DAS ETS Policy Option Packages - Support Base IT Operations

Size: px
Start display at page:

Download "DAS ETS 2015-17 Policy Option Packages - Support Base IT Operations"

Transcription

1 DAS ETS Policy Option Packages - Support Base IT Operations 1a Network $3,000,000 $0 $3,000, Network Equipment Lifecycle Replacement 1b Distributed $1,000,000 $0 $1,000, Server Lifecycle Replacement 1c Security $2,000,000 $0 $2,000, Security Equipment Lifecycle 1d Storage $600,000 $0 $600, Primary Storage Disk Encryption 1e Security $138,390 $111,964 $250, f Security $763,390 $111,964 $875, Vulnerability Scanning Tool & 1/2 Position Log Event Correlation and Monitoring Tool & 1/2 Position Replace critical network equipment that will be at or past of end life in Failure to replace will increase likelihood of network availability issues and prevent implementation of IPv6. Replace servers that will be at or past of end life in A significant percentage of deployed servers were initially installed in Replacement of end of life security equipment including end points used for secure networking. Failure of this equipment could result of loss of network connectivity To meet federal regulatory compliance for sensitive data such as HIPAA, FTI (Federal Tax Information) and other sensitive private data types. Scanning tool would allow for vulnerability scanning of all servers on the data center floor to find security exploits to remediate and to meet security audit findings. 0.5 FTE to performance regular scans of state's infrastructure Security tool that collects, monitors, analyzes and reports security events. This new service will monitor SDC managed server instances and network devices to meet security audit findings. 0.5 FTE to review logs for suspicious activities

2 1g Security $1,000,000 $0 $1,000, Privilege User Access Tool 1h Security $440,000 $0 $440, Security Training 1i Mult $348,127 $2,911,058 $3,259, j Applications $53,558 $447,855 $501, $9,343,464 $3,582,841 $12,926, Positions to Support Growth in Previous Biennia 2 Positions to Support Enterprise Applications Tool to manage and report privileged user access to systems hosted at the data center. This new service is to meet security audit findings. SANS online Information Security Awareness Training modules for all staff in ETS (Enterprise Technology s). This training supports our security audit findings. ( 220 FTE x $2,000ea) Support customer growth in infrastructure which occurred in and and is currently being supported by LDs and contractors. Failure to hire permanent staff will impact the ability of ETS to meet service levels or pay higher costs for contracted resources 2 application specialists to support Tririga, epaystub, Online Time and to rewrite and consolidate DAS legacy business created applications. Failure to hire permanent staff will impact the ability of ETS to meet service levels or pay higher costs for contracted resources

3 DAS ETS Policy Option Packages - Support IT Growth 2a Mainframe $500,000 $0 $500, Mainframe Capacity 2b Multi $803,558 $447,810 $1,251, Implement IPv6 2c Storage $3,228,558 $447,810 $3,676, Support Storage Growth 2d Distributed $2,107,116 $895,620 $3,002, Support Server Growth 2e Security $53,558 $447,810 $501, Security Positions to Support Increased Security Demands Support mainframe upgrade which will occur in IT professional services, FTE and equipment to support conversion to IPv6. Request from agencies in support of application upgrades is expected. Purchase additional storage capacity and staff to keep up with the growing demand of storage growth, new customers and new service offerings. Windows servers continue to be one of the areas with the greatest growth and change requests. Additional positions are required to support these activities as is funding to procure new hardware and software. FTE to keep up with the growing demand of customer requests for security changes and regulatory compliance

4 2f Applications $207,116 $895,620 $1,102, Positions to Support New Customers for Application Development 2g Storage $700,000 $0 $700, Long Term Storage 2h Storage $500,000 $0 $500, i Storage $500,000 $0 $500, Storage for Infrequent Accessed Files File Searching for Evidence Preservation and Legal Hold of Data Application FTE to develop applications to any ETS customer in the shared application delivery platform or customer s environment. New requests from customers such as: Ethics Commission, Employee Relations Board, Department of Energy, Oregon State Marine Board, OLIS, Forestry and Governor s Office. Examples include HRIS (CHRO), Performance Metric Application. Includes $100,00 for application development software Long-term storage would remove files from primary storage and backups, and stored in the event the file would need to be accessed at a later time. Cost avoidance could be achieved through slowing down growth of Primary storage and backups. Infrequent file storage access would move files that have not been accessed for a given time to less expensive storage and remove files from the backup system. Cost avoidance would be achieved through slowing down the growth rate of primary storage and backups. Currently the agencies do not have a simple method to search for evidence or a consistent process for legal hold of data for investigation. This would provide an effective way to search through all online, archive and backup copies of an agency s information.

