Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
> THIS IS THE WAY > THIS IS. The Virtual Enterprise Distributed Workforce Increasing Mobility Demanding Customers Hungry Competitors Budget Crunch The.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Company Confidential WiFiSPARK Limited The Benefits of Wireless Networking Matt O’Donovan WiFiSPARK Limited Tel :
Solutii Nortel pentru IMM Ovidiu Seceleanu 26 Oct 2006
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Citrix Partner Update The Citrix Delivery Centre.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
FireToWire.com The Broadband Wireless Way. FireToWire.com About Fire2Wire.com Qualifications & Expertise Wireless network of 5500 square miles Contracted.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
SiteLock Internet Security: Big Threats for Small Business.
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
Securing Information Systems
[Name / Title] [Date] Effective Threat Protection Strategies.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Efficient Networks. Agenda Service provider Problem/Issues Who we are, why are we here Focus on Increase ARPU –VPN and Firewall managed services Why an.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Implementing Network Access Protection
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Akamai Technologies - Overview RSA ® Conference 2013.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Module 11: Designing Security for Network Perimeters.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Safe’n’Sec IT security solutions for enterprises of any size.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Workshifting Transform your business – empower your people.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
1 © 2000, Cisco Systems, Inc. 1 Cisco Internet Mobile Office: Extending the Abilities of the Business Traveler.
Case Study: Cisco VPN Client
Securing Information Systems
Securing Information Systems
WLAN(stands for wireless LANs)
LAND RECORDS INFORMATION SYSTEMS DIVISION
Securing Information Systems
Check Point Connectra NGX R60
Agenda The current Windows XP and Windows XP Desktop situation
In the attack index…what number is your Company?
Presentation transcript:

Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer

Do more with less Drive employee productivity with IT Use IT to increase the “bottom line” Ensure the infrastructure is always available Secure the environment What are the CIO challenges in meeting the demands being made by business

Enterprise Security Solutions High Security, High speed, High Profits

What is the Threat? Impact of the February 2000 targeted DoS attacks is estimated at $1.2 Billion (Yankee Group) Cost per incident high and rising SQL Slammer damage estimates already around US$1 billion NIMDA – over US$500 million Code Red – over US$2.5 billion Computer Crime and Security Survey 2002: 90% of respondents had been victimised by computer-related crime 80% acknowledged financial losses due to computer breaches 44% of these companies placed a dollar figure on their losses which averaged more than $400,000 80% of cyber crimes are not reported due to fear of bad publicity (FBI) Threat can be external and internal - 50% of attacks come from within an organisation (FBI) No control on who accesses the Internet Loss of Revenue and Productivity

Radius Server “Remote” Office Home Main Office Confidential Transit IPSec SSL MPLS ATM/FR Perimeter Defence ICSA Certified Stateful firewall Access Authentication Authorisation Intrusion detection Audit trail User records Configuration changes Desktop protection Logon and password Biometric Wireless key Performance Enhancers SSL Acceleration Web Balancing Unified Security Architecture - What security principles must be implemented WAN

Secure Flexible Working

Employees looking for a positive balance between home and work “Connected” employees irrespective of location Employees working where they need to, not where they have to What are the forces of influence? Work becomes an activity not a location Broadband access is finally on a roll Wireless hotspots appearing in hotels, airports, retail outlets, etc Application convergence at the desktop

A Day in the Life of an Employee Head Office Managed Office Home Internet Cafe Roaming Hotel

Out of the Office In a hotel room, Airport or Café with Ethernet access (wireless or wired) Need to get on a conference call and access at the same time

Managed Office Secure Remote Working Hotel CallPilot PC Client Contivity CSE 1000 Company office M-1 or BCM Intranet Nortel Secure Contivity Client Internet i2050 Wireless Hotspots Home A simple business case: Average ISDN charge for homeworker today = €350pm DSL charge today = €45pm 1 homeworker = Cash out saving of €3.6k per annum 100 homeworkers = Cash out saving of €360k per annum 1000 homeworkers = Cash out saving of €3.6m per annum

Making use of time Only access to the internet is from a kiosk or café