www.itexpo.com October 10-13, 2006 San Diego Convention Center, San Diego California Integrating Preparedness Into Everyday Operations Jeffrey Stern Vice.

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

Introduction to InMage Solutions Eric Burgener Senior Vice President, Product Management May2009.
1/16/20141 Introduction to InMage Solutions Eric Burgener Senior Vice President, Product Management December 2009.
ACT Canada TDM Summit Halifax| October, 2008 Telework Pilot : The City of Calgary.
Infrastructure Services. Introducing Al-Futtaim Technologies One of the regions leading System Integrators Strong partnerships with leading global ICT.
-Grids and the OptIPuter Software Architecture Andrew A. Chien Director, Center for Networked Systems SAIC Chair Professor, Computer Science and Engineering.
Cloud Computing: Theirs, Mine and Ours Belinda G. Watkins, VP EIS - Network Computing FedEx Services March 11, 2011.
Trends & Emerging Technology Tim O'Brien, Technology Consultant.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Business Continuity Moving from Disaster Recovery to Constant Availability Dan.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
Session 131 Hazard Mapping and Modeling Supporting Emergency Response Operations using GIS and Modeling.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
NetMotion Wireless Get Connected. Stay Connected..
WAN Technology Overview Lecture 3: Introduction to WAN.
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
October 10-13, 2006 San Diego Convention Center, San Diego California Introduction to WiFi Telephony Thursday - 10/12/06, 8:30-9:15am David.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
How to Manage the Organizational Change LaMarsh & Associates, Inc.
Business Continuity & Disaster Planning Incorporating Telework into Robust plans.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
January 30, 2007 Advanced Uses of Telecommunications Infrastructure.
NORDUnet NORDUnet The Fibre Generation Lars Fischer CTO NORDUnet.
Teleworking and Remote Access Presented by: Khalid Anjum Director, Department of Information Technology Middlesex County New Jersey.
October 10-13, 2006 San Diego Convention Center, San Diego California Making the Case for Hosted IP-PBX It’s the economy…and it’s not stupid.
The Case for Teleworking Making the case for teleworking from our experience at Orange Business Services. 19 May 2010.
® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Telework and COOP Different Goals, Common Technologies. Chad Smith-Collingwood Senior.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
2002 L eadership P l a n n i n g C o n f e r e n c e Derrick Hamilton Vice President SBC Midwest Network Services Growing Possibilities: The SBC Network.
October 10-13, 2006 San Diego Convention Center, San Diego California Learning to Embrace Hosted VoIP TM
Using the Intranet for Knowledge Management ISM 6021 By: Diana DeFazio - Carro.
October 10-13, 2006 San Diego Convention Center, San Diego California High Availability Corporate Faxing Disaster Recovery and Business.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
Application Development Tools A look at the future Ron Romanchik Vice President, Sales for North America AudioCodes Blade Business Line.
October 10-13, 2006 San Diego Convention Center, San Diego California Effective Deployment and Migration Strategies Leigh Fatzinger, VP.
October 10-13, 2006 San Diego Convention Center, San Diego California Extending the Value of Your VoIP Investment to Business Applications.
October 10-13, 2006 San Diego Convention Center, San Diego California Learning to Embrace Hosted VoIP Friday, October 13, :15 p.m.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Multi Location Workplace Initiative Presented to the Governor’s Telework Task Force October 5, 2005 Michael Shear POCKETS Distributed Workplace Alternative,
October 10-13, 2006 San Diego Convention Center, San Diego California Prospecting It’s like mining for gold...right?
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Intelligent Interconnects in the VoIP Peering Environment John Longo VP Product Marketing & Management, NextPoint.
October 10-13, 2006 San Diego Convention Center, San Diego California VOIP/FOIP Solutions and Strategic Partnering – A Seducible Moment.
IP telephony is revolutionizing communications. Enhanced services, efficiency increases, and of course, cheaper long- distance are all playing a part in.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
October 10-13, 2006 San Diego Convention Center, San Diego California Staging and Cutting Your IP PBX “The Install”
Virtual Private Networks
Providing Teleworker Services
Technology & Human Capital Management
Case studies in Engineering
Server Consolidation and Virtualization
Virtual Private Networks (VPN)
How to prepare for the End of License of Windows Server 2012/R2
SmartHOTEL Solutions Powered by Microsoft Azure Provide Hoteliers with Comprehensive, One-Stop Automated Management of All Booking Channels MICROSOFT AZURE.
Issues with Your D-Link Router; Call D-Link Router Customer Support Number
KMS Synthesis & Analysis
The Business Value of MPLS VPNs
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Internet protocol stack
Presentation transcript:

