Unified Management of the Common Operating Environment (COE)

Size: px
Start display at page:

Download "Unified Management of the Common Operating Environment (COE)"

Transcription

1 SAND C Unified Management of the Common Operating Environment (COE) Standardizing and managing commonly used software on Windows, Mac, and Linux Sandia National Laboratories Exceptio nal service in the national in teres t Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

2 Introduction At Sandia, there are computing platforms in Sandia's "productivity computing*" environment: Windows, Mac, and Linux In general, Sandia defines and manages an operating system and a core set of security and productivity applications for each platform This is what we call the Common Operating Environment (COE) But Sandia has faced some challenges in defining and managing the COE for each platform in a consistent, "unified" manner This presentation describes the effort we are taking to... Develop a common set of definitions around exactly what the COE is Develop a unified approach to managing the COE across the three computing platforms *Classified and unclassified computing for typical office- or project-related tasks, as opposed to high performance computing or mobile-device computing.

3 What does "COE" even Sandia National Laboratories We're still working on it! Proposed Definition: The suite of software Sandia agrees on to be standardized for most computers on a particular platform (Linux, Mac, or Windows) Includes the operating system, office productivity products, security applications and collaborative tools that meet Sandia's mission needs. What characterizes the COE: Rigorous lifecycle management of the COE Commonly installed on many desktop devices across Sandia's networks Actual software included in the COE and how it is delivered varies by platform and network Provides information to customers about what IT core computing capabilities are available for their desktop to enable them to do their work

4 History: COE management before the Unified COE team s-,- Concept of COE was well-branded and well-known part of Sandia's culture (especially for Windows) Constituent components for all three computing platforms were unevenly defined Fairly well-defined for Windows Somewhat well-defined for Mac Almost non-existent for Linux And not only unevenly defined, unevenly understood What was included in the COE varied according to who you asked COE teams that managed the OS and common applications were split among several organizations and teams Technical teams for Windows and Mac in one organization Linux team in a different organization with little to no contact with the Mac or Windows teams

5 History: COE management before the Unified COE Team, ^ Laborato cont'd Windows COE was the most formally managed and defined platform, with welldeveloped requirements Security Patch management VPN capabilities Corporate web application compatibility with the browser (e.g. browser fully compatible with COTS and in-house built web applications) Testing changes to the environment Mac team typically interpreted requirements for Windows and applied them to the Mac COE (when possible) to ensure alignment with Windows requirements Linux COE existed mostly in theory (Sandia standardized on Red Hat Enterprise Linux as COE), but MANY Linux distributions exist in the environment Approaches to patch management, corporate web application compatibility, functionality improvements (VPN, e.g.) were very different for Linux

6 What we did to address this Sandia National Laboratories April 2014: Created a Unified COE team comprising staff who manage and deliver the COE for all three platforms By computing platform, team members presented to the team how they managed their particular COE, including the following: Research, select, develop, and deliver standard hardware and software offerings Develop tools to deliver secure installation packages or images for their computing environment and network (classified, unclassified, open) Develop tools for technical support staff to support the desktop Manage or provide patches and enhancements for the desktops and servers Ensure all devices in their computing environment met security requirements Provide Tier 3 support Define processes and identify common activities for lifecycle management of the operating systems and applications

7 Results of presentations by team members Determined the team needed a new name to describe the common work performed to deliver the COE Sandia Core Computing Capabilities Team or SC3 team Realized there were common COE lifecycle management processes across the platforms Still did not have a clear definition of the COE (What does it mean?) Current definition still very Windows-focused Determined the COE was the product that the teams delivered to the customer Identified that COE is well-branded at Sandia and needed to be retained in some fashion Prior attempts to map the various applications needed to support the business for each platform were thus far unsuccessful Moving toward the concept that "Unified COE" involves developing a common approach to managing the lifecycle of constituent applications across the platforms, but actual offerings would differ by network and platform

8 We are currently defining COE lifecycle management processes Laboratories Define the process to release the COE to Sandia We do this in partnership with sister organizations containing the Tier 3 group that deploys the COE to the Labs (typically via desktop management software) We have already identified common activities for the Release Process Define the process for managing the COE while it's in the live environment Especially, how we support the field technicians who support customers running the COE We manage compliance in the live environment through a Network Disconnect Process that removes noncompliant devices from the network Defined the process to remove legacy COE especially operating systems from the live environment

