UAB Cyber Security Ini1a1ve

Size: px
Start display at page:

Download "UAB Cyber Security Ini1a1ve"

Transcription

1 UAB Cyber Security Ini1a1ve

2 Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment Secured Environment

3 MicrosoC System Center Configura1on Manager

4 Campus SCCM Overview

5 Why MicrosoC SCCM? Inventory collec1on for mul1ple OS plahorms Key SCCM Features Asset Intelligence and Inventory Endpoint Protec1on SoCware Update Management Remote Management

6 Establishing a Campus Environment September 2014 Built and Deployed SCCM Environment November 2014 Expanded the SCCM Environment to support campus ini1a1ve December 2014 Department Integra1on & Pilot Kicked Off Current Collec1ng Inventory for Systems

7 Campus SCCM Readiness Criteria General Factors OS Requirements Disk Space Public or NAT IP Addresses SCCM not currently deployed Systems can ini1ate communica1on with SCCM Windows 7 / Windows 2003 or Later Supported versions of Mac / Linux / Unix Systems have 500 MB Free (5 GB Preferred)

8 Campus SCCM Agent Deployment Process Complete Readiness Survey & Address Gaps Submit AskIT Ticket to Par1cipate Determine SCCM Agent Deployment Methods Test SCCM Agent Deployments Deploy SCCM Agents Complete Feedback Survey

9 Campus SCCM Benefits Features and Roadmap

10 MicrosoC SCCM Features Computer Asset Repor1ng Remote Management Managing Virus Protec1on Deploying MicrosoC Updates

11 Campus MicrosoC SCCM Roadmap Applica1on Deployment Opera1ng System Deployment Managing Configura1on Se`ngs Reloca1ng User Profiles

12 Role Based Access Administrators with the same Security Roles are s1ll limited to the objects they can manage by Scope SCCM Security Roles SCCM Security Scopes

13 Assistance and Training UAB IT will partner with you throughout the en1re deployment process and is available to answer any ques1ons you may have. We can provide training videos & addi1onal documenta1on as needed. For professional training, we recommend Quickstart (

14 Pilot Review School of Engineering

15 School of Engineering Environment 31 Servers (Windows, Linux) 420 Desktop Computers (Windows, Mac, Linux) Custom socware & hardware management tool VDI for 300 concurrent desktops

16 Why we chose SCCM? We were invited to par1cipate in the pilot by Interim VP of IT, Jeff Neyland. We wanted a management system that was more off the shelf than custom wrifen. We were looking for efficient use of IT Staff 1me.

17 Our Implementa1on Experience Ini1al mee1ng with SCCM team Comple1on of Readiness Survey Deployed SCCM Client across network via custom script Upgraded An1virus protec1on to Endpoint Created Collec1ons for All ENG machines as well as by Department. Added policies to control which collec1on(s) should be allowed to receive An1virus update, patches, and Remote Control.

18 Current Benefits Able to manage patched and unpatched machines more effec1vely Remote control has been effec1ve when suppor1ng users at different loca1ons across campus Ease of monitoring of An1- virus ac1vity

19 Moving ahead with SCCM Addi1onal Training to unlock and gain knowledge of the full poten1al that SCCM has to offer Applying 3 rd party updates and socware installa1on Suppor1ng installa1on of socware and updates on Macs Crea1ng custom reports

20 Cyber Security Ini1a1ve Next Steps for Campus

21 What is next? Timeline for repor1ng August 14 th repor1ng only August 21 st installing SCCM Scheduling Installa1ons Prepare final report for campus review prior to UA system mandate date

22 Develop Advisory Teams Guidelines for iden1fying and repor1ng sensi1ve data Guidelines for risk mi1ga1on Guidelines for maintaining and adding hardware

23 Together Create Campus Ac1on Plan Iden1fying sensi1ve data Risk mi1ga1on of reported inventory Adop1ng a single SCCM solu1on for the en1re campus

24 Ques1ons?

SUMMIT. November 2010

SUMMIT. November 2010 SUMMIT November 2010 Why Summit? Comprehensive Summit provides a unified approach to IT enterprise management following a prescriptive, ITIL based framework Rapid Deployment Summit is developed for and

