USP IT-Security Consulting & Projects
|
|
- Lora Farmer
- 8 years ago
- Views:
Transcription
1
2 Consulting Operation Products & Solutions USP Leistungsübersicht Web Access Management Web Application Firewall Authentication-Proxy Single Sign On USP Secure Entry Server Suite Network Access Control Network Access Control 802.1x and MAC Authentication Dynamic VLAN Assignent BYOD / MDM USP Network Authentication System Managed Security Services Encrypted Site-to-Site VPNs Firewall Protection Secure Remote Access USP Enterprise Network Services IT Security Projects Identity IAM & Access Management Web Application Security Network && Infrastructure Security Mobile Security Cloud Security Project Management Project Experience Methodology Seite 2
3 IT Security Consulting & Projects unser Team Ihre Kompetenz + 80 weitere USP Spezialisten Seite 3
4 Project Experience, Methodology, Skills Strategy & Policy Process & Organisation Architecture & Technology Implementation Leistungsübersicht Identity & Access Management Web Application Security Network & Infrastructure Security Mobile Security Cloud Security Seite 4
5 Unsere Stärken Ihr Nutzen
6 Unsere Stärken Ihr Nutzen Was Kunden an USP schätzen: Expertenwissen. Durch die Spezialisierung von USP profitieren unsere Kunden von Wissen auf Expertenniveau, welches wir nachhaltig auf dem neuesten Stand halten. Methodenkompetenz. Unsere Dienstleistungen erbringen wir nach anerkannten Methoden, jedoch immer abgestimmt auf die individuellen Anforderungen der Unternehmen. Kundenfokus. USP Consulting orientiert sich an Kundenbedürfnissen, umsetzbaren Lösungen und rasch erzielbarem Nutzen. Branchenerfahrung. Kunden profitieren von unserer Praxiserfahrung in verschiedenen Branchen und kommen durch unsere erprobte Vorgehensweise sicher zum Ziel. Kontinuität. Weil IT Security Vertrauenssache ist, lebt USP mit ihren Kunden nachhaltige und langfristige Beziehungen. Seite 6
7 Leistungsbeschreibung
8 Project Experience, Methodology, Skills Identity & Access Management Strategy & Policy Process & Organisation Architecture & Technology Implementation Identity & Access Management IAM strategy (e.g. in general, for the extended enterprise) IAM gap analysis (using United Security Providers IAM framework) IAM roadmap (e.g. fields of action, quick wins, implementation steps) IAM policies (e.g. guidelines, principles, responsibilities) Requirements engineering Roles concept (e.g. business and system roles) Identity administration process analysis and (re)engineering Identity and privilege management concept Identity administration workflow modeling System architecture Solution design Architecture review Proof of concepts IAM product and vendor evaluation Detailed technical specification Implementation and customization (i.e. synchronization, workflow, gui) Integration consulting for other environments (i.e. SAP, MS ADS, other apps) Development of synchronization integration adapters Seite 8
9 Project Experience, Methodology, Skills Web Application Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Web Application Security Web Application Security Policy Legal Compliance Business-aligned Security & Availability B2B/B2C Portal Security Application Development Guidelines User Authorization & Roles User Self Service Reverse Proxy Architecture Authentication Enforcement Web Single Sign-On Security Audits und Reviews Federation & Cross- Domain SSO USP Secure Entry Server Access Infrastructure Konsolidierung Seite 9
10 Project Experience, Methodology, Skills Network and Infrastructure Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Network and Infrastructure Security Security Policies Network Security Policy Security Compliance IT Security management Network (Security) Management Change Management Security Enforcement Security Architecture Network Zoning Perimeter/Datacenter Zoning USP Network Authentication System Perimeter Security Services Security Standards Security Awareness Programs information security and data protection (ISDS) Information Security Management System ISMS Business Continuity Management BCM Hardening Guidelines Network Security Architecture (e.g. IPS, FW, NAC) Content Security Concept (e.g. Proxy, Antivir) Remote Access Architecture (e.g. VPN, VDI, DA) Security Audits and Reviews Migration to Network Zones Seite 10
