IT540 Unit 4 Assignment. Diane Marxen. Kaplan University
|
|
- Calvin Bennett
- 6 years ago
- Views:
Transcription
1 IT540 Unit 4 1 IT540 UNIT 4 ASSIGNMENT IT540 Unit 4 Assignment Diane Maren Kaplan University
2 IT540 Unit 4 2 Table of Contents Page Abstract 3 Introduction and Assumptions 4 Part 1 5 Part 2 7 Conclusion 13 References 14
3 IT540 Unit 4 3 Abstract This document represents the author s work in completion of the Unit 4 weekly assignment for class IT540. The eercise involves planning for the equipment, configuration, and security of an alternate processing site for Piel, Inc., a company which provides video animations for customers worldwide. Assumptions as to what applications are most critical to Piel were made, and decisions about the form of the alternative site and how functions were to be restored as quickly as possible were made.
4 IT540 Unit 4 4 IT540 Unit 4 Assignment Introduction and Assumptions Piel, Inc. is a small to mid-sized business which depends heavily on its computer technology. In the event of a disaster in which the main processing site is not functional, an alternate site needs to be designated. In order to proceed with the development of this site, several assumptions are being made about Piel, Inc., its normal operating environment, and the scope of the disaster. First of all, let us assume the need for use of the alternate site is not due to a widespread disaster, so employees are not directly and personally affected. The use of the alternate site is a temporary situation until normal operations are restored. Temporary could mean a few days or several months. Second, all artistic and all but a few key employees will work from home using personal computers or workstations/laptops from the main site and internet connections. At the alternative site, laptops will be used instead of workstations for the convenience, portability, and small space requirements. No customers will go to the site. Printing can be handled locally by individual employees. The alternate site itself is more than easy commuting distance away from the original site, so only key personnel required to man the site will be located there. The site will be a service bureau type facility which will provide vaulting backup services during normal operation, but upon receiving notification of the eistence of an emergency situation, will provide the contracted hardware, physical space, and internet connectivity. Other assumptions: In addition to vaulting of critical data, backups appropriate to bare metal restoration have been maintained and are available. These would include operating system
5 IT540 Unit 4 5 software, application software, and configuration information at the least. The database referred to in the description of Piel s setup is mission critical. The 20 Xeon Linu servers are part of the 3D render farm. One very important part of Piel s operation is the rendering of video animations. Normally this is handled by a 3D rendering farm consisting of 20 powerful servers. On a temporary basis, this function will be outsourced to RenderRocket. Power on demand on their processors can be purchased and accessed via the Internet from employees own workstations/laptops (RenderRocket, 2011), leaving Piel s IT staff available to support other functions. In order to minimize equipment requirements, use of 2 servers running VMware will be used. These servers will be quad core, loaded with memory and disk space, and provided with multiple NICs to allow each allocated virtual machine adequate power and resources (VMware, 2011). One machine will host , file server and the RSA server. A second will host the firewall, the SFTP server, and the web server. The router has only to segment the IP which sees the Internet from the rest of the machines. This is further enabled by the use of multiple NICs on the VM servers. A switch (a simple hub would be adequate) will coordinate the multiple NICs. PART 1 Is a firewall needed? At the alternate site, a firewall is definitely needed because the site will be connected to the internet to enable the use of and employee connections. Without a firewall, all the most critical company data would be vulnerable. While the primary site is configured with a
6 IT540 Unit 4 6 dual load-balancing firewall, the temporary site would not require the dual functionality, but it must provide same filtering, including allowing , web, and SFTP traffic. Additional VPN support must be added for employee access, and the firewall and all other security measures must follow same security policy as usual. How about remote access? As most employees will not be going to the alternate site, it will be necessary for them to connect to the network. This may be accomplished by providing a VPN solution and remote access control, such as RSA (RSA SecurID, 2011). RSA adds an additional level of authentication to the VPN scenario. For many, access to browser enabled will be sufficient, assuming their primary applications (video design) are installed locally. For those who need to be on the actual network for services such as direct database access, a terminal server can be used to allow remote control processing (University of Washington, 2006). What is the physical security provided at the hosting company? Physical security must be tailored to the location and potential threats from that environment. If the location is above the ground floor, there is little need for protection from floods (Whitman & Mattord, 2012). In a service bureau environment, there usually are employees present. Once the site is activated, access to the equipment should be limited. Door locks as a minimum should be provided, but often sign-in/out, ID cards, and electronic surveillance are part of the package. There should be temperature controls and sensors for fire and water conditions. While UPSs are epected for the equipment, it might also be good to have a fallback generator available to maintain necessary power.
