Principal IT Consultant. Michael Buth IT Consultant Werner Str Dortmund (Germany)
|
|
- Margaret Boyd
- 8 years ago
- Views:
Transcription
1 Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str Dortmund (Germany) in Münster, Germany Study economical informatics Westfälische Wilhelms Universität, Münster (Germany) Tax consultant assistant English (fluently), French (basic skills)
2 Professional experience Michael Buth IT Consultant now Ø IT Consulting Project & Program Management Ø PKI Designer / Architect Ø IT Architecture & Infrastructure Disgn Ø Transition & Out Sourcing Know-How Ø Freelancer Warp Chamber of commerce (IHK Nord Westfalen) now Chamber of commerce Akademie der Wirtschaft der IHK Nord Westfalen IT- System Service Steuerbüro Margot Rittmeier Ø Chief Executive Officer (CEO) Ø Program / Project Management Ø Principal Integrator / Principal IT Consultant Ø Network and System Engineering Ø Member in the board of examiners Certified IT-Manager" / Certified IT Project-Manager / Certified IT Business Manager Ø IT Trainer Ø Network and System Engineering Ø System and Security Administration Ø IT Trainer Ø IT Consultant Ø 2 nd and 3 rd level Support Ø Apprenticeship, tax consultant Ø Network administrator
3 Project experiences CUSTOMER (PERIOD) Schmitz Wortmann Steuerberatungs- GbR ( ) TASKS Ø Analysis an consulting Ø Customizing DNS Ø Customizing Kerio Connect mail server Ø Customizing web server Ø Customizing Active Directory City of Lünen ( ) IHK Nord Westfalen ( ) die Sprachwerkstatt ( ) KG Deutsche Gasrußwerke & Co ( ) Rittmeier Steuerberatung ( ) ID-ware Deutschland ( ) ( ) Ø Consulting Proxy Infrastructure Ø Consulting Bring Your Own Device (BYOD) Ø Analysis and configuration of layer-3 Components (Routen and Switches) Ø Integration of VPN Ø Concept and Integration Active Directory Enterprise Public Key Infrastructure (PKI) Ø Integration of Mobile Devices in 802.1x Wifi Ø Bring Your Own Device (BYOD) concept Ø Firewall integration concept Ø Concept for RADIUS authentication Ø Concept for proxy server integration Ø Concept for kerberos authentication Ø Konzept Kiosk Client Ø Migration VMware ESXi to 5.5 Ø New IT Security concept Ø High Availability Firewall concept Ø Redundant Internet connection concept Ø Kerio Connect Mail Server integration in Active Directory Domain Structure Ø Concept for a Open Source Datacenter Firewalls Ø Concept for Datacenter Active Components Ø Deployment of Open Source Datacenter Firewalls Ø Concept for Client Rollout Ø Concept for Client Deployment Ø Concept for Printer Management Ø Client Deployment Ø Software Deployment
4 ID-ware Deutschland Ø Concept for a Public Key-Infrastructure (PKI) Ø Concept migration network datacenter ( ) Ø Concept network security datacenter Ø Concept Active Directory datacenter Ø Concept VPN-/Firewall-Appliances Ø Migration network datacenter Ø Migration Firewall-/VPN datacenter Ø Migration Cisco router Datacenter Ø Migration Datacenter Mail Server ( ) KfW Bankengruppe Kreditanstalt für Wiederaufbau ( ) KfW Bankengruppe Kreditanstalt für Wiederaufbau ( ) Eurowings ( ) KG Deutsche Gasrußwerke & Co ( ) die Sprachwerkstatt ( ) Ø Concept for moving data center Ø Concept for DNS and Domain Administration Ø Concept for Redundant Network Datacenter Ø Outsourcing Webservices Ø Outsourcing Mailservices Ø Migration VMware ESX Ø Migration Storage System Ø Migration Active Directory Ø Migration VPN-/Firewall-Appliances Ø Deployment Windows 7 Ø Notebook Deployment Windows 7 Ø User Experience Virtualization (UE-V) Ø System Center Configuration Manager (SCCM) Ø Concept for a Public Key-Infrastructure (PKI) Ø Consulting Verwaltungs-PKI (BSI V-PKI) Ø Architecture and design proposals Ø Concept for Codesigning & SSL encryption Ø Processmanagement Ø Implementation of an enterprise PKI Ø Operational Manual Ø Concept for PKI transition Ø Customizing PKI Ø Technologie- and Know-How transfer Ø PKI customizing for advanced SmartCard usage Ø Implementation of proxy-server as central control authorities Ø Virtualization of SQUID
