The Office of Information Technology Campus Network Upgrade A three year plan facilitating increased reliability, functionality and speed for the UTSA.

Slides:



Advertisements
Similar presentations
The Office of Information Technology ITA Meeting June 11, 2009 Travis Room, UC III (2.202)
Advertisements

The Office of Information Technology Network Access Control (NAC) Anthony Espinoza Information Security Officer UTSA Office of Information Security.
Campus Wide Microsoft Agreement for Desktop Suite Education Enrolment Solutions (EES agreement)
Guide to Network Defense and Countermeasures Second Edition
Technology Requirements for Online Testing Online Training Module for the Smarter Balanced Assessment.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Georgia Interoperability Network
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Secure Computing Network
Security Controls – What Works
Chapter 21 Successfully Implementing The Information System
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Prepared: October, Ann Garrett, State Chief Information Security Officer Statewide Security Update October 25, 2005 Information Technology Advisory.
Northern Arizona University Wi-Fi 2005 Flagstaff Campus Wireless Plan 4/11/2005.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
ITSC Report From The CIO: Network Program Update 25 September 2014.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Data Center and Network Planning and Services Mark Redican IET CCFIT Update Feb 13, 2012.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Windows 2000 Windows 2000 Project Team Division of Information Technology Mary Dickerson, MCSE, Project Leader University of Houston Windows 2000 University.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
© British Telecommunications plc BT Managed Services Innovate
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
The University of Texas at San Antonio The Office of Information Technology Network Upgrade Overview.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Lessons Learned: Certification and Accreditation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Information Technology Practical information for new faculty about information technology at Missouri S&T it.mst.edu Christopher Dew Director, IT Operations.
GrangeNet Dr. Greg Wickham APAN NOC 25 August 2005.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Wireless Intrusion Prevention System
Natick Public Schools Technology Update October 6, 2008 Dennis Roche, CISA Director of Technology.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
1 Evolution and Revolution: Windows 7 and Desktop Virtualization Changing the Desktop Support Landscape Denise Harrison, CIO and Vice President.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Maricopa Association of Governments Technology Assessment Group Steven Philbrick – Chief Information Officer Patrick Hait – Infrastructure Manager Jim.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Clouding with Microsoft Azure
Unit 4 – Network Threats and Vulnerabilities
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Microsoft SharePoint Server 2016
Site License Advisory Team
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Unit 27: Network Operating Systems
Based on work by DoIT Network Services, UW-Madison
PBA.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chapter 3 VLANs Chaffee County Academy
Discussion Government Private Business Tools for prevention Congress
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

The Office of Information Technology Campus Network Upgrade A three year plan facilitating increased reliability, functionality and speed for the UTSA network.

The Office of Information Technology Project Overview and Benefits Process Core - Build new 10 Gigabit per second (Gb/s) MPLS core capable backbone network Backbone - Upgrade 20 Main Switches – Each typical campus building has 1 main switch providing backbone connectivity to all areas of the building. Access - Upgrade to top of rack 10 Gigabit per second (Gb/s) capable switch in each of the 150 building data closets Benefits Increased Speed Ability to provide Gigabit speeds to the desktop - While the default connectivity provided to end users remains at 100 Mb/s, the upgrade has provided a 10 Gigabits per second (Gb/s) backbone connection to each network closet within a building. This increased bandwidth will enable connection speeds of up to 1 Gb/s where required for research or other needs. Increased Flexibility Traffic engineering – The new MPLS network will allow UTSA to determine specific paths for network traffic which will provide greater security flexibility. VLANs – With the current network design, departmental networks are limited to a geographic area and may span multiple IP subnets. The new network will provide a wide range of options for extending networks across campus (VPLS, L3 VPN, etc.)

