IT540 Unit 4 Assignment. Diane Marxen. Kaplan University

Size: px
Start display at page:

Download "IT540 Unit 4 Assignment. Diane Marxen. Kaplan University"

Transcription

1 IT540 Unit 4 1 IT540 UNIT 4 ASSIGNMENT IT540 Unit 4 Assignment Diane Maren Kaplan University

2 IT540 Unit 4 2 Table of Contents Page Abstract 3 Introduction and Assumptions 4 Part 1 5 Part 2 7 Conclusion 13 References 14

3 IT540 Unit 4 3 Abstract This document represents the author s work in completion of the Unit 4 weekly assignment for class IT540. The eercise involves planning for the equipment, configuration, and security of an alternate processing site for Piel, Inc., a company which provides video animations for customers worldwide. Assumptions as to what applications are most critical to Piel were made, and decisions about the form of the alternative site and how functions were to be restored as quickly as possible were made.

4 IT540 Unit 4 4 IT540 Unit 4 Assignment Introduction and Assumptions Piel, Inc. is a small to mid-sized business which depends heavily on its computer technology. In the event of a disaster in which the main processing site is not functional, an alternate site needs to be designated. In order to proceed with the development of this site, several assumptions are being made about Piel, Inc., its normal operating environment, and the scope of the disaster. First of all, let us assume the need for use of the alternate site is not due to a widespread disaster, so employees are not directly and personally affected. The use of the alternate site is a temporary situation until normal operations are restored. Temporary could mean a few days or several months. Second, all artistic and all but a few key employees will work from home using personal computers or workstations/laptops from the main site and internet connections. At the alternative site, laptops will be used instead of workstations for the convenience, portability, and small space requirements. No customers will go to the site. Printing can be handled locally by individual employees. The alternate site itself is more than easy commuting distance away from the original site, so only key personnel required to man the site will be located there. The site will be a service bureau type facility which will provide vaulting backup services during normal operation, but upon receiving notification of the eistence of an emergency situation, will provide the contracted hardware, physical space, and internet connectivity. Other assumptions: In addition to vaulting of critical data, backups appropriate to bare metal restoration have been maintained and are available. These would include operating system

5 IT540 Unit 4 5 software, application software, and configuration information at the least. The database referred to in the description of Piel s setup is mission critical. The 20 Xeon Linu servers are part of the 3D render farm. One very important part of Piel s operation is the rendering of video animations. Normally this is handled by a 3D rendering farm consisting of 20 powerful servers. On a temporary basis, this function will be outsourced to RenderRocket. Power on demand on their processors can be purchased and accessed via the Internet from employees own workstations/laptops (RenderRocket, 2011), leaving Piel s IT staff available to support other functions. In order to minimize equipment requirements, use of 2 servers running VMware will be used. These servers will be quad core, loaded with memory and disk space, and provided with multiple NICs to allow each allocated virtual machine adequate power and resources (VMware, 2011). One machine will host , file server and the RSA server. A second will host the firewall, the SFTP server, and the web server. The router has only to segment the IP which sees the Internet from the rest of the machines. This is further enabled by the use of multiple NICs on the VM servers. A switch (a simple hub would be adequate) will coordinate the multiple NICs. PART 1 Is a firewall needed? At the alternate site, a firewall is definitely needed because the site will be connected to the internet to enable the use of and employee connections. Without a firewall, all the most critical company data would be vulnerable. While the primary site is configured with a

6 IT540 Unit 4 6 dual load-balancing firewall, the temporary site would not require the dual functionality, but it must provide same filtering, including allowing , web, and SFTP traffic. Additional VPN support must be added for employee access, and the firewall and all other security measures must follow same security policy as usual. How about remote access? As most employees will not be going to the alternate site, it will be necessary for them to connect to the network. This may be accomplished by providing a VPN solution and remote access control, such as RSA (RSA SecurID, 2011). RSA adds an additional level of authentication to the VPN scenario. For many, access to browser enabled will be sufficient, assuming their primary applications (video design) are installed locally. For those who need to be on the actual network for services such as direct database access, a terminal server can be used to allow remote control processing (University of Washington, 2006). What is the physical security provided at the hosting company? Physical security must be tailored to the location and potential threats from that environment. If the location is above the ground floor, there is little need for protection from floods (Whitman & Mattord, 2012). In a service bureau environment, there usually are employees present. Once the site is activated, access to the equipment should be limited. Door locks as a minimum should be provided, but often sign-in/out, ID cards, and electronic surveillance are part of the package. There should be temperature controls and sensors for fire and water conditions. While UPSs are epected for the equipment, it might also be good to have a fallback generator available to maintain necessary power.