11 Project Experience, Methodology, Skills Mobile Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Mobile Security Mobile Security Strategy Bring Your Own Device Strategy Analysis of 5 Dimensions (User, Device, Access, Service, Policy) Use Case Defintion User Policies Technical Policies User directives Management of certificates Integration Architecture Network Access Control Architecture Mobile Device and App Management Architecture Application Access and -Security USP Secure Entry Server USP Network Authentication System Captive Portal Integration of Mobile Device Management WLAN Architecture Seite 11
12 Project Experience, Methodology, Skills Cloud Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Cloud Security Cloud Computing Strategy Cloud Security Governance IAM in the Cloud (SecaaS) Cloud Audit Cloud Security Policy Cloud Security Risk Management Web Security (Secaas) Mail Security (Secaas) Onboarding Testing Cloud Security Trainings Cloud Security Compliance Application Security Cut Over Information Mgmt and Data Security Validating Cloud Architectures Cloud Transformation Cloud Provider / Services Evaluation Workload Assessment Seite 12
13 Ihr nächster Schritt Wollen auch Sie in Ihren Vorhaben weiter kommen? Kontaktieren Sie uns, wir meistern die Herausforderungen mit Ihnen! Marcel Neiger, Head of Business Unit Fon Riccardo Pileggi Sales Manager Fon Seite 13
BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort. Systems Engineer, Citrix Systems GmbH
BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort Oliver Lomberg Ralph Stocker Systems Engineer, Citrix Systems GmbH Systems Engineer, Citrix Systems GmbH Simplicity vs.
More informationBP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group
BP1 Mobile App Management: Solutions for ios and Android Gary Barton Mobility Architect Citrix Receivers and Gateways Group Agenda 1. Synergy Announcements 2. Mobile Management Market 3. Citrix Vision
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationImplementing Data Models and Reports with Microsoft SQL Server
Implementing Data Models and Reports with Microsoft SQL Server Dauer: 5 Tage Kursnummer: M20466 Überblick: Business Intelligence (BI) wird für Unternehmen von verschiedenen Größen aufgrund des dadurch
More informationModerne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland
Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland Network Security History in a Nutshell 1990s The Internet is bad if we do
More informationSAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte. Jörg Diekkämper 24. April 2015
SAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte Jörg Diekkämper 24. April 2015 2005 2013 Quelle 2014 SAP AG or an SAP affiliate company. All rights reserved. 2 2014 SAP AG or
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More information- Was gibt es Neues? - Mobile Update
- Was gibt es Neues? - Mobile Update Volker Linz Systemberater, Oracle E-Mail: volker.linz@oracle.com +++ Bitte wählen Sie sich in die Telefonkonferenz entweder mit 0800/6648515 oder aus dem Mobilfunknetz
More informationBusinessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren
Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren Partnering for the Cloud 14 th of Mai, 2013 Ulrich Hubert und Klaus Kaufmann Fujitsu Enabling Software Technology 0 Copyright
More informationCA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg
CA Computer Associates Nils Meyer CA Computer Associates GmbH Hamburg Agenda CA Das Unternehmen CA Die Geschichte CA Die Softwarelösungen Diskussion CA Das Unternehmen CA Computer Associates International
More informationDV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications. Systems Engineer, Citrix Systems GmbH
DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications Rob Sanders Oliver Lomberg Systems Engineer, Citrix Systems Systems Engineer, Citrix Systems GmbH Corporate PC Corporate
More informationGet ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen. März 2014