October 10-13, 2006 San Diego Convention Center, San Diego California Integrating Preparedness Into Everyday Operations Jeffrey Stern Vice President, Business Development

October 10-13, 2006 San Diego Convention Center, San Diego California Productivity Identifying the Goal Time TodayDisruptive Event Recovery Trajectory Partial Preparedness “Response” Zone “Target” Zone

October 10-13, 2006 San Diego Convention Center, San Diego California The Problem: 3-Parts & Cyclical Technical Issues  Change is constant  Multiple infrastructures Social Issues  Change is hard  People forget Business Issues  Change is constant  Limited resources

October 10-13, 2006 San Diego Convention Center, San Diego California Social Engineering  Practice “Teleworking”, Not “Disaster Drills”  Change-related issues mitigated  Enables adaptive workflow, knowledge and tools are in place and operational  Teleworking Goals  100% of workforce teleworking 20% of the time  Culture: Nothing special, just the way work gets done The Telework Coalition

October 10-13, 2006 San Diego Convention Center, San Diego California Social Engineering The Telework Coalition Telework Benchmark Study 2006 “A telework program pays for itself in reduced real estate needs, increased employee productivity, improved employee retention, reduced absenteeism, and the opportunity to recruit from a larger talent pool.”  Current benefits (not just “in the event of…”)

October 10-13, 2006 San Diego Convention Center, San Diego California Assessing Resiliency ApplicationsDistributed? Accessibility? DataReplicated? Frequency? HardwareRedundant? Distributed? Internet/WANMultiple connections? Speed? SecurityUnintentional barrier? Compromised? LAN/EthernetReplicable? Technical Engineering Technology Inventory Resiliency vs. Co$t? Frequency x Duration x Hourly Cost = Lost Profits Source: ComputerWorld

October 10-13, 2006 San Diego Convention Center, San Diego California LAN/ Ethernet Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical OSI 7 Layer Model Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical Headquarters Data In Data Out Teleworker VPN Are Not Ethernet IPSec VPNs SSL VPNs VPNs  Behavior change  Not like ‘being in the office’  Poorer performance  Some apps, net svcs, simply not supported  Flooding likely, not an everyday, everyone, everything tool  Dynamic provisioning?

October 10-13, 2006 San Diego Convention Center, San Diego California LAN/ Ethernet Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical OSI 7 Layer Model Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link Layer 1 Physical Headquarters Data In Data Out Teleworker Ethernet is Everyday Ethernet Advantage  No Behavior change  Absorbs change  Eliminates Remote Access  Performance  Universal applicability  Universal compatibility  Major cost benefit as everything rides for free  Simple & intuitive  Everyday preparedness

October 10-13, 2006 San Diego Convention Center, San Diego California Technical Issues  Change is constant  Multiple infrastructures Social Issues  Change is hard  People forget Business Issues  Change is constant  Limited resources Aim Above the “Response Zone” Ethernet Advantage  No Behavior change  Absorbs change  Eliminates Remote Access  Performance  Universal applicability  Universal compatibility  Major cost benefit as everything rides for free  Simple & intuitive  Everyday preparedness

October 10-13, 2006 San Diego Convention Center, San Diego California Jeffrey Stern Vice President, Business Development Thank You! 4962 Fairmont Avenue Second Floor Bethesda, MD