USP IT-Security Consulting & Projects



Similar documents
BP9 - Citrix Receiver Optimierung: So verbessern Sie Management und Benutzerkomfort. Systems Engineer, Citrix Systems GmbH

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Implementing Data Models and Reports with Microsoft SQL Server

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

SAP BusinessObjects Mobile So gelangen Ihre Informationen auf mobile Geräte. Jörg Diekkämper 24. April 2015

How To Make Your Computer System More Secure And Secure

Businessmodelle des SaaS Eco-Systems Chancen, Risiken und kritische Erfolgsfaktoren

CA Computer Associates. Nils Meyer CA Computer Associates GmbH Hamburg

DV4 - Citrix CloudGateway: Access and control Windows, SaaS and web applications. Systems Engineer, Citrix Systems GmbH

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13

Multipurpsoe Business Partner Certificates Guideline for the Business Partner

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233

Digicomp Microsoft Evolution Day MIM 2016 Oliver Ryf. Partner:

Roadmap to Solving Enterprise Mobility

AD2 - The future of mobile enterprise applications: Live from the Citrix Labs

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

LEARNING AGREEMENT FOR STUDIES

Designing and Implementing a Server Infrastructure MOC 20413

Private Geräte im Unternehmen - ein großes Potential mit Risiken

Implementing Microsoft Azure Infrastructure Solutions

IDENTIKEY FEDERATION SERVICES

NCSU SSO. Case Study

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

Course Outline. Mobile Device Management Course 55078: 2 days Instructor Led

Wir begleiten Sie in die Cloud

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Citrix Enterprise Mobility more than just device management (MDM)

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Eurohansia. working in partnership

Storage XenMotion Tampa Technology Project

PROTECT YOUR WORLD. Identity Management Solutions and Services

SAP Solutions for Information Management Overview, Strategy, & Roadmap. Kristin McMahon May 2013

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Update to V10. Automic Support: Best Practices Josef Scharl. Please ask your questions here Event code 6262

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Is Cloud relevant for SOA? Corsin Decurtins

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

How To Run A Server On A Linux Computer (For Free) On A Microsoft Server (For Linux) On An Ipad Or Ipad (For Microsoft) On Free Software (For Ubuntu) On Your Computer Or Ipa (

Cisco ASA und FirePOWER Services

SAP Product Road Map SAP Mobile Documents

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure

Cloud Security Introduction and Overview

SMP Security & Identity Management An Introduction

Solve BYOD with! Workspace as a Service!

Certificate SAP INTEGRATION CERTIFICATION

Groups Inside FHNW: Why it s not just another AAI SP

Security Vendor Benchmark 2016 A Comparison of Security Vendors and Service Providers

Implementing Microsoft Azure Infrastructure Solutions

Microsoft Implementing Microsoft Azure Infrastructure Solutions

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Implementing Microsoft Azure Infrastructure Solutions

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

>Challenges faced by the travel and transportation industry

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Centrify Cloud Connector Deployment Guide

BP8 Citrix Integrations with System Center Configuration Manager 2012

Business Values of Network and Security Virtualization

Cortado Corporate Server

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?

Quick Start Guide UTM 110/120

Enterprise Mobility Services

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

How To Secure Your Mobile Device

Wir stellen uns vor We introduce ourselves

Cloud OS Network. Uwe Lüthy, Die Bedeutung einer Partner Managed Cloud für Kunden. Partner Technology Strategiest

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Application Optimization, Visibility and Control for the Hybrid Enterprise

PortWise Access Management Suite

PortWise Access Management Suite

BP6 Unified Communications in a virtual desktop. Systems Engineer, Citrix Systems

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Standard: Event Monitoring

Jetzt können Sie den Befehl 'nsradmin' auch für diverse Check-Operationen verwenden!

Mobile device Management mit NAC

Cloud Performance Group 1. Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)

Comparative Market Analysis of Project Management Systems

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

How to Get to Single Sign-On

How To Teach A Software Engineer

Vertrauen in Cloud Dienste schaffen

Citrix Enterprise Mobility more than just device management (MDM)

Transcription:

Consulting Operation Products & Solutions USP Leistungsübersicht Web Access Management Web Application Firewall Authentication-Proxy Single Sign On USP Secure Entry Server Suite Network Access Control Network Access Control 802.1x and MAC Authentication Dynamic VLAN Assignent BYOD / MDM USP Network Authentication System Managed Security Services Encrypted Site-to-Site VPNs Firewall Protection Secure Remote Access USP Enterprise Network Services IT Security Projects Identity IAM & Access Management Web Application Security Network && Infrastructure Security Mobile Security Cloud Security Project Management Project Experience Methodology Seite 2

IT Security Consulting & Projects unser Team Ihre Kompetenz + 80 weitere USP Spezialisten Seite 3

