Confidential: University of California San Francisco Medical Center Situation and background Risks Opportunities Evaluation of candidates Security compliance.

Slides:



Advertisements
Similar presentations
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Network Detective Prepared For: ABC Corp Prepared By: Roger G. Best.
Internet2, CENIC and Merit: Partnering to Deliver Cloud Services to California.
DISASTER CENTER Study Case DEMIRBANK ROMANIA “Piata Financiara” ConferenceJanuary 29, 2002 C 2002.
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Enabling Partners to Deliver Application Performance & Availability with vCloud Air and KEMP Technologies New York: Limerick:
Lisa Farmer, Cedo Vicente, Eric Ahlm
Agenda Survey service transition and retirement Examining your survey needs Evaluating application features Service providers.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Question: What is Secure Envelope?
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Data Center Solutions Marketing Data Center Business Advantage Customer Proof.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Toolbox Helping You Define Value and Close Business The Business Value of Hosted PBX/UC&C.
Prospect Name and Logo Presenter Name Date. 0001V1- 2 Objectives Introduction to USinternetworking iMAP Full Service Management Model USi Enterprise Messaging.
Team 2 - Chimera Consulting Portable Office Environment (POE) Christine Benoit Adam Fairhall Anni Hsia Tom Maciejczyk Anita Patel.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Module 9 Configuring Messaging Policy and Compliance.
Module 6 Planning and Deploying Messaging Security.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Computer Emergency Notification System (CENS)
Identity Standard Proposal Identity and Access Management Subcommittee December 12, 2013.
Module 9 Configuring Messaging Policy and Compliance.
VDI for Clinical Researchers TEAM 2 Mimoza Dimodugno Ian Goodsell Robert McPherson Mathew Olsen Jesse Rivera 12/15/2012.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
Implementing Microsoft Exchange Online with Microsoft Office 365
Cloud Computing Use Case Draft v2.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Overview-TPV Service Delivery
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
1 ITS STRATEGIC INITIATIVES Ken Orgill Assistant Vice Chancellor, Information Technology Services and Campus Chief Information Officer.
3 rd Party Registration & Account Management SMT Update To AMWG February 23, 2016.
Real Estate Updates Sarah Bush AVP for Real Estate ALG Meeting January 28 th, 2016.
Case Management: Functions & Tasks Martin B. Tracy, Ph.D. 4-7 November 2008 Ashgabat, Turkmenistan.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Santa Clara, CA (408)
1 ECM APPLICATIONS AND SOLUTIONS - PART 1 MODULE 8 ECM SPECIALIST COURSE 1 Copyright AIIM.
City of Hyattsville City Council IT Briefing October 19, 2015 dataprise.com | #ITinRealLife.
Barracuda Subscription and Support Upsell Opportunities
for Core Commodity Services through the Cloud and Collaboration
Instructional slide to Partner: REMOVE BEFORE PRESENTING TO CUSTOMER
Information Technology (IT) Department
Enterprise Content Management Owners Representative Contract Approval
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Agenda The current Windows XP and Windows XP Desktop situation
Cloud Management as a Service
From Baby Boomers to Millennials
NM Department of Homeland Security and Emergency Management
Presentation transcript:

Confidential: University of California San Francisco Medical Center Situation and background Risks Opportunities Evaluation of candidates Security compliance Core requirements Cost analysis Project recommendation Asks/Questions/Decisions Next steps User acceptance testing Architecture approval Deployment Slide 0 Agenda – Secure Project May 1, 2014 UCSF Information Technology

Confidential: University of California San Francisco Medical Center Allows with confidential information to be delivered securely outside of UCSF Primary users include: Health Care Providers Legal Department Finance Department Human Resources UCSF’s secure system will be end of life and out of compliance on November 14, 2014 All existing functionality will be replicated in the new system There is no migration path for the current system; this provides an opportunity to evaluate leaders in the market Slide 1 Secure Project

Confidential: University of California San Francisco Medical Center Slide 2 UCSF Flow Vontu Data Loss Prevention Tumbleweed Secure Antivirus and SPAM Hygiene server External Recipient Secure Access SSL UCSF Firewall UCSF Departments/Users To: Subject : Secure: PHI stuff

Confidential: University of California San Francisco Medical Center Slide 3 Gartner - Secure Gateway

Confidential: University of California San Francisco Medical Center Slide 4 Five Year TCO FIVE YEAR TCO ANALYSIS CISCO IRONPORT CLOUD CISCO IRONPORT APPLIANCE AXWAY MAILGATE APPLIANCE AXWAY MAILGATE CLOUD Capital Expenses Appliance (Two for redundancy) $ 6, $ 22, Implementation services $ 6, $ 3, Fifth year appliance refresh (Two for redundancy) $ 6, $ 25, Perpetual Software License $ 14, Cloud Set Up Fee $ 7, Operating Expenses Hosting Fee (5 years) $ 57, Annual Software License (5 years) $ 55, $ 77, $ 91, $ 81, TOTAL $ 82, $ 117, $ 164, $ 186,064.00

Confidential: University of California San Francisco Medical Center Cisco IronPort Lowest TCO for either cloud or on premise solution Leads Gartner’s Magic Quadrant for secure gateways Reduces risk of exposure from compromised accounts Meets all core requirements UCSF sender experience remains the same Slide 5 Secure Recommendation

Confidential: University of California San Francisco Medical Center 1.Please provide names of a few people who can assist with user acceptance testing. 2.Is the current Tier 3 classification correct? System recovery is 5 days, Recovery point is 24 hours Secure can be queued for delivery once the system is recovered Alternative communications would be utilized during an outage 3.Should external accounts be maintained longer than 1 year? Secure messages are purged after 60 days Maintaining external login accounts may increase security risk Short expiration could lead to higher volume of calls to the service desk and general dissatisfaction Slide 6 Asks/Questions/Decisions

Confidential: University of California San Francisco Medical Center User Acceptance Testing Account creation and navigation of interface Test sending, receiving, forwarding and recalling Architecture Validate design and implementation plans Procurement & Deployment Engage professional services Produce documentation and appropriate messaging for the user community Slide 7 Next Steps...

Confidential: University of California San Francisco Medical Center Slide 8 Secure Timeline