IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman. and Susan L. Cook WILEY. Wiley Publishing/ Inc.

Size: px
Start display at page:

Download "IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman. and Susan L. Cook WILEY. Wiley Publishing/ Inc."

Transcription

1 IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman and Susan L. Cook WILEY Wiley Publishing/ Inc.

2 Table of Contents»»» #*»* * *«Introduction 7 About This Book 1 Conventions Used in This Book 2 What You're Not to Read 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: Developing the Architecture 3 Part II: Defining the Role of IT Architecture 3 Part III: Creating an Enterprise Culture 3 Part IV: Developing an Extended Network Enterprise 4 Part V: Obtaining Value beyond the Basic Enterprise 4 Part VI: Protecting the Enterprise 4 Part VII: The Part of Tens 4 Icons Used in This Book 4 Where to Go from Here 5 Part h Oei/e(opincf the Architecture 7 Chapter 1: Planning for Enterprise Realignment.9 Defining an Enterprise 9 Finding the Best Solution 10 Providing Leadership 10 In the Traditional Enterprise, Everything May Be Independent 11 Too many resource silos 12 Too many platforms 12 Too many people with root access 13 In the Modern Enterprise, Everything Is Connected 13 Defining Success 14 Using Maturity Models 15 Preventing Failure 15 Chapter 2: Exploring Tasks, Roles, and Tools 17 Examining Common Enterprise Architecture Tasks 17 Identifying data requirements 18 Integrating existing resources 18 Defining technical standards 18 Justifying changes 19 Communicating effectively 19

3 or IT Architecture For Dummies Knowing the Roles of Enterprise Architecture 20 Chief architect 20 Lead architect 21 Technology architect 21 Software or application architect 21 Business architect 22 Data architect 22 Using the Right Tool for the Right Job 23 IT governance 24 Enterprise architecture frameworks 25 Project management 27 Chapter 3: Pondering Platform Pros and Cons 29 Standardizing Your Platform Not 29 Recognizing the benefits of standardization 30 Overcoming challenges in standardization 31 Making the Hard Software Choice: Open Source or Closed Source 33 Open source 34 Closed source 36 Working with Open Standards 38 Looking Past Specifications to Business Needs 39 Part 11: Defining the Me of U Architecture b 1 Chapter 4: Reducing Complexity through Standardization and Consolidation 43 Recognizing Complexity in the Enterprise 43 Common sources of complexity 44 Complications of complexity 46 Planning for Consolidation 47 Applying the 80/20 rule 48 Finding value 49 Planning for technology end of life 49 Maintaining the help desk 51 Consolidating skills 51 Addressing Concerns about Standardization 53 Reduced functionality 53 Decreased productivity 54 Incompatibility with existing applications 54 Risk of technology monoculture 55 Preparing for opposition 55

4 Table of Contents xln Consolidating the Data Center 56 Identifying the benefits 57 Reducing complexity through virtualization 59 Implementing desirable redundancy 60 Planning the centralized facility 61 Automating the Data Center 61 Patches and updates 62 Image-based deployment 62 Backup solutions 63 Chapter 5: Planning Enterprise Information Security 65 Protecting Enterprise Data 66 Creating a Security Plan 67 Design a workable program 68 Use a layered framework 68 Implement security standards 70 View security as a program, not as a project 71 Keep security simple 71 Developing a Security Policy 72 Classifying data to be secured 72 Addressing basic security elements 72 Getting management approval 74 Maintaining the policy 74 Training employees 75 Using Technology to Support Security Operations 75 Use collaborative technologies 76 Remain flexible 77 Plan for partner relationships 77 Outsource only when necessary 78 Chapter 6: Complying with Mandates and Managing Risk 81 Keeping Your Company Compliant 81 Legal mandates that affect the organization 82 Discovery and retention 83 Additional requirements 83 Planning to Manage Risk 84 Identifying threats 84 Identifying vulnerabilities..86 Assessing risk 87 Addressing Risk 89 Prioritizing threats 89 Reducing probability 90 Reducing impact 91 Choosing appropriate mitigations 92