7 IT540 Unit 4 7 PART 2: Piel, Inc. s mission critical and non-critical applications are: Application Critical Not Critical Comment client On individual workstations/laptops office productivity On individual workstations/laptops multimedia authoring & rendering On individual workstations/laptops database access Administrative workstations only firewall web browser On individual workstations/laptops IIS Microsoft Echange SFTP anti-virus/malware intrusion detection payroll/hr company accounting remote access Add to alternative site video animation rendering Outsourcing Table 1: Critical applications. The following equipment will be needed at alternate site: Database server HP ProLiant DL360 for eample 2 VMware servers HP ProLiant DL385 quad core processors 64GB RAM 3T Raid0 3 NICs Terminal server HP ProLiant DL 385 (Hewlett Packard, 2011). Router Cisco 3800 (Cisco, 2011). Hub Cisco-Linksys 500 (Amazon.com) 3 UPSs (APC, 2011 KVM Switch (APC, 2011). Rack LCD Console (APC, 2011). 3-5 laptop computers 1 Midsized laser printer - HP

8 IT540 Unit 4 8 In a service bureau environment, the equipment is generally installed by the service bureau personnel when an emergency is declared. Piel staff would arrive to find the necessary servers up and running, ready for installation of operating systems and applications, and restoration of data. In order to minimize the time involved in this process, it is wise to perform practice runs. Many service providers include an annual testing time as part of the standby contract. Especially when virtual servers are anticipated, it is critical to prioritize the installations so the maimum can be accomplished in the minimum time. For eample, if one process runs longer, start it early. Practice enables staff to become familiar with timing and know when operator intervention is required to continue processes and when they can be unmanned. Since critical data is also being vaulted by the same service bureau, it will be handy for restoration. But carefully ordered procedures and handy configuration information is important to efficient bringing up of the alternate site. During normal operation changes in configuration, updates to software, and changes to backup procedures, media, and/or location need to be kept current in procedures for activating the alternate site. The testing process is one method to check the completeness and accuracy of this plan, and should be used as a check to see that proper updates to the plan are actually being documented. In a service bureau environment, the equipment may or may not be in a rack. If it is, for Piel s requirements, it would look something like this:

9 Figure 1: Piel s Alternative Site Rack Diagram. IT540 Unit 4 9

10 IT540 Unit 4 10 The Network configuration will look like this: Figure 2: Network Diagram. The DNS will be handled by the ISP providing Internet connection. In a service bureau environment, this becomes less important as the power is provided as part of the contract costs. For the above network, power consumption estimates are approimately as follows:

11 IT540 Unit 4 11 Power Consumption Server X4 Monitor Router Switch KVM Disk Array Laptops X4 282W 28W 12W 3W 71W 99W 20W Table 2: Power Consumption. (Smith, 2006). A 10 megabit/second Internet access will be adequate for the alternate site, as it is for the main site. Bandwidth for , FTP, database access, file storage, and Web hosting will be about the same. By outsourcing the rendering the requirements will actually be lower, although employees may find their personal ISP connections are uncomfortably slow for sending video source files to the rendering site. The firewall will be the same software as at the main location. It will be housed on a VM server which has multiple NICs to segment it from the rest of the network. Employees will connect using Windows VPN features, RSA authentication (RSA, 2011), and Terminal Server connections (University of Washington, 2006). To make the cut-over to the alternate site go smoothly, there should be one document outlining the plan. It should contain a section for all tasks and the persons assigned to do them. Detailed timing and decision milestones should be included. It should include procedures for restoring and bringing up each application, and a method for reporting progress to management. This document must be managed tightly, kept current, and overseen by an owner who understands the risks involved (Vallampati, 2009).