Get ready for the mobile Enterprise: Mobile Lösungen für Ihre Unternehmen März 2014 Citrix The Most Complete Mobile Portfolio Mobile Value-on-Investment Mobile Device Management Sandboxed Mail and Web
More informationISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014
ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies
More informationSoftware / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13
Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Seite 1 / 5 Mailit 6 for FileMaker 10-13 The Ultimate Email Plug-In Integrate full email capability into your FileMaker 10-13 solutions with
More informationMultipurpsoe Business Partner Certificates Guideline for the Business Partner
Multipurpsoe Business Partner Certificates Guideline for the Business Partner 15.05.2013 Guideline for the Business Partner, V1.3 Document Status Document details Siemens Topic Project name Document type
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft
More informationIS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY
IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY Security Services Identify and reduce risks The reliable protection of your assets information, workforce,
More informationDigicomp Microsoft Evolution Day 2015 1. MIM 2016 Oliver Ryf. Partner:
1 MIM 2016 Oliver Ryf Partner: 2 Agenda Begrüssung Vorstellung Referent PowerShell Desired State Configuration F&A Weiterführende Kurse 3 Vorstellung Referent Seit 1991 IT-Trainer 1995 MCSE und MCT Seit
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationAD2 - The future of mobile enterprise applications: Live from the Citrix Labs
AD2 - The future of mobile enterprise applications: Live from the Citrix Labs Steve Parry, Senior Director, Citrix Labs Christian Gehring, Enterprise Presales Architect, Citrix Systems Citrix Labs Citrix
More informationDokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11
Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen
More informationLEARNING AGREEMENT FOR STUDIES
LEARNING AGREEMENT FOR STUDIES The Student Last name (s) First name (s) Date of birth Nationality 1 Sex [M/F] Academic year 20../20.. Study cycle EQF level 6 Subject area, Code Phone E-mail 0421 The Sending
More informationDesigning and Implementing a Server Infrastructure MOC 20413
Designing and Implementing a Server Infrastructure MOC 20413 In dieser 5-tägigen Schulung erhalten Sie die Kenntnisse, welche benötigt werden, um eine physische und logische Windows Server 2012 Active
More informationPrivate Geräte im Unternehmen - ein großes Potential mit Risiken
Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private
More informationBenefits of Using Credit Suisse As an Institutional Investor
Success through Partnership Our Offering for Institutional Investors A Clear Advantage with Credit Suisse 4 Experience and Expertise 7 Personalized Advice and Partnership 8 Range of Services 9 Strategic
More informationDC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds. Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems
DC1 Citrix Cloud Strategy Solutions for Private, Hybrid & Public Clouds Olivier Maes, Sr Director Cloud Platform Group, Citrix Systems Cloud is not Cloud Cloud is not is top not down Who made the initial
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationIDENTIKEY FEDERATION SERVICES
Die sichere Brücke zur Cloud IDENTIKEY FEDERATION SERICES Web-Single-Sign-On auf alle Ihre Webapplikationen, aber sicher! Alexander Kehl, Regional Sales Manager 2013 - ASCO Data Security Alltägliche Nachrichten:
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationMOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
More informationCourse Outline. Mobile Device Management Course 55078: 2 days Instructor Led
Prerequisites: Mobile Device Management Course 55078: 2 days Instructor Led Before attending this course, students must have: Basic understanding of TCP/IP and networking concepts. Basic Windows and Active
More informationWir begleiten Sie in die Cloud
Wir begleiten Sie in die Cloud Version 1.0 Christian Messerschmidt Client Solutions Director EMC Deutschland GmbH Copyright 2012 EMC Corporation. All rights reserved. 1 Agenda Welche Cloud? Warum Journey?