5 IT Architecture For Dummies Part 111: Creating an Enterprise Culture 93 Chapter 7: Developing Identity and Access Management Strategies 95 Introducing Identity and Access Management (IAM) 95 Identifying Users 96 Something users know: Password 97 Something users have: Access token 98 Something users are: Biometric identification 99 Something users do: Behavioral identification 101 Authenticating Users 102 Authentication standards 102 Directory 103 Central authentication 103 Federated authentication 104 Single sign-on 104 Cross-realm authentication 105 Authorizing Access 106 File and database rights 106 Service rights 107 Application rights 107 Creating an Identity Management Strategy 108 Reviewing technologies 108 Assigning aggregate rights 108 Meeting legal requirements 108 Keeping it simple 109 Finding benefits 109 Implementing an Identity Management Solution 110 Identification 110 Authentication 110 Authorization Additional functions Chapter 8: Developing a Network Culture through Collaboration Solutions 113 Establishing Networks of Trust 113 Creating a team from a mob 114 Developing strong lines of communication 115 Calculating the value of networks with Metcalfe's Law 115 Developing Network Culture through Social Media 116 Using social networking 117 Employing collective intelligence 118 Setting social-media policies 119 Employing Groupware 120 Considering the benefits of groupware 120 Selecting a groupware solution 121 Ill Ill

6 Table of Contents Working with Enterprise Portals 123 Activating common features of portals 123 Developing network culture with portals 126 Integrating business intelligence tools 126 Chapter 9: Reviewing Communication Methods 127 Identifying Classes of Communication 127 Messaging 128 Chat 128 Electronic mail ( ) 129 Instant messaging 131 Text messaging 132 Community Sites 132 Blogs 133 Discussion boards and forums 133 Wikis 134 Conferencing 135 Videoconferencing 135 Virtual reality 136 Voice over Internet protocol (VoIP) 137 Web conferencing 137 Broadcast Communications 138 Podcasting 139 Really Simple Syndication (RSS) 139 Streaming media 140 Part IV: betieiopinq an Extended NetWork Enterprise... HI Chapter 10: Managing Data Storage 143 Determining Storage Requirements 143 Conducting a storage survey 144 Interviewing personnel 145 Identifying Important Data Categories 145 File repositories 145 File versioning 146 Databases 146 Multimedia Logging 148 Virtual servers 149 Creating a Storage Policy 149 Addressing specific storage topics 150 Distributing the policy 151

7 IT Architecture For Dummies Designing a Storage System 152 Selecting appropriate storage configurations 152 Exploring enterprise-level storage strategies 153 Dealing with expanding storage needs 155 Protecting Stored Data 157 Fault tolerance 158 Backup and recovery 158 Data removal 159 Chapter 11: Managing Application Development 163 Exploring the Software Development Life Cycle 164 Waterfall 165 Prototype 166 Spiral 167 Rapid Application Development Strategies 168 Agile programming 169 Extreme programming 170 Scrum programming 170 Designing Application Architecture 171 Multitiered architecture 171 Service-oriented architecture 172 Including Accessibility 173 Chapter 12: Planning for the Mobile Enterprise 175 Introducing Mobile Computing 175 Laptops 176 Netbooks 176 Tablets 176 Cell phones 177 Bluetooth 177 Long-range wireless 177 Exploring Mobile Computing in the Enterprise 178 Device interaction 179 Boosters and dead zones 179 Going Mobile beyond the Enterprise 182 Navigation 182 Connectivity and bandwidth 183 VPN and SSL access 183 Remote desktops 184 Power 184 Planning for SmartPhone Computing 186 Familiarity 186 Planning ahead 186 Device locking 187 On-device encryption 187 Kill pills 188 Laptop LoJack 188