7 IT540 Unit 4 7 PART 2: Piel, Inc. s mission critical and non-critical applications are: Application Critical Not Critical Comment client On individual workstations/laptops office productivity On individual workstations/laptops multimedia authoring & rendering On individual workstations/laptops database access Administrative workstations only firewall web browser On individual workstations/laptops IIS Microsoft Echange SFTP anti-virus/malware intrusion detection payroll/hr company accounting remote access Add to alternative site video animation rendering Outsourcing Table 1: Critical applications. The following equipment will be needed at alternate site: Database server HP ProLiant DL360 for eample 2 VMware servers HP ProLiant DL385 quad core processors 64GB RAM 3T Raid0 3 NICs Terminal server HP ProLiant DL 385 (Hewlett Packard, 2011). Router Cisco 3800 (Cisco, 2011). Hub Cisco-Linksys 500 (Amazon.com) 3 UPSs (APC, 2011 KVM Switch (APC, 2011). Rack LCD Console (APC, 2011). 3-5 laptop computers 1 Midsized laser printer - HP
8 IT540 Unit 4 8 In a service bureau environment, the equipment is generally installed by the service bureau personnel when an emergency is declared. Piel staff would arrive to find the necessary servers up and running, ready for installation of operating systems and applications, and restoration of data. In order to minimize the time involved in this process, it is wise to perform practice runs. Many service providers include an annual testing time as part of the standby contract. Especially when virtual servers are anticipated, it is critical to prioritize the installations so the maimum can be accomplished in the minimum time. For eample, if one process runs longer, start it early. Practice enables staff to become familiar with timing and know when operator intervention is required to continue processes and when they can be unmanned. Since critical data is also being vaulted by the same service bureau, it will be handy for restoration. But carefully ordered procedures and handy configuration information is important to efficient bringing up of the alternate site. During normal operation changes in configuration, updates to software, and changes to backup procedures, media, and/or location need to be kept current in procedures for activating the alternate site. The testing process is one method to check the completeness and accuracy of this plan, and should be used as a check to see that proper updates to the plan are actually being documented. In a service bureau environment, the equipment may or may not be in a rack. If it is, for Piel s requirements, it would look something like this:
9 Figure 1: Piel s Alternative Site Rack Diagram. IT540 Unit 4 9
10 IT540 Unit 4 10 The Network configuration will look like this: Figure 2: Network Diagram. The DNS will be handled by the ISP providing Internet connection. In a service bureau environment, this becomes less important as the power is provided as part of the contract costs. For the above network, power consumption estimates are approimately as follows:
11 IT540 Unit 4 11 Power Consumption Server X4 Monitor Router Switch KVM Disk Array Laptops X4 282W 28W 12W 3W 71W 99W 20W Table 2: Power Consumption. (Smith, 2006). A 10 megabit/second Internet access will be adequate for the alternate site, as it is for the main site. Bandwidth for , FTP, database access, file storage, and Web hosting will be about the same. By outsourcing the rendering the requirements will actually be lower, although employees may find their personal ISP connections are uncomfortably slow for sending video source files to the rendering site. The firewall will be the same software as at the main location. It will be housed on a VM server which has multiple NICs to segment it from the rest of the network. Employees will connect using Windows VPN features, RSA authentication (RSA, 2011), and Terminal Server connections (University of Washington, 2006). To make the cut-over to the alternate site go smoothly, there should be one document outlining the plan. It should contain a section for all tasks and the persons assigned to do them. Detailed timing and decision milestones should be included. It should include procedures for restoring and bringing up each application, and a method for reporting progress to management. This document must be managed tightly, kept current, and overseen by an owner who understands the risks involved (Vallampati, 2009).