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More informationSoftware EMEA Performance Tour 2013. 17.-19 Juni, Berlin
Software EMEA Performance Tour 2013 17.-19 Juni, Berlin Funktion,Performance,ALM,... Neues aus der HP Entwicklung Jürgen Pilz / 18.06.2013 Copyright 2012 Hewlett-Packard Development Company, L.P. The information
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationEnterprise Mobility Changing the way of doing business
Enterprise Mobility Changing the way of doing business Wolfgang Kuzel Business Development Manager Tieto Austria Gmbh E-mail: wolfgang.kuzel@tieto.com 2013 Tieto Corporation We already have mobile solutions
More informationEurohansia. working in partnership
Eurohansia working in partnership Catalogue Corporate items 2010 Herzliche Grüße! Arbeiten in Partnerschaft. Greetings! Working in partnership. Mehr als eine Aussage, ist diese die Verpflichtung von EUROHANSIA
More informationStorage XenMotion Tampa Technology Project
Storage XenMotion Tampa Technology Project Andrei Lifchits XenServer Storage Overview Feature overview Use cases Bird s-eye view of operation Feature limitations and potential pitfalls API/CLI/GUI walkthrough
More informationPROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
More informationSAP Solutions for Information Management Overview, Strategy, & Roadmap. Kristin McMahon May 2013
SAP Solutions for Information Management Overview, Strategy, & Roadmap Kristin McMahon May 2013 Safe Harbor Statement The information in this presentation is confidential and proprietary to SAP and may
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationNF Group Vorstellung beim IN-Breakfast 29-09-2011
NF Group Vorstellung beim IN-Breakfast 29-09-2011 Xapt US/Kanada Who we are. We make IT passionate. Key Facts Founded 2006 Headquarter Austria 9 operative companies 1000+ employees 120 Mio EUR revenue
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationUpdate to V10. Automic Support: Best Practices Josef Scharl. Please ask your questions here http://innovate.automic.com/q&a Event code 6262
Update to V10 Automic Support: Best Practices Josef Scharl Please ask your questions here http://innovate.automic.com/q&a Event code 6262 Agenda Update to Automation Engine Version 10 Innovations in Version
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationIs Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins
Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel
More informationUpgrading Your Skills to MCSA Windows Server 2012 MOC 20417
Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,
More informationHow To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa (
The real Way of Open Source FOSS Group AG, Hauptstrasse 91, CH 4147 Aesch FOSS Group GmbH, Bismarckallee 9, 79098 Freiburg 2008 by FOSS Group Die FOSS Group ist ein Zusammenschluss von hochkarätigen Free
More informationCisco ASA und FirePOWER Services
Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle
More informationSAP Product Road Map SAP Mobile Documents
SAP Product Road Map SAP Mobile Documents Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This presentation
More informationTechnology Day 2015 Xylos
Stay in control of your identity with Azure Active Directory (Premium) Technology Day 2015 Xylos Robin Vermeirsch Sr. IT consultant CCM Azure Active Directory Introduction Competence Center Messaging (CCM)
More informationArchitecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
More informationKEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure
KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationIQS Identity and Access Management
IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination
More informationSMP Security & Identity Management An Introduction
SMP Security & Identity Management An Introduction SMP Enterprise Grade Mobility Webinar Series Brought to you by the SAP Mobile Rapid Innovation Group (RIG) SAP Mobile Platform: Enterprise Grade Mobility
More informationSolve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationCertificate SAP INTEGRATION CERTIFICATION
Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the interface software MCC SR2015 for the product MCC SR2015 of the MEIERHOFER AG. has been certified for integration with SAP ECC
More informationGroups Inside FHNW: Why it s not just another AAI SP
Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple
More informationSecurity Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers
A Comparison of Security Vendors and Service Providers Information Security and Data Protection An Die Overview digitale Welt of the wird German Realität. and Mit Swiss jedem Security Tag Competitive ein
More informationNeueste Microsoft Server Technologien - Vorteile und Nutzen im Überblick Michael Faden Technology Solution Professional Datacenter Microsoft Schweiz
Neueste Microsoft Server Technologien - Vorteile und Nutzen im Überblick Michael Faden Technology Solution Professional Datacenter Microsoft Schweiz Die Microsoft Cloud OS Vision Microsoft Cloud Erfahrung
More informationImplementing Microsoft Azure Infrastructure Solutions
Implementing Microsoft Azure Infrastructure About this Course This course is aimed at experienced IT Professionals who currently administer their on-premise infrastructure. The course introduces the student
More informationMicrosoft 20533 - Implementing Microsoft Azure Infrastructure Solutions
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals
More informationAppendix C Pricing Index DIR Contract Number DIR-TSO-2724
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers
More informationImplementing Microsoft Azure Infrastructure Solutions
Course 20533A: Implementing Microsoft Azure Infrastructure Solutions Page 1 of 7 Implementing Microsoft Azure Infrastructure Solutions Course 20533A: 4 days; Instructor-Led Introduction This course is
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More information>Challenges faced by the travel and transportation industry
>Challenges faced by the travel and transportation industry Competition Passenger Satisfaction Chart 2 >Challenges faced by the travel and transportation industry Economic instability and uncertainty Difficulty
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationBP8 Citrix Integrations with System Center Configuration Manager 2012
BP8 Citrix Integrations with System Center Configuration Manager 2012 Prasanna Padmanabhan, Manager Product Development, Citrix Systems Inc. Hans Schermer, Senior Systems Engineer, Citrix Systems GmbH
More informationBusiness Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationNATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?
NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? 2014 in Frankfurt am Main DATUM 11.11.2014 SEITE 2 Christian Paul Stobbe Director Strategy Düsseldorf
More informationQuick Start Guide UTM 110/120
Quick Start Guide UTM 110/120 Sophos Access Points Sophos Access Points 1. Preparation Before you begin, please confirm that you have a working Internet connection & make sure you have the following items
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationVisibility and Control for Sanctioned & Unsanctioned Cloud Apps
Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market
More informationHow To Secure Your Mobile Device
BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce
More informationWir stellen uns vor We introduce ourselves
Wir stellen uns vor We introduce ourselves Wir bieten Ihnen ein umfassendes Spektrum an Dienstleistungen in der Nukleartechnik. Dabei setzen wir unsere langjфhrige Erfahrung und unser umfassendes Know-how
More informationCloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest uwelu@microsoft.
Cloud OS Network Die Bedeutung einer Partner Managed Cloud für Kunden. Uwe Lüthy, Partner Technology Strategiest uwelu@microsoft.com Die Cloud Opportunity Definition von Buzzwords Cloud OS Strategie Wichtig
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationApplication Optimization, Visibility and Control for the Hybrid Enterprise
Application Optimization, Visibility and Control for the Hybrid Enterprise Optimierung, Visibilität und Kontrolle in ein einer Welt der Hybrid Enterprise René Bagia Enterprise Sales Executive, Riverbed
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationPortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
More informationBP6 Unified Communications in a virtual desktop. Systems Engineer, Citrix Systems
BP6 Unified Communications in a virtual desktop Hans Schermer Rob Sanders Systems Engineer, Citrix Systems GmbH Systems Engineer, Citrix Systems 2 New ways of communicating Challenges with UC in a virtual
More informationVirtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP
Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationStandard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
More informationJetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden!
NetWorker - Allgemein Tip 642, Seite 1/6 Jetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden! Seit einiger Zeit (NetWorker 8.2.0?) können Sie mit dem Befehl nsradmin -C
More informationMobile device Management mit NAC
Mobile device Management mit NAC fweisel@forescout.com 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal
More informationCloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)
1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support
More informationComparative Market Analysis of Project Management Systems
University of Osnabrück Chair of Business Administration/Organization and Information Systems Prof. Dr. Hoppe (Ed.) Comparative Market Analysis of Project Management Systems Frederik Ahlemann Katharinenstr.
More informationWhile you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationHow To Teach A Software Engineer
Corporate Technology Social Skills für Experten Erfahrungsbericht vom Siemens Curriculum für Senior Architekten / Architekten Matthias Singer Siemens AG Learning Campus Copyright 2010. All rights reserved.
More informationVertrauen in Cloud Dienste schaffen
Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com
More informationCitrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
More information