8 Table of Contents Defining Mobile Access Policy 189 Mobile computing policies 190 Remote access policies 190 Wireless use policies 191 Part V: Obtaining Value beyond the Basic Enterprise 193 Chapter 13: Virtualizing Enterprise Systems 195 Getting the Scoop on Virtualization Technology 196 Virtualizing Servers 197 Hosting virtual machines 198 Separating hardware and software tech refresh planning 199 Emerging best practices 200 Virtualizing Workstations 201 Using thin and thick clients 202 Virtual desktops 202 Remote desktops 203 Client hosting 203 Virtualizing Applications 203 Cloud Computing 204 Private clouds 205 Best practices 205 Chapter 14: Facilitating High-Performance Computing 207 Supercomputers Rule the World 207 Desktop computing 208 Parallel computing 210 Distributed computing 210 Everyday High-Performance Computing 211 Computing clusters 212 Visualization clusters 214 Grid computing 215 Volunteer computing 216 Compute farms 217 Desktop High-Performance Computing 217 Chapter 15: Enabling Green IT 219 Practicing Green Technology 219 Extended replacement cycles 220 Telework and telecommuting 220 Data center location 220 Energy tax credits 221 ENERGY STAR 221 Considering Alternative Energy 222 Reducing Consumables 223

9 IT Architecture For Dummies Selecting Green Hardware 224 Configuring Green Settings 225 Virtualizing Hardware 226 Ensuring Green Disposal 226 Part VI: Protecting the Enterprise 229 Chapter 16: Planning Technology Updates 231 Reviewing Hardware Update Strategies 231 Keeping systems until they fail 232 Using defined replacement cycles 232 Riding the cutting edge 236 Employing trickle-down replacement 237 Relying on surplus technology 238 Using technology as a reward 238 Replacing technology in an ad-hoc manner 239 Planning for Sub-System Updates 240 Upgrading components 240 Updating firmware 241 Updating device drivers 241 Planning Software Updates 242 Understanding the need for testing 242 Exploring deployment strategies 243 Planning for software maintenance 245 Chapter 17: Planning Security Strategies 247 Identifying Threats to the Enterprise 247 Malware 247 Application vulnerabilities 249 Directed network attacks 250 Selecting Appropriate Countermeasures 250 Malware protection 250 Secure application development 251 Data loss prevention 251 Encryption 252 Firewalls 254 Intrusion detection and prevention 256 Network address translation 257 Network monitoring 260 Chapter 18: Planning Business Continuity and Disaster Recovery 261 Defining Business Continuity and Disaster Recovery 261 Keeping Your Business in Business: Continuity Planning 262 Participating in a business impact analysis 262 Participating in risk assessment 264

10 Table of Contents Preparing a Recovery Plan 264 Developing scenarios 264 Incorporating virtualization strategies 265 Testing the plan 267 Updating the plan 267 Using Alternative Sites 268 Selecting the right type of site 268 Managing the alternative site 269 Communicating During a Disaster 270 Part (/ll: The Part of Tens. 273 Chapter 19: Ten Challenges for Redesigning an Existing Enterprise 275 Dealing with Lack of Executive Support 275 Handling Opposition to Change 276 Deciding on a Platform: Open Source versus Closed Source/Commercial Off-the-Shelf 276 Eliminating Resource Silos 277 Integrating Legacy Systems 277 When Change Doesn't Happen Fast Enough 278 Maintaining Compliance throughout the Process 278 Dealing with Separate Revenue Streams 279 Supporting Personally Owned Equipment 279 Know Your Limits 280 Chapter 20: Ten "Low-Hanging Fruit" Opportunities 281 Eliminate Resource Silos 281 Standardize the Workstation Environment 282 Create a Centralized Data Center 282 Consolidate Resources Already Within the Data Center 283 Implement Automated Update/Patch Management Solutions 283 Implement Enterprise-Level Anti-Malware Solutions 284 Use Risk Assessment Results to Find Easily Fixed Vulnerabilities 285 Schedule Workstation Replacement 285 Implement Virtualization 286 Reduce Cost from Consumables by Implementing Green IT Practices 286 Glossary 289 Index 313

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Wiley Publishing, Inc.

