USP IT-Security Consulting & Projects

Size: px
Start display at page:

Download "USP IT-Security Consulting & Projects"

Transcription

1

2 Consulting Operation Products & Solutions USP Leistungsübersicht Web Access Management Web Application Firewall Authentication-Proxy Single Sign On USP Secure Entry Server Suite Network Access Control Network Access Control 802.1x and MAC Authentication Dynamic VLAN Assignent BYOD / MDM USP Network Authentication System Managed Security Services Encrypted Site-to-Site VPNs Firewall Protection Secure Remote Access USP Enterprise Network Services IT Security Projects Identity IAM & Access Management Web Application Security Network && Infrastructure Security Mobile Security Cloud Security Project Management Project Experience Methodology Seite 2

3 IT Security Consulting & Projects unser Team Ihre Kompetenz + 80 weitere USP Spezialisten Seite 3

4 Project Experience, Methodology, Skills Strategy & Policy Process & Organisation Architecture & Technology Implementation Leistungsübersicht Identity & Access Management Web Application Security Network & Infrastructure Security Mobile Security Cloud Security Seite 4

5 Unsere Stärken Ihr Nutzen

6 Unsere Stärken Ihr Nutzen Was Kunden an USP schätzen: Expertenwissen. Durch die Spezialisierung von USP profitieren unsere Kunden von Wissen auf Expertenniveau, welches wir nachhaltig auf dem neuesten Stand halten. Methodenkompetenz. Unsere Dienstleistungen erbringen wir nach anerkannten Methoden, jedoch immer abgestimmt auf die individuellen Anforderungen der Unternehmen. Kundenfokus. USP Consulting orientiert sich an Kundenbedürfnissen, umsetzbaren Lösungen und rasch erzielbarem Nutzen. Branchenerfahrung. Kunden profitieren von unserer Praxiserfahrung in verschiedenen Branchen und kommen durch unsere erprobte Vorgehensweise sicher zum Ziel. Kontinuität. Weil IT Security Vertrauenssache ist, lebt USP mit ihren Kunden nachhaltige und langfristige Beziehungen. Seite 6

7 Leistungsbeschreibung

8 Project Experience, Methodology, Skills Identity & Access Management Strategy & Policy Process & Organisation Architecture & Technology Implementation Identity & Access Management IAM strategy (e.g. in general, for the extended enterprise) IAM gap analysis (using United Security Providers IAM framework) IAM roadmap (e.g. fields of action, quick wins, implementation steps) IAM policies (e.g. guidelines, principles, responsibilities) Requirements engineering Roles concept (e.g. business and system roles) Identity administration process analysis and (re)engineering Identity and privilege management concept Identity administration workflow modeling System architecture Solution design Architecture review Proof of concepts IAM product and vendor evaluation Detailed technical specification Implementation and customization (i.e. synchronization, workflow, gui) Integration consulting for other environments (i.e. SAP, MS ADS, other apps) Development of synchronization integration adapters Seite 8

9 Project Experience, Methodology, Skills Web Application Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Web Application Security Web Application Security Policy Legal Compliance Business-aligned Security & Availability B2B/B2C Portal Security Application Development Guidelines User Authorization & Roles User Self Service Reverse Proxy Architecture Authentication Enforcement Web Single Sign-On Security Audits und Reviews Federation & Cross- Domain SSO USP Secure Entry Server Access Infrastructure Konsolidierung Seite 9

10 Project Experience, Methodology, Skills Network and Infrastructure Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Network and Infrastructure Security Security Policies Network Security Policy Security Compliance IT Security management Network (Security) Management Change Management Security Enforcement Security Architecture Network Zoning Perimeter/Datacenter Zoning USP Network Authentication System Perimeter Security Services Security Standards Security Awareness Programs information security and data protection (ISDS) Information Security Management System ISMS Business Continuity Management BCM Hardening Guidelines Network Security Architecture (e.g. IPS, FW, NAC) Content Security Concept (e.g. Proxy, Antivir) Remote Access Architecture (e.g. VPN, VDI, DA) Security Audits and Reviews Migration to Network Zones Seite 10

