CONFIG & ORCHESTRATION MGR COM 2.1 Imagine a typical network environment in which there are thousands of devices. An IT staff member makes a change to one of these devices, which results in several minutes of network downtime. For the enterprise, the costs of this downtime can be significant - reduced productivity, lost business and missed revenue. So how do you determine who made the change and why? Without effective user-access controls in place, it's possible that the network administrator might never know. The good news is that with Avaya Configuration and Orchestration Manager (COM), this is one scenario that won't be an issue for your network administrator. Avaya COM comes complete with powerful user access controls that you can use to restrict or permit access to configuration and management tools, helping to protect the network from potential harm caused by unauthorized access. That's not all Avaya Configuration and Orchestration Manager offers. As a central configuration platform, the GUI-driven Avaya COM helps reduce the administration, complexity and related costs of configuring, provisioning and troubleshooting your network - all from one central server. Furthermore, the intuitive and easy-to-use wizards can help reduce configuration time by as much as 70 percent, freeing your valuable IT experts to work on other critical projects. Avaya Configuration and Orchestration Manager is a real-time web-based network management solution that offers best-in-class configuration, provisioning and troubleshooting for a wide range of technologies. Designed to support multiple users across an entire enterprise network, the topology-driven Avaya Configuration and Orchestration Manager is ideal for companies that want a cost-effective, easy-to-use and easy-to-manage solution that simplifies configuration and provisioning allowing valuable IT resources to focus on other important activities such as running the network. Avaya Configuration and Orchestration Manager allows authorized and authenticated personnel to conveniently, quickly and securely configure devices on the network regardless of where the user or the device is located.