Il progetto tecnologico

Size: px
Start display at page:

Download "Il progetto tecnologico"

Transcription

1 1

2 Il progetto tecnologico

3 The Olympic Family Athletes and Technicians Organizing Committees IOC and Sport Federations Judges 250 Media Sponsors NBC Toroc and partners Volunteers people 3

4 The Mission of Identification, design and realization of all ITC services in order to manage the organization, to assure operations and to take part in the celebrations for the XX Olympic Games 4

5 projects Personal Computers and Servers UNIX Systems Data Base Management Network and System Security Data Centers Help Desk and Customer Support Games Management Systems CIS, INFO 2006 Venue planning and setup Venue Operations Document management systems Paralympic Games Office Automation 5

6 projects projects Local Area Networks Timing and Scoring On Venue Results Results Distribution Backbone (WAN-MAN fiber optic olympic network) Telephony and line services Cabling for Timing and Scoring systems LAN equipments and cabling on venues Radio mobile systems (Private Mobile Radios, GSM) Radio Frequency Spectrum management Electronic systems (TV, Videoboards, Scoreboards, Public Address) Torino 2006 TV Rate Card project 6

7 projects projects Internet Official Web Site Intranet/Extranet applications Administrative systems Logistics Integration Labs Main Center TV sets VCRs Cameras & camcorders Copiers & document processing equipment Fax devices Energy, Uninterruptible Power Supply (UPS) & Power generators Accreditations and Access control systems Security equipments 7

8 Overall MP Phases Testo G-8 G-7 G-6 G-5 G-4 G-3 G-2 G-1 G+1 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 FA s FOP s VOP s TE Foundation Overall MP Phases Strategic Planning Operational Planning Test Events Operational Readiness Games Operation Dissolution P. G. G FA s: Functional Areas Strategies P.G.: Previous Summer Games FOP s: Functional Operations Planning, starts VOP s: Venue Operations Planning, starts TE: Test Events 8

9 The challenge for Olympic Games The Challenge To be ready on time: a binding deadline A huge project: most of equipments and systems to be implemented in a very short period of time Total functionality: all technology must run perfectly from the first day Only one chance High profile / High quality Testing, testing, testing. 9

10 The technology plan Organization The technology plan Project Management Management/Distribution of results Games Management Systems Fixed and mobile telephony Radio Torino2006 TV Internet Paralympic Games Infrastructure Sponsor/partners 10

11 Top sponsors partners sponsors Main sponsors Official Sponsor Official Supplier 11

12 Internal TOROC s systems Office automation Internal TOROC s systems Document management system CAD systems Payroll Complex projects management Infrastructure, Info Systems and Telecommunications Internet Security Business systems 12

13 Technical Service Some Figures Technical Service Utenti 4500 CISCOSYSTEMS Server 2000 Stampanti/ Fotocopiatrici Laser di rete 700 Pc Desktop Switch/Hub Stampanti da scrivania Pc Portatili 600 Cavi di Rete Plotter 15 Mailbox Average of delivered msg in 8 hrs 13

14 OLYMPIC GAMES systems Systems Integration OLYMPIC GAMES systems Timing & Scoring On- Venue Results GMS Info. Diffusion Internal TOROC s Systems Systems Management Direzione Tecnologie System Hardware System Software System Software Reprographics Reprographics 14

15 Results systems SCBD Testo TVG Local Venue Anna Smith (USA) 1:09:30 (7) Venue T&S PRD Infrastructure overview OVR CIS RDF PRD Info CIS HDTV RBK Central / Distributed CRS / IDF 15

16 Telecommunication Backbone (WAN-MAN fiber optic olympic network) Telephony and line services Telecommunication Infrastructures Cabling for Timing and Scoring systems LAN equipments and cabling on venues Radio mobile systems (Private Mobile Radios, GSM) Radio Frequency Spectrum managment Electronic systems (TV, Videoboards, Scoreboards, Public Address) Torino 2006 CATV Rate Card project 16

