Lesson 15 Total Cost of Ownership

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Guide to Network Defense and Countermeasures Second Edition
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
Planning for Sustainable Desktop Computing Access ’98 Presentation Robert N. Kavanagh Associate Vice-President, Information Technology Services, University.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
SCSC 311 Information Systems: hardware and software.
Chapter 6 of the Executive Guide manual Technology.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Guide to TCP/IP Fourth Edition Chapter 11: Deploying IPv6.
9.3 Computer System Support. Total Cost of Operating Computer Systems Total Costs of Ownership (TCO) – costs of installing, operating & maintaining Includes.
SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
TOTAL COST OF OWNERSHIP
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
Firewall Security.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
verifone HQtm Estate Management Solution
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
“Business first, technology's the tool.”. The Application Hosting business model is based on a very simple idea:  Install application software on powerful.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Managed IT Solutions More Reliable Networks Are Our Business
Chapter 1 Computer Technology: Your Need to Know
Hosted Services Led by Jason Gross, Terrice McClain, & Jen Paulin
Chapter 6: Securing the Cloud
Distributed Asset Management Making The Business Case
Platform as a Service (PaaS)
COMP532 IT INFRASTRUCTURE
AT&T Premises-Based Firewall Enhanced SBS Solution
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
BANKING INFORMATION SYSTEMS
Control system network security issues and recommendations
Lesson 15 Total Cost of Ownership
MCSA VCE
Workgroup Technology Partners
Welcome To : Group 1 VC Presentation
What Do We Do? Managed IT services
Information Technology
Professional Network Services
Contact Center Security Strategies
EC Strategy, Globalization, and SMEs
Firewalls Jiang Long Spring 2002.
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Managed Content Services
Agenda The current Windows XP and Windows XP Desktop situation
Demystifying the Cloud
Implementing Firewalls
NFV and SD-WAN Multi vendor deployment
Presentation transcript:

Lesson 15 Total Cost of Ownership

What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New applications require new solutions

What Drives TCO in Security? Vendors produce in-secure applications Vulnerabilities proliferate Business processes depend on applications System availability drives profit

Components to Consider Initial Cost of Product (25% of life cycle) Vendor Support Services Deployment Services Time for Staff to Install and Configure Training Cost Post Deployment Support

How to Reduce TCO? Simplify Infrastructure (KISS) Upgrade Infrastructure When Timing is Right Minimize Labor Intensive Activities Consider Remote Management Know Your Assessment Parameters

T C O Security Risk Option 3 Option 2 Option 1 HIGH Budget Line Acceptable Risk Ideal Soln LOW HIGH LOW Security Risk

Evaluating the Options FIREWALL At Gateway Only Option 2 DMZ Firewall Architecture Anti Virus Software on all DMZ machines Option 3 DMZ, AV S/W on DMZ Machines VPN Access to all DMZ Machines AV S/W and Firewalls on all Clients

Evaluating Architectures Option 1 - Screening Router Option 2 - Dual Homed Host Option 3 - Bastion Host Option 4 – Screened subnet (DMZ) Which one cost more relative to risk?

Option 1: Screening Router Internet Screening Router

Option 2: Dual-homed Host Dual-homed host Architecture Internet Dual-homed host

Option 3: Bastion Host Screened host Architecture Screening Router Internet X Screening Router Bastion Host

Option 4: Screened Subnet Screened subnet Architecture—aka DMZ Internet FIREWALL Exterior Router Perimeter Network Interior Router Internal Network

Assumptions Cost of Router: $3000 Cost of Firewall: $5000 Cost of Security Administrator--$75K/year Managed Security Service Provider(MSSP)--$24K/year

Things to Consider Which Option Would You Choose? Is cost the only driver? Could You Determine TCO for the different architectures? Given a Set of Devices Could You Compute TCO?

Difficulties with ROI Investment decisions based on ability to demonstrate positive ROI ROI traditionally difficult to quantify for network security devices Difficult to calculate risk accurately due to subjectivity involved with quantification Business-relevant statistics regarding security incidents not always available for consideration in analyzing risk

Option Cost—In-house Manpower cost constant: $75K Option 1 - Screening Router: $78K HW Cost: $3K (cost of 1 router) Option 2 - Dual Homed Host: $80K HW Cost: $5K (FW cost) Option 3 - Bastion Host: $83K HW cost: $8000 (router + FW) Option 4 – Screened subnet (DMZ): $86K HW cost: $11000 (2 routers + FW)

Option Cost—MSSP Manpower cost constant: $24K Option 1 - Screening Router: $27K HW Cost: $3K (cost of 1 router) Option 2 - Dual Homed Host: $29k HW Cost: $5K (FW cost) Option 3 - Bastion Host: $32K HW cost: $8000 (router + FW) Option 4 – Screened subnet (DMZ): $35K HW cost: $11000 (2 routers + FW)

New Paradigm Needed? TJ Maxx Credit Card Theft: $450M Wonder if they had an ROI? Why not a TCS: Total Cost of Security? What would one short-term outage cost? What would one long-term outage cost? Could we survive losing customer data? What is it worth not to experience any of this? Could we make money off our security expenses via marketing, branding

Summary What Drives TCO? Reducing TCO Option Analysis Assumptions and Considerations Difficulties with ROI