Lesson 15 Total Cost of Ownership

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
Planning for Sustainable Desktop Computing Access ’98 Presentation Robert N. Kavanagh Associate Vice-President, Information Technology Services, University.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Firewall Configuration Strategies
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
Chapter 6 of the Executive Guide manual Technology.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Guide to TCP/IP Fourth Edition Chapter 11: Deploying IPv6.
9.3 Computer System Support. Total Cost of Operating Computer Systems Total Costs of Ownership (TCO) – costs of installing, operating & maintaining Includes.
SANS Technology Institute GDWP Presentation 1 GIAC Enterprises Network Deployment Phase 1: The Perimeter Rodney Caudle, Jay Radcliffe, and Jim Voorhees.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
TOTAL COST OF OWNERSHIP
An iterative approach to Desktop Virtualization By Mike Cave, Acting Chief Information Officer CA Department of Toxic Substances Control.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Lesson 15 Total Cost of Ownership. What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New.
E-TechServices's IT Strategy Open. Virtualize. Rationalize. A Strategy for Optimal IT Deployment.
Firewall Security.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Security fundamentals Topic 10 Securing the network perimeter.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Mindcraft is a registered trademark of Mindcraft, Inc. October 26, 1998Copyright 1998 Mindcraft, Inc. A Strategy for Buying Directory Servers Bruce Weiner.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
+ Lec#1: Planning, Designing, and Operating Local Area Networks 1 st semester CT.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Security fundamentals
Managed IT Solutions More Reliable Networks Are Our Business
Chapter 6: Securing the Cloud
Lesson 15 Total Cost of Ownership
COMP532 IT INFRASTRUCTURE
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Control system network security issues and recommendations
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Workgroup Technology Partners
Introduction to Operating Systems
Welcome To : Group 1 VC Presentation
IS4550 Security Policies and Implementation
Design Unit 26 Design a small or home office network
Firewalls Purpose of a Firewall Characteristic of a firewall
Professional Network Services
Contact Center Security Strategies
Level 2 Diploma Unit 11 IT Security
Firewalls Jiang Long Spring 2002.
How to Mitigate the Consequences What are the Countermeasures?
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Managed Content Services
Agenda The current Windows XP and Windows XP Desktop situation
Demystifying the Cloud
Implementing Firewalls
Presentation transcript:

Lesson 15 Total Cost of Ownership

What Drives TCO? Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New applications require new solutions

What Drives TCO in Security? Vendors produce in-secure applications Vulnerabilities proliferate Business processes depend on applications System availability drives profit

Components to Consider Initial Cost of Product (25% of life cycle) Vendor Support Services Deployment Services Time for Staff to Install and Configure Training Cost Post Deployment Support

How to Reduce TCO? Simplify Infrastructure (KISS) Upgrade Infrastructure When Timing is Right Minimize Labor Intensive Activities Consider Remote Management Know Your Assessment Parameters

T C O Security Risk Option 3 Option 2 Option 1 HIGH Budget Line Acceptable Risk Ideal Soln LOW HIGH LOW Security Risk

Evaluating the Options FIREWALL At Gateway Only Option 2 DMZ Firewall Architecture Anti Virus Software on all DMZ machines Option 3 DMZ, AV S/W on DMZ Machines VPN Access to all DMZ Machines AV S/W and Firewalls on all Clients

Evaluating Architectures Option 1 - Screening Router Option 2 - Dual Homed Host Option 3 - Bastion Host Option 4 – Screened subnet (DMZ) Which one cost more relative to risk?

Option 1: Screening Router Internet Screening Router

Option 2: Dual-homed Host Dual-homed host Architecture Internet Dual-homed host

Option 3: Bastion Host Screened host Architecture Screening Router Internet X Screening Router Bastion Host

Option 4: Screened Subnet Screened subnet Architecture—aka DMZ Internet FIREWALL Exterior Router Perimeter Network Interior Router Internal Network

Assumptions Cost of Router: $3000 Cost of Firewall: $5000 Cost of Security Administrator--$75K/year Managed Security Service Provider(MSSP)--$24K/year

Things to Consider Which Option Would You Choose? Is cost the only driver? Could You Determine TCO for the different architectures? Given a Set of Devices Could You Compute TCO?

Difficulties with ROI Investment decisions based on ability to demonstrate positive ROI ROI traditionally difficult to quantify for network security devices Difficult to calculate risk accurately due to subjectivity involved with quantification Business-relevant statistics regarding security incidents not always available for consideration in analyzing risk

Option Cost—In-house Manpower cost constant: $75K Option 1 - Screening Router: $78K HW Cost: $3K (cost of 1 router) Option 2 - Dual Homed Host: $80K HW Cost: $5K (FW cost) Option 3 - Bastion Host: $83K HW cost: $8000 (router + FW) Option 4 – Screened subnet (DMZ): $86K HW cost: $11000 (2 routers + FW)

Option Cost—MSSP Manpower cost constant: $24K Option 1 - Screening Router: $27K HW Cost: $3K (cost of 1 router) Option 2 - Dual Homed Host: $29k HW Cost: $5K (FW cost) Option 3 - Bastion Host: $32K HW cost: $8000 (router + FW) Option 4 – Screened subnet (DMZ): $35K HW cost: $11000 (2 routers + FW)

Summary What Drives TCO? Reducing TCO Option Analysis Assumptions and Considerations Difficulties with ROI