17 Optical Fiber Backbone Optical Fiber Backbone Alpine skiing Cross Country Curling Ski Jump PRAGELATO PINEROLO Alpine skiing Press Center BORGATA Olympic Village SESTRIERE SALICE ULZIO Logical ring BARDONECCHIA Free style CESANA Snow Board ULZIO Olympic Village S.SICARIO Biathlon Alpine skiing Telecom Primary Data Center Olympic Palasport Stadium Backbone 2 Media Village 5 Media Village 3 Palavela NETWORK TURIN LANCIA MANAGMENT Main Press Center Head Quarter v. Nizza Meridien Olympic Family Oval Olympic Village Secondary Data Media Center Village 4 TURIN ISONZO Head Quarter TOROC Telecom Medal Plaza Jolly Hotel Ligure Torino Jolly Hotel A Jolly Hotel P.P Esposizioni Bob Backbone 1 International Broadcasting Center Media village 2 Media Village 6 Media Village 7 17

18 Main projects Official Web Site Paralympic Paralympic site (internet) Internet Projects Education Torch Relay Volunteers E-Shop Extranet Toroc NOC-IOC extranet Radio Frequency Intranet Toroc 18

19 Other Technologies Audio/Visual products Video boards Other Technologies TV sets VCRs Cameras & camcorders Copiers & document processing equipment Fax devices Energy, Uninterruptible Power Supply (UPS) & Power generators Access control systems Security equipment 19

20 Paralympic Games Para = Parallel to Olympic Games Paralympic Games Sports change Challenge Changes in the staff Different Infrastructures (Network, Power, Hardware) Different Systems (Info distribution, OVRs, GMS) Different Procedures Sponsors/partners 20

21 IT security La sicurezza dei sistemi informativi aziendali

22 TOROC Information Security La sicurezza informatica del TOROC deve garantire all'organizzazione: integrità disponibilità riservatezza di tutti i dati elettronici che transitano e risiedono sull infrastruttura tecnologica di servizio del TOROC denominata di seguito Admin Network. TOROC Confidential 22

23 IT Security Mission La missione della sicurezza IT è: analizzare e comprendere le esigenze definire il modello e gli obiettivi di sicurezza implementare la migliore soluzione tecnologica aiutare gli utenti del Comitato nel day by day effettuare l auditing e il monitoring dei sistemi Per riuscire al meglio nell attività di prevenzione del crimine informatico, è fondamentale la collaborazione di tutto lo staff TOROC, che in prima persona è coinvolto nell utilizzo dei sistemi informativi. TOROC Confidential 23

24 Admin IT Security Implementation Plan (Y0 + GT) Year -4 Year -3 Year -2 Year -1 Year 0 + GT 1 Network Design Security Policies 1 version Open Source Open Source Policies 2 Open Source Study Review and Approval 2 O.S. Impl. (HA) and Brand Design Study Games Security Policies design Brand Solution Implementation Final Policies implementation Final Approval Approval 2 Internet Connectivity ISP Provided ISP Provided H.A. Solution (i.e. GBE conn.) H.A. Implementation Consolidation Proxy Service ISP Provided ISP Provided Open Source Open Source HA Consolidation Web Content Filter ISP Provided ISP Provided Open Source Brand Product Consolidation Border Firewall 1 Open Source Design of 2 O.S. 2 Open Source Final Solution Design (Brand) Constant Tuning Core Firewall #### Design of O.S. Solution Open Source HA Implem. Final Solution Design (Brand) Constant Tuning 3 IDS / IPS Systems #### Design of O.S. Solution Anti-Virus Systems Internal AV System External AV System Open Source HA Implem. Centralized AV System Final Solution Design (Brand) Multiple External AV Constant Tuning Restrict Rules + Consolidation Monitoring System #### Open Source Open Source HA #### consolidation Auditing System #### Open Source Open Source HA Final Solution Design and Impl. Tuning and Consolidation WebFarm Systems 1 WebServer + 1 WebFarm Study 1 WebFarm Arch. Implem. Official Internal WebFarm Impl. Redundancy Plan Study + Implem Reverse Proxy of Web Appl. + Cons. 4 Web Reporting #### Open Source 1 Brand Solution Mail Service + FTP ISP Provided 1 Open Source + Exchange 2 Open Source HA + Exchange Tuning Of Brand Solution Tuning of HA and encryption comm. Maintaining Consolidation Anti-Spamming Sys. ISP Provided #### 1 Open Source HA Open Source Tuning TOROC Confidential 5 VPN (branch offices) #### 1 Open Source 2 Open Source HA VPN (mobile users) #### #### 1 Open Source HA External Access (RAS) MS Access Server Analog Access Server ISDN Access Server Brand Solution Management + CLOSING Brand Solution Management + CLOSING Dismission 24