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Bacula Open Source Project Bacula Systems (professional support)

Bacula Open Source Project Bacula Systems (professional support) Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

Building your cloud porbolio APS Connect

Building your cloud porbolio APS Connect Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy

More information

Council Monitoring & Assessment Program Development

Council Monitoring & Assessment Program Development Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Parallels Solu+ons for Business Keeping IT in Control of Mac in the Enterprise. Carlos Capó Sr. Manager, Global Business Solu6ons

Parallels Solu+ons for Business Keeping IT in Control of Mac in the Enterprise. Carlos Capó Sr. Manager, Global Business Solu6ons Parallels Solu+ons for Business Keeping IT in Control of Mac in the Enterprise Carlos Capó Sr. Manager, Global Business Solu6ons Leader in Applica6on Accessibility and Mac Enablement Strong Foundation

More information

A Brief Overview of the Mobile App Ecosystem. September 13, 2012

A Brief Overview of the Mobile App Ecosystem. September 13, 2012 A Brief Overview of the Mobile App Ecosystem September 13, 2012 Presenters Pam Dixon, Execu9ve Director, World Privacy Forum Jules Polonetsky, Director and Co- Chair, Future of Privacy Forum Nathan Good,

More information

Capitalize on your carbon management solu4on investment

Capitalize on your carbon management solu4on investment Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net

More information

Five Factors Driving Businesses to Rethink EDI on IBM i

Five Factors Driving Businesses to Rethink EDI on IBM i Simplify and Accelerate e- Business Integra6on Five Factors Driving Businesses to Rethink EDI on IBM i EDI Change Drivers External Loca6ons, Partners, and Services Customers Suppliers / Service Providers

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

UNIFIED, END- TO- END EDISCOVERY

UNIFIED, END- TO- END EDISCOVERY ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin

More information

CFITS Industry Partners

CFITS Industry Partners UNIVERSITY OF SOUTH ALABAMA Les Barnett, Director 2015 CFITS Industry Partners INDUSTRY PARTNER PROGRAM CENTER FOR FORENSICS, INFORMATION TECHNOLOGY, AND SECURITY with the SCHOOL OF COMPUTING INDUSTRY

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage Design considera-ons and Guiding Principles for Implemen-ng Cloud Security William Stearns Security Analyst CloudPassage In a nutshell How do Cloud Servers differ from Data Center Servers? How do the differences

More information

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management

More information

AIS TECHNOLOGY SOLUTIONS GUIDE

AIS TECHNOLOGY SOLUTIONS GUIDE AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World

Discovering Computers Fundamentals, 2010 Edition. Living in a Digital World Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on

More information

SPI/UL Cable Hea.ng Study AUTHOR- FRED DAWSON THE CHEMOURS COMPANY NEC PANEL 16 PRINCIPAL MEMBER

SPI/UL Cable Hea.ng Study AUTHOR- FRED DAWSON THE CHEMOURS COMPANY NEC PANEL 16 PRINCIPAL MEMBER SPI/UL Cable Hea.ng Study AUTHOR- FRED DAWSON THE CHEMOURS COMPANY NEC PANEL 16 PRINCIPAL MEMBER Overview - Increasing power demands - Increasing power creates a poten2al problem - The Na2onal Electrical

More information

Splunk implementa-on. Our experiences throughout the 3 year journey

Splunk implementa-on. Our experiences throughout the 3 year journey Splunk implementa-on Our experiences throughout the 3 year journey About us Harvard University University Network Services Group Serving over 2500 faculty and more than 18,000 students Jim Donn Management

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

Securing Business Informa9on in the Cloud

Securing Business Informa9on in the Cloud Securing Business Informa9on in the Cloud For security and IT pros concerned with protec9ng sensi9ve informa9on across mul9ple endpoints and applica9ons. Explore how cloud can enable us to go back to basics

More information

Cloud Based Tes,ng & Capacity Planning (CloudPerf)

