Storage Virtualization: Capacity: Virtual Storage Allocated: 2,030TB. Network Storage Allocated: 61TB. Backup Service Customer Data: 870TB.
|
|
|
- Tracy Holmes
- 10 years ago
- Views:
Transcription
1 IT Optimization Progress to Date June Single Platform Over 60,000 accounts in service Migrated over 50,000 mailboxes from 87 agencies, boards/commissions. JFS completing Transition Planning and will be migrating state employees through the September timeframe. SOCC Remediation - Complete Increased the power capacity for the building; Added an additional protected power system; Increased emergency power capacity; Added three new diesel generators to the infrastructure support system; Constructed a new generator building to house up to five generators; Created a way to add fuel during an emergency situation without shutting down the generators; and Remediated one floor to provide an additional 70,000 square feet of data center space. Consolidated State computing assets to the 2 nd floor Repurposed 3 rd floor to provide co-location services to education (k-12 & higher education) and local government entities. Agency Server Migrations - Migrated the following agencies into the Private Cloud environment: Facility Construction Commission (33 Servers) Department of Health (273 Servers) Department of Natural Resources (103 Servers) Office of Budget Management (88 Servers) Mental Health and Addiction Services (225 Servers) Development Services Agency (4 Servers) Department of Transportation (389 Servers) Department of Education (217 Servers) Department of Youth Services (94 Servers) Department of Rehabilitation and Correction (69 Servers) EPA for Identity Consumption (1,300 Desktops) Virtual Servers: Capacity: VMWare: Currently have capacity for ~3,000 images. As we incorporate agency hardware that number will grow. Continue right Sizing of the VMWare Environment Progress: VMware: We nearly quadrupled our number of VM Images from 579 to 2127 images. AIX: Deployed an additional 16 Virtual LPAR s
2 Storage Virtualization: Capacity: Virtual Storage Allocated: 2,030TB. Network Storage Allocated: 61TB. Backup Service Customer Data: 870TB. Progress: Virtual Storage: Migrated 220TB of production BWC storage at William Green building to State of Ohio Private Cloud Storage Service. Network Storage: Started provisioning Network Storage service with TAX STARS project being the first customer with ~60TB migrated in. Backup Storage: Added 63TB of backup customer data through consolidations. Identity Domain: Created an Identity Domain for consumption of shared solutions and services Created a Child Identity Domain for Cloud Migrations Migrated 1 Agency for desktop consumption Migrated 12 agencies for , SharePoint and Lync Consumption Customer Support/Service Desk Migrated from end of life software ticketing tool (Footprints) to ServiceNow Negotiated ServiceNow seat license from $104 to $44 per seat Providing training to multiple agencies Voice over IP 16,958 users converted to VoIP from 57 agencies, boards and commissions 24 agencies, boards and commissions with 4,000+ users are in process and 10 with 2,000+ in the planning stages. 455 SIP trunks connecting disparate VoIP systems to the state s solution have been deployed allowing agencies to leverage investment until end of life then convert to the central solution Solution includes: Access-a-phone Solution to accommodate users that are hearing or vision impaired MeetingPlace Solution provides low cost audio conference bridging services to users Lync Click to Call integration with the state s Lync presence to allow users to click numbers on screen and dial phone Local Admin Tool custom tool allows local help desks support functionality such as changing passwords, deploying new phones, etc. Verasmart Includes call detail reporting tool for agencies for real time data on phone usage Survivability Designed a variety of survivability solutions to allow robust survivability for those that need it.