12 IT540 Unit 4 12 For Piel s cutover, since the primary site is out of commission, the tasks do not involve time to ramp down, and/or run parallel, but instead require speed and efficiency. As is a high priority, it should be brought up as quickly as possible after the firewall has been installed. Fileserver and database servers would be net, with remote access servers, and then the web site. Each restoration needs a detailed list of tasks from assembling software, configuration, and backups, to installing OS and configuring, to installing software, such as MS Echange or the DBMS, and installing backup software to enable restoration. At that point, data is restored. The plan could be as simple as a spreadsheet. A plan for cut-over or hand back is essentially the same as the cut over plan, especially since the assumption is that the original site is destroyed, so new hardware would be purchased and installed first. In this case, it is important to note that the alternate site must continue to backup data to keep everything current during processing. The order or restoring might, however, be different. Since the outsourced rendering farm costs based on usage, it may be good to bring that back in-house first, followed by the web site, the file server and database, and the servers.

13 IT540 Unit 4 13 Conclusion This paper is in partial completion of a Master of Science in Information Technology degree. The specific assignment was for class IT540 Management of Information Security. Several topics involving the subject the use of an alternate processing site for business continuity were discussed.

14 IT540 Unit 4 14 References APC (2011). Products and Services. Retrieved November 15, 2011 from Cisco, (2011). Routers and Switches. Retrieved November 15, 2011 from Hewlett Packard, (2011). Small & Medium Business. Retrieved November 15, 2011 from Site/en_US/-/USD/ViewProductDetail- Start?ProductUUID=IdMQ7EN5PaYAAAEtrdpVIOG5&CatalogCategoryID=YsoQ7EN 5pXkAAAEuhnsoLTj_ RenderRocket, (2011). A Render Farm in a Cloud. Retrieved November 14, 2011 from RSA SecurID, (2011). Securing Your Future with Two-Factor Authentication. Retrieved November 14, 2011 from Smith, W. (2006). Climate Change Electricity Consumption of Common Domestic Appliances. Retrieved November 14, 2001 from University of Washington, (2006). Microsoft Windows Terminal Server. Retrieve November 14, 2011 from Vallampati, M., (2009). Anatomy of a Cutover Plan or Don t get caught dead in a go-live situation. Retrieved November 14, 2011 from

15 IT540 Unit 4 15 VMware, (2011). VMware Products. Retrieved November 14, 2011 from Whitman, M.E. and Mattord, H.J. (2012). Principles of Information Security. Boston, MA. Course Technology.

Unit 4 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Unit 4 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D. Running head: UNIT 4 RESEARCH PROJECT 1 Unit 4 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/14/2014 UNIT 4 RESEARCH PROJECT 2

More information

Edge for All Business

Edge for All Business 1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or

More information

Network Assessment Your Company s Name

Network Assessment Your Company s Name Network Assessment Your Company s Name October 11 th, 2009 NSK, Inc. Page 1 Contents Section 1 Network... 4 1.1 ISP... 4 1.2 Internal Network... 4 (a) Firewall... 4 (b) Switches...4 (c) Wireless...4 (d)

More information

NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY

NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy.

More information

Goodwill. Industries of Lower South Carolina, Inc Technology Plan

Goodwill. Industries of Lower South Carolina, Inc Technology Plan Goodwill Industries of Lower South Carolina, Inc. Published 7/23/2008 Reviewed 8/1/2009 Reviewed Revised 8/31/2010 Reviewed Revised 8/31/2011 Reviewed 12/18/2012 Revised 2013 Technology Plan 1 Goodwill

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Retired. For more information on HP's ProLiant Security Server visit:

Retired. For more information on HP's ProLiant Security Server visit: Overview The HP running Microsoft Internet Security & Acceleration (ISA) Server 2006 is an advanced firewall, VPN, and Web caching solution that can be quickly and easily deployed in multiple network environments

More information

Information Services IT Security Policies L. Network Management

Information Services IT Security Policies L. Network Management Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007

3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 3.3 Understanding Disk Fault Tolerance Windows May 15th, 2007 Fault tolerance refers to the capability of a computer or network to continue to function when some component fails. Disk fault tolerance refers

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

IT your way - Hybrid IT FAQs

IT your way - Hybrid IT FAQs Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix

More information

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER

ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER ASSURING BUSINESS CONTINUITY THROUGH CONTROLLED DATA CENTER IT Audit, Information Security & Risk Insight Africa 2014 Johnson Falana CISA,MIT,CEH,Cobit5 proverb814@yahoo.com Overview Information technology

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration

More information

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service

RFP Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service RFP 2017 845 Annex A Terms of Reference UNHCR HQ Data Centre Colocation Service Version 1 Contents Project objectives... 1 Background... 1 Scope... 1 Timeframe and Cost... 4 Stakeholders, roles and responsibilities...