25 IT security Games Information Security

26 IT Security Our Challenge Protect the Games IT infrastructure from any undesired and/or uncontrolled phenomena which can impact any parts of the result chain and associated services Timing and Scoring: Real time application (Scoreboard) Real-time chain of results Information Diffusion Systems: Near real time (within few seconds) Games Intranet Feed to the Press & Broadcasters AVAILABILITY Integrity Games Management Systems: ERP of the Games (ACR, SIS, TRA, PRO ) Personnel Data Confidentiality Integrity 26

27 Security Integration UNDERSTAND Understand Business Requirements Define Security Metrics MEASURE Measure Security Posture Identify normal Behavior Define criticality of Systems and Data ANALYSE Evaluate the Risk (based on scenario) Assess Vulnerability Audit BUILD Define Security Domains Segment the Network Integrate to enforce Security Controls RUN Respond to the Incident Monitor for abnormal Behavior Centralized Authentication / Local Management 27

28 Games Network Segmentation 28

29 29

Technology Services Allocation Model

Technology Services Allocation Model Allocation Model Version 2 for FY13-14 Model Review & Changes This is a brief overview of the to help explain the following: - The various models / funding sources - The methodology in calculating allocation

More information

APC-Pro sa Computer Service

APC-Pro sa Computer Service Configuring, Managing and Troubleshooting Microsoft Exchange Service Pack 2 (10135B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di

More information

IT Security in Banque du Liban

IT Security in Banque du Liban IT Security in Banque du Liban Zeina AOUN Head of Security Division IT Department BANQUE DU LIBAN Workshop on Building Trust and Confidence in Arabic e-services 25-27 May 2010 AGENDA BDL Security Drivers

More information

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager

Sicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United

More information

Percorso Mcsa Managing and Mainting Windows 8

Percorso Mcsa Managing and Mainting Windows 8 Percorso Mcsa Managing and Mainting Windows 8 Descrizione In questo corso, gli studenti imparano a progettare l'installazione, la configurazione e la manutenzione di Windows 8. Due caratteristiche uniche

More information

La soluzione Vmware View per l End User Computing (EUC) Alan Calegari System Engineer & Pre-Sales Specialist

La soluzione Vmware View per l End User Computing (EUC) Alan Calegari System Engineer & Pre-Sales Specialist La soluzione Vmware View per l End User Computing (EUC) Alan Calegari System Engineer & Pre-Sales Specialist Il Cloud sta cambiando gli ambienti informatici Data Apps Computing Public Cloud Data Apps Computing

More information

APC-Pro sa Computer Service

APC-Pro sa Computer Service Configuring, Managing and Maintaining Windows Server 2008-based Servers (6419B) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di formazione

More information

IBM System Storage DS3400 Simple SAN

IBM System Storage DS3400 Simple SAN IBM System Storage Simple SAN Facile da implementare Pronto per supportare la crescita del tuo business Al prezzo che non ti aspetti 1 Soluzione Dischi SAN Fibre 4Gbps a basso costo ma affidabile? per

More information

Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5

Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5 Corso: Supporting and Troubleshooting Windows 10 Codice PCSNET: MW10-3 Cod. Vendor: 10982 Durata: 5 Obiettivi Al termine del corso i partecipanti saranno in grado di: Descrivere i processi coinvolti nella

More information

asktel Business Connect

asktel Business Connect Why go through the hassle and expense of maintaining your own firewall or Virtual Private Network when we can do it for you? Significant savings Increased speed at lower cost Business Connect will increase

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

Tutta la formazione che cerchi, su misura per te.