12 IT540 Unit 4 12 For Piel s cutover, since the primary site is out of commission, the tasks do not involve time to ramp down, and/or run parallel, but instead require speed and efficiency. As is a high priority, it should be brought up as quickly as possible after the firewall has been installed. Fileserver and database servers would be net, with remote access servers, and then the web site. Each restoration needs a detailed list of tasks from assembling software, configuration, and backups, to installing OS and configuring, to installing software, such as MS Echange or the DBMS, and installing backup software to enable restoration. At that point, data is restored. The plan could be as simple as a spreadsheet. A plan for cut-over or hand back is essentially the same as the cut over plan, especially since the assumption is that the original site is destroyed, so new hardware would be purchased and installed first. In this case, it is important to note that the alternate site must continue to backup data to keep everything current during processing. The order or restoring might, however, be different. Since the outsourced rendering farm costs based on usage, it may be good to bring that back in-house first, followed by the web site, the file server and database, and the servers.
13 IT540 Unit 4 13 Conclusion This paper is in partial completion of a Master of Science in Information Technology degree. The specific assignment was for class IT540 Management of Information Security. Several topics involving the subject the use of an alternate processing site for business continuity were discussed.
14 IT540 Unit 4 14 References APC (2011). Products and Services. Retrieved November 15, 2011 from Cisco, (2011). Routers and Switches. Retrieved November 15, 2011 from Hewlett Packard, (2011). Small & Medium Business. Retrieved November 15, 2011 from Site/en_US/-/USD/ViewProductDetail- Start?ProductUUID=IdMQ7EN5PaYAAAEtrdpVIOG5&CatalogCategoryID=YsoQ7EN 5pXkAAAEuhnsoLTj_ RenderRocket, (2011). A Render Farm in a Cloud. Retrieved November 14, 2011 from RSA SecurID, (2011). Securing Your Future with Two-Factor Authentication. Retrieved November 14, 2011 from Smith, W. (2006). Climate Change Electricity Consumption of Common Domestic Appliances. Retrieved November 14, 2001 from University of Washington, (2006). Microsoft Windows Terminal Server. Retrieve November 14, 2011 from Vallampati, M., (2009). Anatomy of a Cutover Plan or Don t get caught dead in a go-live situation. Retrieved November 14, 2011 from
15 IT540 Unit 4 15 VMware, (2011). VMware Products. Retrieved November 14, 2011 from Whitman, M.E. and Mattord, H.J. (2012). Principles of Information Security. Boston, MA. Course Technology.
Unit 4 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.
Running head: UNIT 4 RESEARCH PROJECT 1 Unit 4 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/14/2014 UNIT 4 RESEARCH PROJECT 2
More informationEdge for All Business
1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or
More informationNetwork Assessment Your Company s Name
Network Assessment Your Company s Name October 11 th, 2009 NSK, Inc. Page 1 Contents Section 1 Network... 4 1.1 ISP... 4 1.2 Internal Network... 4 (a) Firewall... 4 (b) Switches...4 (c) Wireless...4 (d)
More informationNETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY
NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy.
More informationGoodwill. Industries of Lower South Carolina, Inc Technology Plan
Goodwill Industries of Lower South Carolina, Inc. Published 7/23/2008 Reviewed 8/1/2009 Reviewed Revised 8/31/2010 Reviewed Revised 8/31/2011 Reviewed 12/18/2012 Revised 2013 Technology Plan 1 Goodwill
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationLevel 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services
9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s
More informationUniversity Information Systems. Administrative Computing Services. Contingency Plan. Overview
University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview
More informationRetired. For more information on HP's ProLiant Security Server visit:
Overview The HP running Microsoft Internet Security & Acceleration (ISA) Server 2006 is an advanced firewall, VPN, and Web caching solution that can be quickly and easily deployed in multiple network environments
More informationInformation Services IT Security Policies L. Network Management
Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security
More informationAwareness Technologies Systems Security. PHONE: (888)
Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web
More information3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007
3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationTimeIPS Server. IPS256T Virtual Machine. Installation Guide
TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision
More informationIT your way - Hybrid IT FAQs
Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix
More informationASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER
ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationSecuring VSPEX VMware View 5.1 End- User Computing Solutions with RSA
Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration
More informationRFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service
RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More information1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable
Karnataka State Natural Disaster Monitoring Centre (Affiliated to Dept. of Science & Technology, Govt. of Karnataka) Pre-bid meeting held on 22.12.2009 Corrigendum RACK SERVERS, SAN Storage, TAPE library,
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationDude Solutions Business Continuity Overview
Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....
More informationCUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018
CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice,
More informationQuest DL Appliance Family
Quest DL Appliance Family June, 2017 Topics: Introduction Appliance Configuration Machine Protection Replication Virtual Machine Export/Virtual Standby Additional Information Contacting Quest 2017 Quest
More informationRunning head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1
Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1 Project Part VII: Final Project Paper with Final Budget Recommendations Sharon C. Perelman Northwestern University School of Continuing
More informationCOMPARING COST MODELS - DETAILS
COMPARING COST MODELS - DETAILS SOFTLAYER TOTAL COST OF OWNERSHIP (TCO) CALCULATOR APPROACH The Detailed comparison tab in the TCO Calculator provides a tool with which to do a cost comparison between
More informationHYBRID CLOUD BACKUP & DISASTER RECOVERY
HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationEVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER
WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and
More informationBrown County Virtualization Project
Brown County Virtualization Project By Nicholas Duncanson Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationVenyu Solutions Inc. Managed Hosting Services Statewide Enterprise Agreement
Colocation Services LA00001 Rack Space: 1/4 Rack 1 Monthly $250.00 $175.00 LA00002 Rack Space: 1/4 Rack Installation Fee 1 Each $500.00 $350.00 LA00003 Rack Space: 1/2 Rack 1 Monthly $500.00 $350.00 LA00004
More informationManual Sql Server 2012 Express Limit Cpu
Manual Sql Server 2012 Express Limit Cpu SQL Server 2014 Reporting Services Standard and Enterprise supports a maximum of SQL Server 2014 Express resources Windows Server 2012 resources For more information
More informationAdvanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER
Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as
More informationDISASTER RECOVERY PRIMER
DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data
More informationUniversal Computing Solutions, Inc Niagara Falls Blvd., Suite 2A Niagara Falls, N.Y (716)
Universal Computing Solutions, Inc. 9701 Niagara Falls Blvd., Suite 2A Niagara Falls, N.Y. 14304 (716) 298-5290 www.universal-cs.com Or is it spread across all of your PCs on your network? The default
More informationModels HP Security Management System XL Appliance with 500-IPS System License
Overview Models HP Security System Appliance with 25-IPS System License HP Security System XL Appliance with 500-IPS System License HP vsms for VMware vsphere single host Software License HP High Availability
More informationZYNSTRA TECHNICAL BRIEFING NOTE
ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and
More informationPhysical and Environmental Security Standards
Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationSAS SOLUTIONS ONDEMAND
DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007
More informationThe Guide to... Hosted Exchange Disaster Recovery
The Guide to... Hosted Exchange Disaster Recovery Hardware Configuration CISCO FIREWALLS The Cisco firewalls we use to manage the network are ASA models, we run them in each individual Data Centre/Cabinet
More informationParagon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized Backup and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationIT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME
IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationA Cloud WHERE PHYSICAL ARE TOGETHER AT LAST
A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT
More informationWorld Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition
World Skills Competition Trade 39: IT PC and Network Support Day 2 Competition Small Business Competitor Name: Country Code: 1 of 10 CONTENTS This Test Project proposal consists of the following documentation/files:
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationEnterprise X-Architecture 5th Generation And VMware Virtualization Solutions
Steve Sue VMware PSE June-8 th -2010 Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions 2010 IBM Corporation Virtualization Spending Priority Goldman Sachs 2010 Key Tech Trends
More informationClient Computing Security Standard (CCSS)
Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices
More informationTIBCO Nimbus Service
TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
More informationService Description CloudCore
CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationFigure 1-1: Local Storage Status (cache).
The cache is the local storage of the Nasuni Filer. When running the Nasuni Filer on a virtual platform, you can configure the size of the cache disk and the copy-on-write (COW) disk. On Nasuni hardware
More informationBackupAssist v5. Combining Drive Imaging, Data Archival Backup and Internet Backup. Your presenter: Linus Chang, Lead Developer of BackupAssist
BackupAssist v5 Combining Drive Imaging, Data Archival Backup and Internet Backup Your presenter: Linus Chang, Lead Developer of BackupAssist Our last SBS UG presentation was in 2005 What we used to do...
More informationDisaster Recovery Solution Achieved by EXPRESSCLUSTER
Disaster Recovery Solution Achieved by EXPRESSCLUSTER November, 2015 NEC Corporation, Cloud Platform Division, EXPRESSCLUSTER Group Index 1. Clustering system and disaster recovery 2. Disaster recovery
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationHPE Datacenter Care for SAP and SAP HANA Datacenter Care Addendum
HPE Datacenter Care for SAP and SAP HANA Datacenter Care Addendum This addendum to the HPE Datacenter Care Service data sheet describes HPE Datacenter Care SAP and SAP HANA service features, which are
More informationServer Colocation Standards
Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke
More informationEFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE
EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationContingency Planning
Contingency Planning Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill Procedures are required that will permit
More informationTrust Services Principles and Criteria
Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access
More informationCalcanas 1. Edgar Calcanas Dr. Narayanan CST March 2010 CST 412 Mid-Term. Workstations
Calcanas 1 Edgar Calcanas Dr. Narayanan CST 412 17 March 2010 CST 412 Mid-Term Workstations 1) Every employee must have its own workstation, for our potential client NOPI. We must provide a workstation
More informationAdministration of Symantec Cyber Security Services (July 2015) Sample Exam
Administration of Symantec Cyber Security Services (July 2015) Sample Exam Contents SAMPLE QUESTIONS... 1 ANSWERS... 6 Sample Questions 1. Which DeepSight Intelligence Datafeed can be used to create a
More informationApplications/Data To Include in Survey (include applications that meet one or more of the following criteria)
Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data
More informationThe OnApp Cloud Platform
The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationSeqrite TERMINATOR (UTM) Unified Threat Management Solution.
Unified Threat Management Solution TERMINATOR Introduction Seqrite TERMINATOR is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution
More informationXytech MediaPulse Equipment Guidelines (Version 8 and Sky)
Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) MediaPulse Architecture Xytech Systems MediaPulse solution utilizes a multitier architecture, requiring at minimum three server roles: a database
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationCOUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services
COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG 50400 BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services October, 2015 This document is copyright to County Government of Busia and
More informationon VMware Deployment Guide November 2018 Deployment Guide for Unitrends Free on VMware Release 10.3 Version Provide feedback
Deployment Guide November 2018 Release 10.3 Version 1.11152018 2 Copyright Copyright 2018 Unitrends Incorporated. All rights reserved. Content in this publication is copyright material and may not be copied
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.1 1 Chapter 15 Objectives 15.1 Identify potential safety hazards and implement proper safety procedures related to networks 15.2
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationBusiness Continuity Plan Executive Overview
Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information
More informationNext Generation Firewall
Next Generation Firewall Release Notes 5.10.10 Revision A Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on page 7 New
More informationThe HP Blade Workstation Solution A new paradigm in workstation computing featuring the HP ProLiant xw460c Blade Workstation
The HP Blade Workstation Solution A new paradigm in workstation computing featuring the HP ProLiant xw460c Blade Workstation Executive overview...2 HP Blade Workstation Solution overview...2 Details of
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationCOLOCATION 1/4 RACK RACK COLD AISLE CONTAINEMENT PRIVATE CAGE PRIVATE SUITE FLEXIBLE PRICING OPTIONS
1 COLOCATION Experience the most flexible datacenters for mission-critical infrastructure in a highly secure, efficient and reliable environment. Enjoy future-proof and agile colocation services that provide
More informationThe Lighthouse Case Management System
The Lighthouse Case Management System Get everything you need to track hotline reports from beginning to end in one easy-to-use online tool! For most organizations, keeping track of hotline reports can
More informationBusiness Resiliency in the Cloud: Reality or Hype?
Business Resiliency in the Cloud: Reality or Hype? Karen Jaworski Senior Director, Product Marketing EVault, a Seagate Company 8/10/2012 2012 EVault, Inc. All Rights Reserved 1 Who is EVault? Cloud-Connected
More informationNetwork Performance, Security and Reliability Assessment
Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD
More informationHPE Converged Data Solutions
HPE Converged Data Solutions Erdinc Kaya - kaya@hpe.com Storage Solution Architect Areas of Transformation & HPE IM&P A platform approach for effectively managing and protecting all information enterprise-wide
More informationThis PDF is no longer being maintained. Search the SolarWinds Success Center for more information.
This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document
More informationCAMAvision System Requirements Guide revised 3/21/2017
The computer industry is very fast moving, with larger and faster technologies supplanting previous hardware releases within six to nine months. Some of the specifications listed may no longer be available,
More informationExpert Reference Series of White Papers. Understanding Data Centers and Cloud Computing
Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge
More information