This document discusses how to secure various IT assets including those located in main and DR data centers, internal and outsourced workstations, and data in transit. It describes network-based security methods like firewalls, IPS, and NAC. It also covers host-based security of operating systems, applications, and data on servers and workstations. The document advocates for encryption, log management, vulnerability management, and WAN optimization to enhance security and performance.
2. Location of Assets
1. Main Data Center - Systems/Host/Storage
2. DR Data Center – Systems/Host/Storage
3. Organizations Internal End point – Workstations
4. Outsource end point – Workstations
5. Network – data in transit
3. Method of Securing Assets
1.Network-base
2.Host-based
3.Workstation
4.File/Data Security
8. Security Optimization
• Log/Security Information Management
• IP Address Management
• Vulnerability Management
• Recovery Management
• Remediation and Patch Management
• Policy Audit and Review
9. Optimization Solution
• IT Asset Management
• Infrastructure Management
• Performance Management
• WAN Optimization
10. WAN Optimization
• WAN Acceleration
– enhance the WAN performance by
classifying, monitoring and shaping the WAN
traffic
• WAN Management
– use techniques such as traffic shaping,
compression, caching, and protocol
acceleration to enhance performance