Managed Services: No Headaches about Security Costs Hanover, CeBIT 2005.

Slides:



Advertisements
Similar presentations
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Fujitsu Siemens Computers at a glance Georgios Nikolopoulos Sales Manager November 2008.
EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
Private/Proprietary/Lock. Contains private and/or proprietary information. May not be used or disclosed outside the BellSouth and Cisco companies except.
QAD On Demand Operational Delivery Kory D. Johnson QAD Explore 2012.
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
by Evolve IP Managed Services
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
1 Private/Proprietary Not for disclosure outside BellSouth except by written agreement BellSouth DataCare IP Telephony Manager BellSouth DataCare IP Telephony.
Virtual Private Network
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
HiPath 4000 V1.0.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
MobileOffice – Mobile Communication Management Hanover, CeBIT 2005.
Global Infrastructure Management Business Update Vivek Gupta and Tom Tucker 20 th February, 2013 © 2013, Zensar Technologies. All Rights Reserved..
HiPath 4000 Converging Solutions for Enterprises Hanover, CeBIT 2005.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Smart Care Sales Simulation February 2009.
9,825,461,087,64 10,91 6,00 0,00 8,00 Information and Communication Networks HiPath 8000 with HiPath ComScendo Real Time IP Communication for Data Center.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
HiPath 8000 – Real Time Communications meet IT Data Centers Hanover, CeBIT 2005.
Field Force Mobility Optimizing the Field Forces Hanover, CeBIT 2005.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
“Hosted Voice Services: Are They Right for You?” Andy Morrow Executive Director-VoIP Product Management, SBC Communications
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
How to Sell T-Link TL250/300. T-Link Internet & Network Alarm Communicators Internet alarm communications for multi-branch Financial Institutions, Governments,
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Our Company What your are Getting If your workstation or laptop has been giving you problems, we can fix it and restore your productivity without adding.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
Take your business one step further… …let us show you HOW.
RMM / MDM Cloud Partner Training Series September 2015.
MANAGED LAN SERVICES How will you benefit? Managed LAN service  Full LAN service (hardware, operation, other services)  Per-port pricing  International.
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Securing Interconnect Networks By: Bryan Roberts.
Managed IT Services JND Consulting Group LLC
Copyright © 2013 OneNeck IT Services Corporation. All Rights Reserved. 1 Cloud Enablement For Microsoft Dynamics Cloud Enablement for Dynamics AX and Use.
IT – SERVICES with FINANCIAL GUARANTEE IT – SERVICES with FINANCIAL GUARANTEE
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Avtec Inc Virtualization - Securely Moving to the Cloud.
CSI - SMART Business NUF Thursday 17th November 2016.
Mobile equipment for vacuum control
BellSouth DataCare IP Telephony Manager July, 2004
Chapter 7. Identifying Assets and Activities to Be Protected
Virtual Private Networks (VPN)
AT&T Premises-Based Firewall Enhanced SBS Solution
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network
Professional Network Services
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

Managed Services: No Headaches about Security Costs Hanover, CeBIT 2005

© Siemens CeBIT Isn’t that your question? How can I concentrate on my core business and winning new customers without thinking of background infrastructure??  Isn’t there a partner who takes care about my communications infrastructure including it’s security?  How about Managed Services? Do I have to know by 100% my future needs and strategies? And can I afford it?  Isn’t my communication infrastructure the backbone for my business and shouldn’t I talk for it with the most reliable partner?

© Siemens CeBIT So far decisions for new investments were driven by cost reductions Today you look for new business opportunities und more added value reduce Cost of capital increase Productivity generate Value added Cost of operation reduce We concentrate on value for your business!

© Siemens CeBIT Concrete Scenario-Challenges for Travel and tourism agency, founded in 1945 with highest customer satisfaction rates 25 locations all over Berlin with full service offers for train and flight coonections Pooling data- and voice infrastructure without additional training measures for the employees Cost-efficient managed services security concept for secure data intimacy of customers

© Siemens CeBIT Scenario Highlights / Short Overview Installation of all needed service- processes: connection to management system, maintenance and support of security system Harmonizing of IP- Infrastructure, design of customer-specific security police Installation of firewall and outsourcing of security-tasks to Siemens Management Center

© Siemens CeBIT risc and before Traditional security areas Due to the increasing networking and cross-linking of electronic systems and infrastructures risks are increasing in the areas  abuse of information (illegal notice by third parties, falsification... )  loss of information internet / intranet client/server LAN / WAN Communication devices buildings people post & archive Are you aware of the security - topic? present security areas

© Siemens CeBIT risc und davor Cause analysis  Sensitive information is available through standard technology (PC), regardless of time and location  It takes minimum effort to access information effort brute force – high effort Break in, thievery „High Tech“ – but medium effort Bugging, spying „High Tech“ – but minimum effort Bugging, spying, sabotage It needs so little for great losses… internet / intranet client/server LAN / WAN Communication devices buildings people post & archive

© Siemens CeBIT Work place BEX employee Partner infrastructure BEX branch infrastructure BEX enterprise infrastructure Internet VPN Attacks on all flanks cracker & hacker fraud attack industrial espionnage fraud attack wiretapping viruses fraud attack

