User`s guide
Technical white paper 
4 
comprehensive service automation solution. Cloud Service Automation (CSA) can leverage CloudSystem Matrix 
infrastructure services, and adds applications to the supply layer. It also expands the system’s infrastructure capabilities: for 
example, with CSA, HP CloudSystem Enterprise can support multiple hypervisors—such as those from VMware, Microsoft, 
KVM, and Xen—within the supply layer. Cloud Service Automation also provides portal services for the demand layer, where 
consumers or business users can request services. The software delivers IaaS and PaaS in a heterogeneous environment, as 
well as virtual desktop infrastructure (VDI or “Desktop as a Service”) and XaaS. Cloud Service Automation manages the 
entire cloud service lifecycle, including provisioning the infrastructure, whether by extension to one—or several—Matrix 
Operating Environment resource pools, or from non-Matrix infrastructure pools. It also handles provisioning, patching, and 
ensuring compliance of business and custom applications; managing and monitoring the cloud; and releasing resources 
back to the cloud. Extensions allow adding further service assurance, enhanced security, storage management, and network 
management. 
HP CloudSystem Enterprise users can: 
•  Broker and manage on-demand application and infrastructure services 
•  Enforce compliance 
•  Meet service-level agreements (SLAs) with performance and availability management 
•  Secure data with multi-tenancy and role-based access 
•  Deliver comprehensive, unified service lifecycle management 
HP CloudSystem Enterprise components 
Besides Cloud Service Automation, components of CloudSystem Enterprise that enable its capabilities include: 
HP Operations Orchestration (OO) 
OO coordinates communication between integrated products and managed devices. 
HP Server Automation (SA) 
SA deploys operating systems and policies to managed devices. It provides lifecycle server management and automated 
application deployment, and automates tasks such as provisioning, patching, configuration management, and compliance 
management. This software can also provision operating systems, and can automate the ongoing lifecycle management of 
a deployed OS or application with policy-based patching and compliance capabilities. 
HP Database and Middleware Automation (DMA) 
DMA provides a content library for database and middleware management. It provisions application architectures onto 
existing infrastructure, and can also manage those applications, providing pre-packaged workflows for application patching, 
compliance, and code release. DMA eliminates the need for manual customization. 
HP SiteScope 
SiteScope provides agentless monitoring of infrastructure platforms and the key performance indicators (KPIs) of 
applications. KPIs include CPU, disk, and memory usage, etc. 
HP Universal Configuration Management Database (UCMDB) 
UCMDB maintains accurate, up-to-date information regarding the relationships between infrastructure, applications, and 
cloud services. 
HP Matrix Operating Environment 
Matrix Operating Environment supplies infrastructure services. Cloud Service Automation is thoroughly integrated with the 
infrastructure services created by the Matrix Operating Environment and through this layer can burst to public cloud 
services. 
HP ArcSight overview 
Enterprise Security Manager 
HP ArcSight Enterprise Security Manager (ESM) is the premiere security event manager that analyzes and correlates every 
operational event (login, logoff, file access, database query), or other event in order to support your IT team in every aspect 
of security event monitoring, from compliance and risk management to security intelligence and operations. The ArcSight 
ESM event log monitor sifts through millions of log records to find the targeted critical events, and presents them in real 
time via dashboards, notifications, and reports, so you can accurately prioritize security risks and compliance violations. By 
adding HP Reputation Security Monitor (RepSM), vetted reputation-based threat intelligence can be correlated with security 
events to identify threats earlier and to detect and avert even the most sophisticated attacks. 