Cloud Based Tes,ng & Capacity Planning (CloudPerf) Cloud Based Tes,ng & Capacity Planning (CloudPerf) Joan A. Smith Emory University Libraries joan.smith@emory.edu Frank Owen Owenworks Inc. frank@owenworks.biz Full presenta,on materials and CloudPerf screencast

More information

Kaseya Fundamentals Workshop DAY ONE

Kaseya Fundamentals Workshop DAY ONE Kaseya Fundamentals Workshop DAY ONE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day One Overview Kaseya System Architecture Workshop LAB environment

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

Establishing Effec/ve Data Governance

Establishing Effec/ve Data Governance Establishing Effec/ve Data Governance Data Quality Council Much of what I say is taken from 2 publica/ons put out by the na/onal Center for Educa/on Sta/s/cs and Na/onal Forum on Educa/on Sta/s/cs Forum

More information

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% Modernizing EDI: How to Cut Your Migra6on Costs by Over 50% EDI Moderniza6on: Before and ABer External Loca;ons, Partners, and Services Customers Suppliers / Service Providers Cloud/SaaS Applica;ons &

More information

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance CON7484 Jeff Savit Senior Technical Product Manager Oracle VM Product Management October 1, 2014 Safe Harbor Statement The following

More information

Cloud Compu?ng & Big Data in Higher Educa?on and Research: African Academic Experience

Cloud Compu?ng & Big Data in Higher Educa?on and Research: African Academic Experience 3 rd SG13 Regional Workshop for Africa on ITU- T Standardiza?on Challenges for Developing Countries Working for a Connected Africa (Livingstone, Zambia, 23-24 February 2015) Cloud Compu?ng & Big Data in

More information

First Na)on Project Management Boot Camp

First Na)on Project Management Boot Camp First Na)on Project Management Boot Camp Links to Learning - Ontario: Building a Sustainable Future Thunder Bay, Ontario What is a Project / Project Management? A project can be defined as a temporary

More information

MTD Keystone s Multiple Service Platforms

MTD Keystone s Multiple Service Platforms MTD s Multiple Service Platforms uses the Microso/ Office pla5orm and is an MS Access applica:on with integra:on to the common Microso/ Office applica:ons, namely Excel, Word, and Outlook. may be installed

More information

Ubuntu, FEAP, and Virtualiza3on. Jonathan Wong Lab Mee3ng 11/08/10

Ubuntu, FEAP, and Virtualiza3on. Jonathan Wong Lab Mee3ng 11/08/10 Ubuntu, FEAP, and Virtualiza3on Jonathan Wong Lab Mee3ng 11/08/10 Mo3va3on Compiling and opera3ng FEAP requires knowledge of Unix/ Posix systems Being comfortable using command- line Naviga3ng the file

More information

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of

More information

Reali9es of Being PCI Compliant

Reali9es of Being PCI Compliant Reali9es of Being PCI Compliant Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, QSA, PA- QSA, ASV Vice President- K3DES LLC Professional Strategies S23 CRISC CGEIT CISM CISA Abstract PCI DSS compliance

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory. Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your

More information

Introduc)on of Pla/orm ISF. Weina Ma Weina.Ma@uoit.ca

Introduc)on of Pla/orm ISF. Weina Ma Weina.Ma@uoit.ca Introduc)on of Pla/orm ISF Weina Ma Weina.Ma@uoit.ca Agenda Pla/orm ISF Product Overview Pla/orm ISF Concepts & Terminologies Self- Service Applica)on Management Applica)on Example Deployment Examples

More information

Selling Hosted MS Exchange 2010 & SharePoint

Selling Hosted MS Exchange 2010 & SharePoint Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market

More information

Cyber Security Initiative UAB Campus SCCM Agent Installation Prerequisite & Deployment Guide. June 2015

Cyber Security Initiative UAB Campus SCCM Agent Installation Prerequisite & Deployment Guide. June 2015 Cyber Security Initiative UAB Campus SCCM Agent Installation Prerequisite & Deployment Guide June 2015 2 Summary This document provides UAB departments and schools with the steps necessary to fully participate

