and achieve the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.
  • IBM i-i Watch
  • Real-time monitoring of system and hardware status.
  • Automatic send email, SMS, and LINE notification in real time.
  • Can integrate customers’ application system monitoring messages (MSGF/MSGID).
  • Settings of real-time notification (function maintenance such as various monitoring and alert conditions/information of informer).
  • Multiple IBM i servers can be monitored with a single screen at the same time.
Automation solutions for the cloud platform
  • Features
  • Application with the digital foundation defined by VMware software for innovation on your selected cloud
  • Our solutions are based on industry-leading technology, and we have integrated the best virtualization computation, storage, network and comprehensive cloud management technology at the same level. With the utilization of our common operating environment, it can quickly implement, manage, connect and protect various programs in the data centers, clouds, and devices.
    With the comprehensive understanding of regulations, processes and products in the industry, Dimerco Data System has developed a full range of IT management platforms for enterprises:
  • SDDC - Software-defined data center
  • SDN - Software-defined networking
  • SDS - Software-defined storage
  • PKS - Pivotal Container Service
  • Dimerco Data System Cloud Management Platform
  • Functions
  • The cutting-edge cloud integration software VMware:
  • Automated resource delivery application.
  • Software-defined delivery vSAN, HCI data center.
  • Software-defined delivery performance monitoring.
  • Software-defined delivery centralized event analysis.
  • The containerized Tanzu K8S management.
  • Desktop cloud in the information security area.
  • Hybrid cloud (AWS/Azure) to carry on the enterprise data center.
  • The one and only one-stop cloud management platform in the industry:
  • Automated resource deployment on the main three platforms (VMware, Hyper-v, AIX).
  • Integrate user’s self-served applications and operations (backup, snapshot, firewall, and load balance).
  • Integrate enterprise SSO certification mechanism.
  • Integrate enterprise’s internal auditing process.
  • The audit report development service in accordance with regulations.
  • Integrate the DevOps agile development process flow management.
New Generation Information Security Joint Protection
  • Features
  • Dimerco Data System Corporation proposed the new generation information security joint protection solution in order to ensure our customers’ information security. The core concept of the solution refers to the protection architecture proposed by Gartner: the Adaptive Security Architecture, to achieve the best protection process against the threat through four uninterrupted cycles (forecast, prevention, detection, and response).
  • Forecast:
  • Find the existing vulnerabilities of the organization through the risk analysis of the Red Team rehearsal, penetration test and external monitoring conducted by external experts, to reduce the attack on the organization by patching or strengthening the protection capabilities in this aspect.
  • Prevention:
  • Adopt various advanced protection technologies (sandbox, behavior identification, MITRE ATT&CK intrusion strategy analysis, CDR, encryption algorithm and IOT protocol identification, etc.) in common intrusion channels (network, email and endpoint) to reduce the possibility of intrusion.
  • Detection:
  • The AI automation analysis is able to quickly find the unknown potential threats, while improving the organization’s threat protection ability and reducing the management cost.
  • Response:
  • With the AI analysis results and help from our experts and consultants, customers can quickly carry out threat relief, vulnerability patch, information sharing or threat identification and investigation.
  • Functions
  • Assistance from experts and consultants
  • Penetration test service.
  • Red Team attack rehearsal service.
  • Risk analysis of external network information security.
  • AI Endpoint Monitoring (CyCarrier Technology)
  • Integrate with the artificial intelligence endpoint protection solution.
  • AI information security and health checkup service.
  • Threat incident identification and investigation service.
  • Network gateway protection (CheckPoint)
  • Smart IOT device identification.
  • Quickly interpret and analyze threat information and immediately update the security features.
  • Threat extraction of suspicious file on the network (CDR).
  • Detection of fraudulent websites.
  • Virtualized security monitoring.
  • Applications and API threats and security protection (WAF)
  • Automated robot protection.
  • Dynamic data with confusion encryption protection.
  • API attack protection.
  • Data protection solution (Gemalto)
  • Database encryption, complying with regulations.
  • The network endpoint packet encryption prevents sniffing.
  • Cloud encryption enhances cloud security.
  • The life cycle key management, with division of responsibility and authorization.
  • IBM i information security and audit solutions
  • Control the FTP connection operations.
  • Control the database connection (customer’s applications use JDBC)/DDBC/OLEDB to connect to IBM i server for operations.
  • Control the data transfer (5250 FileTransfer) for connection operations.
  • Daily automatic/manual generation of connection logs/file access reports.
  • Sheltered Harbor Plan
  • The backup data is encrypted and unchangeable, and it is separated from the existing backup data.
  • Offline backup to ensure that it cannot write to the backup data.
  • In line with the financial security mobile plan – establish a sheltered harbor for the security of business operation data.
Professional services for the new generation database
  • Features
  • In the modern day, enterprises require high-performance databases for online data processing, data storage, and to conduct analysis for the enterprises.

    The IT team in the enterprise has the demands for performance of the database in a timely manner, to fulfill the needs of deployment, testing, analysis and the enterprises’ operations.

    With our professional database consultants and vertical integration services of IT infrastructure planning and design, Dimerco Data System provides individual and customized consultation services for all enterprises, enhancing system availability and security for the IT team to become an indispensable business partner.
  • The database service of the new generation can offer three major databases (SQL Server, Oracle, DB2) to our customers:
  • The centralized planning and creation of database.
  • Database upgrade and migration of heterogeneous platform.
  • Professional consultation services.
  • Database encryption.
  • Database monitoring dashboard .
  • Functions
  • The centralized planning and creation of database
  • Conduct the centralized planning based on customers’ needs and create an optimized database to save the authorization fees.
  • Design a high-availability database architecture with read/write splitting; conduct both onsite backup and remote backup to reduce downtime.
  • Database upgrade and migration of heterogeneous platform
  • Database upgrade and migration, and conversion of heterogeneous platform (SQL Server, Oracle, DB2).
  • Professional consultation services
  • Technical consultation around the clock and regular health checkup of database.
  • Advanced performance review and analysis report, and suggestions for adjustment based on the report.
  • The establishment of database management regulations, suggestions for backup planning, planning for architecture adjustment, hardware planning consultation, and systematic stress test.
  • Database encryption
  • Provides the most comprehensive and secure data protection; complies with the domestic and international laws and regulations; comprehensive key protection with the key management solutions; establishes the key management mechanism and achieves the detachment of power and responsibility.
  • Database monitoring dashboard
  • Visualized display of database status.
  • Abnormal alert.
  • Automatic report.
  • Simplify the DBA daily maintenance.