Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.

Slides:



Advertisements
Similar presentations
Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
Advertisements

RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
HIPAA Security Standards What’s happening in your office?
Firewall Configuration Strategies
IT’s Gone Mobile: How to do your Job Anywhere Jason Hand IT Specialist, Central NM Electric Cooperative Jason Hand Cell:
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
For more notes and topics visit:
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Microsoft DirectAccess & Work Folders NICHOLAS A. HAY MONROE COUNTY ISD
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
Security fundamentals
Virtual Private Network Access for Remote Networks
Getting Connected to NGS while on the Road…
Lecture 6: Cloud Computing
WHY VIDEO SURVELLIANCE
Chapter 7: Using Windows Servers
Technology Audit Brandon Hall.
Virtual Private Networks and IPSec
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 6: Securing the Cloud
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Introduction to Networking
Security of a Local Area Network
practice-questions.html If you Are Thinking about your dumps? Introduction:
Welcome To : Group 1 VC Presentation
Client-Server Computing
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Getting Connected to NGS while on the Road…
09/12/2018 Virtual Networks.
Unit 1.4 Wired and Wireless Networks Lesson 3
Networking and Security
Computer Technology Networks & Internet.
WHY VIDEO SURVELLIANCE
Presentation transcript:

Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location

Disclaimer Doing any of these opens your files to increased threat from the internet If you choose to do any of these options, you must ensure your setup has very strong passwords, up to date firmware and software, secure encryption algorithms, and is configured properly and safely If you choose to set this up, you should have a competent IT person configure this that is familiar with the protocols and concepts of keeping your information secure

Goals Discuss the problem and talk through some solutions Show you how these will be configured and how it works once complete Explain why owncloud is a secure alternative to dropbox and other cloud providers Show you the software and products necessary to make it happen

Achievement Points After attending this Tech Talk, you should be able to… Know what you need to complete this kind of setup Have an understanding of VPN connectivity and tell an IT person what you are wanting And imagine how this kind of ability could increase your own and your office’s productivity

Terminology VPN (Virtual Private Network) – a connection from one location to another location, secured by an encrypted tunnel that network traffic is passed through Cloud – accessible from the internet because it’s on the internet

Option one - VPN Setup a VPN and have your files shared Connect back to your office via tunnel Have access to your files and even remotely control your system if configured Safest and time proven method

How it works VPN VPN

Necessary Components A firewall capable of VPN connectivity Either a VPN client or to setup the built in VPN capabilities of your portable device A storage system to hold your files Static IP address greatly simplifies the process

Option two – ownCloud Works like Dropbox Syncs files between computers Has a web interface you can log into and see/edit documents like google docs Has a calendar and contacts Not as time proven as VPN Apple mobile app is 99 cents Can be used without exposing it to the internet

How it works Your office

Necessary components A server to host owncloud Virtual appliance does exist so it can be a vmware host or some other hypervisor Mobile devices need an app You should have either a static IP address or dynamic DNS to tell the DNS what your office’s IP address is if it changes A good firewall with DMZ

Option three - both You can setup a VPN and owncloud The files will only sync when you have the VPN tunnel established Adds a much heavier level of security and decreases network facing exposure Does increase complexity, but not terribly Removes the option for sharing files outside of the group of users that have the VPN software installed

Weigh the risk Do a cost/benefit analysis with the cost being what it would cost you if the data was exposed to an outside entity Will having these files accessible make me more productive and outweigh the risk What am I willing to spend to mitigate the risks to gain the benefit

Option four - wait We have been researching other third party options and all of them have come up short. We are still optimistic and haven’t given up hope of finding one that meets all the requirements Once we do find one, we will let everyone know how to get connected with them and how much it will cost

Conclusions File sharing has risks and benefits Not any one solution is perfect One of these options could benefit your current workflow and make you more productive

Questions?