Proposed Centralized Sales Support Server Implementation.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © 2004 South-Western. All rights reserved.18–1 Learning Goals components ways computers contribute challenges of managing today’s information.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
5205 – IT Service Delivery and Support
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
3 Cloud Computing.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS DRIVEN TECHNOLOGY Chapter Twelve: Integrating the Organization from.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
BUSINESS DRIVEN TECHNOLOGY
Part VII: Special Topics Introduction to Business 3e 18 Copyright © 2004 South-Western. All rights reserved. Using Information Technology.
Remote Support System in Medical Corporation Group 1.
What is Enterprise Architecture?
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
TECHNOLOGY GUIDE THREE
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Using Technology to Manage Information
The Environment. The business environment  The critical infrastructure business environment has changed Information Technology offers opportunity for.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Jon Walton Director of Technology Bay Area Technology Forum November 5, 2009 Technology Consolidation: Fact or Fiction.
+ SUH Incorporated Executive Briefing. + SUH Business Opportunity I.T. solutions are needed to improve SUH’s ability to operate Sales Support team would.
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Intranet Steve Andy Michael. Intranet A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Continental expects to increase system uptime, implement new services in minutes, and save up to $1.5 million a year in hardware, software, labor, implementation,
Introduction to IT investment decision-making Pertemuan 1-2 Matakuliah: A Strategi Investasi IT Tahun: 2009.
Amagees Tech Corp value added services Data Management and Infrastructure.
Review 1 Chapters Chapter 1 Understanding Computers, 12th Edition 2 Chapter 1 Explain why it is essential to learn about computers today and discuss.
CRM COMPUTING A Look At the Advantages and Disadvantages Madison Garvin.
LEFT BANK PICTURES NETWORK INTEGRATION Date. Executive Summary Business Problem: In 2012 Sony Pictures Television purchased a majority share in Left Bank.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Cloud Computing 3. TECHNOLOGY GUIDE 3: Cloud Computing 2 Copyright John Wiley & Sons Canada.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Clouding with Microsoft Azure
SDN & NFV Driving Additional Value into Managed Services.
Providing Teleworker Services
Discovering Computers 2010: Living in a Digital World Chapter 14
IDEA d.o.o. Accommodating rapid growth with an IBM System x and System Storage solution Business challenge: Because of rapid growth, Serbian food retailer.
Spectrum technologies
Providing Teleworker Services
BUSINESS DRIVEN TECHNOLOGY
VPN (Virtual Private Network)
The Need for Business Transformation Enhanced Competition in Business Need For More Operational Efficiency Pressure To Reduce Cost More Focus On Customers.
Mitel Networks SX-200 ICP Sales Training Terminology.
Virtual Private Network (VPN) Market
3 Cloud Computing.
Providing Teleworker Services
Providing Teleworker Services
AT&T/Cisco Partnership…Enabling Customer Success
Entry Guideline Template
In the attack index…what number is your Company?
Providing Teleworker Services
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Proposed Centralized Sales Support Server Implementation

Introduction SUH faces new challenges 3 unique and separate IT infrastructures Incompatibilities and frustrations Merging of all 3 networks Greater need for sales team support New and current employee training program An opportunity presents itself

Sales Support Server Hardware Components Hardware Components Server mainframe(s) VPN server Hard drive storage UPS Network infrastructure cabling

Sales Support Software Components Software Components Microsoft Server 2008 Enterprise Edition VmWare Virtualization VPN software

How Will It All Work? - What our new central server network will look like. - Connectivity between corporate and its subsidiaries. - Remote access for our travelling sales representatives. (Wikipedia,

Implementation Requirements Hardware and software components Resources IT training and support SDLC adherence Strong project management

IT Best Practices For Implementation Four IT Characteristics For Best Practices Accessibility Availability Reliability Usability

IT Best Practices For Operations and Sustainment Vulnerability Mitigation and Security Authentication and Authorization Prevention and Resistance Detection and Response

Sales Support Server As An Enterprise Wide Solution Enterprise Resource Planning Centralized access to all pertinent sales data Up to date sales reporting and forecasting Better statistical sales analysis Better decision making by senior management Bettering information sharing amongst corporate and its subsidiaries

Enterprise Wide Objectives Operational Goals, Benefits and Results Tangible Results Intangible Results Benefits Long Term Goals

In Summary… Centralized Sales Support Server Able to achieve our growing business requirements Meets essential sales support information technology demands Enhanced enterprise resource planning Increased information sharing Greater operational goals and benefits Increase in efficiency, productivity, and profitability

References CSIS. (2009, August 10). Twenty critical controls for effective cyber defense: consensus audit guidelines. Marakas, G., & O'Brien, J. (2011). Management information systems. (p. 320). New York, NY: The McGraw-Hill Company. Wikipedia. Image. Virtual private network. Retrieved from