DAS ETS 2015-17 Policy Option Packages - Support Base IT Operations

Similar documents
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Dynamic Service Desk. Unified IT Management. Solution Overview

State of Oregon. State of Oregon 1

Cybersecurity Health Check At A Glance

HIPAA Compliance Evaluation Report

White Paper. Central Administration of Data Archiving

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

<Insert Picture Here> Oracle Database Security Overview

Exhibit to Data Center Services Service Component Provider Master Services Agreement

ENTERPRISE TECHNOLOGY SERVICES STRATEGIC PLAN 2015 Update

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Division/Unit/Department: Information Technology Plan

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation

Office Technologies Managed Services Professional Services. SERVING OVER 18,000 CUSTOMERS IN THE NYC & TRI-STATE AREA tomorrowsoffice.

Oracle Database Security

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Managing and Maintaining Windows Server 2008 Servers

Autodesk PLM 360 Security Whitepaper

Patch and Vulnerability Management Program

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Complete Database Security. Thomas Kyte

Vistara Lifecycle Management

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Seven Things To Consider When Evaluating Privileged Account Security Solutions

CMS Operational Policy for Separation of Duties for System Security Administration and Auditing

THE CASE FOR ACTIVE DATA ARCHIVING

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Information Security Plan May 24, 2011

Software Asset Management on System z

DOT.Comm Oversight Committee Policy

STREAM FRBC

EMC E Exam Name: Virtualized Data Center and Cloud Infrastructure Design Specialist

IBM QRadar Security Intelligence April 2013

Service Catalog. it s Managed Plan Service Catalog

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

System Management. What are my options for deploying System Management on remote computers?

What s new in AM 9.30 Accelerating business outcomes

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Moving beyond Virtualization as you make your Cloud journey. David Angradi

How To Write An Ets Request For Proposal (Rfp)

Validating Enterprise Systems: A Practical Guide

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

Osterman Research Executive Summary

"Service Lifecycle Management strategies for CIOs"

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

Planning and Administering Windows Server 2008 Servers

Information Technology Solutions

Current IBAT Endorsed Services

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth

Why can you trust Google?

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

JOB DESCRIPTION CONTRACTUAL POSITION

INFORMATION SECURITY California Maritime Academy

SOFTWARE MANAGEMENT EXECUTIVE SUMMARY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Managing Enterprise Devices and Apps using System Center Configuration Manager

Payment Card Industry Data Security Standard

LEARNING SOLUTIONS website milner.com/learning phone

Exhibit to Data Center Services Service Component Provider Master Services Agreement

ICT budget and staffing trends in the UK

Enterprise Data Protection

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Specific observations and recommendations that were discussed with campus management are presented in detail below.

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

McAfee Endpoint Protection Products

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

AllianceIT Managed Services

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

HIPAA-COMPLIANT PRIVATE CLOUD DELIVERS LIFE-SAVING MEDICAL HELP

Oregon Department of Human Services Central and Shared Service Programs

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Transcription:

DAS ETS 2015-17 Policy Option Packages - Support Base IT Operations 1a Network $3,000,000 $0 $3,000,000 0.00 Network Equipment Lifecycle Replacement 1b Distributed $1,000,000 $0 $1,000,000 0.00 Server Lifecycle Replacement 1c Security $2,000,000 $0 $2,000,000 0.00 Security Equipment Lifecycle 1d Storage $600,000 $0 $600,000 0.00 Primary Storage Disk Encryption 1e Security $138,390 $111,964 $250,353 0.50 1f Security $763,390 $111,964 $875,353 0.50 Vulnerability Scanning Tool & 1/2 Position Log Event Correlation and Monitoring Tool & 1/2 Position Replace critical network equipment that will be at or past of end life in 2015-17. Failure to replace will increase likelihood of network availability issues and prevent implementation of IPv6. Replace servers that will be at or past of end life in 2015-17. A significant percentage of deployed servers were initially installed in 2009-11 Replacement of end of life security equipment including end points used for secure networking. Failure of this equipment could result of loss of network connectivity To meet federal regulatory compliance for sensitive data such as HIPAA, FTI (Federal Tax Information) and other sensitive private data types. Scanning tool would allow for vulnerability scanning of all servers on the data center floor to find security exploits to remediate and to meet security audit findings. 0.5 FTE to performance regular scans of state's infrastructure Security tool that collects, monitors, analyzes and reports security events. This new service will monitor SDC managed server instances and network devices to meet security audit findings. 0.5 FTE to review logs for suspicious activities

