Application Security Architecture: Timing & Requirements Getting It Right and On Time
|
|
|
- Amos Page
- 10 years ago
- Views:
Transcription
1 Application Security Architecture: Timing & Requirements Getting It Right and On Time Brian V. Cummings Tata Consultancy Services Thursday, March 15, 2012 Session 10187
2 Why? Security is to Application Development as Truth is to a Court of Law: It is usually the last thing to come to the room, and has to be dragged in by its heels, kicking and screaming in protest! Lawyer whose name I have long forgotten 1
3 Often a Thorny, Unresolved Issue 2
4 A recent (horror) Story Query from a Project Lead: Lead: Brian, when is the best time in a development project to talk to Security? Brian (to self): OMG!!! Brian (to Lead): What are you building and how far along are you. Lead: A Procurement Web Portal for the company s vendors. We begin testing in a few weeks. Brian (to Lead): The answer is At the start of the project! The one that finally prompted this presentation 3
5 Another Recent Story Request from a Project Lead: Lead: Brian, we are going live with this Web Portal in three months. We need you to help us document security and disaster recovery procedures Brian: What security and disaster recovery provisions have been made? Lead: Not much, but we need the procedures! Brian (to Lead): The answer is At the start of the project! They simply don t know how much they don t know! 4
6 Still Another Recent Story Dismissal from a Project Lead: Security Architect to Lead: What provisions are you making for security? How can I help you? We need to make sure your security architecture is consistent with our standards. Lead to Security Architect: We believe we can implement this Web Portal with a minimum of security. You don t need to worry about it! (The above in one of the world s largest financial institutions). 5 What? Me? Worry? Really?
7 Outsourcing your Application Development? Quality Assessor to Project Lead: Quality Guy: Who from the client is engaged in coordinating their requirements for risk, security, compliance, and continuity? Lead to Quality Guy Umm they have not been involved. Quality Guy: Did we seek them out and they declined? Did they seek us out and we declined? Lead: Umm, no, neither. What s wrong with this picture? 6
8 The End Result (Just Desserts) Inadequate Security Incompatible Architecture Need to Retrofit Cost and/or Vulnerability and/or Growth Limitations 7
9 OK, Wiseguy What s the Answer? 8
10 1. Frameworks & Standards Secure App Dev Framework (SABSA) Architecture Framework (TOGAF) Site Relevant Secure App Dev Standards Foundations 9
11 1A. TOGAF Security Architecture Authentication & Authorization Risk Management, Assurance, Audit Asset Protection Availability Administration 10
12 1A1. TOGAF Security Architecture Phases Business Requirements Architecture Vision Business Architecture Information Systems Architecture Technology Architecture Opportunities & Solutions Migration Planning Implementation Governance Architecture Change Management 11
13 1B. SABSA Secure Application Development 12
14 1B1. SABSA Security Matrix 13
15 1C1. Site Relevant Process & Standards 14
16 1C2. Site Relevant Process & Standards 15
17 2. Security Architecture Governance Enterprise Security Architecture Architectural Review/Guidance Security Governance Thought Leadership / Direction Application Security CoE IT Risk/Compliance Management Compliance Assurance Security Assessment / Compliance Audit Process Excellence Training & Awareness 16
18 3. Application Security Risk Management 17
19 3a. Application Security Risk Management 18 Risk Tier Applicability Security Extreme Risk High Risk Moderate Risk Internet facing transactional applications, especially of a financial nature. Applications that handle financial data; privacy regulated data; intellectual property; company sensitive or restricted data. Internet facing or not. Other core business applications; non-transactional Internet facing apps Strongest identification, authentication, access control, PKI encryption vs SSL, storage encryption. Continuous vulnerability testing. Strong identity authentication, access control, SSL, storage encryption, and standard vulnerability testing. Baseline security controls Low Risk All others Baseline security controls
20 4. Application Project Security Architects 19
21 4a. A More Whimsical Diagram 20
22 5. Security Architect as a Consultant Do This! Not This! 21
23 The CISO s Challenge Balancing Protection, Compliance, Enablement, Productivity, Profitability Business Enablement Increase employee and enterprise productivity and time to market Automated Identity & Access Role-Based Access Automated monitoring and alerts Automated compliance validation Facilitate business agility CISO Value Proposition InfoRisk/Security Effectiveness Optimize Information risk and security programs Alignment with business environment and business goals and objectives Vision and strategy aligned with risk Solutions balanced across risks and investment focused on greatest risks Optimize Risk & Security Investment Balance investment to risk Increase capacity and coverage with current staff Increase quality of security management Reduce relative Security TCO 22 Achieving Secure Business Success & Profitability Few endeavors in an enterprise can enable or impair its mission to the extent as can its information risk and security program.