9 Manage the release process Sandia National Laboratories Identify issues with the new software Test compatibility with various users (deployment team, early adopters, etc.) for the following COE application Browser readiness for corporate web applications Firewall protection Desktop management software solutions VPN solution Cyber security machine protection requirements Complete Sandia admin activities Proper internal network, cyber, and test machine registrations for new OS Adhere to Change Management processes

10 For example: Release the Mac OS to Sandia Sandia National Laboratories Sandia Administrative Activities to bring newly released OS in compliance for use on Sandia's networks Development

11 We have mostly well-developed process to manage gs^ COE while it's in the live environment Well-defined Incident and Request management processes (Tiers 1, 2, and 3 support, beginning with the help desk) Patch management: Very mature in the Windows environment Still maturing for the Mac OS Still maturing for Red Hat Enterprise Linux Ongoing process to ensure compliance to requirements of computers on Sandia's networks Network Disconnect Process helps manage the risk Well-defined process to manage less-than-full-version software updates for Windows and Mac

12 Process to remove legacy COE (especially operating systems) from the live environment The team monitors OS vendors for the following criteria: Number of versions behind vendors' latest released OS Security patches and enhancements no longer provided by the vendor Support by vendor ends or is available only at additional costs Cost increases due to Compatibility issues with other core applications Increase in OS instability, performance, errors, troubleshooting Legacy browsers embedded in the OS are no longer compatible with core applications We declare the OS meeting these criteria as "legacy" and they are no longer approved for Sandia networks Sandia's Network Disconnect Process helps drive customers to upgrade, purchase a new computer, or retire their device with the legacy OS: Sandia requirements provide the "teeth" to manage the risk of legacy devices (prevent network access, require additional protections, etc.) Non-exempt devices with legacy OSes that are discovered on the network are automatically submitted to the Network Disconnect Process An exemption process is available for customers to keep their legacy OS devices while securing Sandia's networks from vulnerabilities

13 Next steps: Unify lifecycle management of the COE acros computing platforms Sandia National Laboratories Define COE components for each platform Collaborate across computing platforms to standardize lifecycle management processes Move toward making common capabilities available for all platforms IT Infrastructure teams engaging Mac and Linux teams by investigating Windows infrastructure capabilities for the non-windows platforms Standardize communications with customers regarding release and removal of the COE from Sandia's environment Build in communications and self-help training opportunities for customers to minimize impact to their work

14 Why do all of this? Common, formal processes standardize on the delivery of the COE AND help us identify opportunities for improvement Standardized processes help us spin up new projects quickly and consistently Don't reinvent the wheel every time we get a new or remove an old software version A unified team encourages collaboration and sharing of experiences and challenges A standardized COE helps manage customer expectations, especially when we do the more difficult task of removing software from the live environment Obviously, a standardized, unified COE helps Sandia manage risk and secure its networks

Application Performance and Security Testing

Application Performance and Security Testing Photos placed in horizontal position with even amount of white space between photos and header Application Performance and Security Testing NLIT May 1 4, 2016 Christi Forsythe and Roy Life, Sandia National

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Essex County College INFORMATION TECHNOLOGY MASTER PLAN 2009-2012

Essex County College INFORMATION TECHNOLOGY MASTER PLAN 2009-2012 Essex County College INFORMATION TECHNOLOGY MASTER PLAN 2009-2012 TABLE OF CONTENTS Introduction... 3 Guiding Principles... 4 Alignment... 5 Projected Annual Costs... 6 Goals and Objectives... 7 Page 2

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Virtual Patching: a Proven Cost Savings Strategy

Virtual Patching: a Proven Cost Savings Strategy Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

MANAGED FIREWALL SERVICE. Service definition

MANAGED FIREWALL SERVICE. Service definition MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to

More information

MiServer & MiDatabase Service Review & Rates Discussion

MiServer & MiDatabase Service Review & Rates Discussion MiServer & MiDatabase Service Review & Rates Discussion December 17, 2012 NG Unit Reps Bill Wrobleski/Mandie Chapman Today Cloud Strategy Refresher MiServer/MiDatabase service review Projected rates 2013

More information

Agilent Technologies Electronic Measurements Group Computer Virus Control Program

Agilent Technologies Electronic Measurements Group Computer Virus Control Program Agilent Technologies Electronic Measurements Group Computer Virus Control Program Agilent Technologies Electronic Measurements Group (EMG) recognizes the potential risk of computer virus infection that

More information

AllianceIT Managed Services

AllianceIT Managed Services AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Cloud Defense. Kevin Hall Cyber Security Technology Department 4/17/2012. Sandia National Laboratories SAND 2012-2581C

Cloud Defense. Kevin Hall Cyber Security Technology Department 4/17/2012. Sandia National Laboratories SAND 2012-2581C 4/17/2012 Cloud Defense Kevin Hall Cyber Security Technology Department Sandia National Laboratories SAND 2012-2581C Sandia National Laboratories is a multi program laboratory managed and operated by Sandia

More information

Ohio University Office of Information Technology

Ohio University Office of Information Technology Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels

More information

To Virtualize Applications or Not to Virtualize: That is the Question! Introduction to application virtualization. What is virtualization?

To Virtualize Applications or Not to Virtualize: That is the Question! Introduction to application virtualization. What is virtualization? To Virtualize Applications or Not to Virtualize: That is the Question! Presented by: Bryan Ray, IT Applications Supervisor DLA Piper US LLP Justin Martin, Systems Engineer Symantec Introduction to application

More information

Table of Contents. Technical paper Open source comes of age for ERP customers

Table of Contents. Technical paper Open source comes of age for ERP customers Technical paper Open source comes of age for ERP customers It s no secret that open source software costs less to buy the software is free, in fact. But until recently, many enterprise datacenter managers

More information

Framework for SCADA Security Policy

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 1 Abstract Modern automation systems used

More information

Virtual Patching: a Compelling Cost Savings Strategy

Virtual Patching: a Compelling Cost Savings Strategy Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information

Rose Business Technologies

Rose Business Technologies Benefits of Software as a Service (SaaS) Software as a Service (SaaS) may be defined simply as software applications deployed over the Internet. With SaaS, a third-party provider licenses an application

More information

Keeping your Java updated Software updates using ITS desktop management. March 2015. William Neville wpjneville@mun.ca Bill Hearn bhearn@mun.

Keeping your Java updated Software updates using ITS desktop management. March 2015. William Neville wpjneville@mun.ca Bill Hearn bhearn@mun. Keeping your Java updated Software updates using ITS desktop management March 2015 William Neville wpjneville@mun.ca Bill Hearn bhearn@mun.ca Agenda What is SCCM? Why SCCM? Who has SCCM? Software Updates

More information

Who is Watching You? Video Conferencing Security

Who is Watching You? Video Conferencing Security Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative

More information

Leveraging the SharePoint Investment (Thinking beyond file storage)

Leveraging the SharePoint Investment (Thinking beyond file storage) Photos placed in horizontal position with even amount of white space between photos and header To replace these boxes with images open the slide master Leveraging the SharePoint Investment (Thinking beyond

More information

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope

State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision

More information

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

The Convergence of IT Operations

The Convergence of IT Operations SOLUTION WHITE PAPER The Convergence of IT Operations A Case for IT Service and Asset Process Integration and Automation TABLE OF CONTENTS TODAY S REALITY: THE FUTURE IS NOW. 1 AUTOMATION & INTEGRATION:

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

United States Antarctic Program Deployment Requirements for Information Security Training and Computer Requirements

United States Antarctic Program Deployment Requirements for Information Security Training and Computer Requirements United States Antarctic Program Deployment Requirements for Information Security Training and Computer Requirements Information Security Training and Acknowledgement Requirement The National Science Foundation

More information

Unifying IT How Dell Is Using BMC

Unifying IT How Dell Is Using BMC Unifying IT Management: How Dell Is Using BMC Software to Implement ITIL ABSTRACT Companies are looking for ways to maximize the efficiency with which they plan, deliver, and manage technology services.

More information

BIGFIX. BigFix and configuration management database solutions

BIGFIX. BigFix and configuration management database solutions BigFix and configuration management database solutions Configuration management databases (CMDB) have emerged as an important tool for understanding relationships between IT assets and their support for

More information

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote

More information

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

OnX Oracle Cloud Services

OnX Oracle Cloud Services OnX Oracle Cloud Services BUSINESS CHALLENGES There are several business challenges that drive the cloud discussion and cloud infrastructure market. These business challenges are very different from the

More information

Patch Management Policy

Patch Management Policy Patch Management Policy L2-POL-12 Version No :1.0 Revision History REVISION DATE PREPARED BY APPROVED BY DESCRIPTION Original 1.0 2-Apr-2015 Process Owner Management Representative Initial Version No.:

More information

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17.