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable

1 Page No. 20, 21 & 22 Form factor. This should be read as 1U/2U Rack Mountable Karnataka State Natural Disaster Monitoring Centre (Affiliated to Dept. of Science & Technology, Govt. of Karnataka) Pre-bid meeting held on 22.12.2009 Corrigendum RACK SERVERS, SAN Storage, TAPE library,

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

Dude Solutions Business Continuity Overview

Dude Solutions Business Continuity Overview Dude Solutions Business Continuity Overview Table of Contents Overview.... 2 Primary and Disaster Recovery Data Centers.... 2 Network Infrastructure.... 3 Emergency Processes.... 3 Power and Cooling Systems....

More information

CUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018

CUNY Graduate Center Information Technology IT Provisioning for Business Continuity & Disaster Recovery Effective Date: November 14, 2018 CUNY Graduate Center Information Technology IT for & Effective Date: November 14, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice,

More information

Quest DL Appliance Family

Quest DL Appliance Family Quest DL Appliance Family June, 2017 Topics: Introduction Appliance Configuration Machine Protection Replication Virtual Machine Export/Virtual Standby Additional Information Contacting Quest 2017 Quest

More information

Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1

Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1 Running head: PROJECT PART VII: FINAL PROJECT PAPER WITH FINAL 1 Project Part VII: Final Project Paper with Final Budget Recommendations Sharon C. Perelman Northwestern University School of Continuing

More information

COMPARING COST MODELS - DETAILS

COMPARING COST MODELS - DETAILS COMPARING COST MODELS - DETAILS SOFTLAYER TOTAL COST OF OWNERSHIP (TCO) CALCULATOR APPROACH The Detailed comparison tab in the TCO Calculator provides a tool with which to do a cost comparison between

More information

HYBRID CLOUD BACKUP & DISASTER RECOVERY

HYBRID CLOUD BACKUP & DISASTER RECOVERY HYBRID CLOUD BACKUP & DISASTER RECOVERY What is NexProtect? NexProtect is a cost-effective, Hybrid Cloud Backup & Disaster Recovery solution that meets your business needs with an on-site appliance that

More information

Welcome to Gumnut Cloud

Welcome to Gumnut Cloud Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install

More information

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and

More information

Brown County Virtualization Project

Brown County Virtualization Project Brown County Virtualization Project By Nicholas Duncanson Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Venyu Solutions Inc. Managed Hosting Services Statewide Enterprise Agreement

Venyu Solutions Inc. Managed Hosting Services Statewide Enterprise Agreement Colocation Services LA00001 Rack Space: 1/4 Rack 1 Monthly $250.00 $175.00 LA00002 Rack Space: 1/4 Rack Installation Fee 1 Each $500.00 $350.00 LA00003 Rack Space: 1/2 Rack 1 Monthly $500.00 $350.00 LA00004

More information

Manual Sql Server 2012 Express Limit Cpu

Manual Sql Server 2012 Express Limit Cpu Manual Sql Server 2012 Express Limit Cpu SQL Server 2014 Reporting Services Standard and Enterprise supports a maximum of SQL Server 2014 Express resources Windows Server 2012 resources For more information

More information

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as

More information

DISASTER RECOVERY PRIMER

DISASTER RECOVERY PRIMER DISASTER RECOVERY PRIMER 1 Site Faliure Occurs Power Faliure / Virus Outbreak / ISP / Ransomware / Multiple Servers Sample Disaster Recovery Process Site Faliure Data Centre 1: Primary Data Centre Data

More information

Universal Computing Solutions, Inc Niagara Falls Blvd., Suite 2A Niagara Falls, N.Y (716)

Universal Computing Solutions, Inc Niagara Falls Blvd., Suite 2A Niagara Falls, N.Y (716) Universal Computing Solutions, Inc. 9701 Niagara Falls Blvd., Suite 2A Niagara Falls, N.Y. 14304 (716) 298-5290 www.universal-cs.com Or is it spread across all of your PCs on your network? The default

More information

Models HP Security Management System XL Appliance with 500-IPS System License

Models HP Security Management System XL Appliance with 500-IPS System License Overview Models HP Security System Appliance with 25-IPS System License HP Security System XL Appliance with 500-IPS System License HP vsms for VMware vsphere single host Software License HP High Availability

