Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe

Slides:



Advertisements
Similar presentations
May 10, 2001An Overview of the Princeton University Web 1 Undergraduate Student Government Portal  History - Found at
Advertisements

Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Microsoft Dynamics. Introducing Al-Futtaim Technologies  One of the region’s leading System Integrators  Strong partnerships with leading global ICT.
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
Cross Platform Development the Good, the Bad, and the Ugly WIFI: BRGuest / Gu3st!
The IP Communications Top 5 Richard McLeod Director, IP Communications Worldwide Channels Cisco Systems.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CFO Summit. Microsoft Business Solutions Customer Relationship Management (aka Microsoft CRM) Building Profitable Customer Relationships Alex Simons Product.
Project 2003 Presentation Ben Howard 15 th July 2003.
Kony Vertical Apps Ready to Run and Accelerators.
+ SUH Incorporated Executive Briefing. + SUH Business Opportunity I.T. solutions are needed to improve SUH’s ability to operate Sales Support team would.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
RMM / MDM Cloud Partner Training Series September 2015.
 Has computer technology knowledge and programming expertise  Understands business problems  Uses logical methods for solving problems  Has fundamental.
The Information Age Redefining the Rules of Business.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
Sierra Pacific Community College District 7300 College Avenue Sacramento, CA
Who are we? We’re one of Europe and Asia’s top consumer finance lenders We want to help our clients realise their dreams in a financially secure way We.
What is Cloud Computing?
Information Systems in Organizations 1.1 Introduction to MIS
Mobile application and website to buy and sell books
The BEST Citrix/Microsoft RDS alternative
Information Systems in Organizations 1.1 Introduction to MIS
Transform yourself and build your IT cloud career path
Segmap Solutions Mapping segments.
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
AT&T Premises-Based Firewall Enhanced SBS Solution
Discovering Computers 2010: Living in a Digital World Chapter 14
Enterprise-level Identity Protection
Top 5 Ways To Change The #Marketing Conversation with Your Customer Around PC Refresh December 2016.
Data Center Firewall.
Information Systems in Organizations 1.1 Introduction to MIS
Hot Topics:Mobility in the Cloud
Eric Miller, Megan Gallagher & Melissa Mulvey
Niv Gross, Ohad Ifrach, Ortal Israel
Information Systems in Organizations 1
Project Work - Topic Selection
Get In Touch With Canon Printer Phone Number For Online Tech support
Securing Information Systems
BOMGAR REMOTE SUPPORT Karl Lankford
Today’s Risk. Today’s Solutions. Cyber security and
Computerized and Manual Systems
Web Application Development Company - Sara Analytics Pvt. Ltd.
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Information Systems in Organizations 1.1 Introduction to MIS
Address: 223/224 Global Business Park, Chandigarh, Mob: Phone:
Information Systems in Organizations 1.1 Introduction to MIS
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
MIS5001: Information Technology Management The Strategic Role of IT
Information Systems in Organizations 1.1 Introduction to MIS
UNC Banding Decision Bands Bret Naber CHECO – Salary Banding
Information Systems in Organizations 1.1 Introduction to MIS
WorkFit Jon, Matt, Thompson, Sara.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
National Cyber Security
Searchable. Secure. Simple.
Information Systems in Organizations 1.1 Introduction to MIS
Team/Company Name Proof of Concept Fund.
Information Systems in Organizations 1.1 Introduction to MIS
A Retail Software Company
By: Kelly Conger, Ryan Gibbons, Liwei Yi, Jiawei Huang
Information Systems in Organizations 1.1 Introduction to MIS
Administrative Software in Microsoft Azure Lets Companies Increase Productivity and Control “After conducting analysis and research for the best offer.
The MobileIron® Threat Detection difference:
Information Systems in Organizations 1.1 Introduction to MIS
Latest Practice Test Dumps
LimitList Ahmad, Anna, Ian.
Presentation transcript:

Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe PROtect Cyber Security Management Tool Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe

CYBER SECURITY CONCERNS 67% of Businesses Reported an Incident  Incidents and Crime Growing Rapidly Professional Services, Lost Business Opportunities, Down-time Average SMB Security Incident Costs $38,000 President Elect’s First 100 Days National Focus on Cyber Security Problem – what is the problem you are trying to solve? Why is it important? Why should we care? (use the materials from the project charter)

WHY YOU NEED PROtect SMB Driven Services Cross-platform Access Tools & Education Cross-platform Access Web Portal Mobile Application Ease of Use Created for Non-IT Professionals Customer Support Solution – description of the solution – what is it? how does it work? (use the materials from the project charter) 

ENTERPRISE ARCHITECTURE Prototype demonstration in class. (MIS 3504) 

PROCESS MODEL OVERVIEW Data and process model overview – what is the data model of the solution? What is the process model (MIS 2502 and MIS 3504)

PROCESS MODEL OVERVIEW Data and process model overview – what is the data model of the solution? What is the process model (MIS 2502 and MIS 3504)

Users Jackson Taylor Administrator “I am looking for a service that allows me to manage threats that may occur for our company stemming from the employee’s personal devices.” Taylor Sales Associate “I use my personal laptop and cell phone to complete a majority of my work tasks while I am on the road.”

Solution Demonstration PROtect

Phase 2 Phase 1 Phase 3 Implementation Plan Where We Are Now Customer Acquisition Customer Support Web Portal & Mobile App Development Phase 1 What’s Next Additional Monitoring IDS/IPS DNS Phase 2 Where We Want To End Up Consulting Services Pen Testing Proactive Services Corporate Partnerships Phase 3 Implementation plan – what steps do you need to take to put your solution into operation? How did you get here? (MIS 3535) 

FINANCIAL SCOPE Basic financials for years 1, 2, and 3 including income (sales and other sources) and expenses (marketing, salaries, computing, servers, etc.) (use the template)

Professional threat protection for your business. Goodbye Cyber Threats PROtect Professional threat protection for your business.