The Office of Information Technology Deployment Year 1 TaskDateStatus Product review and vendor selectionOctober January 2009Complete Network Planning and DesignFebruary May 2009Complete New core network deployed in parallel with existing UTSA network June 2009Complete AET Building on new networkAugust 2009Complete JPL building on new networkNovember 2009Complete Science building on new networkDecember 2009Complete Funding $1,597, /13/08 Status

The Office of Information Technology Deployment Year 2 TaskDateStatus Physical Plant Building on new networkFebruary 2010Complete Main Building on new networkMarch 2010Complete Bioscience Engineering Building on new network May 2010In Progress Business Building on new networkJuly 2010Scheduled University Center buildings on new network August 2010Scheduled Engineering Building on new networkSeptember 2010Scheduled Arts Building on new networkOctober 2010Scheduled Funding $1,475, /16/09 Status

The Office of Information Technology Deployment Year 3 TaskDateStatus MS Building on new networkFebruary 2011 HSS Building on new networkMarch 2011 BSA Building on new networkMay 2011 University Heights Building on new networkJuly 2011 Monterrey Building on new networkAugust 2011 Frio Building on new networkSeptember 2011 Durango Building on new networkOctober 2011 ITC Building on new networkOctober 2011 Requested Funding $1,485, Status

The Office of Information Technology Information Security Initiative

The Office of Information Technology Deployment Year 1  Senior Information Security Analyst Salary + benefits 2/1/09 – 8/31/09 - $42,000  Assist the Information Security Officer (ISO) in developing and implementing tools and applications needed to protect our networks and systems from internal and external threats  Lead of Ediscovery program  Information Security Trainer Salary + benefits 4/6/09 – 8/31/09 - $22,000  Computer systems to support the two new positions - $6000  Encase Acquition - $77,000  EnCase is forensic software used by many law enforcement agencies and corporations around the world to support civil/criminal investigations, network investigations, data compliance and electronic discovery. We use the product to support the Legal Office’s litigation cases. Currently we have 24 cases involving 186 personnel.forensic softwarelaw enforcement agencieselectronic discovery  Rolled Over $110, to Year 2 Funding $256,364 10/13/08

The Office of Information Technology Year 1 Training  Developed the ISO training program and presented to 790 personnel Outreach Activity# of SessionsTotal Number of Attendees New Employee Orientation (Classroom Style) Presentations to students (in class)11382 Presentations to UTSA community6125 Windows Administrator Class735 Protecting UTSA Data831 TOTALS54790

The Office of Information Technology Deployment Year 2  Senior Information Security Analyst and Information Security Trainer Salary + benefits - $134,000  Laptop Encryption Phase 1 - $42,000  UTSA President issued a mandate that affects every campus laptop user: all university- owned laptops will be encrypted. This mandate is in response to UT System Security Practice Bulletin #1 (PDF).mandateUT System Security Practice Bulletin #1  Will increase our Information Security Program Index Score  Over 1000 laptops encrypted in Phase I  Configuration and Asset Management Infrastructure for Window, Mac, and Linux systems - $60,000  Provides us the ability to manage the security of over 5000 desktops, servers and other computers and to discover in detail what software is loaded and functioning on each machine.  Software is provided by UT System at no cost.  Will increase our Information Security Program Index Score Funding $284,328

The Office of Information Technology Deployment Year 2 (Con’t)  McAfee - $38,000  One year renewal for Anti-Virus software. Will be phased out by August 31, Is being replaced by Microsoft Forefront at no additional cost to the university  Provides protection to over 5000 desktops, laptops and servers from malware introduced into those devices.  Saint - $30,000  Provides UTSA a tool to conduct vulnerability assessments.  Provides scans to meet Payment Card Industry (PCI) compliance. (still negotiating)  Assessments are required annually by the Department of Information Resources and UT System  Will increase our Information Security Program Index Score  Software Maintenance for EnCase - $12,000  Planning to roll over $75,000 to Year 3

The Office of Information Technology Deployment Year 3  Senior Information Security Analyst and Information Security Trainer Salary + benefits - $138,000  Software Maintenance for Encase ($12k), Saint ($3k), Arbor($5k) - $20,000  Network Access Control (NAC) – $64,000  Prevents computers from accessing the UTSA network until they’ve met certain conditions. This protects UTSA from malware being introduced into our network.  Web Vulnerability Tool - $50,000  Provide UTSA the ability to scan our web sites for vulnerabilities. This reduces the chances of the web sites being hacked.  Will increase our Information Security Program Index Score  Laptop Encryption - $26,000  Phase II of Laptop encryption – Downtown Campus  Laptop Encryption Tool for Macs Requested Funding - $288,555