B2B FileMover Grand Valley State University. B2B FileMover Agenda Introduction & Background File Exchange Process Security Infrastructure Design Reporting.

Slides:



Advertisements
Similar presentations
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Advertisements

Enhancing Workflow Automation in Insurance Underwriting Processes with Web Services and Alerts Dickson K. W. CHIU Senior Member, IEEE Dickson Computer.
1 Outsourcing Contract and Service Level Issues Sharon O’Bryan Week 5 November 2, 2004.
SUK KI KIM New architecture for enhanced security system in linux.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Distributed Account Management Middleware Glenn Bresnahan (PI), Boston University Steve Quinn (CoPI), NCSA Aaron Fuegi, Boston University Chris Pond, NCSA.
Maintaining and Updating Windows Server 2008
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Electrolux System Integration Projects
SNMP ( Simple Network Management Protocol ) based Network Management.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IdentiTrip 2006 Our Skills Making your Job Easier.
EXchange Data Flow (Shipper to LSP --> Invoice) 8. Import Invoice 6. Connect to IBS Hub 7. FTP or HTTP ‘Pull’ Data from IBS Hub 4. Deposit Data into IBS.
Exlibris: Developers Meet Developers Feb. 1-2, 2010 Voyager To NUFinancials ( peoplesoft ) System ( for Invoice Payment ) Michael North Northwestern University.
Document Retention System. MARCH 2006 Confidential 2 General Architecture Scan and Search Search only Scan and Search Search only Scan Search Store Secured.
Module 6 Planning and Deploying Messaging Security.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Enterprise Architecture 2013 University of California, Irvine: EA Case Study - Enterprise Service Bus Data Architecture Prepared by for ITANA Face-to-Face:
DESIGNING A LONG-TERM INTEGRATION ARCHITECTURE FOR PROVISIONING TNC May 2007, Copenhagen Aida Omerovic Scientist & project manager – UNINETT FAS,
Page 1 © 2001, Epicentric - All Rights Reserved Epicentric Modular Web Services Alan Kropp Web Services Architect WSRP Technical Committee – March 18,
Brief Overview: Options for Licence & Support Open Source Job Scheduler Software- und Organisations-Service GmbH 
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
GEtServices Purchasing Units & Materials Training For Suppliers Request.
Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson.
IdentiTrip Key Features & Benefits All data imported from MIS system Quick MIS upload annually for new intake and class changes No manual input of pupil.
Banking Allison Marshall Lead Consultant – On Demand.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Presented By:.  Problem  Solution  Architecture ◦ What ◦ Why  Challenges  Status  Demo  Questions.
The Claromentis Digital Workplace An Introduction
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Module 1: Designing IIS Web Farms Changes in a Nutshell shell-shared-hosting-improvements-on-iis7.aspx.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Maintaining and Updating Windows Server 2008 Lesson 8.
De Rigueur - Adding Process to Your Business Analytics Environment Diane Hatcher, SAS Institute Inc, Cary, NC Falko Schulz, SAS Institute Australia., Brisbane,
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Project part-financed by the European Union 1 eGOVEREGIO Prepared by: Antoni Wójcik – Regional Development Agency Bielsko Biala e-GOVERMENT paltform
FTP File Transfer Protocol hlku. Computer Center, CS, NCTU 2 FTP  FTP File Transfer Protocol Used to transfer data from one computer to another over.
Introduction to Barracuda IM Firewall
©2016 Cleo. All rights reserved. Confidential.
Introduction to VMware Virtualization
Team MITRE Sentinel Final Presentation
Connect:Direct for UNIX v4.2.x Silent Installation
Get the Most Out of GoAnywhere: Advanced Workflows
ITIS 3110 IT Infrastructure II
Get the Most Out of GoAnywhere: Agents
FTP - File Transfer Protocol
Microservices Diagram Template
Security Testing of Oracle Interfaces using MFT process
2016 Primeur ©.
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
TechEd /21/2018 5:20 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Implementing Listening Producers in IBM Sterling Filegateway
WW TSS-06 S2 Monitor Automated Galaxy Log Monitoring Application
SNMP (Simple Network Management Protocol) based Network Management
Bethesda Cybersecurity Club
e-Invoicing – e-Ordering 20/11/2008
Presented By DAN RICHARDS
The new EDAMIS and its security
STATEL an easy way to transfer data
Objectives. Objectives Objectives Content Configure Microsoft Azure monitor.
IT Management, Simplified
Lec1: Introduction to Network Management
Presentation transcript:

B2B FileMover Grand Valley State University

B2B FileMover Agenda Introduction & Background File Exchange Process Security Infrastructure Design Reporting Capabilities Administration Lessons Learned Questions & Discussion

Introduction & Background Necessity of Secure File Transfer Priority Health Why GVSU Interns? Partnership with GVSU $$$ Why Perl?

File Exchange Process Objective Automated Secure Transfer Why FTP? Most Requested Solves ASCII / EBCDIC Common Free Modular Design Partner or Steelcase Initiated Push or Pull Transfers On Demand Repetitive

B2B FileMover Process

Security Separate User Accounts Filename Verification Encryption Standards Virus Scanning Security Agreement

Incoming Process Data Flow

Security Separate User Accounts Filename Verification Encryption Standards Virus Scanning Security Agreement

Infrastructure Design Architecture Automated Supports FTP and SFTP Independent Capabilities Centralized and Reusable Modules Stateful and Self-Recoverable

Reporting Capabilities Log Contents System Reporting EMU monitoring Heartbeats Normal Alert Notification System Errors Verifications

Administration Platform - Linux Main System Administration Account Process Configuration Values Independent Administration Accounts File Permissions

Lessons Learned Gather Requirements Scope Creep Setting & Understanding Expectations Profuse Testing Use “Warning” Option Linux Permission Settings Sufficient Documentation Instant Messaging

QUESTIONS & DISCUSSION