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

The Guide to... Hosted Exchange Disaster Recovery

The Guide to... Hosted Exchange Disaster Recovery The Guide to... Hosted Exchange Disaster Recovery Hardware Configuration CISCO FIREWALLS The Cisco firewalls we use to manage the network are ASA models, we run them in each individual Data Centre/Cabinet

More information

Paragon Protect & Restore

Paragon Protect & Restore Paragon Protect & Restore ver. 3 Centralized Backup and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become

More information

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME

IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME IT Discovery / Assessment Report Conducted on: DATE (MM/DD/YYY) HERE On-site Discovery By: AOS ENGINEER NAME Assessment Document By: AOS ENGINEER NAME For: CLIENT NAME HERE CLIENT ADDRESS HERE 1. Current

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT

More information

World Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition

World Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition World Skills Competition Trade 39: IT PC and Network Support Day 2 Competition Small Business Competitor Name: Country Code: 1 of 10 CONTENTS This Test Project proposal consists of the following documentation/files:

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions

Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions Steve Sue VMware PSE June-8 th -2010 Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions 2010 IBM Corporation Virtualization Spending Priority Goldman Sachs 2010 Key Tech Trends

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

TIBCO Nimbus Service

TIBCO Nimbus Service TIBCO Nimbus TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use onpremise or as part of cloud computing environments. Whether it's efficient claims or trade

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE UNITED KINGDOM WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including

More information

Service Description CloudCore

Service Description CloudCore CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Figure 1-1: Local Storage Status (cache).

Figure 1-1: Local Storage Status (cache). The cache is the local storage of the Nasuni Filer. When running the Nasuni Filer on a virtual platform, you can configure the size of the cache disk and the copy-on-write (COW) disk. On Nasuni hardware

More information

BackupAssist v5. Combining Drive Imaging, Data Archival Backup and Internet Backup. Your presenter: Linus Chang, Lead Developer of BackupAssist

BackupAssist v5. Combining Drive Imaging, Data Archival Backup and Internet Backup. Your presenter: Linus Chang, Lead Developer of BackupAssist BackupAssist v5 Combining Drive Imaging, Data Archival Backup and Internet Backup Your presenter: Linus Chang, Lead Developer of BackupAssist Our last SBS UG presentation was in 2005 What we used to do...

More information

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Disaster Recovery Solution Achieved by EXPRESSCLUSTER Disaster Recovery Solution Achieved by EXPRESSCLUSTER November, 2015 NEC Corporation, Cloud Platform Division, EXPRESSCLUSTER Group Index 1. Clustering system and disaster recovery 2. Disaster recovery

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

What can the OnBase Cloud do for you? lbmctech.com

What can the OnBase Cloud do for you? lbmctech.com What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

HPE Datacenter Care for SAP and SAP HANA Datacenter Care Addendum

HPE Datacenter Care for SAP and SAP HANA Datacenter Care Addendum HPE Datacenter Care for SAP and SAP HANA Datacenter Care Addendum This addendum to the HPE Datacenter Care Service data sheet describes HPE Datacenter Care SAP and SAP HANA service features, which are

More information

Server Colocation Standards

Server Colocation Standards Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke

More information

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can

More information

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

Contingency Planning

Contingency Planning Contingency Planning Introduction Planning for the unexpected event, when the use of technology is disrupted and business operations come close to a standstill Procedures are required that will permit

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

Calcanas 1. Edgar Calcanas Dr. Narayanan CST March 2010 CST 412 Mid-Term. Workstations

Calcanas 1. Edgar Calcanas Dr. Narayanan CST March 2010 CST 412 Mid-Term. Workstations Calcanas 1 Edgar Calcanas Dr. Narayanan CST 412 17 March 2010 CST 412 Mid-Term Workstations 1) Every employee must have its own workstation, for our potential client NOPI. We must provide a workstation

More information

Administration of Symantec Cyber Security Services (July 2015) Sample Exam

Administration of Symantec Cyber Security Services (July 2015) Sample Exam Administration of Symantec Cyber Security Services (July 2015) Sample Exam Contents SAMPLE QUESTIONS... 1 ANSWERS... 6 Sample Questions 1. Which DeepSight Intelligence Datafeed can be used to create a

