1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials.

Slides:



Advertisements
Similar presentations
Tomorrows Technology For Todays Business. McAfee.com Background Internets largest consumer ASP Online security, privacy and PC management services Largest.
Advertisements

1 Capability Set - Bullet. 2 Common Community Problems Too Much Information –Institutions have to SPAM their faculty and students –Too many online sources.
1 Capability Set - Detail. 2 Common Content Problems Content Mayhem –File management and storage confusion Content Multiplication –Editing déjà vu - same.
Four ways to give electronically 1. Making it easy for givers to give! 2.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Complete Automatic Observation for Middle School Education Hongfeng GUO Global Hands-on Universe Conference JUL Tokyo, Japan National Astronomical.
0 - 0.
Addition Facts
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Using Family Connection Online Resource for Planning & Advising.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Information Technology Environmental Scan Information Sources State of Maryland, USM, MHEC IT Plans SU IT Plan,Tech Fluency Policy, and 2001 Tech survey.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
Chapter 11: The X Window System Guide To UNIX Using Linux Third Edition.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Beyond virtualization  Complete virtualization platform  Improved scalability and performance.
Chapter 7: Intranet LAN Design
Addition 1’s to 20.
How To Set Up A Wireless Network Using A D-Link Wireless Router
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Position Opening Page 1 Job Classification: Network Server Administrator Opening Date: June 27, 2014 Location: Dobson Office Closing Date: July 7, 2014Grade:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Working for a hospital at home (Teleworking). Teleworking Home working or teleworking for hospitals staff is the process where they work from home using.
9/18/2015www.protocolnet.com1 PROTOCOL ONLINE SERVICES Pvt. Ltd., “To become a leader in Information Technology by providing entire spectrum of hardware,
ESubnet Enterprises Inc. Richard Danielli, eSubnet Higher sales volumes through high network availability INTIX 2010.
© British Telecommunications plc BT Managed Services Innovate
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
BroncoFusion September 25, 2013 Instructional & Information Technology (I&IT) Carol Gonzales, Assoc. CIO, Projects & Support Candie McDougall, Lead,
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
| IIT Annual Update Overview Divisional Update IIT Staff are focused on customers first IIT has improved the learner experience.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Managed IT Solutions More Reliable Networks Are Our Business
Fourth Dimension Technologies
CHALLENGES Users growing and becoming more demanding
CompTIA Security+ SY0-401 Real Exam Question Answer
Control system network security issues and recommendations
How a Network Works The network in this presentation belongs to Informa Software, Maitland FL.
CCNET Managed Services
PROFILE Sweet spot Budgets Regional campuses Community colleges
Implementing Client Security on Windows 2000 and Windows XP Level 150
Network hardening Chapter 14.
Online Learning.
Capitalize on Your Business’s Technology
Presentation transcript:

1 CHALLENGES Users growing and becoming more demanding –E-learning, electronic registration and other services –Require 24x7 access to learning materials hosted on remote servers Exploding wireless adds to support burden High bandwidth utilization downloads –Video clips –Music –Computer games

2 SECURITY CHALLENGES Overall philosophy that information must be shared…not necessarily protected –Many depts. run FTP, Web Server software –Lax password security –Desktops, laptops not professionally administered –Unwitting launch pad for DoS attacks Explosion in wireless growth –Prime vector for fast, repeated viral infections –Poor set-up parameters result in vulnerabilities Staffing/budgeting issues preclude hiring security expertise

3 DELL CAN HELP Assures uptime of critical systems hosting Learning Management Systems Bridges gap between 24x7 users and 8am-6pm staff Proactively identifies and protects critical resources against security threats Cost-effectively monitors and secures wireless access points

4 ONE INTEGRATED VIEW OF NETWORKS AND SECURITY

5 CASE STUDY: Profile: –Oldest community college in CA –20,000 + full-time students –17 IT professionals (labs, , PCs, support, etc) –Multiple locations connected by T1s Issues: –Distance learning increased demand for 24x7 uptime –Problems detecting failed online registration servers –Couldnt dedicate operations staff to IT monitoring

6 Maximize Uptime Of Registration Servers We continually needed to extend student online registration due to server uptime issues. One of our favorite Dell features is the ability to proactively alert on multiple network performance issues, then provide us with recommendations that enable us to preempt costly network downtime. Name, Title Institution

7 OPTIMIZE UPTIME OF LEARNING MANAGEMENT SYSTEMS What was my Spanish grade? Can Dr. Richards post the Geology 101 syllabus? …Reading lists for the quarter?

8 ENSURE CRITICAL SYSTEMS ARE UP Can students register for classes 24x7? Do we need to schedule additional time for sophomore registration?

9 IDENTIFY INCREASING BANDWIDTH UTILIZATION Why is access to remote campus resources slow? Flags unusual bandwidth increases

10 OPTIMIZE AVAILABILITY OF WIRELESS NETWORK Avoid monitoring every single access point Monitor strategic points – firewalls, routers, switches

11 CASE STUDY: Profile: –50,000 students; 16 campuses –Predominantly Microsoft shop –Using Dell to protect and optimize availability of core apps, such as HR, payroll, student records Previous issues: –Cost-prohibitive to hire multiple security experts –Products brought into the university are insecure out of the box –Cant keep up with Microsoft patches Institution logo / graphic

12 DOCUMENT ASSETS…BEFORE IMPLEMENTING SECURITY PLANS Automatically discovers IT assets Documents equipment, O/S, software packs Customizable notes section

13 PROACTIVELY IDENTIFY ATTACK VULNERABILITIES Protect against legal liability in serving as a launch pad for DoS attacks Ongoing white hat scanning

14 Which of my core business servers are missing the most patches? PROACTIVE SERVER RESOURCE MANAGEMENT

15 CORPORATE BACKGROUND Add company boilerplate info