Wiley Publishing, Inc. by Tony Bradle Foreword by Eric Swift General Manager, Unified Communications, Microsoft Corporation WILEY Wiley Publishing, Inc. Table of Contents O O O O O» @ O O O «O #» O O * O O O O O O O O O 0 O»

More information

CXA 204 1I Basic Administration for Citrix XenApp 6

CXA 204 1I Basic Administration for Citrix XenApp 6 COURSE DESCRIPTION CXA 204 1I Basic Administration for Citrix XenApp 6 Basic Administration for Citrix XenApp 6 training course provides the foundation necessary for administrators to effectively centralize

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Core Data Service 2015 IT Domain Definition Change Overview

Core Data Service 2015 IT Domain Definition Change Overview Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

End-to-End Infrastructure Solutions

End-to-End Infrastructure Solutions End-to-End Infrastructure Solutions Thakral One www.thakralone.com www.thakralone.com 1 Agenda 1 2 3 Maximizing Infrastructure Investments End-to-End Infrastructure Solutions Thakral One and Our Value

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

David.Balka@chi.frb.org 2009 STREAM FRBC

David.Balka@chi.frb.org 2009 STREAM FRBC Virtualization ti Dave Balka David.Balka@chi.frb.org Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results. MANAGED SERVICES PROVIDER Dynamic Solutions. Superior Results. REVOLUTIONIZE YOUR INSTITUTION BY FULLY LEVERAGING THE BENEFITS OF TECHNOLOGY MAXIMIZE YOUR TECHNOLOGY INVESTMENTS ENHANCE SECURITY OF YOUR

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP

COMLINK Cloud Technical Specification Guide CLOUD DESKTOP COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop

More information

Virtual Desktop Management Using Sychron Habitats to Virtualize Your Desktops

Virtual Desktop Management Using Sychron Habitats to Virtualize Your Desktops Virtual Desktop Management Using Sychron Habitats to Virtualize Your Desktops 0BThe Problem with Enterprise Desktop Delivery The enterprise is increasingly challenged by the proliferation of PCs, laptops,

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

Before taking this course, Citrix recommends that learners have the following:

Before taking this course, Citrix recommends that learners have the following: Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

Citrix Desktop Virtualization Fast Track

Citrix Desktop Virtualization Fast Track Citrix Desktop Virtualization Fast Track Description: Days: 5 Prerequisites: This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications

More information

Texas Transportation Institute Information Resources Strategic Plan 2012 2016

Texas Transportation Institute Information Resources Strategic Plan 2012 2016 Texas Transportation Institute Information Resources Strategic Plan 2012 2016 June 2012 Information Resources Strategic Plan 2012 2016 Texas Transportation Institute The Texas A&M University System The

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led

Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Course Description Basic Administration for Citrix XenApp 6.5 training course provides the foundation necessary for administrators

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Citrix XenApp 6.5 Administration

Citrix XenApp 6.5 Administration Presentation Style: Duration: Tutor-led Classroom 5 Days Course Start Time: 09:30hrs Course End Time: 16:30hrs Citrix XenApp 6.5 Basic Administration training course provides the foundation necessary for

More information

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

CMB 207 1I Citrix XenApp and XenDesktop Fast Track CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012 Teleworking Technology Guide and Checklist UW Information Technology November 2012 1 Contents Teleworking Technology Guide for UW Faculty and Staff... 3 UW Information Technology Service Catalog and IT

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Your complete guide to Cloud Computing

Your complete guide to Cloud Computing Your complete guide to Cloud Computing 1 Doc V1.0 Dec 2013 Table of Contents Hosted Desk- 3 The Cloud and Cloud Computing... 4 The benefits of Cloud Solutions 6 The Cloud is Growing - Rapidly 7 Resolving

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people

More information

Computer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes

Computer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes Unit 9: Computer Networks Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose R/601/7320 BTEC National The aim of this unit is to ensure learners understand the key components