1g Security $1,000,000 $0 $1,000,000 0.00 Privilege User Access Tool 1h Security $440,000 $0 $440,000 0.00 Security Training 1i Mult $348,127 $2,911,058 $3,259,185 13.00 1j Applications $53,558 $447,855 $501,413 2.00 $9,343,464 $3,582,841 $12,926,305 16.0 13 Positions to Support Growth in Previous Biennia 2 Positions to Support Enterprise Applications Tool to manage and report privileged user access to systems hosted at the data center. This new service is to meet security audit findings. SANS online Information Security Awareness Training modules for all staff in ETS (Enterprise Technology s). This training supports our security audit findings. ( 220 FTE x $2,000ea) Support customer growth in infrastructure which occurred in 2011-13 and 2013-15 and is currently being supported by LDs and contractors. Failure to hire permanent staff will impact the ability of ETS to meet service levels or pay higher costs for contracted resources 2 application specialists to support Tririga, epaystub, Online Time and to rewrite and consolidate DAS legacy business created applications. Failure to hire permanent staff will impact the ability of ETS to meet service levels or pay higher costs for contracted resources

DAS ETS 2015-17 Policy Option Packages - Support IT Growth 2a Mainframe $500,000 $0 $500,000 0.00 Mainframe Capacity 2b Multi $803,558 $447,810 $1,251,368 2.00 Implement IPv6 2c Storage $3,228,558 $447,810 $3,676,368 2.00 Support Storage Growth 2d Distributed $2,107,116 $895,620 $3,002,736 4.00 Support Server Growth 2e Security $53,558 $447,810 $501,368 2.00 2 Security Positions to Support Increased Security Demands Support mainframe upgrade which will occur in 2015-17 IT professional services, FTE and equipment to support conversion to IPv6. Request from agencies in support of application upgrades is expected. Purchase additional storage capacity and staff to keep up with the growing demand of storage growth, new customers and new service offerings. Windows servers continue to be one of the areas with the greatest growth and change requests. Additional positions are required to support these activities as is funding to procure new hardware and software. FTE to keep up with the growing demand of customer requests for security changes and regulatory compliance

2f Applications $207,116 $895,620 $1,102,736 4.00 4 Positions to Support New Customers for Application Development 2g Storage $700,000 $0 $700,000 0.00 Long Term Storage 2h Storage $500,000 $0 $500,000 0.00 2i Storage $500,000 $0 $500,000 0.00 Storage for Infrequent Accessed Files File Searching for Evidence Preservation and Legal Hold of Data Application FTE to develop applications to any ETS customer in the shared application delivery platform or customer s environment. New requests from customers such as: Ethics Commission, Employee Relations Board, Department of Energy, Oregon State Marine Board, OLIS, Forestry and Governor s Office. Examples include HRIS (CHRO), Performance Metric Application. Includes $100,00 for application development software Long-term storage would remove files from primary storage and backups, and stored in the event the file would need to be accessed at a later time. Cost avoidance could be achieved through slowing down growth of Primary storage and backups. Infrequent file storage access would move files that have not been accessed for a given time to less expensive storage and remove files from the backup system. Cost avoidance would be achieved through slowing down the growth rate of primary storage and backups. Currently the agencies do not have a simple method to search for evidence or a consistent process for legal hold of data for investigation. This would provide an effective way to search through all online, archive and backup copies of an agency s information.

2j All $2,000,000 $0 $2,000,000 0.00 Monitoring Software Desktop $3,107,116 $895,620 $4,002,736 4.00 Implement Virtual Desktop 2k 2l TAM $1,445,337 $671,715 $2,117,052 3.00 Automation 2m Admin $253,558 $447,810 $701,368 2.00 Performance Management 2n Admin $226,779 $223,905 $450,684 1.00 Time Tracking 2o Admin $450,000 $0 $450,000 0.00 Proactive Customer $16,082,696 $5,373,719 $21,456,415 24.0 Purchase and install an all encompassing monitoring toolset will allow for monitoring of all the state's infrastructure and agency applications running on any platform 4 staff, hardware and software to implement virtual desktop service - 2,500 users @ $1,200 ($3,000 5 year TCO/2 years) Automate provisioning and other routine tasks that require manual support delaying server delivery time. Performance management software w/ 220 seats. This investment will allow ETS to manage to our strategic plan, cascading goals from the strategic plan down to the individual. $50,000/year software costs $100,000 implementation cost, one time. 2 FTE to support program area ongoing. Time tracking process in support of business within a business transformation, Full Cost. The Time Tracking tool will allow ETS units to track and collect information on actual time spent on customer and internal project allowing for accurate charge back. $50,000/year software costs $100,000 implementation cost, one time. One FTE t0 support Establish online service catalog and customer portal to support automated provisioning, performance reporting and customer support

DAS ETS 2015-17 Policy Option Packages - Support Agency IT Projects 3 All $10,267,790 $2,239,686 $12,507,476 10.00 Agency IT projects Companion POP Companion POP to agency projects which are submitted requiring ETS support through the 107BF14 process DAS ETS 2015-17 Policy Option Packages - Support Agency IT Purchases 4 All $7,512,805 $0 $7,512,805 0.00 Support Growth in Agency Purchases Limitation only for growth in passthrough. Supports growth in agency purchases of items such as long distance, network connections to field offices and agency specific software. $43,206,755 $11,196,246 $54,403,001 50 Total