5 printing company Ø Concept Mac OS X Server implementation ( ) Ø Migration Active Directory -> OS X Open Directory Ø Mac OS X Server 10.7 NetBoot, RADIUS 802.1x Wifi & Ethernet Ø Integration of Kerio Connect Mail Server Ø Integration of iphones in 802.1x Wifi Infrastructure Ø Firewall, VPN & Squid Proxy Server KG Deutsche Gasrußwerke & Co ( ) Rittmeier Steuerberatung ( ) ( ) Eurowings Luftverkehrs AG ( ) HighSolutuions AG ( ) DECO LEISURE ( ) IHK Nord Westfalen ( ) Ø Migration Windows Server > Windows Server 2008 R2 Ø Integration of Smart Phones (iphone, Android) in 802.1x Wifi Ø Integration of SmartCard Public Key Infrastructure (PKI) Ø Integration Active Directory Enterprise Public Key Infrastructure (PKI) Ø Integration RADIUS (NPS) 802.1x Wifi Active Directory Infrastructure Ø Integration RADIUS (NPS) 802.1x Wired Access Infrastructure Ø Integration Squid Proxy based on Server Windows Server 2008 R2 with User Auth. Ø Concept for securing conference rooms Ø Concept Migration Windows XP -> Windows 7 64bit Ø Concept Migration Office > Office 2010 Ø VMware ESXi migration from 4.1 to 5.0 Ø Migration Windows Server 2003 to Windows Server 2008 R2 Active Directory Ø Automated deployment of Windows 7 and Office 2010 using Automated Deployment Kit (AIK / WAIK) Ø VMware ESXi migration from 4.1 to 5.0 Ø Integration of iphone (Kerio Connect Mailserver) Ø Integration of Secure (S/MIME) Public Key (PKI) Ø Integration of Windows Server 2008 R2 VPN IPsec network Ø Network analysis Ø Development of scalable future-oriented proposals for network Ø Workshop Windows Server 2008 R2 Ø Workshop Migration Novell NetWare 6 -> Windows Server 2008 R2
6 Ø VMware ESXi migration from 3.5 to Ø Concept Migration Windows XP to Windows 7 64bit Ø Concept Microsoft WDS Roll Out ( ) Steuerberatung Rittmeier ( ) ( ) Ø Server virtualization to VMware ESXi 4.1 Ø Integration of iphone Ø Integration of iphones in 802.1x Wifi Infrastructure Ø Integration of secure Wifi Ø Data center virtualization to VMware ESX Ø Integration of iphone Ø Firewall migration to Cisco ASA Ø Backup concept T-Mobile Deutschland ( ) T-Mobile Deutschland ( ) St. Elisabeth-Hospital Beckum ( ) Kreis Soest ( ) T-Mobile International AG ( ) Fachhochschule Köln ( ) Ø Migration of FTP services to secure web based services Ø Design Proposals Ø Migration Microsoft 2000 Server -> Windows Server 2008 Ø Active Directory Design Proposals Ø Project Management Ø Migration Lotus Notes -> Microsoft Exchange Ø Linux Reverse Proxy Integration -> Active Sync, OWA, Outlook over RPC/HTTPS Ø Integration and maintenance of RSA SecurID Appliance Ø Project Management Ø Design, maintenance and monitoring of CeBIT / Systems platform for mobile devices Ø Integration of RIM Blackberry Ø Integration of Apple iphone Enterprise Infrastructure Ø Maintenance of Check Point firewalls and Cisco VPN-Gateways Ø Maintenance of active network components Ø Integration of Public-Key-Infrastructure (PKI) Ø Design and implementation of network Ø Migration of Windows NT 4.0 network to Microsoft Server 2003 Active Directory