11 Project Experience, Methodology, Skills Mobile Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Mobile Security Mobile Security Strategy Bring Your Own Device Strategy Analysis of 5 Dimensions (User, Device, Access, Service, Policy) Use Case Defintion User Policies Technical Policies User directives Management of certificates Integration Architecture Network Access Control Architecture Mobile Device and App Management Architecture Application Access and -Security USP Secure Entry Server USP Network Authentication System Captive Portal Integration of Mobile Device Management WLAN Architecture Seite 11

12 Project Experience, Methodology, Skills Cloud Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Cloud Security Cloud Computing Strategy Cloud Security Governance IAM in the Cloud (SecaaS) Cloud Audit Cloud Security Policy Cloud Security Risk Management Web Security (Secaas) Mail Security (Secaas) Onboarding Testing Cloud Security Trainings Cloud Security Compliance Application Security Cut Over Information Mgmt and Data Security Validating Cloud Architectures Cloud Transformation Cloud Provider / Services Evaluation Workload Assessment Seite 12

13 Ihr nächster Schritt Wollen auch Sie in Ihren Vorhaben weiter kommen? Kontaktieren Sie uns, wir meistern die Herausforderungen mit Ihnen! Marcel Neiger, Head of Business Unit Fon Riccardo Pileggi Sales Manager Fon Seite 13

BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort. Systems Engineer, Citrix Systems GmbH

BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort. Systems Engineer, Citrix Systems GmbH BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort Oliver Lomberg Ralph Stocker Systems Engineer, Citrix Systems GmbH Systems Engineer, Citrix Systems GmbH Simplicity vs.

More information

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group BP1 Mobile App Management: Solutions for ios and Android Gary Barton Mobility Architect Citrix Receivers and Gateways Group Agenda 1. Synergy Announcements 2. Mobile Management Market 3. Citrix Vision

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Implementing Data Models and Reports with Microsoft SQL Server

Implementing Data Models and Reports with Microsoft SQL Server Implementing Data Models and Reports with Microsoft SQL Server Dauer: 5 Tage Kursnummer: M20466 Überblick: Business Intelligence (BI) wird für Unternehmen von verschiedenen Größen aufgrund des dadurch

More information

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland Network Security History in a Nutshell 1990s The Internet is bad if we do

More information

SAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte. Jörg Diekkämper 24. April 2015

SAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte. Jörg Diekkämper 24. April 2015 SAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte Jörg Diekkämper 24. April 2015 2005 2013 Quelle 2014 SAP AG or an SAP affiliate company. All rights reserved. 2 2014 SAP AG or

More information

How To Make Your Computer System More Secure And Secure

How To Make Your Computer System More Secure And Secure Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management

More information

- Was gibt es Neues? - Mobile Update

- Was gibt es Neues? - Mobile Update - Was gibt es Neues? - Mobile Update Volker Linz Systemberater, Oracle E-Mail: volker.linz@oracle.com +++ Bitte wählen Sie sich in die Telefonkonferenz entweder mit 0800/6648515 oder aus dem Mobilfunknetz

More information

Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren

Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren Partnering for the Cloud 14 th of Mai, 2013 Ulrich Hubert und Klaus Kaufmann Fujitsu Enabling Software Technology 0 Copyright

More information

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International

More information

DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications. Systems Engineer, Citrix Systems GmbH

DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications. Systems Engineer, Citrix Systems GmbH DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications Rob Sanders Oliver Lomberg Systems Engineer, Citrix Systems Systems Engineer, Citrix Systems GmbH Corporate PC Corporate

More information

Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014

Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014 Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen März 2014 Citrix The Most Complete Mobile Portfolio Mobile Value-on-Investment Mobile Device Management Sandboxed Mail and Web

More information

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies

More information

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Seite 1 / 5 Mailit 6 for FileMaker 10-13 The Ultimate Email Plug-In Integrate full email capability into your FileMaker 10-13 solutions with

More information

Multipurpsoe Business Partner Certificates Guideline for the Business Partner

Multipurpsoe Business Partner Certificates Guideline for the Business Partner Multipurpsoe Business Partner Certificates Guideline for the Business Partner 15.05.2013 Guideline for the Business Partner, V1.3 Document Status Document details Siemens Topic Project name Document type