5 2j All $2,000,000 $0 $2,000, Monitoring Software Desktop $3,107,116 $895,620 $4,002, Implement Virtual Desktop 2k 2l TAM $1,445,337 $671,715 $2,117, Automation 2m Admin $253,558 $447,810 $701, Performance Management 2n Admin $226,779 $223,905 $450, Time Tracking 2o Admin $450,000 $0 $450, Proactive Customer $16,082,696 $5,373,719 $21,456, Purchase and install an all encompassing monitoring toolset will allow for monitoring of all the state's infrastructure and agency applications running on any platform 4 staff, hardware and software to implement virtual desktop service - 2,500 $1,200 ($3,000 5 year TCO/2 years) Automate provisioning and other routine tasks that require manual support delaying server delivery time. Performance management software w/ 220 seats. This investment will allow ETS to manage to our strategic plan, cascading goals from the strategic plan down to the individual. $50,000/year software costs $100,000 implementation cost, one time. 2 FTE to support program area ongoing. Time tracking process in support of business within a business transformation, Full Cost. The Time Tracking tool will allow ETS units to track and collect information on actual time spent on customer and internal project allowing for accurate charge back. $50,000/year software costs $100,000 implementation cost, one time. One FTE t0 support Establish online service catalog and customer portal to support automated provisioning, performance reporting and customer support

6 DAS ETS Policy Option Packages - Support Agency IT Projects 3 All $10,267,790 $2,239,686 $12,507, Agency IT projects Companion POP Companion POP to agency projects which are submitted requiring ETS support through the 107BF14 process DAS ETS Policy Option Packages - Support Agency IT Purchases 4 All $7,512,805 $0 $7,512, Support Growth in Agency Purchases Limitation only for growth in passthrough. Supports growth in agency purchases of items such as long distance, network connections to field offices and agency specific software. $43,206,755 $11,196,246 $54,403, Total

7

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

HIPAA Compliance Evaluation Report

HIPAA Compliance Evaluation Report Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations

More information

White Paper. Central Administration of Data Archiving

White Paper. Central Administration of Data Archiving White Paper Central Administration of Data Archiving Archiving and Securing Corporate Data... 1 The Growing Need for Data Archive Solutions... 1 Determining Data Archiving Policy... 2 Establishing the

More information

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

<Insert Picture Here> Oracle Database Security Overview

<Insert Picture Here> Oracle Database Security Overview Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

ENTERPRISE TECHNOLOGY SERVICES STRATEGIC PLAN 2015 Update

ENTERPRISE TECHNOLOGY SERVICES STRATEGIC PLAN 2015 Update ENTERPRISE TECHNOLOGY SERVICES STRATEGIC PLAN 2015 Update ETS Roadmap for 2012 2016 Tony Black, Administrator (Interim) 503-373-1000 [email protected] http://oregon.gov/das/ets Enterprise Technology

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Division/Unit/Department: Information Technology Plan 2012-2017

Division/Unit/Department: Information Technology Plan 2012-2017 Administrative Plan - 1 Division/Unit/Department: Information Plan 2012-2017 I. Introduction State your administrative department/unit/division mission statement. The Information Division's mission is

More information

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation Total Cost of Ownership: What is it Really? August 11, 2003 The Challenge How do I optimize my IT investments? Organizations remain under intense pressure to reduce costs To reduce costs we must increase

More information

Office Technologies Managed Services Professional Services. SERVING OVER 18,000 CUSTOMERS IN THE NYC & TRI-STATE AREA tomorrowsoffice.

Office Technologies Managed Services Professional Services. SERVING OVER 18,000 CUSTOMERS IN THE NYC & TRI-STATE AREA tomorrowsoffice. Office Technologies Managed Services Professional Services Agenda What s Changed? Office Technologies Solutions Beyond Your MFP The New Atlantic Protecting Your Business What s Changed What s Changed?