More information

Data Privacy and Data Security in Telemedicine Applica5ons. Patrick Harpes www.monitor it.lu

Data Privacy and Data Security in Telemedicine Applica5ons. Patrick Harpes www.monitor it.lu Data Privacy and Data Security in Telemedicine Applica5ons Patrick Harpes www.monitor it.lu Agenda Right to privacy Data/Informa@on security Data security measures Risks using telemedicine Composi@on of

More information

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into

More information

2014 NSF Cybersecurity Summit: Bro Platform Training Workshop

2014 NSF Cybersecurity Summit: Bro Platform Training Workshop 2014 NSF Cybersecurity Summit: Bro Platform Training Workshop BroCon 2014 The Bro Team Robin Sommer Jus2n Azoff Doris Schiöberg Jeanne:e Dopheide NSF Cybersecurity Summit Aug. 26th, 2014 The NSF Bro Center

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute

More information

Remote Monitoring of Enterprise Systems

Remote Monitoring of Enterprise Systems Remote Monitoring of Enterprise Systems A Step Towards Effec1ve Management of Cloud Based Services Johnson L Fisher, Director, IS Opera5ons May 28, 2015 Agenda Overview Current State Facility and Service

More information

BadUSB On accessories that turn evil

BadUSB On accessories that turn evil BadUSB On accessories that turn evil Karsten Nohl Sascha Krißler Jakob Lell SRLabs Template v12 Demo 1 USB s&ck takes over Windows machine 2 Agenda

More information

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser

Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures

More information

Cloud Compu)ng in Educa)on and Research

Cloud Compu)ng in Educa)on and Research Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research

More information

The True Meaning of the Voice- Enabled Web. Keith R. McFarlane (@krmc)

The True Meaning of the Voice- Enabled Web. Keith R. McFarlane (@krmc) The True Meaning of the Voice- Enabled Web Keith R. McFarlane (@krmc) Agenda Introduc8on WebRTC in the Contact Center LiveOps Browser VoIP Implementa8on Looking Ahead Remember Convergence? The evolution

More information

DDC Sequencing and Redundancy

DDC Sequencing and Redundancy DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system

More information

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015 Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use

More information

IT Asset Management Best Practices Using RFID. Stephen Schwartz

IT Asset Management Best Practices Using RFID. Stephen Schwartz IT Asset Management Best Practices Using RFID Stephen Schwartz 1 Agenda IAITAM Functional Areas ITAM Best Practice Areas for RFID Asset Life Cycle Process Understanding Your Policies & Processes Suggested

More information

Developing a Full- Spectrum Security Training Program

Developing a Full- Spectrum Security Training Program Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Asset Management and Mobile GIS Data Collec6on: Best Prac6ces Using ipads and Tablet Computers

Asset Management and Mobile GIS Data Collec6on: Best Prac6ces Using ipads and Tablet Computers Asset Management and Mobile GIS Data Collec6on: Best Prac6ces Using ipads and Tablet Computers Rob Musci Eric Pescatore pescatoreec@cdmsmith.com January 26, 2015 NEW ENGLAND WATER ENVIRONMENT ASSOCIATION

More information

Enterprise Systems Tech. solutions, strategic persp. and org. considerations. TDEI13, 2014-09- 17 Özgün Imre

Enterprise Systems Tech. solutions, strategic persp. and org. considerations. TDEI13, 2014-09- 17 Özgün Imre Enterprise Systems Tech. solutions, strategic persp. and org. considerations TDEI13, 2014-09- 17 Özgün Imre Agenda Report presenta=ons With candy as reward Literature Discussion Lee, Jinyoul; Keng Siau

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

Reports Analyzing Your Email Performance

Reports Analyzing Your Email Performance Reports Analyzing Your Email Performance Part 2 Robert Sajan UC Berkeley University Rela?ons Web Group Copyright 2010 UC Regents. All rights reserved. Reports Analyzing Your Email Performance Some ques?ons

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Accelerating Application Performance on Virtual Machines