Tutta la formazione che cerchi, su misura per te. Implementing and Administering Internet Information Services (IIS) 6.0 MOC2576-3 Giorni - 1.190.000 + iva Prerequisiti Almeno due anni di esperienza nell amministrazione di sistemi basati su Windows Servers:

More information

TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco

TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco Channel solution for 2015 TOP 100-500 VARs Printers Servers Desktops Storage Security Mobility Software Telco www.compubase.net compubase is the leading source of information on ICT market players in EMEA.

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Information Security Management at the Olympics: Finding the Needle in the Haystack

Information Security Management at the Olympics: Finding the Needle in the Haystack Information Security Management at the Olympics: Finding the Needle in the Haystack Markus J. Krauss VP Cloud Computing and Service Provider mjk@netiq.com Chris Van Den Abbeele Solution Manager ISRM chris.vandenabbeele@atos.net

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

IBM System Storage DS3400 Simple SAN Express Kit PN.172641U

IBM System Storage DS3400 Simple SAN Express Kit PN.172641U IBM System Storage Simple SAN Express Kit PN.172641U Facile da implementare Pronto per supportare la crescita del tuo business Al prezzo che non ti aspetti 1 Soluzione Dischi SAN Fibre 4Gbps a basso costo

More information

Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives)

Summary of Current ITMP Projects by Status. Summary of All ITMP Projects by Status (136 current plus 18 new initiatives) Attachment "A" Summary of Current ITMP Projects by Status Percent of Projects by Status Type Abreviation No. of Projects 27% Ongoing O 36 35% Complete Com 47 6% Project Started PS 8 7% Budgeted B 10 15%

More information

INFORMATION TECHNOLOGY DIVISION TELECOMMUNICATIONS NETWORK SERVICES WYOMING INTERNETWORK DECLARATION OF SERVICES SERVICES AND RESPONSIBILITIES

INFORMATION TECHNOLOGY DIVISION TELECOMMUNICATIONS NETWORK SERVICES WYOMING INTERNETWORK DECLARATION OF SERVICES SERVICES AND RESPONSIBILITIES INFORMATION TECHNOLOGY DIVISION TELECOMMUNICATIONS NETWORK SERVICES WYOMING INTERNETWORK DECLARATION OF SERVICES The Wyoming Internetwork is a shared Wide Area Network (WAN) that interconnects agency Local

More information

70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Corso MS-2823)

70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Corso MS-2823) 70-299: Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Corso MS-2823) A chi si rivolge: amministratori di sistemi o ingegneri di sistemi che dispongono delle competenze

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

Cyber Security and Critical Information Infrastructure

Cyber Security and Critical Information Infrastructure Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes

More information

12/23/2013 LINUX AND I TECH WWW.LINUXCHENNAI.COM WWW.ITECHSERVICES.IN SOLUTIONS. Linux mail server in Chennai surya

12/23/2013 LINUX AND I TECH WWW.LINUXCHENNAI.COM WWW.ITECHSERVICES.IN SOLUTIONS. Linux mail server in Chennai surya 12/23/2013 LINUX AND I TECH SOLUTIONS WWW.LINUXCHENNAI.COM WWW.ITECHSERVICES.IN Linux mail server in Chennai surya 2 P a g e Nixbase Technology Nixbase Technology is the total Linux solution providers

More information

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210

Interactive welcome kit. 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET Interactive welcome kit 866.603.3199 Charter-Business.com CB.016.fibCD.0210 CHARTER BUSINESS FIBER INTERNET 2 Turn your contacts on to affordable, powerful solutions from

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

IBM enetwork VPN Solutions

IBM enetwork VPN Solutions IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business

More information

IBM System Storage DS3400 Simple SAN Ready Express

IBM System Storage DS3400 Simple SAN Ready Express IBM System Storage Simple SAN Ready Express Facile da implementare Pronto per supportare la crescita del tuo business Al prezzo che non ti aspetti 1 Soluzione Dischi SAN Fibre 4Gbps a basso costo ma affidabile?