7 Haupt Pharma AG Ø Project Management ( ) Ø Migration of Windows NT 4.0 network to Microsoft Server 2003 Active Directory Ø Implementation of VMware ESX Server Infrastructure Ø Design and implementation of network Ø Integration of Cisco Failover Firewall Cluster Ø Integration of VPN Ø Integration of Squid Proxy Servers (failover) Ø Support for SAP migration project Kreis Soest ( ) T-Mobile Mobile Bussiness Solution ( ) UNITED LABLES AG ( ) Ø Migration of Check Point Firewalls to Cisco Pix Firewalls Ø Integration and maintenance Cisco Failover Firewall Cluster and VPN-Gateways Ø Design and implementation of network and VLANs Ø EIP / SIP Project Ø Design, integration, maintenance of Check Point Nokia Cluster Firewalls Ø Integration and maintenance of active components HP and Cisco Switches, Cisco Routers, VPN- Gateways Ø Integration of VLAN, OSPF Routing Ø Design and integration of DNS Servers Ø Support for Microsoft consultants & developers Ø Maintenance and administration Microsoft ISA Servers Ø Support for Speed Proxy integration Ø Development and integration of external mobile services and integration of needed VPN and security Ø Enterprise customers support integrating VPN and mobile services Ø Design and integration of security concepts Ø Design and integration of Cisco Firewall Appliances Ø Integration of VPN Chamber of commerce IHK Nord Westfalen ( ) Ø Design and implementation of network Ø Design and implementation of intranet & internet Ø Firewall, Proxy, Mail, Web, DNS
8 Competencies COMPETENCE Operating Systems (Computer) Operating Systems (Appliances) Software DESCRIPTION Ø Windows NT, 2000, 2003, 2008, 2012, XP, Vista, 7, 8, 10 Ø UNIX, Linux (RHEL, CentOS, Fedora, SuSE, Debian) Ø SUNOS/Solaris Ø OpenBSD, FreeBSD, NetBSD Ø Novell Netware Ø Mac OS X, Mac OS X Server Ø Cisco Pix, ASA, VPN, IOS Ø Check Point Ø Juniper Ø Netscreen Ø RSA SecurID Ø NOKIA Ø Open source firewall systems Ø Switches: Cisco, HP, Dell etc. Ø Microsoft Server & Products Ø Kerio Connect Mail Server Ø VMware (NAS / SAN) Ø Red Hat Directory Server (LDAP) Ø Apache Ø MySQL Ø Postfix Ø Nagios Ø Squid Ø RADIUS Ø Black Berry Enterprise Server Ø etc
9 Networking & Ø Expert Public Key Infrastructure (PKI) know how Security Skills Ø PGP, S/MIME Soft Skills Ø Expert IP know how Ø Project and process management (ITIL) Ø Architecture- and design Ø Complex IP Network Design Ø Migration and integration Ø Systems and network management and analyses Ø Virtualization Ø Security audits Ø Intrusion prevention Ø Trouble shooting Ø Firewall, VPN Ø VLAN Ø Routing Ø Switching Ø Clustering, load balancing Ø Directory Services Ø LDAP Ø Active Directory Ø GPO Ø 13 years of management experience Ø Professional attitude and appearance Ø Decisive and accountable character Ø Excellent presentation and communication skills Ø Profound experience in transforming marketing requirements and business strategies into technical solution Ø Proven ability to lead teams to deliver in time and budget Ø Visionary thinking and open-minded, innovative intellect Ø Well established contacts Ø Profound knowledge of IT technologies and technical improvements Other Skills Ø Accredited as auditor for the certification of persons to ISO Ø Ausbildereignung (AdA) Ø
kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies
KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
More informationOur Systems Experience, Specifically:
Our Systems Experience, Specifically: This list is not all encompassing; if you are looking for something in particular that is not listed, we hope you please call or email. Windows Server 2003/XP/Vista
More informationOVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
More informationOperating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):
Product Version: Gigasoft Software: Post6.0 Description: This document lists the available operating systems, platforms, and applications specifically tested to be compatible with Ahsay software. Contents:
More informationMANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com
MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM
More informationEvaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
More informationRESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.
RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,
More informationProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
More informationCisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered
More informationAhmed Al-Haffar. Objectives. Experience
Ahmed Al-Haffar Kuwait - Salmiya (+965) 9724-9062 E-mail: ahmed.haffar@hotmail.com Objectives A Microsoft techie & B.E Computer Science Engineer, with MCSA, MCTS, MCITP, Network+ and CCNA with 6 years
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationModule 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.
SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server
More informationWide technical Know-how, Cross-platform engineering and troubleshooting, Administration
Business Partner Summary Sheet Last name external consultant: First name external consultant: Main skill: Dietz Oliver T. Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration
More informationGF Financial Markets I.T. Architecture Role
GF Financial Markets ( GFFM ) is a London-based wholly owned subsidiary of GF Securities, one of China s largest security houses. GFFM is FCA regulated and a Ring Dealing member of the London Metal Exchange.
More informationDeployment Guide. Websense Web Security Websense Web Filter. v7.1
Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States
More informationPCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:
PCISS-1 Job Description: Perform hardware and software installation, configuration, and upgrades Monitoring systems to ensure system availability to all users and performing necessary maintenance to support
More informationHosting topology SMS PASSCODE 2015
Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left
More informationProven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia
Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab
More informationOverVIEW and Property Managed Hosting
MANAGED HOSTING SERVICES OVERVIEW AND PRICING Managed hosting is all about peace of mind and comfort in knowing that infrastructure experts look out for your company s most critical assets at all times.
More informationWhy a Reverse Proxy with My Instant Communicator for mobiles??
Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010 What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all
More informationCisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
More informationSelect IT Consulting Services RFP 11-01 Technical and Network Support Specialist Services (Lot Group C)
Computer/Application Support Specialist Computer/Application Support Specialist 1 Typical Functions: Preferred This function requires business work experience with Windows XP, IT experience, work experience
More informationThe Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
More informationCA Service Desk Manager Release 12.5 Certification Matrix
CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating
More informationSOFTNIX LOGGER Centralized Logs Management
SOFTNIX LOGGER Centralized Logs Management STANDARD, RELIABLE, SECURITY Softnix Logger Our goal is not only regulate data follow by cyber law but also focus on the most significant such as to storage data
More informationCHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING
CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING There are hundreds of managed hosting providers that all claim to offer the best managed hosting. But there are vast differences in terms of their reliability,
More informationACL Compliance Director FAQ
Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...
More informationList of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
More informationMobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
More informationStatus of Open Source and commercial IPv6 firewall implementations
Status of Open Source and commercial IPv6 firewall implementations Dr. Peter Bieringer AERAsec Network Services & Security GmbH info@aerasec.de European Conference on Applied IPv6 (ECAI6) Cologne, Germany
More informationPROFILE: SENIOR SYSTEM ENGINEER
PROFILE: SENIOR SYSTEM ENGINEER HOLISTIC ICT: BRIDGING THE GAP BETWEEN BUSINESS-ORIENTED DEMANDS AND TECHNOLOGY-DRIVEN SOLUTIONS. PERSONAL INFORMATION: PERSONAL: NAME: KOEN JANSSENS NATIONALITY: BELGIAN
More informationReplacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide
Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.