3 Mobile Device Management Automating mobile business processes, end-to-end procurement and recycling; 24/7 technical help-desk support and ongoing expense optimization Migrated 12,000 mobile devices from 20 agencies Mobile Devices Cost Optimization Process A meeting scheduled with CIO s and CFO s on July 18 th to review the process. Ohio One Network Circuit inventory forms completed from multi-tenant facilities in preparation for aggregate circuit recommendations currently sequencing the conversions. The goal is to complete these conversions by June Current One Network conversion activities include: o Hilltop locations that includes circuits from DPS, ODOT, MHAS, EMA with estimated completion of October 2014 o SOCC data center conversion to One Network with an estimated completion date of August 2014 IP Address Conflict Resolutions: o 21 agencies require IP address resolution, to date 4 agencies have completed and 17 are in progress for completion by 12/31/14 Microwave Point to Point adoption Went from 3 sites in 3 counties January 1 st, 2013 to 76 counties and 162 sites June 30th State Agency use- MARCS, OPLIN, ODOT, DPS, JFS, ODNR, Ohio State University, and Ohio Turnpike Local Government Entities- Currently servicing Orange Village PD, Xenia PD, Fairborn PD, Beavercreek PD, Beavercreek Fire, Licking County, Warren County, Mercer County, City of Toledo, Washington County, and Gallia County. Working with Clinton County, Hamilton County, Clinton County, and the City of Findlay Commercial Entities- 30 MARCS $90M upgrade to the next-generation P-25, IP-based 700/800 MHz radio system, originally scheduled to be completed in July, Project is ahead of schedule and the first phase will be completed on or before July, 2015 All 225 tower sites have been equipped with the next-generation radio gear. 122 sites are fully operational. All sites have the required FCC licensing. High bandwidth backhaul functionality, using a combination of above-ground microwave and inground fiber connectivity has been initiated. Connectivity is scheduled for all tower sites linked back to the Columbus, Lake County and Jefferson County Zone Controllers by September of 93 MARCS Towers currently have fiber connectivity Increased bandwidth for 113 of the 218 towers from 1.5 to 5 mbps reduced reliance on T-1s Entered into shared services agreements with: o The Ohio State University, Warren County, Clermont County, Clinton County, Jefferson County, Greene County, Licking County, Lake County, Franklin County, Union County, Summit County the City of Findlay and the City of Green. Currently pursuing shared services agreements with: o the City of Columbus, Montgomery County, Butler County, Stark County, Trumbull County, Tuscarawas County, Richland County, Knox County and the City of Cleveland.
4 In 2013 added over 5,500 paying radio subscriptions to the platform. Working diligently to add up to 15,000 more paying radio subscriptions o Current operating budget provided for grant funding to fire departments, who serve a population of 25,000 or less, the ability to fund up to $50,000 per department in MARCS equipment and/or user fees Implementing MARCS in Schools o $5M included in the current State of Ohio operating budget to fund these MARCS-in- Schools radios o 1332 schools have ordered Emergency School Radio s through this grant program in 71 of 88 counties. Medicaid Elevation: Electronic Data Interchange: All environments and staff have been migrated from JFS to OIT. Greek Systems: Two environments have been migrated. The remaining environments will be migrated by end of July. Stand Alone Systems: Requirements were developed and delivered to ODM for the improvement/replacement of the Cost Allocation Planning Information System (CAPIS) Network and Authentication testing: There are 3 Iteration tests for the network/app. authentication. Iteration 1 was completed and 85% of Iteration two completed. The remainder of iteration 2 and Iteration 3 will be completed in July. Desktop End Point Computing vendor selected and on-site. PCs, Laptops, and printers have been ordered. Telephony and Contact Center: Current State document has been completed. Working with focus group of JFS/ODM/OIT to document future state. Intranet: Requirements and Design completed. Ohio Benefits (Integrated Eligibility): October 1st 2013 Go Live Modified Adjusted Gross Income (MAGI) Extension and Expansion Automated Verification capability for MAGI applications using the Federal Data Hub (includes Social Security Administration, Department of Homeland Security, and Internal Revenue Service) No Touch Functionality Converted 26,000 Metro Health Individuals with no worker intervention Real-time interface with the Medicaid Management Information System (MITS) Completed processing of Ohio s full backlog of outbound FFM accounts Enabled processing of Inbound FFM accounts Processed over 20,000 Inbound FFM Individuals with no worker intervention Enabled Ohio resident self service capabilities via an online consumer portal (with 0 reported performance issues) Established real time interfaces with federal systems, including homeland security, social security, IRS, Medicaid and Medicare Established real time interface with Ohio Medicaid claims system Worked closely with stakeholders from Ohio's Dept of Medicaid and Dept of Rehabilitation and Corrections to build a process that would allow for inmates to receive Medicaid coverage for in-
