Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob.

Slides:



Advertisements
Similar presentations
The Business Solutions Revolution Xavier Villegas Chief Business Market Officer September 17, 2013.
Advertisements

Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
Role of ICT in Business ICT in a business environment can be used for:
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
E-commerce vs. E-business
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Business Systems Chapter 7.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Introduction to Information Systems
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Alcatel Customized Training Site David Otero University of San Diego MSIT 526 Dr. Carl Rebman.
Deployment Options Frank Bergmann
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Let’s Get Set Up By Michael Crawford. Situation at Hand Basic Needs ◦ Budget of $25-50,000 ◦ Connection to an ISP to access internet Security ◦ Network.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Karolina Muszyńska Based on
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
CHAPTER 10 KNOWLEDGE TRANSFER IN THE E-WORLD
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 13 Information Technology for Business.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Foundations of information systems
Current Network Schema Router Internet Switch PC.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
IT Infrastructure Chap 1: Definition
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
IT Infrastructure for Business
Chapter 6 of the Executive Guide manual Technology.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
Britt’s AC Web-centered Intranet Linda S. Cook 9/10/01 Barry University, Merritt Island, FL Program: MSIT Instructor: Dr. Pamela Luckett IT699 Integrated.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Global IT Solutions for Multinational Corporations Jim Forbes Vice President Equant IP Solutions Line of Business.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Top 5 Disruptive Technologies for MSPs David Strom MSP Alliance San Jose (310)
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
1 Information Technology Infrastructure & Management Overview.
ImplementationOptionsImplementationOptions.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction  Easy English, Inc. Chinese based company specializing in Language translation  Background Translations are currently done manually by bi-lingual.
Lesson 10 E-MANAGEMENT SYSTEMS. What is an Entrepreneur? Entrepreneur n. a business man or woman of positive disposition who attempts to make profit from.
Group 5 Julian Cheung Duncan Wu Flanda Vuong Aximon Zhao.
1 Copyright © 2012 Tata Consultancy Services Limited Windchill Architecture.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 9 : Knowledge Transfer in the E-World KNOWLEDGE TRANSFER IN THE E-WORLD Chapter 4.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Accounting Guru Cloud ERP (Enterprise Resource Planning) ERP Software https:
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
KNOWLEDGE MANAGEMENT (KM) Session # 33. Corporate Intranet A Conceptual Model INTRANET Production Team— New Product Budget Director— New Product Knowledge.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
CtrlS DR on Demand framework is a pioneering concept that will change the way enterprises look at DR. DR on Demand now ensures that you have almost the.
Cloud readiness assessment
Top 5 Open Source Firewall Software for Linux User
Disaster Recovery as a Service
Professional Network Services
Online software and backups
Capitalize on Your Business’s Technology
PureSystems Computer Services
Presentation transcript:

Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob

Why should businesses be concerned with IT ? No IT = No business!!!!! Are there exceptions ? IT solution, a core determinant of business success, even government success !!! IT success – Amazon (sells book to 6 billion). IT failure – Mumbai Carnage A world without IT, a possibility ? After a nuclear war or in paradise Conclusion ? A well constructed IT solution is a core component of success. Food for thought: Donkeys are not computer friendly!

Some important IT concepts E-Commerce:Harnessing the power of the internet to make $. Enterprise Resource Planning (ERP): Integrates all aspects of a business in an IT solution. Customer Relations Management (CRM): Gathers customer data on-line, to customize it products/services. IT Security: Proactive expertise in securing networks.

Some important IT concepts (contd) Content Management Software: Use the “web” to share data with customers, suppliers, employees Knowledge Management Software: integrates all aspects of a business in an IT solution. Customer Relations Management (CRM):Gathers customer data on-line, to customize it products/services. Supply Chain Management (SCM): Involves all steps in flow & transformation of raw material to finished goods.

IT concepts simplified Database:NY Database advantages Organized data storage Fast retrieval, search Useful reports Instant access Benefits multiplied by internet expansion Cost savings Offers more options => More business flexibility

Opening the network to the internet... Database:NY Employee:Pak Internet Business Process Outsourcing Head Office and clientele in NY, USA Employees in Pakistan Cost saving Benefiting from the internet Ready To be Online ?

Many issues to consider when opening up to the internet Database:NY Employee:Pak Internet Business Process Outsourcing Head Office and clientele in NY, USA Employees in Pakistan Cost saving Benefiting from the internet Good idea, but … Not so simple What about security ? X

Firewall Database:NY Employee:Pak Firewall:NY Internet Firewall Secures the internal network from the internet It is a must for E-Commerce Applications

Router Database:NY Employee:Pak Router:NY Firewall:NY Internet Generally a router is required to connect the corporate network to the internet. A router connects different networks.

The Anti-Virus Server Database:NY Employee:Pak Router:NY Firewall:NY Anti-Virus Internet The Enterprise Anti-Virus will clean all internet traffic of virus...

The Web Server Database:NY Employee:Pak Router:NY Firewall:NY Anti-Virus Web server Internet People on the internet access the Web server, not the actual database. The Web server hosts the corporate web site.

Finally accessing the Database Database:NY Employee:Pak Router:NY Firewall:NY Anti-Virus Web server Internet Can secure network by VPN encryption

Storage Area Network (SAN) Database:NY Employee:Pak Router:NY Firewall:NY Anti-Virus Web server $AN Internet Storage Area Network Houses the corporate data- treasure

Data Backup Database:NY Employee:Pak Backup Router:NY Firewall:NY Anti-Virus Web server $AN Internet Data backups are highly recommended, & are generally on tape cartridges.

Database replication Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Internet Database replication also speeds up reads. Writes are done to the master database, & then the slaves are updated.

Intrusion Detection Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Intrusion detection Internet Protecting the network from unwanted traffic.

Network Management Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Intrusion detection Network Management Internet

IT concepts simplified Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Intrusion detection Network Management RED – External ORANGE – DMZ GREEN - Internal Internet

IT concepts simplified Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Intrusion detection Network Management RED – External ORANGE – DMZ GREEN - Internal Is this network secure ? Internet

IT concepts simplified Database:NY Employee:Pak Backup DB replica:AZ Router:NY Firewall:NY Anti-Virus Web server $AN Intrusion detection Network Management RED – External ORANGE – DMZ GREEN - Internal Is this network secure ? Internet Encryption

IT solution effectiveness Budget Platform/application mix Handling of NMS Proactiveness of IT team

Conclusion IT solution success depends on human factors. Understanding those factors is necessary.