More information

Web Hosting. CMS Development. Domain registrations. DNS Pointing. Website Publishing. SMB Starter Package. Static Website Development

Web Hosting. CMS Development. Domain registrations. DNS Pointing. Website Publishing. SMB Starter Package. Static Website Development Domain registrations DNS Pointing Website Publishing Web Hosting SMB Starter Package Static Website Development 5 Mailboxes 250MB each Domain Registration Logo Design Website Publishing SMB Package Dynamic

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

2012 Countywide IT Environment Questionnaire

2012 Countywide IT Environment Questionnaire 2012 Countywide IT Environment Questionnaire Unless otherwise specified, please answer questions with data as of January 23, 2012. Respondent Information Department Name: Name of the person completing

More information

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID

Managed Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest

More information

Network Security I Switches, Routers & Firewalls I Antivirus I Remote Assistance I Data Encryption

Network Security I Switches, Routers & Firewalls I Antivirus I Remote Assistance I Data Encryption Vyom Consultants VYOM Consultants believes on Indian work culture, belief, and customs. We are the group of professional people who creates happiness by solving your technical issues and maintain the long

More information

Getting the Most From. Your Help Desk

Getting the Most From. Your Help Desk . Turbo-IT Corporation 103 West Second Street Irving, Texas 75060 http://www.turbo-it.com turbo-it Corporation Getting the Most From.......... Your Help Desk Cost Reduction Strategies for Service Desk

More information

MASSIF: A Promising Solution to Enhance Olympic Games IT Security

MASSIF: A Promising Solution to Enhance Olympic Games IT Security MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th

More information

Mapping Your Data to BMC Atrium CMDB 7.6.04 Classes

Mapping Your Data to BMC Atrium CMDB 7.6.04 Classes Mapping Your Data to BMC Atrium CMDB 7.6.04 Classes This table maps configuration items (CI) found in your environment to the classes available for BMC Atrium CMDB in the Common Data Model. It contains

More information

Corso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: 50322 Durata: 5

Corso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: 50322 Durata: 5 Corso: Configuring and Administering Windows 7 Codice PCSNET: MSW7-8 Cod. Vendor: 50322 Durata: 5 Obiettivi Descrivere e scegliere le varie versioni di Windows 7 Eseguire una nuova installazione di Windows

More information

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA.

PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA. PROTECTION AND SYSTEM MAINTENANCE COMPUTER AND COMUNICATION SYSTEM OF EXECUTIVE COUNCIL OF AUTONOMOUS PROVINCE OF VOJVODINA Milan Paroški 1, Nenad Petrović, Rade Ćirić 2 1 Provincial Authorities Administrative

More information

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale PART 2: plan, act, repeat (from the look, plan,

More information

Internet and Intranet Calling with Polycom PVX 8.0.1

Internet and Intranet Calling with Polycom PVX 8.0.1 Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

Office of Information Technology Service Catalog FY2015

Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

APC-Pro sa Computer Service

APC-Pro sa Computer Service Installing and Configuring Windows Server 2012 (20410A) Durata: 5 giorni Orario: 8:30 12:00 / 13:30-17.00 Costo per persona: CHF 1 900.-- (Min. 5 partecipanti) Obiettivi di formazione Al termine del corso

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

LUCENT S ENTRY INTO NETWORK SECURITY

LUCENT S ENTRY INTO NETWORK SECURITY LUCENT S ENTRY INTO NETWORK SECURITY and Distributed System Security Symposium March 12, 1998 H. M. Gittleson Director, Internet Security Products Group 1 Traffic Growth In Voice And Data Services 250

More information

Role and Mandate of Computing and Communications (C&C) Memorial University

Role and Mandate of Computing and Communications (C&C) Memorial University Role and Mandate of Computing and Communications (C&C) Memorial University Mission: Our goal is to promote quality and excellence in the delivery of information services to the university community. We

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Enterprise Network Solution

Enterprise Network Solution Enterprise Network Solution CONTENT p Enterprise Evolution p DCN Solutions p Case Studies Business Driven More Productivity More profitability Business Driven Challenge Productivity Improve Efficiency

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

How to Remotely View Security Cameras Using the Internet

How to Remotely View Security Cameras Using the Internet How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability

More information

IT Security - Regulations and Technical Aspects. Network concepts. Authors: Andreas Lorenz and Thomas Brandel

