Welcome to Pantheon

Pantheon Global Services Organization specializes in providing a wide array of software development, consulting and support services. Our technical and business consulting services are organized as specific centers of excellence with exclusive focus on the respective technology solutions and toolsets. Pantheon Services holds primary vendor status with many of the Fortune 100 companies. Our service regions include North America, South America, Europe, South Asia, Asia Pacific and Australia.

Odyssey Features

The Odyssey platform provides a profound advancement over the ad hoc, error prone and inefficient manual mechanism that are commonly employed in the industry today.Odyssey does this by capturing the critical technical knowledge and processes required to manage software assets into automated reusable entities.Odyssey uses these reusable entities to perform end-to-end automation of processes that were once only possible through elaborate, labor-intensive, manual procedures.

Security
Built on a foundation that guarantees secure access for users and project resources. Supports pluggable security realms LDAP, NTRealm, NIS, Entrust, CA and IBM.

  • Provides granular security capabilities at Directory, File and Network Port level to secure shared hosting environments
  • Comes out-of-the-box with an RSA security based user management solution
  • Role based, flexible security model for supporting varying organizational structures for the separation of roles and responsibilities
  • All file movements, communications and objects persisted on the file systems are encrypted (RSA security).
  • Ability to integrate with third party user authentication systems.
Change Management
Provides a solid framework for change management process. End-to-end accountability and auditable processes for change implementation.

Content Editor Web Part

  • Ability to implement system changes at the lowest levels of granularity, allowing control over what parts of the systems need to be migrated/deployed
  • Provides the capability to review the changes that were implemented and examine the status of those deployments
  • Built-in capability to Rollback changes made to the system in the event of errors during deployment, preserving data integrity
  • Ability to perform varying degrees of automated Quality Control checks as code/application changes enter the system
Data Integrity
Comes packaged with fault tolerant capabilities and guarantees data and content integrity against hardware, network and operating system failures.

  • Fault Tolerant agent architecture guarantees high availability and automated error recovery and control in the event of system errors/failures
  • Automated error recovery and control capabilities adds to the system reliability and stability
  • Supports a single point of administration capabilities
  • Server and Agent updates can be installed and managed using the administration console
Interoperability
Works on Windows 2012 R2, 2012, 2008 R2, 2008, Windows 10, 8.1, 8, 7, Unix, Linux, AIX, HPUX, Solaris and Mac operating systems.

  • Odyssey is platform independent and can run on Microsoft Windows 2008 and above versions including client Windows OS 7 and above, Sun Solaris, HP UX, Linux and IBM AIX
  • Capable of seamless operation in a heterogeneous environment
  • All security capabilities are preserved across all the supported platforms
Audit & Compliance
Comes out of the box with comprehensive auditing and reporting functionality that helps organizations trace information movement and ensure conformance to standards.

The problem with current methods...

Traditional methods of reporting, tracking and logging of application changes are not adequate for achieving some of today's stringent audit and regulatory compliance requirements. Odyssey comes "out-of-the-box" with fine grained security, reporting and auditing capabilities that supports compliance requirements such as Sarbanes and Oxles (SOX) for their IT environments. Odyssey captures instruction level details and provides a framework to generate compliance reports at a touch of a button.

[/list]
Alerts & Notifications
Designed to securely disseminate alerts and notifications at various stages of the deployments.

  • Built-in capabilities for sending alerts and notifications at different points in the life cycle of the deployment process
  • Ability to send notifications in the event of successful deployment, errors during deployment, request for approval, approval notifications as well as pre and post deployment activities
  • Notifications can be in the form of emails, pager messages or faxes
Intelligent Agents
Comes packaged with a comprehensive set of intelligent agents with capabilities to interface with multitudes of technologies and vendor solutions. Full support for 80+ plug-ins and intelligent agents.

Odyssey supports 300+ technologies and vendor solutions. The following is a list of supported solutions from top tier software vendors:

  • Microsoft Application Servers
  • Microsoft Web Servers and ISA Servers
  • Microsoft BizTalk
  • Microsoft SharePoint
  • Microsoft .NET Technologies
  • Microsoft COM+ Technologies
  • Microsoft Visual Source Safe
  • Microsoft Team soft Foundation
  • Microsoft SQL Servers
  • Microsoft Windows Services Mgmt Solutions
  • Microsoft Windows System Admin Services
  • Java/J2EE Technologies
  • Oracle Database Servers
  • Oracle Web Application Servers
  • Siebel CRM
  • People Soft Solutions
  • IBM WebSphere Servers
  • BEA Web Logic Servers
  • BEA Aqua logic Portal
  • Web Methods
  • EMC Documentum
  • SAP Netweaver Solutions
  • SAP Enterprise Portal
  • SAP CRM, BW, APO, XI…
  • SAP R/3, Enterprise R/3
  • JD Edwards
Wizards
Packaged with a collection of wizards that simplifies even the most complex process.

  • Odyssey is easy to use and has friendly interfaces due to the wizard based architecture in all its functions
  • Extensive collection of wizard based graphical interfaces are provided for task creation, management and system interactions
  • The use of wizard based interfaces practically eliminates the need for scripting and programming.
  • The streamlined interfaces substantially lower the introduction of manual errors in the system
  • Provides graphical file explorers for viewing, navigation and selection of resources (files/dir) on remote systems
Workflows
Provides a simple, configurable workflow model that ensures a well defined process for the distribution of information.

  • Odyssey provides a built in workflow model for migration and deployment management of applications
  • Automated workflow engine that only requires the definition of deployers and approvers/authorizers
  • Allows the incorporation of checks and balances into the process.
  • Provides a platform for following appropriate authorization procedures and practices for mission critical projects
  • Ability to define individuals, groups and multiple groups for authorizations and approvals
Scheduler
Provides a built-in scheduler for scheduling deployments.

  • Built-in scheduler for scheduling deployments
  • Support for flexible schedules with a wide range of scheduling options and events
  • Capabilities to schedule deployments upon availability of files/dirs (File/Dir Watchers)
  • Capability to incorporate workflows into scheduled deployments
Role Based Access Control
Designed to support separation of roles and responsibilities and provides a flexible framework for creating roles and privileges to meet the most stringent security models.

Odyssey provides a sophisticated set of role-based security controls that confines users to information and functions that they "need-to-know" to do their job. There are three overall access levels in the system:

  • System Configuration Access- Functions that maintain Odyssey software and monitor the health of the system
  • User and Group Access - Functions that create and maintain User accounts and User Groups
  • Resource Group Access - Functions necessary to create, and maintain specific automation projects
One Touch Deployments
Provides deployers with a one touch interface to perform even the most complex deployments.

  • Complete end-to-end automation of migration and deployment tasks eliminating errors introduced due to manual operations
  • Automation includes third party solutions and Operating System level services
  • Ability to perform end-to-end application deployments without the need for external scripting
  • One Touch Deployment allows a quick and easy way to deploy even the most complex applications without compromising security and control requirements
  • Extensive customization capabilities even for the most unique system interactions

View Our Webcast

Are you interested in learning more about our products?

Register with us to gain access to webcasts and whitepapers that showcase our various products and services.
View Our Webcast