More information

Deployment Topologies - DPAdmin An isoagroup Product

Deployment Topologies - DPAdmin An isoagroup Product Deployment Topologies - DPAdmin An isoagroup Product Author: Sinu Sekhar Revision History Date Version Description Author 10/24/2010 1.0 Initial version Sinu Sekhar 1. DPAdmin and DataPower Deployment

More information

VVC Technology & Information Resources Catalog of Services

VVC Technology & Information Resources Catalog of Services 1. Information Technology a. Accounts i. Account Management (1) Credential Management (a) Your IT Department manages system credentials on all systems excepting Financial 2000, SnowWhite, Charming and

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

Why a Reverse Proxy with My Instant Communicator for mobiles??

Why a Reverse Proxy with My Instant Communicator for mobiles?? Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010 What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all

More information

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Length: 3 Days Audience(s): IT Professionals Level: 400 Technology: Windows Server 2008 Type: Course Delivery Method: Instructor-led

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

City of Coral Gables

City of Coral Gables City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:

More information

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days)

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) www.peaksolutions.com 6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) Introduction This course will prepare IT professionals for the role of Enterprise Administrator. Students

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4 Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

How To Secure A Remote Worker Network

How To Secure A Remote Worker Network Key Steps to a Secure Remote Workforce Telecommuting benefits the employee and the company, the community and the environment. With the right security measures in place, there s no need to delay in creating

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Private Cloud. One solution managed by Applied

Private Cloud. One solution managed by Applied Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Welcome to Remote Access Services (RAS)

Welcome to Remote Access Services (RAS) Welcome to Remote Access Services (RAS) Our goal is to provide you with seamless access to the TD network, including the TD intranet site, your applications and files, and other important work resources

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect

Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies Terry Lewis Solutions Architect Today s discussion Technology Drivers Desktop and Application Delivery Complexity Which

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information

More information

How To Protect Your Online Backup From Being Hacked

How To Protect Your Online Backup From Being Hacked Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup

More information

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day 70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

PART I: The Pros and Cons of Public Cloud Computing

PART I: The Pros and Cons of Public Cloud Computing PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored

More information

White Paper A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS. Executive Summary

White Paper A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS. Executive Summary A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS Executive Summary Using the same technology that moves data, text and images around the global Internet,

More information

Hedge Funds & the Cloud: The Pros, Cons and Considerations

Hedge Funds & the Cloud: The Pros, Cons and Considerations Hedge Funds & the Cloud: The Pros, Cons and Considerations By Mary Beth Hamilton, Director of Marketing, Eze Castle Integration The increased use of cloud-based services is undeniable. Analyst firm Forrester

More information

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS SMG 1117.2111 FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS OFFICE OF INFORMATION MANAGEMENT AND TECHNOLOGY OFFICE OF INFORMATION MANAGEMENT

More information

Microsoft SharePoint 2010 Administration

Microsoft SharePoint 2010 Administration Microsoft SharePoint 2010 Administration Real-World Skills for MCITP Certification and Beyond Tom Carpenter James Pyles WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning the Logical

More information

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE Duration 5 Days Course Outline Module 1: Designing IIS Web Farms The students will learn the process of designing IIS Web Farms with

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Eleventh Hour Security+

Eleventh Hour Security+ Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Going Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager!

Going Hybrid. The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager! Going Hybrid The first step to your! Enterprise Cloud journey! Eric Sansonny General Manager! About Aruba! Few figures! About Aruba! Few figures! 2 million customers! About Aruba! Few figures! 600 people!

More information

Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM

Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM Introduction to Virtualization Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM 1 Data Center Transformation 2 Scope of Virtualization Services 3 Virtualization Evolution 4

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

UC & C Success Requires a Services Lead Approach

UC & C Success Requires a Services Lead Approach UC & C Success Requires a Services Lead Approach Presented by Zeus Kerravala Principal Analyst 2014 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Business Climate is Changing Technology Solution

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information