More informationIntroduction to Computer Administration. System Administration
Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration
More informationHow To Get Vpn On A Pc Or Mac Or Ipad Vpn Vpn For Free For Free On A Microsoft Mac Or Pc Or Ipod Or Ipa Or Ipd Or Ipard For Free
Full version is >>> HERE
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationDesigning a Windows Server 2008 Network Infrastructure
Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure
More informationClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
More informationE M P I R E C O L L E G E
34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of
More informationMobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
More informationWorkspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com
More informationSNOW LICENSE MANAGER (8.X)... 4
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS
More informationDiploma in Computer Science
SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer
More informationShipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11c ()... 2 Director Management Console (console
More informationCourse Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
More informationMS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008
MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Description This five-day instructor-led course teaches the features and technologies of Windows Server 2008 and Windows
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationOut-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationUpdating Your Windows Server 2003 Technology Skills to Windows Server 2008
Updating Your Windows Server 2003 Technology Skills to MS6416: 5 Days Course Overview This five-day instructor-led course teaches the features and technologies of and R2 to IT professionals who have specialist
More informationYubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationPhong Dam. Objective. Experience
Phong Dam 8610 Causeway Dr Houston, TX 77083 pddam@newagedev.net Cell: 8328660213 Objective Obtain a challenge position of the dynamic world of information technology in which I can utilize my knowledge
More informationvcloud Automation Center Support Matrix vcloud Automation Center 5.2
vcloud Automation Center Support Matrix vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSymantec App Center 4.0 Admin Documentation
Symantec App Center 4.0 Admin Documentation Installation Planning Guide September 2012 Symantec Corporation, 2012 Page 1 Table of Contents Purpose of Document... 3 Deployment Options Overview... 3 Public
More informationSoftware Requirements, Version 2015_01_12
Software Requirements, Version 2015_01_12 Product / Version DSM 7.2.1 DSM 2013.2 DSM 2014.1 Server Software (EN) Windows Server 2008 R2 Standard, Enterprise, Datacenter, Core (all SP) Windows Server 2008
More informationPulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15
Pulse Policy Secure Supported Platforms Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
More informationMicrosoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435
coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding
More informationRelease Notes. for Kerio Connect 8.0.0
Release Notes for Kerio Connect 8.0.0 Date: December 4, 2012 2012 Kerio Technologies. All rights reserved. 1 Important changes in this version New Kerio Connect client The Kerio Connect webmail interface
More informationWeb Hosting. E-Mail Hosting. Cloud File Hosting. The Genio Group (214) 732-7411 info@thegeniogroup.com www.thegeniogroup.com
Web Hosting E-Mail Hosting Cloud File Hosting Genio Hosting Servers All of Genio s Hosting Servers run on Apple hardware running Mac OS X Server. Mac OS X Server leverages the computing power of 64-bit
More informationn2grate Open Positions March 2015
n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationMCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)
MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the
More informationPROFILE: SENIOR SYSTEM ENGINEER
PROFILE: SENIOR SYSTEM ENGINEER MISSION STATEMENT: TO DECIDE UPON & BRING THE RELEVANT TECHNOLOGIES TO THE BUSINESS WITHOUT LOSING SIGHT OF BOTH BUSINESS NEEDS AND IMPLEMENTATION GOALS. IN OTHER WORDS:
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
More informationConfiguration Audit & Control
The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration
More informationCheck list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01
Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1 Agenda Traditional vs. Modern Cyber Defense แตกต างหร อส งเสร มก นและก น อย างไร? Industry Standard Checklist
More informationITEC 495 Capstone Project Ideas