24 Summary of Better Practices for Application Security Architecture Adopt the TOGAF and SABSA frameworks Establish IT Security Architecture Governance Establish Application Risk Management Require Project Security Architects Be a Consultant, not an Enforcer 23
25 The End! Thank you! 24 The Minions of Despicable Me
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Vendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
Microsoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
Cloud Roadmap to Success. October, 2014
Cloud Roadmap to Success October, 2014 Catapult Systems & Level 3 Today s Presenters [email protected] [email protected] What is the Cloud Technology trends: driving cloud adoption
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
SIEM just another acronym? What is it Why Advanced Persistent Threats (APTs) Audit Objectives Audit Program
Security Information and Event Management (SIEM) Audit Kevin Savoy Audit Director Strategic Risk Management SIEM just another acronym? What is it Why Advanced Persistent Threats (APTs) Audit Objectives
<Insert Picture Here> How to protect sensitive data, challenges & risks
How to protect sensitive data, challenges & risks Lars Klumpes CISSP Security Strategy Consultant EMEA Disclaimer The following is intended to outline our general product direction.
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
SECURITY AND RISK MANAGEMENT
SECURITY AND RISK MANAGEMENT IN AGILE SOFTWARE DEVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12 #WHOAMI Security Architect @ Financial Services Organization Location:
Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments
Running Mission-Critical Enterprise Applications in Private and Hybrid Cloud Environments Working in Partnership Today s Presenters Working in Partnership Paul Calvert IT Services Solution Line Director
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Enterprise Security Architecture Concepts and Practice
Enterprise Architecture Concepts and Practice Jim Whitmore [email protected] Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
An Evaluation Framework for Selecting an Enterprise Cloud Provider
An Evaluation Framework for Selecting an Enterprise Cloud Provider WHITE PAPER This White Paper is intended for senior IT leaders of global enterprises considering a new cloud solution or expanding an
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
WEB Penetration Testing
FTA Annual Conference WEB Penetration Testing and Vulnerability Analysis June 10, 2008 Timothy R. Blevins, KDOR Chief Information Officer 1 WEB Penetration Testing What is WEB Penetration Testing? When
Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015
Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Cloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
Enterprise Security Architecture
Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Mid-Office On-Demand. iqcx Overview. Presented by Ron Childress
Mid-Office On-Demand iqcx Overview Presented by Ron Childress Presentation Objectives Definitions and Terminology Corporate Considerations Total Cost of Ownership (TCO) Considerations iqcx Re-engineering
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased
Growth Through Excellence
Growth Through Excellence Public/Private Cloud Services Service Definition Document G- Cloud 5 REFERENCE NUMBER RM1557v Table of Contents Table of Contents... 3 Executive Summary... 4 About the Company...
Migrating to the Cloud. Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services
Migrating to the Cloud Developing the right Cloud strategy and minimising migration risk with Logicalis Cloud Services Organisations are looking for new ways to deliver IT services and demanding that ICT
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific
Realizing the Benefits of Hybrid Cloud Anand MS Cloud Solutions Architect Microsoft Asia Pacific Agenda Key drivers for Hybrid Cloud Unified Cloud Strategy Example Use Cases How to get there Hybrid Cloud:
KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT
1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT About Kyle Lai 2 Kyle Lai, CIPP/G/US, CISSP, CISA, CSSLP, BSI Cert. ISO 27001 LA President of KLC Consulting, Inc. Over 20 years in IT and Security Security
Building Reference Security Architecture
Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect Information Security Too many organizations still
Can Cloud Database PaaS Solutions Replace In-House Systems?
Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Mobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
Using Managed Services As A Software Delivery Model In Canadian Health Care
Using Managed Services As A Software Delivery Model In Canadian Health Care September 9, 2005 Authors: Darren Jones Darcy Matras INTRODUCTION... 3 MANAGED SERVICES DEFINED... 4 MANAGED SERVICES OVERVIEW...
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Presentation to House Committee on Technology: HHS System Identity & Access Management
Presentation to House Committee on Technology: HHS System Identity & Access Management Bowden Hight Deputy Executive Commissioner Information Technology Services Health and Human Services Commission May
ASU Web Application Security Standard
ASU Web Application Security Standard Spring 2014 2 1 PURPOSE This standard seeks to improve the security of ASU Web applications by addressing the following: Threat modeling and security testing Web application
Explore the Possibilities
Explore the Possibilities 2013 HR Service Delivery Forum Best Practices in Data Management: Creating a Sustainable and Robust Repository for Reporting and Insights 2013 Towers Watson. All rights reserved.
Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, 2015. Brian Grayek CISSP, CCSK, ITILv3
Cloud Security Are you on the train or the tracks? ISSA CISO Executive Forum April 18, 2015 Brian Grayek CISSP, CCSK, ITILv3 1 Agenda: Facts Opinions (based on experience) A little humor Some gold nuggets
Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management
Ipanema Technologies: A True Synergy Between WAN Optimization and Application Performance Management Introduction When WAN optimization technologies were first introduced to the market, solution providers
Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
Third Party Security: Are your vendors compromising the security of your Agency?
Third Party Security: Are your vendors compromising the security of your Agency? Wendy Nather, Texas Education Agency Michael Wyatt, Deloitte & Touche LLP TASSCC Annual Conference 3 August 2010 Agenda
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Moving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING
CLOUD 401: NAVIGATING ADVANCED TOPICS IN CLOUD COMPUTING Introduction The cloud market has matured, and many IT professionals are exploring advanced topics in cloud architecture and deployment, covering
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014
CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Developing Business Architecture with TOGAF
Developing Business Architecture with TOGAF Building Business Capability 2013 Las Vegas, NV Armstrong Process Group, Inc. www.aprocessgroup.com Objectives Introduce The Open Group Architecture Framework
(Dev + Ops) ITSM = Calamity
(Dev + Ops) ITSM = Calamity Randy Steinberg [email protected] DevOps Defined A cultural and professional movement that stresses communication, collaboration, and integration between software developers,
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations
The Business Case for Cloud: Critical Legal, Business & Diligence Considerations Presented by Janine Anthony Bowen, Esq., CIPP/US [email protected] (678) 823-6611 Janine Anthony Bowen, Esq., CIPP/US
Enterprise Cloud Solutions
IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,
Data Center Consolidation in the Federal Government Looking beyond the technology
Data Center Consolidation in the Federal Government Looking beyond the technology Overview The reported number of Federal data centers grew from 432 in 1998 to 2,094 in 2010 1, an increase that is costly,
Client Requirement. Why SharePoint
Client Requirement Client wanted a sharepoint system that could meet their document and record management needs. It should also improve client s information management systems. To support existing and
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Professional Cloud Solutions and Service Practices
Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
Selecting the right Cloud. Three steps for determining the most appropriate Cloud strategy
Selecting the right Cloud Three steps for determining the most appropriate Cloud strategy Selecting the most appropriate cloud model can be a challenging process for organisations and IT executives tasked
1. From the CIO 3. 2. Strategic Direction for Cloud Computing at Kent State 4. 3. Cloud Computing at Kent State University 5
Kent State University ss Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology