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233 Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft

More information

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY Security Services Identify and reduce risks The reliable protection of your assets information, workforce,

More information

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:

Digicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner: 1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit

More information

Roadmap to Solving Enterprise Mobility

Roadmap to Solving Enterprise Mobility Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all

More information

AD2 - The future of mobile enterprise applications: Live from the Citrix Labs

AD2 - The future of mobile enterprise applications: Live from the Citrix Labs AD2 - The future of mobile enterprise applications: Live from the Citrix Labs Steve Parry, Senior Director, Citrix Labs Christian Gehring, Enterprise Presales Architect, Citrix Systems Citrix Labs Citrix

More information

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11 Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen

More information

LEARNING AGREEMENT FOR STUDIES

LEARNING AGREEMENT FOR STUDIES LEARNING AGREEMENT FOR STUDIES The Student Last name (s) First name (s) Date of birth Nationality 1 Sex [M/F] Academic year 20../20.. Study cycle EQF level 6 Subject area, Code Phone E-mail 0421 The Sending

More information

Designing and Implementing a Server Infrastructure MOC 20413

Designing and Implementing a Server Infrastructure MOC 20413 Designing and Implementing a Server Infrastructure MOC 20413 In dieser 5-tägigen Schulung erhalten Sie die Kenntnisse, welche benötigt werden, um eine physische und logische Windows Server 2012 Active

More information

Private Geräte im Unternehmen - ein großes Potential mit Risiken

Private Geräte im Unternehmen - ein großes Potential mit Risiken Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private

More information

Benefits of Using Credit Suisse As an Institutional Investor

Benefits of Using Credit Suisse As an Institutional Investor Success through Partnership Our Offering for Institutional Investors A Clear Advantage with Credit Suisse 4 Experience and Expertise 7 Personalized Advice and Partnership 8 Range of Services 9 Strategic

More information

DC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds. Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems

DC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds. Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems DC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems Cloud is not Cloud Cloud is not is top not down Who made the initial

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

IDENTIKEY FEDERATION SERVICES

IDENTIKEY FEDERATION SERVICES Die sichere Brücke zur Cloud IDENTIKEY FEDERATION SERICES Web-Single-Sign-On auf alle Ihre Webapplikationen, aber sicher! Alexander Kehl, Regional Sales Manager 2013 - ASCO Data Security Alltägliche Nachrichten:

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Oracle Mobile Security Suite. René Klomp 6 mei 2014 Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be

More information

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires

More information

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led Prerequisites: Mobile Device Management Course 55078: 2 days Instructor Led Before attending this course, students must have: Basic understanding of TCP/IP and networking concepts. Basic Windows and Active

More information

Wir begleiten Sie in die Cloud

Wir begleiten Sie in die Cloud Wir begleiten Sie in die Cloud Version 1.0 Christian Messerschmidt Client Solutions Director EMC Deutschland GmbH Copyright 2012 EMC Corporation. All rights reserved. 1 Agenda Welche Cloud? Warum Journey?

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

Software EMEA Performance Tour 2013. 17.-19 Juni, Berlin

Software EMEA Performance Tour 2013. 17.-19 Juni, Berlin Software EMEA Performance Tour 2013 17.-19 Juni, Berlin Funktion,Performance,ALM,... Neues aus der HP Entwicklung Jürgen Pilz / 18.06.2013 Copyright 2012 Hewlett-Packard Development Company, L.P. The information

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Enterprise Mobility Changing the way of doing business

Enterprise Mobility Changing the way of doing business Enterprise Mobility Changing the way of doing business Wolfgang Kuzel Business Development Manager Tieto Austria Gmbh E-mail: wolfgang.kuzel@tieto.com 2013 Tieto Corporation We already have mobile solutions

More information

Eurohansia. working in partnership

Eurohansia. working in partnership Eurohansia working in partnership Catalogue Corporate items 2010 Herzliche Grüße! Arbeiten in Partnerschaft. Greetings! Working in partnership. Mehr als eine Aussage, ist diese die Verpflichtung von EUROHANSIA

More information

Storage XenMotion Tampa Technology Project

Storage XenMotion Tampa Technology Project Storage XenMotion Tampa Technology Project Andrei Lifchits XenServer Storage Overview Feature overview Use cases Bird s-eye view of operation Feature limitations and potential pitfalls API/CLI/GUI walkthrough

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

SAP Solutions for Information Management Overview, Strategy, & Roadmap. Kristin McMahon May 2013

SAP Solutions for Information Management Overview, Strategy, & Roadmap. Kristin McMahon May 2013 SAP Solutions for Information Management Overview, Strategy, & Roadmap Kristin McMahon May 2013 Safe Harbor Statement The information in this presentation is confidential and proprietary to SAP and may

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

NF Group Vorstellung beim IN-Breakfast 29-09-2011

NF Group Vorstellung beim IN-Breakfast 29-09-2011 NF Group Vorstellung beim IN-Breakfast 29-09-2011 Xapt US/Kanada Who we are. We make IT passionate. Key Facts Founded 2006 Headquarter Austria 9 operative companies 1000+ employees 120 Mio EUR revenue

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Update to V10. Automic Support: Best Practices Josef Scharl. Please ask your questions here http://innovate.automic.com/q&a Event code 6262

Update to V10. Automic Support: Best Practices Josef Scharl. Please ask your questions here http://innovate.automic.com/q&a Event code 6262 Update to V10 Automic Support: Best Practices Josef Scharl Please ask your questions here http://innovate.automic.com/q&a Event code 6262 Agenda Update to Automation Engine Version 10 Innovations in Version

More information

Mobile Security: The good, the bad, the way forward

Mobile Security: The good, the bad, the way forward Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel

More information

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,

More information

How To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa (

How To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa ( The real Way of Open Source FOSS Group AG, Hauptstrasse 91, CH 4147 Aesch FOSS Group GmbH, Bismarckallee 9, 79098 Freiburg 2008 by FOSS Group Die FOSS Group ist ein Zusammenschluss von hochkarätigen Free

More information

Cisco ASA und FirePOWER Services

Cisco ASA und FirePOWER Services Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle

More information

SAP Product Road Map SAP Mobile Documents

SAP Product Road Map SAP Mobile Documents SAP Product Road Map SAP Mobile Documents Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This presentation

More information

Technology Day 2015 Xylos

Technology Day 2015 Xylos Stay in control of your identity with Azure Active Directory (Premium) Technology Day 2015 Xylos Robin Vermeirsch Sr. IT consultant CCM Azure Active Directory Introduction Competence Center Messaging (CCM)

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

IQS Identity and Access Management

IQS Identity and Access Management IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination

More information

SMP Security & Identity Management An Introduction

SMP Security & Identity Management An Introduction SMP Security & Identity Management An Introduction SMP Enterprise Grade Mobility Webinar Series Brought to you by the SAP Mobile Rapid Innovation Group (RIG) SAP Mobile Platform: Enterprise Grade Mobility

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Certificate SAP INTEGRATION CERTIFICATION

Certificate SAP INTEGRATION CERTIFICATION Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the interface software MCC SR2015 for the product MCC SR2015 of the MEIERHOFER AG. has been certified for integration with SAP ECC

More information

Groups Inside FHNW: Why it s not just another AAI SP

Groups Inside FHNW: Why it s not just another AAI SP Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple

More information

Security Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers

Security Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers A Comparison of Security Vendors and Service Providers Information Security and Data Protection An Die Overview digitale Welt of the wird German Realität. and Mit Swiss jedem Security Tag Competitive ein

More information

Neueste Microsoft Server Technologien - Vorteile und Nutzen im Überblick Michael Faden Technology Solution Professional Datacenter Microsoft Schweiz

Neueste Microsoft Server Technologien - Vorteile und Nutzen im Überblick Michael Faden Technology Solution Professional Datacenter Microsoft Schweiz Neueste Microsoft Server Technologien - Vorteile und Nutzen im Überblick Michael Faden Technology Solution Professional Datacenter Microsoft Schweiz Die Microsoft Cloud OS Vision Microsoft Cloud Erfahrung