5 patient services. The impact of this new process has resulted in a savings of an estimated $50K a day and an overall estimated yearly savings to the Dept of Rehab and Corrections of $18M. Project costs are significantly under budget and only 8 percent of the federal Healthcare.gov project costs IT Asset Management: Completed the development of IT Asset Management Plan detailing how Enterprise IT assets will be accurately accounted for and tracked. Established interim processes for transferring assets to OIT through the IT Optimization project. Security: End Point Protection: Centrally managed anti-malware scanning and signature database components, system firewall and other advanced protection components, all integrated with additional features such as device control, application control, endpoint encryption, data loss prevention (DLP), and configuration management. Product deployed at DAS, SERB, CSV, MARCS, DNR, EPA, OBM, ODH, DSA Current Statistics: o 3926 workstations deployed on protection agent across 9 entities o 2987 workstations deployed antivirus component across 3 entities o 15 machines deployed on web checking component o 20 machines deployed on HIPS o 886 servers on protection agent o 868 servers on antivirus component Vulnerability Management: Implementing a platform to conduct vulnerability scans of systems and networks in each cabinet agency. Scanning in 5 Agencies - DAS, MHAD, DNR, ODH and EPA 5 Agencies in process - BWC, DoDD, ODE, JFS, DSA and ODE SIEM (Security Information and Event Manager Initiative): SIEM tools collect security logs from many different sources and provide real-time event correlation and alerting to potential attacks and security violations. Implementing SIEM technology will make it possible for all cabinet agencies to comply with controls stipulated in the Consensus Audit Guidelines (CAG) and the National Institute of Standards and Technology (NIST) Special Publication Agencies Reporting to SIEM - DAS, EPA, DNR, DODD, AOS, OOD Agencies in process -Medicaid, JFS, COM and DSA Intrusion Protection: Intrusion detection Systems (IDS)/Intrusion Prevention Systems (IPS) are critical security architecture components. They enable IT administrators to secure the enterprise environment. Implementing intrusion prevention technology will produce compliance for all cabinet agencies with controls stipulated by the Consensus Audit Guidelines (CAG) and the National Institute of Standards and Technology (NIST) Special Publication
6 IPS sensors have been configured and installed on the network Continuing to configure IPS management tool IPS resource started Workforce: Hiring To Date: o Security: 8 positions (Information Security Officers/ ITC3 and IT architect 1) o Data Center Services: 13 positions (Infrastructure Specialists, IT Managers) Agency's currently being supported by the central Security model o Security Officer: DPS, ODE, DSA, DODD, Medicaid o Security Architects: EPA, DNR, Health Letters of Agreement established with OCSEA o Project Employee (12/13) o Cross-agency bidding (6/14) o Training (6/14) 18 Agency Outreach meetings conducted with IT Optimization leadership and agency IT staff
IT Optimization Accomplishments as of 12/31/13
IT Optimization Accomplishments as of 12/31/13 Email Single Platform Over 62,000 email accounts in service Migrated over 48,000 mailboxes from 84 agencies, boards/commissions. DYS and JFS remain. DYS is
City of Coral Gables
City of Coral Gables Information Technology Department IT TECHNICAL SUPPORT DIVISION Infrastructure Upgrade Plan Systems, Applications, Network, and Telecommunications Infrastructure OVERVIEW Last revision:
IT Optimization Business Partner Briefing. 4 February 2014
IT Optimization Business Partner Briefing 4 February 2014 Agenda Welcome Stu Davis IT Optimization Scope Consolidated Plan Approach Stu Davis Data Center Operations Spencer Wood Network Operations John
ACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
Company Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Contact us for a free consultation today! 630-936-4045 [email protected]
IT Relocation Schedule Moving offices? Often, relocating your IT infrastructure can be one of the most daunting aspects of the move, and it s also the most critical to business continuity. Servers, PCs,
1.0 Purpose of Solicitation
Information Technology Consulting Services Notice of Request for Proposal Information Technology Managed Services and Support South Adams County Water and Sanitation District 1.0 Purpose of Solicitation
How To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Office of Information Technology Service Catalog FY2015
Office of Information Technology Service Catalog FY2015 Office of Information Technology Service Catalog FY2015 Table of Contents Accounts & Passwords... 3 Administrative... 4 Business Tools and Services...
Check Point 3D Security
Check Point 3D Security Combining Policies, People and Enforcement for Unbeatable Protection John Vecchi Head of WW Product Marketing 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW)
State of Tennessee Sourcing Event #9160 ServiceNow Preliminary Statement of Work (SOW) ServiceNow Implementation Project Objectives to be completed are: 1. Aide in optimizing processes and integration
Core Data Service 2015 IT Domain Definition Change Overview
Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»
IT Transformation All Hands Meeting
IT Transformation All Hands Meeting 12 August 2013 IT Optimization All Hands Meeting Agenda State of Ohio IT Transformation All Hands Meeting Date: Time: Location: 12 August 2013 1:30-2:30 PM Riffe, 19
IT Strategic Plan INFRASTRUCTURE PROPERTIES AND PLANNING
IT Strategic Plan INFRASTRUCTURE PROPERTIES AND PLANNING 2016-2019 Purpose The purpose of this document is to provide the general scope and direction for information technology (IT) in Infrastructure Properties
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Security Policy for External Customers
1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
DOT.Comm Oversight Committee Policy
DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:
OIT User Conference Security Team November 2014
OIT User Conference Security Team November 2014 Welcome and Introductions What will we be covering today? Introductions Office of Information Security and Privacy (OISP) and the Transformation effort Staffing
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
Delivering UC Solutions UC Summit
Siemens Enterprise Communications Delivering UC Solutions UC Summit David Leach Unified Communications Consultant Siemens Enterprise Communications 1 2012 Siemens Enterprise Communications, Inc. Business
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
Iowa State University Proposal for HR-01 ISU HR Operating Model
Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.
KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet
How RSA has helped EMC to secure its Virtual Infrastructure
How RSA has helped EMC to secure its Virtual Infrastructure A new solution, the RSA solution for Cloud Security and Compliance, has been developed and is now available to all of our customers. Luciano
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Partner Selling Guide EARTHLINK BUSINESS USE ONLY
IT SERVICES Partner Selling Guide EARTHLINK BUSINESS USE ONLY EARTHLINK OVERVIEW For over 20 years, EarthLink has embraced and harnessed changes in the ever-changing world of technology. Beginning in 1994,
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Q1 R1 Q2 R3 Q4 Q6 R6 Q7 R7 Q8 R8
Q1 R1 Q2 R2 Q3 R3 Q4 Questions and Answers for Enterprise Voice over Internet Protocol RFP Can you please clarify the statement on transport cost to the d-mark? Are you referring to internal cabling bringing
Statement of Work: SharePoint Migration Services. Supplement 1
Statement of Work: SharePoint Migration Services Supplement Contents.0 SharePoint Migration Services...2.. Background and Overview...2 2.0 Project Requirements, Formal Deliverables and Scope of Work...2
Security in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware [email protected] Ugo Piazzalunga Technical Manager, SafeNet [email protected] Agenda Software Defined
Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery
1 Introduction As businesses emerge from the difficult economic recession, they need to continue the low-cost and highproductivity practices that allowed them to successfully weather the storm. Specifically
Microsoft Premier Deployment. Office 365 Service Description
Microsoft Premier Deployment Office 365 Service The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT
Managed Service Plans
Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely
How To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX
Whitepaper The Top 10 Advantages of 3CX Phone System Why your next phone system should be software based and by 3CX This whitepaper outlines the top 10 advantages of choosing 3CX Phone System, a Windows
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Information Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
LHRIC Network Support - Additional Service Features
LHRIC Network Support - Additional Service Features It is important to note that costs associated with LHRIC Network Support service not only cover an on-site support engineer but also include a number
Are there limits on the number of years the district would agree to under contract? Please See RFP
Can you break out and identify how many are to be installed per location and what flavors of each? The following counts are approximate and the District will reserve the right to add/remove counts during
Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3. Improve Processes...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... 3 Improve Processes... 3 Innovation... 4 IT Planning & Alignment
SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less
SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
G-Cloud Managed Exchange SaaS. Service Description
G-Cloud Managed Exchange SaaS Service Description Version No: 5.0g Date: 08/04/2014 Table of Contents FEATURES... 3 OPTIONAL FEATURES... 4 BENEFITS... 4 CONNECTED SERVICES... 4 SERVICE REQUIREMENTS...
Cisco Unified MobilityManager Version 1.2
Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
The ROI of Automated Agentless Endpoint Management
V The ROI of Automated Agentless Endpoint Management A Frost & Sullivan White Paper Prepared by Ariel Avitan, Industry Analyst 2 TABLE OF CONTENTS The Impact of Endpoint Monitoring and Control Solutions
Secondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
CHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
Updated 7/02/2012 Infrastructure Opportunity Map
Updated 7/02/2012 Opportunity Map s Other Personnel Productivity DataCenter Plan UPS and GEN Laptop Encryption Client Domino E-Mail IMS Version 11 POP Server IT Asset Windows 7 OS Migration Good Technology
What s new for SharePoint 2016?
What s new for SharePoint 2016? Release History and Roadmap SharePoint Portal Server 2001 2001 SharePoint Portal Server 2003 2003 Office SharePoint Server 2007 2006 SharePoint Server 2010 2009 SharePoint
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Upper Perkiomen School District
Upper Perkiomen School District Network Infrastructure Review Executive Summary Prepared by 1001 James Drive, Suite A15 Leesport, PA 19533 610 916 9400 www.jlrconsulting.com Date: March 10, 2015 Report