More information

Oracle Database Security

Oracle Database Security Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Patch and Vulnerability Management Program

Patch and Vulnerability Management Program Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance

More information

Complete Database Security. Thomas Kyte http://asktom.oracle.com/

Complete Database Security. Thomas Kyte http://asktom.oracle.com/ Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

CMS Operational Policy for Separation of Duties for System Security Administration and Auditing

CMS Operational Policy for Separation of Duties for System Security Administration and Auditing Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Separation of Duties for System Security Administration and Auditing March 2006

More information

THE CASE FOR ACTIVE DATA ARCHIVING

THE CASE FOR ACTIVE DATA ARCHIVING THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: [email protected] Web: www.data-storage.co.uk

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Information Security Plan May 24, 2011

Information Security Plan May 24, 2011 Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised

More information

Software Asset Management on System z

Software Asset Management on System z Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager [email protected] Agenda Why Software Asset Management (SAM) The Discipline of Software

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

[email protected] 2009 STREAM FRBC

David.Balka@chi.frb.org 2009 STREAM FRBC Virtualization ti Dave Balka [email protected] Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework

More information

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

EMC E20-018. Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist EMC E20-018 Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist http://www.exams.solutions/e20-018-exam-guide.html Product: Demo Question: 1 What is the first phase of the Virtual

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI Product white paper ROI and SIEM How the RSA envision platform delivers an Industry-leading ROI This paper examines the Return on Investment (ROI) that a quality security information & event management

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

What s new in AM 9.30 Accelerating business outcomes

What s new in AM 9.30 Accelerating business outcomes What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing 1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Identity and Access Needs

More information

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment. Security Services A Solution for Providing BPM of Security Services within the Enterprise Environment. First steps towards Next Generations Operations (OPS) to drive Gross Margin Dear security colleagues,

More information

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

How To Write An Ets Request For Proposal (Rfp)

How To Write An Ets Request For Proposal (Rfp) Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project. chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules) MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the

More information

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................

More information

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific Realizing the Benefits of Hybrid Cloud Anand MS Cloud Solutions Architect Microsoft Asia Pacific Agenda Key drivers for Hybrid Cloud Unified Cloud Strategy Example Use Cases How to get there Hybrid Cloud:

More information

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed

More information

Osterman Research Executive Summary

Osterman Research Executive Summary 1 Osterman Research Executive Summary Messaging is the primary communications medium for many enterprises today and the one that its users can afford least to be without. At the heart of this medium is

More information

"Service Lifecycle Management strategies for CIOs"

Service Lifecycle Management strategies for CIOs "Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

Planning and Administering Windows Server 2008 Servers

Planning and Administering Windows Server 2008 Servers Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth [email protected]

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth ananth@eventtracker.com Cutting Through SIEM Vendor Marketing Make the right technology decision A. Ananth [email protected] Outline What s in a name? SIEM? SEM? SIM? Customer Motivations Vendor approaches to the problem

More information

Why can you trust Google?

Why can you trust Google? Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of

More information

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

SOFTWARE MANAGEMENT EXECUTIVE SUMMARY

SOFTWARE MANAGEMENT EXECUTIVE SUMMARY SOFTWARE MANAGEMENT EXECUTIVE SUMMARY Under a task order with the Office of Inspector General, Jefferson Wells reviewed the Commission s software management. Our review found that some controls and best

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify

More information

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager

Managing Enterprise Devices and Apps using System Center Configuration Manager Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6433A: Planning and Implementing Windows Server 2008 Length: 5 Days Published: September 07, 2011 Language(s): English Audience(s): IT Professionals Overview About this Course Level: 300 Technology:

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Enterprise Data Protection

Enterprise Data Protection PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Specific observations and recommendations that were discussed with campus management are presented in detail below. CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010 Texas State Library and Archives Commission Information Technology Detail 82 th Regular Session, Agency Submission, Version 1 August 26, 2010 PAGE: 1 of 6 5005 ACQUISITN INFO RES TECH 4 Computer Resources/Network

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your

More information

McAfee Endpoint Protection Products

McAfee Endpoint Protection Products McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

AllianceIT Managed Services

AllianceIT Managed Services AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand

More information

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day 70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include

More information

HIPAA-COMPLIANT PRIVATE CLOUD DELIVERS LIFE-SAVING MEDICAL HELP

HIPAA-COMPLIANT PRIVATE CLOUD DELIVERS LIFE-SAVING MEDICAL HELP HIPAA-COMPLIANT PRIVATE CLOUD DELIVERS LIFE-SAVING MEDICAL HELP Taking Business to the Cloud www.aisn.net 8300 Greensboro Drive, Ste. 1100 McLean, VA 22102 888.579.AISN (2476) NON-PROFIT RELIES ON AISN

More information

Oregon Department of Human Services Central and Shared Service Programs

Oregon Department of Human Services Central and Shared Service Programs Overview DHS Central and Shared Services provide critical leadership and business supports necessary to achieve the mission of the agency: helping Oregonians achieve well-being and independence through

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information