Accelerating Application Performance on Virtual Machines Accelerating Application Performance on Virtual Machines...with flash-based caching in the server Published: August 2011 FlashSoft Corporation 155-A W. Moffett Park Dr Sunnyvale, CA 94089 info@flashsoft.com

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

Licensing++ for Clouds. Mark Perry

Licensing++ for Clouds. Mark Perry Licensing++ for Clouds Mark Perry Plan* 1. Cloud? 2. Survey 3. Some ques@ons 4. Some ideas 5. Some sugges@ons (that would be you) * Plan 9 future events such as these will affect you in the future Clouds

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Virident HGST Leading the Flash Pla6orm Transforma:on March 2014

Virident HGST Leading the Flash Pla6orm Transforma:on March 2014 Virident HGST Leading the Flash Pla6orm Transforma:on March 2014 www.virident.com Storage Technology Division Hard Drive Division Storage Technology Division www.virident.com ENTERPRISE 2014, Virident

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

- Welcome to AdvisorLoans

- Welcome to AdvisorLoans - Welcome to AdvisorLoans AdvsorLoans provides turnkey financing solu6ons in every facet of lending, including SBA. Our expert team is well versed in SBA programs and works in this specialty daily to insure

More information

1. Introduc+on and Background. 2. Service Overview. 3. Your Requirements. Cloud Services so far Feasibility Study Next Steps Procurement, POC

1. Introduc+on and Background. 2. Service Overview. 3. Your Requirements. Cloud Services so far Feasibility Study Next Steps Procurement, POC 1. Introduc+on and Background Cloud Services so far Feasibility Study Next Steps Procurement, POC 2. Service Overview Service Profile The Architecture & principles The Service Features/Characteris+cs 3.

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

Ecommerce Conference Umass Dartmouth April 19, 2013

Ecommerce Conference Umass Dartmouth April 19, 2013 Ecommerce Conference Umass Dartmouth April 19, 2013 As a seminar Special,for all who call and request additional information from 4/19 to 5/30/2013, you will receive: A. Free Consultation no charge to

More information

Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo

Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo Medical Introduc;on Standards 60601-1 in par;cular

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

Virtual Pla*orms Hypervisor Methods to Improve Performance and Isola7on proper7es of Shared Mul7core Servers

Virtual Pla*orms Hypervisor Methods to Improve Performance and Isola7on proper7es of Shared Mul7core Servers Virtual Pla*orms Hypervisor Methods to Improve Performance and Isola7on proper7es of Shared Mul7core Servers Priyanka Tembey Ada Gavrilovska, Karsten Schwan [School of CS, Georgia Tech] 1 Applica7on Consolida7on

More information

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management

More information

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING

DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial

More information

Application of Supply Chain Concepts to the Analysis Process

Application of Supply Chain Concepts to the Analysis Process Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative

More information

We are pleased to offer the following program to Woodstock Area Educators:

We are pleased to offer the following program to Woodstock Area Educators: DATE: Spring 2016 TO: RE: Woodstock Area Educators Upcoming Cohort Programs Presently, many teachers are enrolled in cohort graduate programs through partnerships between local regional offices of education,

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Sophos Ltd. All rights reserved.

Sophos Ltd. All rights reserved. Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to

More information

Everything You Need to Know about Cloud BI. Freek Kamst

Everything You Need to Know about Cloud BI. Freek Kamst Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to

More information

Broadband Success & Struggles in Healthcare

Broadband Success & Struggles in Healthcare Broadband Success & Struggles in Healthcare Broadband is important to providing telehealth in rural healthcare facili9es Telehealth requires reliable broadband connec9on Healthcare facili9es seeing a change

More information

Network Performance Tools

Network Performance Tools Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf

More information

Security Awareness. Top Security Issues. Office of Informa(on Technology Informa5on Security Department 2011-2012 BE CYBER SAFE

Security Awareness. Top Security Issues. Office of Informa(on Technology Informa5on Security Department 2011-2012 BE CYBER SAFE Security Awareness Office of Informa(on Technology Informa5on Security Department 2011-2012 Top Security Issues BE CYBER SAFE 1 Top Security Items for 2011-2012 Passwords Social Networking Phishing Malware,

More information