IT Security - Regulations and Technical Aspects. Network concepts. Authors: Andreas Lorenz and Thomas Brandel IT Security - Regulations and Technical Aspects Network concepts The following presentations have been used for System Administrator training at FZK and are thus specific to their environment. However

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

22/11/2015-08:08:30 Pag. 1/10

22/11/2015-08:08:30 Pag. 1/10 22/11/2015-08:08:30 Pag. 1/10 CODICE: TITOLO: MOC20462 Administering Microsoft SQL Server Databases DURATA: 5 PREZZO: LINGUA: MODALITA': 1.600,00 iva esclusa Italiano Classroom CERTIFICAZIONI ASSOCIATE:

More information

ICT Primary and Secondary SOC Mapping

ICT Primary and Secondary SOC Mapping ICT Primary and Secondary SOC Mapping This is a list of occupational SOC codes MPICT considers as ICT. Primary ICT SOC codes are those that are 100% ICT. Secondary SOC codes are those partially involved

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Office of Information Technology Service Catalog FY2015

Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...

More information

How do SMB benefit from using the Small but Secured Aries Server Appliance

How do SMB benefit from using the Small but Secured Aries Server Appliance How do SMB benefit from using the Small but Secured Aries Server Appliance white paper Internet Needs The Internet revolution is like nothing in the history of mankind. E-mail can be sent from San Francisco

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

ABOUT SMART CHOICE. Internet Solutions Ethernet T1 DSL Fiber Cable

ABOUT SMART CHOICE. Internet Solutions Ethernet T1 DSL Fiber Cable ABOUT SMART CHOICE Smart Choice is a leading end-to-end telecommunications consulting and management company, providing a premier level of expertise and support for all our clients telecom needs. We offer

More information

1.264 Lecture 32. Telecom: Basic technology. Next class: Green chapter 4, 6, 7, 10. Exercise due before class

1.264 Lecture 32. Telecom: Basic technology. Next class: Green chapter 4, 6, 7, 10. Exercise due before class 1.264 Lecture 32 Telecom: Basic technology Next class: Green chapter 4, 6, 7, 10. Exercise due before class 1 Exercise 1 Communications at warehouse A warehouse scans its inventory with RFID readers that

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici.

Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Quali sono i rischi che derivano dall utilizzo del mobile e quali le precauzioni da prendere contro gli attacchi informatici. Nicola D Ottavio Security Sales Specialist 1 The required roadmap disclaimer

More information

Cisco Lab@Politecnico di Torino

Cisco Lab@Politecnico di Torino Cisco Lab@Politecnico di Torino Fulvio Risso http://staff.polito.it/fulvio.risso/ 1 Main objectives Main use: teaching So, features, not performances Not experimental devices, but what students will use

More information

Proactive IT Solutions More Reliable Networks Are Our Business

Proactive IT Solutions More Reliable Networks Are Our Business Proactive IT Solutions Logo Proactive IT Solutions More Reliable Networks Are Our Business Copyright 2005 Primetime, Inc. All rights reserved. Catalin Ursu info@catcomcomputers.com 973-233-1888 B 973-233-1887

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

Parklands internet. Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close)

Parklands internet. Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close) Parklands internet Tim King Tim.king@investcope.com 0779 851 7370 (22 Tulip Tree Close) Please note The content of these slides are an initial proposal, not an offer for service. It is likely that the

More information

Campus Network Best Practices: Core and Edge Networks

Campus Network Best Practices: Core and Edge Networks Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center dsmith@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).

More information

HealthcareBookings.com Security Set Up

HealthcareBookings.com Security Set Up HealthcareBookings.com Security Set Up Introduction... 2 Overview of the process for using HealthcareBookings.com... 2 Professionals... 2 Patients... 3 Passwords... 4 Hosting Security... 4 Overview of

More information

Certificates, Certification Authorities and Public-Key Infrastructures

Certificates, Certification Authorities and Public-Key Infrastructures Certificati digitali Certificates, Certification Authorities and Public-Key Infrastructures Ozalp Babaoglu La chiave pubblica con la quale stiamo cifrando deve appartenere realmente al destinatario del