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17. Table of Contents 1.0 GENERAL... 3 1.1 SUMMARY... 3 1.2 REFERENCES... 3 1.3 SUBMITTALS... 3 1.3.1 General... 3 1.3.2 Service Request Criteria... 4 1.4 EXPECTATIONS... 4 1.4.1 OTech... 4 1.4.2 Customer...

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

Computer Classroom Security Standard

Computer Classroom Security Standard Computer Classroom Security Standard Cal State Fullerton operates a heterogeneous network environment composed of centrally supported workstations, servers, and the network infrastructure. Along with administrative

More information

UCLA Policy 401 Minimum Security Standards for Network Devices

UCLA Policy 401 Minimum Security Standards for Network Devices UCLA Policy 401 Minimum Security Standards for Network Devices Issuing Officer: Associate Vice Chancellor, Information Technology Responsible Dept: Office of Information Technology Effective Date: November

More information

Patching Off-the-Shelf Software Used in Medical Information Systems

Patching Off-the-Shelf Software Used in Medical Information Systems Patching Off-the-Shelf Software Used in Medical Information Systems This Paper was developed by the Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC) This Paper has been approved by: NEMA (National

More information

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013 SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence timothy.mcbride@nist.gov David Waltermire Information Technology Laboratory david.waltermire@nist.gov

More information

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration

Version Date Description Author(s) 1.0 2/17/2014 Initial SLA Created ITC Administration IT Service Level Agreement (SLA) for users supported by the BEI Pilot Cluster in the departments of Biological Chemistry, Neurobiology, Neurology, and Pharmacology by the Information Technology Center

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

University Managed Desktop Program. Desktop Computing Support Framework 343-3362 or 875-6422

University Managed Desktop Program. Desktop Computing Support Framework 343-3362 or 875-6422 University Managed Desktop Program Desktop Computing Support Framework 343-3362 or 875-6422 Overview Commencing [enter department-specific date], desktop computing support will be provided for [enter department

More information

Workstation Management

Workstation Management Workstation Management Service Description Version 1.00 Effective Date: 07/01/2012 Purpose This Service Description is applicable to Workstation Management services offered by MN.IT Services and described

More information

Web Application Platform for Sandia

Web Application Platform for Sandia Web Application Platform for Sandia Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for

More information

MiServer and MiDatabase. Service Level Expectations. Service Definition

MiServer and MiDatabase. Service Level Expectations. Service Definition MiServer and MiDatabase Service Description Service Definition As part of the NextGen Michigan initiative, Information and Technology Services has engaged in building a private cloud offering to support

More information

Systems Management Tools And Documentation Version 8.1 Installation Guide

Systems Management Tools And Documentation Version 8.1 Installation Guide Systems Management Tools And Documentation Version 8.1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION:

More information

GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS

GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS GigaSpaces XAP 10.0 Administration Training ADMINISTRATION, MONITORING AND TROUBLESHOOTING GIGASPACES XAP DISTRIBUTED SYSTEMS Learn about GigaSpaces XAP internal protocols, its configuration, monitoring

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

The management imperative

The management imperative Pillars of Enterprise Protection: IT Management Technical Brief: IT Management Pillars of Enterprise Protection: IT Management Contents The management challenge...............................................................................

More information

Network Security Infrastructure Testing

Network Security Infrastructure Testing Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support

More information

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX Whitepaper The Top 10 Advantages of 3CX Phone System Why your next phone system should be software based and by 3CX This whitepaper outlines the top 10 advantages of choosing 3CX Phone System, a Windows

More information

Process for Selecting Engineering Tools Applied to Selecting a SysML Tool

Process for Selecting Engineering Tools Applied to Selecting a SysML Tool SANDIA REPORT SAND2010-7098 Unlimited Release February 2011 Process for Selecting Engineering Tools Applied to Selecting a SysML Tool Kent de Jong, Mark J. De Spain, Marjorie E. Hernandez, Debbie S. Post,

More information

Project Charter and Scope Statement

Project Charter and Scope Statement Prepared by: Mike Schmidt Version: 1.0 Last Revision Date: April 14, 2010 Create Date: May 6, 2010 EXECUTIVE SUMMARY... 3 1 INTRODUCTION... 4 2 PROJECT OBJECTIVES... 4 2.1 MISSION... 4 2.2 OBJECTIVES...

