CHALLENGES Users growing and becoming more demanding

Slides:



Advertisements
Similar presentations
1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
“Your On-Call Source for Technology Solutions”. Our Mission We help our clients make the right Technology decisions for their business We help our clients.
Position Opening Page 1 Job Classification: Network Server Administrator Opening Date: June 27, 2014 Location: Dobson Office Closing Date: July 7, 2014Grade:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
MANIT WEB HOSTING SERVICES Presented by - Sandeep Jain & Devesh Lal CRISP, Bhopal.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
 Academic   Administrative ◦ Departments  Desktop Services  Networking & Telecommunications  Computer Center ◦ Office of Computer and Information.
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© British Telecommunications plc BT Managed Services Innovate
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
The Microsoft Baseline Security Analyzer A practical look….
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
BroncoFusion September 25, 2013 Instructional & Information Technology (I&IT) Carol Gonzales, Assoc. CIO, Projects & Support Candie McDougall, Lead,
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Statistics Canada1 Statistics Canada’s strategic approach to IT Security OECD Conference on IT Security Paris, April 19th and 20th, 2001 Dave Venables.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
| IIT Annual Update Overview Divisional Update IIT Staff are focused on customers first IIT has improved the learner experience.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Yanz Limited IT SUPPORT BRISTOL - IT CONSULTANCY SERVICES ( ) Website : Contact us :
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Information Technology Services (ITS)
Managed IT Solutions More Reliable Networks Are Our Business
Fourth Dimension Technologies
Overview: Cloud Datacenters
The All In One Hosted Solution
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cloud Firewall.
CompTIA Security+ SY0-401 Real Exam Question Answer
Data Center Firewall.
Control system network security issues and recommendations
How a Network Works The network in this presentation belongs to Informa Software, Maitland FL.
CCNET Managed Services
PROFILE Sweet spot Budgets Regional campuses Community colleges
March 9, 2017 Technology committee.
Download dumps - Microsoft Real Exam Questions Dumps4download
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Unit 36: Internet Server Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
Network hardening Chapter 14.
Online Learning.
Agenda The current Windows XP and Windows XP Desktop situation
Capitalize on Your Business’s Technology
Securing web applications Externally
IT Management, Simplified
Presentation transcript:

CHALLENGES Users growing and becoming more demanding E-learning, electronic registration and other services Require 24x7 access to learning materials hosted on remote servers Exploding wireless adds to support burden High bandwidth utilization downloads Video clips Music Computer games

SECURITY CHALLENGES Overall philosophy that information must be shared…not necessarily protected Many depts. run FTP, Web Server software Lax password security Desktops, laptops not professionally administered Unwitting “launch pad” for DoS attacks Explosion in wireless growth Prime “vector” for fast, repeated viral infections Poor set-up parameters result in vulnerabilities Staffing/budgeting issues preclude hiring security expertise

DELL CAN HELP Assures uptime of critical systems hosting Learning Management Systems Bridges gap between 24x7 users and 8am-6pm staff Proactively identifies and protects critical resources against security threats Cost-effectively monitors and secures wireless access points

ONE INTEGRATED VIEW OF NETWORKS AND SECURITY

CASE STUDY: <COMPANY> Profile: Oldest community college in CA 20,000 + full-time students 17 IT professionals (labs, email, PCs, support, etc) Multiple locations connected by T1s Issues: Distance learning increased demand for 24x7 uptime Problems detecting failed online registration servers Couldn’t dedicate operations staff to IT monitoring

Maximize Uptime Of Registration Servers “We continually needed to extend student online registration due to server uptime issues. One of our favorite Dell features is the ability to proactively alert on multiple network performance issues, then provide us with recommendations that enable us to preempt costly network downtime.” Name, Title Institution

OPTIMIZE UPTIME OF LEARNING MANAGEMENT SYSTEMS …Reading lists for the quarter? What was my Spanish grade? Can Dr. Richards post the Geology 101 syllabus?

ENSURE CRITICAL SYSTEMS ARE UP Do we need to schedule additional time for sophomore registration? Can students register for classes 24x7?

IDENTIFY INCREASING BANDWIDTH UTILIZATION Flags unusual bandwidth increases Why is access to remote campus resources slow?

OPTIMIZE AVAILABILITY OF WIRELESS NETWORK Avoid monitoring every single access point Monitor strategic points – firewalls, routers, switches

CASE STUDY: <INSTITUTION> Profile: 50,000 students; 16 campuses Predominantly Microsoft shop Using Dell to protect and optimize availability of core apps, such as HR, payroll, student records Previous issues: Cost-prohibitive to hire multiple security experts Products brought into the university are “insecure out of the box” Can’t keep up with Microsoft patches Institution logo / graphic

DOCUMENT ASSETS…BEFORE IMPLEMENTING SECURITY PLANS Automatically discovers IT assets Documents equipment, O/S, software packs Customizable notes section

PROACTIVELY IDENTIFY ATTACK VULNERABILITIES Protect against legal liability in serving as a launch pad for DoS attacks Ongoing “white hat” scanning

PROACTIVE SERVER RESOURCE MANAGEMENT Which of my core business servers are missing the most patches?

CORPORATE BACKGROUND Add company boilerplate info