© Siemens CeBIT LAN Server Standort 1 Siemens Management Center Internet IP-Tunnel LAN Standort 3 LAN Standort 2 Server DSL-Router DSL- Anschluß E-Sienet DSL- Router Firewall mit VPN Requirement: xDSL-Access with fixed IP- address Design of a virtual private network with different locations: Secured end-to-end communication (VPN Tunnel) Encrypted data exchange with IP Sec Controlled communications through firewall functionality Standardized operations The solution: Managed Services for Security

© Siemens CeBIT h Your benefits  Transparent services costs and detailed SLAs  Secure Access for all employees to mission critical information and applications – anytime& anywhere across all devices  Convincing security concept for all cooperating partners (banks) and customers  Reliable availability for guaranteed ongoing business processes  Investment protection of existing infrastructure through smooth migration and upgradability  Saving of personnel costs and expenses tailored to real business needs  Clearly calculated ROI by well-experienced service- partners

© Siemens CeBIT Caution! Example configuration: price status 12/2004 E-Sienet 20 User/Business-Edition/: per user once-only arragement (without DMZ): 846,00 € Managed Services (3 years, p.m.): 449,09 € once-only costs HW / SW:7.274,12 € E-Sienet 50 User / Business-Edition: per user once-only arragement (without DMZ): 846,00 € Managed Services (3 years, p.m.): 485,75 € once-only costs HW / SW:10.059,94 € E-Sienet 100 User / Business-Edition: per user once-only arragement (without DMZ): 846,00 € Managed Services (3 years, p.m.): 632,39 € once-only costs HW / SW:14.242,78 € Managed Security with E-Sienet The SW-modules and services are scalable. Individual configurations and calculations are possible. 24/7 - Service VPN-Gateway (f.Service only ) -Server / Mail-Relay Spam-Mail-filter Virus Scanner (incl. Clients) The price for security – it’s nothing you couldn’t afford (calculation for scenario) Scenario BEX

© Siemens CeBIT Example invoice: E-Sienet  Considered: work of an administrator for supporting the overall system and administrative security measures: Basis (Hardware and Firewall): 10 h / p.m. Internet (Proxy, DNS, Mailforwarder, URL-Blocker): 5 h / p.m. Mailserver: 6 h / p.m. Web- / FTP- Server: 4 h / p.m. Backup (1 x Woche): 1 h / p.m. _________ Total:26 h / p.m.  Expense contains: Escalation, update of security-patches and general updates, monitoring of server processes, log-file analysis, configuration and user support. And imagine the employee resources you would have to build up…

© Siemens CeBIT  How much is a network administrator per hour?* Income, related costs ( € /Jahr gross):4.750,- € / p.m. Trainings: 200,- € / p.m. Yearly efficiency: h / p.a. 85 % productivity: h / p.a. ______________ resultant: 1 administrator hour costs (approx.): 40,25 € / Std.  For a appreciated efficiency from 26 h / p.m. the monthly outcome of administrative costs of ownership min. are: €  Monthly saving with Managed Security > 550 € ! Example: E-Sienet Business Edition with 50 users / 36 month How much is E-Sienet ? Monthly income (auf 36 Monate): 485,75 € / p.m.** Hardware / Software invest:10.059,94 € / once-only** Initiation:846,- € / once-only** ** Pakete: Firewall, Internet, Mail, WEB, Backup, alle Preisangaben sind Listenpreise; Preisstand: * Quelle: Heise And that’s our price - it’s nothing you couldn’t afford (ROI reflections for scenario)

© Siemens CeBIT HiPath Managed Services for Voice and Data Fault Management Configuration Management Accounting Management Performance Management Security Management Service Management 3rd Party Management & Services Business Continuation Services Help Desk International Management HiPath Managed Services Security Protection Service Monitoring ServiceAccess Service Detection Service Managed Services: a whole range of value levers for your business

© Siemens CeBIT For infrastructure services you should rely on the experience of your partner Our offerings are based upon... …Creative Problem Solving …Strategic Thinking …Industry Knowledge …Leading Edge Technology

© Siemens CeBIT Managed ServicesLifecycle ServicesProfessional Services Network Management Security Management Multi-Vendor Support Asset Management Communications Out- Tasking Service/Help Desk Technology Consulting Assessments Customization Systems Integration Design Project Mgmt Remote monitoring, diagnostics, reporting Hardware/software installation, maintenance, fixes, spare parts Moves, Adds, Changes (MAC) Training Manage Educate Support Build Design Consult Our Services Portfolio

© Siemens CeBIT Covering all vertical industry markets Services/Logistics Public/Health/Education US ARMY ? Media/Communications Industry/Retail Insurance/Banking

© Siemens CeBIT HiPath ComScendo HiPath ProCenter HiPath OpenScape HiPath MobileOffice Business Applications HiPath MetaManagement and HiPath QoS HiPath SIcurity IP Infrastructure Business Applications Common Application Platform HiPath Servers & Gateways HiPath Ready - Certified Applications Other Applications Huawei HiPath - Total Business Communications Components optiClients, optiPoints and Portals

Thank you! Your Questions please!