Project Experience, Methodology, Skills Strategy & Policy Process & Organisation Architecture & Technology Implementation Leistungsübersicht Identity & Access Management Web Application Security Network & Infrastructure Security Mobile Security Cloud Security Seite 4

Unsere Stärken Ihr Nutzen

Unsere Stärken Ihr Nutzen Was Kunden an USP schätzen: Expertenwissen. Durch die Spezialisierung von USP profitieren unsere Kunden von Wissen auf Expertenniveau, welches wir nachhaltig auf dem neuesten Stand halten. Methodenkompetenz. Unsere Dienstleistungen erbringen wir nach anerkannten Methoden, jedoch immer abgestimmt auf die individuellen Anforderungen der Unternehmen. Kundenfokus. USP Consulting orientiert sich an Kundenbedürfnissen, umsetzbaren Lösungen und rasch erzielbarem Nutzen. Branchenerfahrung. Kunden profitieren von unserer Praxiserfahrung in verschiedenen Branchen und kommen durch unsere erprobte Vorgehensweise sicher zum Ziel. Kontinuität. Weil IT Security Vertrauenssache ist, lebt USP mit ihren Kunden nachhaltige und langfristige Beziehungen. Seite 6

Leistungsbeschreibung

Project Experience, Methodology, Skills Identity & Access Management Strategy & Policy Process & Organisation Architecture & Technology Implementation Identity & Access Management IAM strategy (e.g. in general, for the extended enterprise) IAM gap analysis (using United Security Providers IAM framework) IAM roadmap (e.g. fields of action, quick wins, implementation steps) IAM policies (e.g. guidelines, principles, responsibilities) Requirements engineering Roles concept (e.g. business and system roles) Identity administration process analysis and (re)engineering Identity and privilege management concept Identity administration workflow modeling System architecture Solution design Architecture review Proof of concepts IAM product and vendor evaluation Detailed technical specification Implementation and customization (i.e. synchronization, workflow, gui) Integration consulting for other environments (i.e. SAP, MS ADS, other apps) Development of synchronization integration adapters Seite 8

Project Experience, Methodology, Skills Web Application Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Web Application Security Web Application Security Policy Legal Compliance Business-aligned Security & Availability B2B/B2C Portal Security Application Development Guidelines User Authorization & Roles User Self Service Reverse Proxy Architecture Authentication Enforcement Web Single Sign-On Security Audits und Reviews Federation & Cross- Domain SSO USP Secure Entry Server Access Infrastructure Konsolidierung Seite 9

Project Experience, Methodology, Skills Network and Infrastructure Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Network and Infrastructure Security Security Policies Network Security Policy Security Compliance IT Security management Network (Security) Management Change Management Security Enforcement Security Architecture Network Zoning Perimeter/Datacenter Zoning USP Network Authentication System Perimeter Security Services Security Standards Security Awareness Programs information security and data protection (ISDS) Information Security Management System ISMS Business Continuity Management BCM Hardening Guidelines Network Security Architecture (e.g. IPS, FW, NAC) Content Security Concept (e.g. Proxy, Antivir) Remote Access Architecture (e.g. VPN, VDI, DA) Security Audits and Reviews Migration to Network Zones Seite 10

Project Experience, Methodology, Skills Mobile Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Mobile Security Mobile Security Strategy Bring Your Own Device Strategy Analysis of 5 Dimensions (User, Device, Access, Service, Policy) Use Case Defintion User Policies Technical Policies User directives Management of certificates Integration Architecture Network Access Control Architecture Mobile Device and App Management Architecture Application Access and -Security USP Secure Entry Server USP Network Authentication System Captive Portal Integration of Mobile Device Management WLAN Architecture Seite 11

Project Experience, Methodology, Skills Cloud Security Strategy & Policy Process & Organisation Architecture & Technology Implementation Cloud Security Cloud Computing Strategy Cloud Security Governance IAM in the Cloud (SecaaS) Cloud Audit Cloud Security Policy Cloud Security Risk Management Web Security (Secaas) Mail Security (Secaas) Onboarding Testing Cloud Security Trainings Cloud Security Compliance Application Security Cut Over Information Mgmt and Data Security Validating Cloud Architectures Cloud Transformation Cloud Provider / Services Evaluation Workload Assessment Seite 12

Ihr nächster Schritt Wollen auch Sie in Ihren Vorhaben weiter kommen? Kontaktieren Sie uns, wir meistern die Herausforderungen mit Ihnen! Marcel Neiger, Head of Business Unit Fon +41 31 959 02 38 E-Mail marcel.neiger@u-s-p.ch Riccardo Pileggi Sales Manager Fon +41 31 959 02 41 E-Mail riccardo.pileggi@u-s-p.ch Seite 13