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Enterprise Host Security Software Suite Standards and Policy ITP Number ITP-SEC001 Category Recommended Policy Contact RA-ITCental@pa.gov Effective Date August 28, 2008 Supersedes

More information

HP Client Automation software Starter and Standard Editions

HP Client Automation software Starter and Standard Editions HP Client Automation software Starter and Standard Editions Data sheet Managing client devices effectively and efficiently is a mission-critical function for today s businesses. However, that challenge

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Why a Server Infrastructure Refresh Now and Why Dell?

Why a Server Infrastructure Refresh Now and Why Dell? Why a Server Infrastructure Refresh Now and Why Dell? In This Paper Outdated server infrastructure contributes to operating inefficiencies, lost productivity, and vulnerabilities Worse, existing infrastructure

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

QuickSpecs. HP Session Allocation Manager Software (SAM v2.3) Overview

QuickSpecs. HP Session Allocation Manager Software (SAM v2.3) Overview Overview Introduction A key component of the HP Virtual Client Essentials software portfolio, Session Allocation Manager (SAM) administrative software brokers network connections to seamlessly deliver

More information

Cracking the Code on Software License Management

Cracking the Code on Software License Management Cracking the Code on Software License Management Overview of IT Asset Management Integration Integration of the physical, financial, and contractual attributes of IT assets Enables the delivery of timely

More information

Red Teaming of Advanced Information Assurance Concepts

Red Teaming of Advanced Information Assurance Concepts Red Teaming of Advanced Information Assurance Concepts Bradley J. Wood Red Team Program Manager Distinguished Member of Technical Staff Sandia National Laboratories bjwood@sandia.gov Ruth A. Duggan Red

More information

Carahsoft End-User Computing Solutions Services

Carahsoft End-User Computing Solutions Services Carahsoft End-User Computing Solutions Services Service Description Horizon View Managed Services Bronze Package Managed Services Package Options # of Desktops to be Managed Desktop Type Duration of Services

More information

Update on the SAP GUI Family. Q3/2014 Public

Update on the SAP GUI Family. Q3/2014 Public Update on the SAP GUI Family Q3/2014 Public Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved.

Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. Parallels Virtuozzo Containers 4.0 for Linux Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers

More information

Why you need an Automated Asset Management Solution

Why you need an Automated Asset Management Solution solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery

More information

How To Manage Your Information Systems At Aerosoft.Com

How To Manage Your Information Systems At Aerosoft.Com Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented

More information

W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s u r i n g B u s i n e s s I m p a c t a n d R O I

W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s u r i n g B u s i n e s s I m p a c t a n d R O I Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L i n u x M a n a g e m e n t w i t h R e d H a t S a t e l l i t e : M e a s

More information

Building and Managing a Standard Operating Environment

Building and Managing a Standard Operating Environment Building and Managing a Standard Operating Environment Dirk Herrmann Head of Strategic Consulting Central Europe, Red Hat Todd Warner Satellite Product Manager, Red Hat Milan Zázrivec Satellite Software

More information

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines California State Polytechnic University, Pomona Desktop Security Standard and Guidelines Version 1.7 February 1, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM DESKTOP SECURITY STANDARD...3 ROLES

More information

Achieving HIPAA Compliance with Red Hat

Achieving HIPAA Compliance with Red Hat Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops The Health Insurance Portability and Accountability Act (HIPAA) of 1996 introduced a sweeping set of regulations that have

More information

GLOBAL PARTNER TRAINING

GLOBAL PARTNER TRAINING GLOBAL PARTNER TRAINING Introducing Red Hat Enterprise Linux 6 November 2010 The RHEL Team Agenda The market opportunity and landscape Introducing Red Hat Enterprise Linux 6 Key features and benefits Product

More information

Data Sheets RMS infinity

Data Sheets RMS infinity Data Sheets RMS infinity Introduction RayManageSoft infinity provides a complete set of products for software and operating system (OS) deployment, vulnerability analysis and patch management for Microsoft

More information

HP Client Management Solutions Overview

HP Client Management Solutions Overview HP Client Management Solutions Overview Table of contents Introduction... 2 HP Client Management Solutions... 2 HP Software Solutions... 2 Microsoft Solutions... 5 HP Management Tools and Technology...