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure About this Course This course is aimed at experienced IT Professionals who currently administer their on-premise infrastructure. The course introduces the student

More information

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals

More information

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course 20533A: Implementing Microsoft Azure Infrastructure Solutions Page 1 of 7 Implementing Microsoft Azure Infrastructure Solutions Course 20533A: 4 days; Instructor-Led Introduction This course is

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

>Challenges faced by the travel and transportation industry

>Challenges faced by the travel and transportation industry >Challenges faced by the travel and transportation industry Competition Passenger Satisfaction Chart 2 >Challenges faced by the travel and transportation industry Economic instability and uncertainty Difficulty

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

BP8 Citrix Integrations with System Center Configuration Manager 2012

BP8 Citrix Integrations with System Center Configuration Manager 2012 BP8 Citrix Integrations with System Center Configuration Manager 2012 Prasanna Padmanabhan, Manager Product Development, Citrix Systems Inc. Hans Schermer, Senior Systems Engineer, Citrix Systems GmbH

More information

Business Values of Network and Security Virtualization

Business Values of Network and Security Virtualization Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? 2014 in Frankfurt am Main DATUM 11.11.2014 SEITE 2 Christian Paul Stobbe Director Strategy Düsseldorf

More information

Quick Start Guide UTM 110/120

Quick Start Guide UTM 110/120 Quick Start Guide UTM 110/120 Sophos Access Points Sophos Access Points 1. Preparation Before you begin, please confirm that you have a working Internet connection & make sure you have the following items

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market

More information

How To Secure Your Mobile Device

How To Secure Your Mobile Device BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce

More information

Wir stellen uns vor We introduce ourselves

Wir stellen uns vor We introduce ourselves Wir stellen uns vor We introduce ourselves Wir bieten Ihnen ein umfassendes Spektrum an Dienstleistungen in der Nukleartechnik. Dabei setzen wir unsere langjфhrige Erfahrung und unser umfassendes Know-how

More information

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft.

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft. Cloud OS Network Die Bedeutung einer Partner Managed Cloud für Kunden. Uwe Lüthy, Partner Technology Strategiest uwelu@microsoft.com Die Cloud Opportunity Definition von Buzzwords Cloud OS Strategie Wichtig

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Application Optimization, Visibility and Control for the Hybrid Enterprise

Application Optimization, Visibility and Control for the Hybrid Enterprise Application Optimization, Visibility and Control for the Hybrid Enterprise Optimierung, Visibilität und Kontrolle in ein einer Welt der Hybrid Enterprise René Bagia Enterprise Sales Executive, Riverbed

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

BP6 Unified Communications in a virtual desktop. Systems Engineer, Citrix Systems

BP6 Unified Communications in a virtual desktop. Systems Engineer, Citrix Systems BP6 Unified Communications in a virtual desktop Hans Schermer Rob Sanders Systems Engineer, Citrix Systems GmbH Systems Engineer, Citrix Systems 2 New ways of communicating Challenges with UC in a virtual

More information

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN

More information

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from

More information

Standard: Event Monitoring

Standard: Event Monitoring Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information

More information

Jetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden!

Jetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden! NetWorker - Allgemein Tip 642, Seite 1/6 Jetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden! Seit einiger Zeit (NetWorker 8.2.0?) können Sie mit dem Befehl nsradmin -C

More information

Mobile device Management mit NAC

Mobile device Management mit NAC Mobile device Management mit NAC fweisel@forescout.com 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal

More information

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support

More information

Comparative Market Analysis of Project Management Systems

Comparative Market Analysis of Project Management Systems University of Osnabrück Chair of Business Administration/Organization and Information Systems Prof. Dr. Hoppe (Ed.) Comparative Market Analysis of Project Management Systems Frederik Ahlemann Katharinenstr.

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

How To Teach A Software Engineer

How To Teach A Software Engineer Corporate Technology Social Skills für Experten Erfahrungsbericht vom Siemens Curriculum für Senior Architekten / Architekten Matthias Singer Siemens AG Learning Campus Copyright 2010. All rights reserved.

More information

Vertrauen in Cloud Dienste schaffen

Vertrauen in Cloud Dienste schaffen Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information