Selecting a Business Continuity Planning Tool

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Security Update Server Registration, Active scanning and Windows patching.
MediTract Contract Management Software
Module 4: System Maintenance Intuit Financial Services University Internet Banking Certification Training.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
PKI and . Considerations Behind Firewall System Security On the Internet –Simple Mail Transfer Protocol (SMTP)
Changing the Economics of Innovation
LIONS LIONS. CTA Schedule Finder Requirements Overview Requirements Overview Technical Requirements Primary Functional Requirements Administrative Requirements.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Go to Enter your id and password and click Login button.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Shopping and ORM Solutions
YNG Solutions Website Usability Review Prepared by Josepha Rood December 19, 2008.
Live for today as if it is your last day but plan for tomorrow as if it will last forever!
Enterprise Physical Access Control System (ePACS) Overview Briefing
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Robin Daniels Sr. Manager, Product Marketing Running Your Business in the Cloud.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
VMware, Salesforce.com building Java cloud platform.
X POST. What is X POST? X Post is a web based application software the offers a combination of essentials tools to create rich contents in digital signage.
GLOCO – Integrated Corporate Portal Final Presentation Presented by Team 3 1 Team 3 Members: Joyce Torres Kenneth Kittredge Pamela Fisher Ruzhena Saltisky.
1 EIR Accessibility Web Scanning Program Jeff Kline, Statewide Accessibility Coordinator Texas Department of Information Resources October, 2012.
Supervisory Control and Data Acquisition (SCADA) Software.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Courier Tracking System. Small Courier Operations Small courier services collect Letters and parcels from customers and issues its own POD number Then.
Auditing Information Systems (AIS)
August Mr. Mike Finley, CISSP Senior Security Engineer Computer Science Corporation.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
WEEK INTRODUCTION CSC426 SOFTWARE ENGINEERING.
Database Administration
1 Grants.gov Update to the NGP February 1, Grants.gov System Improvements  December 11 – 12, 2010: Oracle Database version 11g upgrade  January.
DataFlow Diagram – Level 0
T8. Open Source Tools That are Changing the Content Technology Landscape Gilbane San Francisco 2010.
Train & Assess IT Office XP and Office 2003 Web-based Training and Assessment in a Single Product! New and Improved Enhancements Direct from Market and.
TrainingRegister® Training Management Software Maintain Permanent Training Records for Each Individual Monitor and Track Required Training Know Who Needs.
NIZHAL KANINI Nizhal Kanini has ventured into IT Industry with a dynamic team of qualified professionals to offer a comprehensive portfolio of Computer-
Smart Pharmacy. Introduction Current Scenario Software has become an indispensable tool in any organization. Companies are offering products that can.
IT Services Model Business Requirements IT Strategies Goals
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
10 things you can do today to reduce your security risk.
AIX to Linux Migration Project DeeDee Valdez and Wei Zhou IT Computing Platforms – DBA June 9, 2016.
Cisco Compliance Management and Configuration Service
Information Systems Development
(Hardware & Infrastructure)
Quicken Installation Problem Number More info :
Cloud Helps Schools Get Needed Tools
Strong Authentication and Single Sign-On (SSO) for Health Care
Malwarebytes Software Updating
Taxi App source code Development Company
Student Information System Project: (Shorthand: SIS!!!!)
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
ApplinX Rod Carlson Senior Technical Lead.
Contact Center Security Strategies
05 | Making the Cloud Transition
In House or Cloud Based ERP Implementation
BusinessObjects IN Cloud ……InfoSol’s story
King Saud University College of Engineering IE – 462: “Industrial Information Systems” Fall – 2018 (1st Sem H) Chapter 2 Information System.
Internet Engineering Course
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Presentation transcript:

Selecting a Business Continuity Planning Tool Katina Blue Director of Business Continuity and Disaster Recovery

DO YOUR RESEARCH Use search engines on the Internet Obtain referrals from colleagues Request demos Test for a period of time; don’t be anxious (6 months) Research the experience of the company; age of company and tool

AUDITING THE TOOL Compare Functionality and Flexibility Proprietary software vs. non-Proprietary software Ease of use Compare strengths and weakness to other tools Avoid persuasion from other colleagues Is it buggy? Stability of database

COST FACTORS Based on license Enterprise discounts Inflation over years Maintenance license

INFRASTRUCTURE Type of platforms the system operates on Type of database; is it proprietary? What type of Technical Support does the vendor offer

APPLICATION ADMINISTRATION Requires a system administrator Local installs versus web based Frequency of patches and updates Require vendor technical support or in-house administration Mitigate risks if you can!

SECURITY Web based security infrastructure Personalization of screens Uses Login ID and Password Security module to restrict plan access