More information

The Retail Payment System - Disruption of RPS

The Retail Payment System - Disruption of RPS 2012_6458P by Teresa Chambers FUNDED BY THE DEPARTMENT OF HOMELAND SECURITY, OFFICE OF SCIENCE AND TECHNOLOGY, AWARD #2009-ST-062-000031 Creation of a Community College-University Collaborative to Promote

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

AcuityLogic Hosting Options

AcuityLogic Hosting Options AcuityLogic is an intuitive, scalable, high-performing, integrated Web-based practice management system that supports patient communications, billing, and insurance claims; point-of-sale (POS); business

More information

SARATOGA CITY COUNCIL

SARATOGA CITY COUNCIL SARATOGA CITY COUNCIL MEETING DATE: December 2, 2009 AGENDA ITEM: DEPARTMENT: Administrative Services CITY MANAGER: Dave Anderson PREPARED BY: Leo Salindong DIRECTOR: Mary Furey IT Analyst Finance & Administrative

More information

Provisioning Technology for Automation

Provisioning Technology for Automation Provisioning Technology for Automation V Mamoru Yokoyama V Hiroshi Yazawa (Manuscript received January 17, 2007) Vendors have recently been offering more products and solutions for IT system automation

More information

Deploying. Mac. Five best practices

Deploying. Mac. Five best practices Deploying Mac Five best practices Deploying Mac Today more than ever, IT teams are looking to support Mac users at work. These five best practices used by medium and large organizations like yours will

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Best Practices for PC Lockdown and Control Policies. By Dwain Kinghorn

Best Practices for PC Lockdown and Control Policies. By Dwain Kinghorn 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Best Practices for PC Lockdown and Control Policies By Dwain Kinghorn TABLE OF CONTENTS

More information

Desktop Delivery: Making Desktop Virtualization Work

Desktop Delivery: Making Desktop Virtualization Work Desktop Delivery: Making Desktop Virtualization Work Published: April, 2008 TABLE OF CONTENTS SUMMARY...2 CHALLENGES WITH TRADITIONAL DESKTOPS...3 DESKTOP VIRTUALIZATION OVERVIEW...4 DESKTOP VIRTUALIZATION

More information

Portal for ArcGIS. Satish Sankaran Robert Kircher

Portal for ArcGIS. Satish Sankaran Robert Kircher Portal for ArcGIS Satish Sankaran Robert Kircher ArcGIS A Complete GIS Data Management Planning & Analysis Field Mobility Operational Awareness Constituent Engagement End to End Integration Collect, Organize,

More information

A Path from Windows Desktop to HTML5

A Path from Windows Desktop to HTML5 A Path from Windows Desktop to HTML5 GIZMOX TRANSPOSITION: The path to modern enterprise application code a Reduce Risk, Cost, and Time to Market for Legacy App Conversions GIZMOX TRANSPOSITION Introduction

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO. Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff

More information

How to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital.

How to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital. How to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital. Most library e-journals & databases are restricted to use on campus, or use off-campus only by current

More information

AUDIT REPORT. The National Nuclear Security Administration s Network Vision Initiative

AUDIT REPORT. The National Nuclear Security Administration s Network Vision Initiative U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The National Nuclear Security Administration s Network Vision Initiative DOE-OIG-16-05 December 2015

More information

I. Introduction. An SHI International Corp White Paper IT Outlaw: Making VDI Friendly

I. Introduction. An SHI International Corp White Paper IT Outlaw: Making VDI Friendly An SHI International Corp White Paper IT Outlaw: Making VDI Friendly I. Introduction As today s IT teams and budgets are leaner than ever, resource and time management are key to successfully navigating

More information

Parallels Desktop. for Mac. A Framework for Adopting Macs into the Windows Centric Business. Enterprise Edition. White Paper. www.parallels.

Parallels Desktop. for Mac. A Framework for Adopting Macs into the Windows Centric Business. Enterprise Edition. White Paper. www.parallels. Parallels Desktop Enterprise Edition for Mac White Paper A Framework for Adopting Macs into the Windows Centric Business www.parallels.com Parallels Desktop for Mac Enterprise Edition Enabling IT teams

More information

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ...

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ... Release Notes Release Notes 2013/04/08 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 7 New Features in Security Manager... 7 Known

More information

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install: Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the

More information

White Paper Take Control of Datacenter Infrastructure

White Paper Take Control of Datacenter Infrastructure Take Control of Datacenter Infrastructure Uniting the Governance of a Single System of Record with Powerful Automation Tools Take Control of Datacenter Infrastructure A new breed of infrastructure automation

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information