2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

© 2010 Quest Software, Inc. ALL RIGHTS RESERVED Quests solutions for Windows Management Lee Elliott & Jonathan Culver – Technical Account Managers Windows.
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Barracuda Backup Service Data Backup and Disaster Recovery.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP StorageWorks LeftHand update Marcus.
Maintaining Windows Server 2008 File Services
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
November 2009 Network Disaster Recovery October 2014.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
CredoGov VDI Introduction James Gunn
Storage Security and Management: Security Framework
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Virtualization Lab 3 – Virtualization Fall 2012 CSCI 6303 Principles of I.T.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
NetBackup PureDisk Kris Hagerman Sr. Vice President, Data Center Management.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
Information Availability Brett Paulson Sr. VP and Chief Information Officer Board of Trade Clearing Corporation FIA – November 7, 2002.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Storage Trends: DoITT Enterprise Storage Gregory Neuhaus – Assistant Commissioner: Enterprise Systems Matthew Sims – Director of Critical Infrastructure.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Neil Sanderson 24 October, Early days for virtualisation Virtualization Adoption x86 servers used for virtualization Virtualization adoption.
Disaster Recovery and Business Continuity Planning.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
EXC303 - Exchange Server 2007 SP1 Overview Martin Coetzer Technical Consultant Microsoft.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
Microsoft and Symantec
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Common Solutions Group May 13,  Faculty/Staff appropriate grade of service  Full Exchange environment ◦ Outlook ( , contacts, calendar, tasks)
Global Infrastructure Tenets Strategic Value 1.Growth - Identify enabling technologies that can boost employee productivity and agility, bring products.
Improving IT Processes IT Service Improvement Model.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Microsoft Desktop Virtualization Kiran N R Optimized Desktop – TSP Microsoft Corporation.
1© Copyright 2014 EMC Corporation. All rights reserved. ViPR DR Requirement.
© 2009 IBM Corporation Statements of IBM future plans and directions are provided for information purposes only. Plans and direction are subject to change.
Practical IT Research that Drives Measurable Results Leverage Server Virtualization for DR Affordability and Agility 1Info-Tech Research Group.
Impact Research 1 Customizing Your Archiving Strategy: Summary Document.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Job offer IT System & Software Specialist We are currently looking for an IT database administrator in order to respond to one key-account customer demand.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Barracuda Backup Easy Cloud-Connected Backup Version 5.4 | July 2014.
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cybersecurity - What’s Next? June 2017
Working at a Small-to-Medium Business or ISP – Chapter 8
CCNET Managed Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Using the Cloud for Backup, Archiving & Disaster Recovery
Capitalize on Your Business’s Technology
6. Application Software Security
Presentation transcript:

2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management – customers first

2 Storage Issues Background Talking Points Drivers for investment in a new storage solution: The cost of DASD continues to drop File sizes continue to increase As are result of the quantity and larger files, service restoration in event of a disaster takes much longer and is increasing There is a desire to recover faster in case of a disaster is the default business tool and our users rely on its service to conduct business The storage capacity limits are our users chief issue with IT services and many can not function within the established policies Current centralized disk storage solution has reached capacity There is no server redundancy in today’s solution. A server failure results in lost productivity as seen in November when the primary file server (DATA1) was unavailable due to hardware problems Backups are taking much longer and a full systems backup can not be completed over the weekend.

3 Storage Projects The new storage platform will provide some foundation benefits: Include server redundancy so system will continue to process in case of a server failure A tiered storage system that moves old files and off to secondary storage. This provides more storage space on the primary storage system for users files and s. Reduced burden on users (managing capacity limits) and IT (managing user PSTs) Reduce service disaster recovery time Reduce system backup times Deliverables: 1.New system that will: Give users vast amounts of space Remove the necessity for having Outlook Personal Folders. All will be in the inbox 2.New file systems that will: Faster file restores Intraday file backups (allows IT to recover file changes users make during the day) The 2006 projects, lay the foundation for real time data replication to our disaster site. In 2007, IT will replicate file and data to Marlboro so these services can be restored much more quickly than today.

4 Security Issues Background Talking Points Drivers for security projects: Need to reduce the number of users with elevated privileges Need for a more secure way to store and use IT administrative passwords Blackberry devices are important business tools with a wealth of information on them, yet are not secured by a password Desktops can be altered without IT intervention This reduces PC standardization (driving costs) User install programs that violate our security and compliance policies (Instant Messaging software, file sharing, remote access) All software is subject to hacking. Allowing a great variety of programs makes it difficult, if not impossible for the Information Security Team to maintain a secure working environment As the exploits of 2005 and earlier become harder to exploit, attacks will increasingly focus desktop vectors (path of least resistance for capital gain).

5 Security Projects Deliverables: 1.Blackberry security policy implementation 2.New password standard for IT Administrators that requires a complex, 15 character password 3.Evaluation of administrative accounts focused on reducing the number of accounts with elevated privileges 4.Evaluation of a token based system for managing administrative passwords 5.New desktop standard policy and enforcement 6.Roll out Netscreen devices to London and Sydney 7.Expand ports on ISG and physically separate DMZ 8.Reduce the overall vulnerability exposure

6 Systems Issues Background Talking Points Drivers for virtual systems investment: Server sprawl continues as IT adopts best practices and introduces additional application platforms to ensure application integrity and testing Server sprawl increases administration expense costs (head count) as more Engineers are required to manage additional systems Server sprawl increases capital costs as more hardware and software is provisioned to meet the application needs Most development systems are used lightly and not necessarily need daily Some old systems are still supporting older applications. These systems have reached end of life and the cost to support older systems exceeds their value. At the same time, investing additional capital dollars in these application is not necessarily the best solution either. All enterprises are investing in virtual servers, it’s an industry trend

7 Virtual Systems Projects Two virtual server environments using VMWare’s ESX will be implemented to allow Engineering to: 1.Provision new Siebel and Fatwire staging environments without dedicated hardware 2.Potentially replicate the new E-commerce architecture planned for Navisite in a virtual environment making the development environment match the production systems. 3.Move some lightly used, yet newer development systems from physical servers to virtual. These servers can then be reused for production needs. 4.Introduce a control mechanism for managing server sprawl 5.Quickly provision development systems 6.Gain more efficient use of capital hardware In 2007, VMWare will be introduced into the disaster recovery environment allowing IT to provision servers as needed in a disaster scenario.

8 Service Management Issues Background Talking Points Drivers for Service Management projects: Our business expects IT to deliver value. Senior Management wants to know what it is getting for it’s IT dollars. Some IT processes such as Business Continuity and Incident Management are mature, yet others such as Problem, Release, Configuration and Availability Management should be improved upon In order to communicate its value, IT must develop methods and metrics that it can report on Some Service Levels have been defined (for example: Incident Response and Business Continuity), but other services have no defined Service Levels Problem Management has been identified as an area that IT needs to focus on.

9 Service Management Projects Deliverables: 1.Baseline performance and availability for IT Services using Compuware’s Vantage software 2.Define a Problem Management procedure and look to implement software to incorporate the procedures with our vendor software 3.Continue to deliver the IT Report on a quarterly or Semi-annual basis 4.Develop a Service Level Report for Senior Management