More information

Certificates, Certification Authorities and Public-Key Infrastructures

Certificates, Certification Authorities and Public-Key Infrastructures Certificati digitali Certificates, Certification Authorities and Public-Key Infrastructures Ozalp Babaoglu Problema: la chiave pubblica con la quale stiamo cifrando deve appartenere realmente al destinatario

More information

Course Outline: Course 10135A: Configuring, Managing and Troubleshooting Microsoft

Course Outline: Course 10135A: Configuring, Managing and Troubleshooting Microsoft Course Outline: Course 10135A: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This five-day,

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications

EDI BROCHURE ELECTRONIC DATA INTERCHANGE WITH FORD. created by GSEC, Global Supplier Electronic Communications ELECTRONIC DATA INTERCHANGE WITH FORD EDI BROCHURE created by GSEC, Global Electronic Communications Page 1 of 23 Brochure map EDI Brochure Overview Connecting to Ford Further Information Support Who is

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

Excelsior Springs School District Technology Department Service Level Agreement

Excelsior Springs School District Technology Department Service Level Agreement Excelsior Springs School District Technology Department Service Level Agreement Updated 10/4/2013 The Excelsior Springs School District (ESSD) Technology Department is committed to providing quality customer

More information

West Mifflin Area School District Technology Department Strategic Plan 2013-2016

West Mifflin Area School District Technology Department Strategic Plan 2013-2016 West Mifflin Area School District Technology Department Strategic Plan 2013-2016 Table of Contents 1. Planning Process Overview... 2 2. Membership List... 2 3. Mission... 3 4. Technology Analysis... 3

More information

Streamit s audio streaming solutions for dummies

Streamit s audio streaming solutions for dummies Streamit s audio streaming solutions for dummies A professional user s perspective. By Wim van Dijk ========================================== If you are used to traditional ways of listening to (or distributing)

More information

Breaking down the Barriers: Implementing Vaulting Technologies

Breaking down the Barriers: Implementing Vaulting Technologies Breaking down the Barriers: Implementing Vaulting Technologies 1999 Cyber-Ark introduces the Vaulting Technology US Patent #6,356,941 Remote offices Customers Partner and Suppliers A Safe Haven highly

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Presented By: David J. Musto, Principal Thermo Systems L.L.C. East Windsor, NJ USA

Presented By: David J. Musto, Principal Thermo Systems L.L.C. East Windsor, NJ USA Designing Secure, Redundant Fiber Optic Networks for District Energy Systems: A case study of the Lulu Island network design in Manama, Kingdom of Bahrain. Presented By: David J. Musto, Principal Thermo

More information

Lausanne, 26 Aug 2011 NEWS ACCESS RULES APPLICABLE FOR THE BROADCAST OF THE LONDON 2012 OLYMPIC GAMES, 27 JULY-12 AUGUST 2012

Lausanne, 26 Aug 2011 NEWS ACCESS RULES APPLICABLE FOR THE BROADCAST OF THE LONDON 2012 OLYMPIC GAMES, 27 JULY-12 AUGUST 2012 Lausanne, 26 Aug 2011 NEWS ACCESS RULES APPLICABLE FOR THE BROADCAST OF THE LONDON 2012 OLYMPIC GAMES, 27 JULY-12 AUGUST 2012 A. INTRODUCTION The broadcast of the London 2012 Olympic Games ( Games ), to

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

CDW Advanced Image Deployment Service Customer Guide

CDW Advanced Image Deployment Service Customer Guide CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow

Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces

More information

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook 29 29 4. Exercise: Developing CERT Infrastructure Main Objective Targeted Audience Total Duration To learn what kind of software and hardware solutions could be used to provide a particular CERT service

More information

PCI DATA SECURITY STANDARD OVERVIEW

PCI DATA SECURITY STANDARD OVERVIEW PCI DATA SECURITY STANDARD OVERVIEW According to Visa, All members, merchants and service providers must adhere to the Payment Card Industry (PCI) Data Security Standard. In order to be PCI compliant,

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Evolving Telecommunications to Triple Play:

Evolving Telecommunications to Triple Play: Hands-On IPTV, VoIP, 3D TV and Delivery Systems for System Engineers Course Description With the introduction of Next Generation Networks to telecommunications carrier infrastructures, customers expect

More information