ITEC 495 Capstone Project Ideas Open Source Content Filtering OpenDNS A 25 person architectural firm with one single location needs to implement a low cost, secure, easy to deploy and administer web content
More informationACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client
ACCREDITED SOLUTION EXPLORER Cisco Systems VPN Client Document Name: EXPLORER Cisco Systems VPN Client Revision: PA2 Introduction: Typical Applications: Product Description: This document describes the
More informationRequest for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
More informationCorporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
More informationSymantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
More informationShipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.02b ()... 2 Director Console (console only)
More informationCourse 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008
Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course
More informationMUHAMMAD USMAN SHARIF
MUHAMMAD USMAN SHARIF CCIE # 47806 (Service Provider) Email-Address : usmanlodhi1001@gmail.com Skype Name : usman_lodhi1001 LinkedIn : https://pk.linkedin.com/in/usmanlodhi1001 Mobile No : 0092-323-4947956
More informationVNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)
VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT mcsa (70-413) Microsoft certified system administrator (designing & implementing server infrasturcure) www.vnlinfotech.com MODULE 1 : Considerations for Upgrades
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationIVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE:
IVAN WINDON - CCENT 5295 S Netherland Way, Centennial, CO 80015 720.258.6311 c https://www.l3pdu.com ivan.windon@l3pdu.com NETWORK / SYSTEMS ADMINISTRATOR Solutions-focused IT professional driven to advance
More informationSophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
More informationCisco WebEx Meetings Server
Data Sheet Cisco WebEx Meetings Server Now you can bring Cisco WebEx conferencing into your company s private cloud, for a cost-effective, secure, and flexible collaboration and communications solution.
More informationTo support all ICT network, telecommunications and network security systems within the Council
JOB DESCRIPTION JOB TITLE: Network Officer SERVICE AREA: ICT LOCATION: As Reasonably Determined JOB NO: SECTION: ICT Technical Services GRADE: G7 SCP s: N/A : PURPOSE OF JOB: To support all ICT network,
More informationVPN_2: Deploying Cisco ASA VPN Solutions
VPN_2: Deploying Cisco ASA VPN Solutions Description Deploying Cisco ASA VPN Solutions (VPN) 2.0 is the latest update to the Cisco Certified VPN Training that aims at providing network security engineers
More information"cv" Saman Khalilian. Certificates. IT Courses Passed. Technical Skills
"cv" Saman Khalilian Certificates MCP, since 6002, MCP ID: 6205062 MCSA on Windows 6006 MCSA: Messaging on Windows 6006 MCSE on Windows 6006 MCSE: Messaging on Windows 6006 MCTS MCITP: Enterprise Administrator
More informationContent Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationDEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1
DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed
More informationecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
More informationCURRICULUM VITAE. Swedish/American (dual citizenships)
CURRICULUM VITAE PERSONAL INFORMATION Name NICO DAVIS Address FURALLÉN 34 218 36 BUNKEFLOSTRAND E-mail Nationality SWEDEN nico@davis.se Date of birth 22 OCTOBER 1971 Microsoft Certified Professional ID
More informationDesigning and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
More informationSINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:
NH204-1314 Designing and Implementing Server Infrastructure 136 Total Hours COURSE TITLE: Designing and Implementing Server Infrastructure COURSE OVERVIEW: After completing this course, students will be
More informationTo participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a
More informationSupported Devices (Event Log Sources)
Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110
More informationClustering in Parallels Virtuozzo-Based Systems
Parallels Clustering in Parallels Virtuozzo-Based Systems Copyright 1999-2009 Parallels Holdings, Ltd. ISBN: N/A Parallels Holdings, Ltd. c/o Parallels Software, Inc. 13755 Sunrise Valley Drive Suite 600
More informationSnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple
More informationBSD Firewalling with pfsense. NYCBSDCon 2010
BSD Firewalling with pfsense and a bit on entrepreneurship and open source NYCBSDCon 2010 Chris Buechler - cmb@pfsense.org pfsense Overview FreeBSD-based firewall distribution tailored for use as a firewall
More information