More information

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria) Objective of Survey The purpose of this survey is to identify and understand 1) the nature of critical and sensitive campus-wide applications and/or data, 2) where the data is located, 3) how the data

More information

The OnApp Cloud Platform

The OnApp Cloud Platform The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software

More information

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

Seqrite TERMINATOR (UTM) Unified Threat Management Solution. Unified Threat Management Solution TERMINATOR Introduction Seqrite TERMINATOR is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution

More information

Xytech MediaPulse Equipment Guidelines (Version 8 and Sky)

Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) MediaPulse Architecture Xytech Systems MediaPulse solution utilizes a multitier architecture, requiring at minimum three server roles: a database

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services

COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services COUNTY GOVERNMENT OF BUSIA P.O. PRIVATE BAG 50400 BUSIA, KENYA. Disaster Recovery & Business Continuity Plan for ICT Services October, 2015 This document is copyright to County Government of Busia and

More information

on VMware Deployment Guide November 2018 Deployment Guide for Unitrends Free on VMware Release 10.3 Version Provide feedback

on VMware Deployment Guide November 2018 Deployment Guide for Unitrends Free on VMware Release 10.3 Version Provide feedback Deployment Guide November 2018 Release 10.3 Version 1.11152018 2 Copyright Copyright 2018 Unitrends Incorporated. All rights reserved. Content in this publication is copyright material and may not be copied

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.1 1 Chapter 15 Objectives 15.1 Identify potential safety hazards and implement proper safety procedures related to networks 15.2

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Business Continuity Plan Executive Overview

Business Continuity Plan Executive Overview Business Continuity Plan Executive Overview In terms of business continuity and disaster recovery planning, Harland Clarke s mission is to ensure the availability of critical business functions and Information

More information

Next Generation Firewall

Next Generation Firewall Next Generation Firewall Release Notes 5.10.10 Revision A Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on page 7 New

More information

The HP Blade Workstation Solution A new paradigm in workstation computing featuring the HP ProLiant xw460c Blade Workstation

The HP Blade Workstation Solution A new paradigm in workstation computing featuring the HP ProLiant xw460c Blade Workstation The HP Blade Workstation Solution A new paradigm in workstation computing featuring the HP ProLiant xw460c Blade Workstation Executive overview...2 HP Blade Workstation Solution overview...2 Details of

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

COLOCATION 1/4 RACK RACK COLD AISLE CONTAINEMENT PRIVATE CAGE PRIVATE SUITE FLEXIBLE PRICING OPTIONS

COLOCATION 1/4 RACK RACK COLD AISLE CONTAINEMENT PRIVATE CAGE PRIVATE SUITE FLEXIBLE PRICING OPTIONS 1 COLOCATION Experience the most flexible datacenters for mission-critical infrastructure in a highly secure, efficient and reliable environment. Enjoy future-proof and agile colocation services that provide

More information

The Lighthouse Case Management System

The Lighthouse Case Management System The Lighthouse Case Management System Get everything you need to track hotline reports from beginning to end in one easy-to-use online tool! For most organizations, keeping track of hotline reports can

More information

Business Resiliency in the Cloud: Reality or Hype?

Business Resiliency in the Cloud: Reality or Hype? Business Resiliency in the Cloud: Reality or Hype? Karen Jaworski Senior Director, Product Marketing EVault, a Seagate Company 8/10/2012 2012 EVault, Inc. All Rights Reserved 1 Who is EVault? Cloud-Connected

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

HPE Converged Data Solutions

HPE Converged Data Solutions HPE Converged Data Solutions Erdinc Kaya - kaya@hpe.com Storage Solution Architect Areas of Transformation & HPE IM&P A platform approach for effectively managing and protecting all information enterprise-wide

More information

This PDF is no longer being maintained. Search the SolarWinds Success Center for more information.

This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document

More information

CAMAvision System Requirements Guide revised 3/21/2017

CAMAvision System Requirements Guide revised 3/21/2017 The computer industry is very fast moving, with larger and faster technologies supplanting previous hardware releases within six to nine months. Some of the specifications listed may no longer be available,

More information

Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing

Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing Expert Reference Series of White Papers Understanding Data Centers and Cloud Computing 1-800-COURSES www.globalknowledge.com Understanding Data Centers and Cloud Computing Paul Stryer, Global Knowledge

More information