SlideShare a Scribd company logo
1 of 10
Download to read offline
What to do with assets?
Location of Assets

1.   Main Data Center - Systems/Host/Storage
2.   DR Data Center – Systems/Host/Storage
3.   Organizations Internal End point – Workstations
4.   Outsource end point – Workstations
5.   Network – data in transit
Method of Securing Assets
1.Network-base
2.Host-based
3.Workstation
4.File/Data Security
Network-Based
1. Perimeter
  •   Firewall
  •   IPS
  •   NAC
2. Content-based
  •   AV
  •   AS
  •   WF
3. VPN
  •   IPSEC
  •   SSL
Host-Based
•   OS hardening
•   Application hardening
•   Access Control
•   HIPS
•   AV
•   AS
•   FW, Application firewall
Workstation
•   OS hardening
•   User hardening
•   HIPS
•   AV
•   AS
•   WF
•   Personal FW
File/Data Security
• Encryption – storage, in-transit
• Data-loss protection – communication
  channels
Security Optimization
•   Log/Security Information Management
•   IP Address Management
•   Vulnerability Management
•   Recovery Management
•   Remediation and Patch Management
•   Policy Audit and Review
Optimization Solution
•   IT Asset Management
•   Infrastructure Management
•   Performance Management
•   WAN Optimization
WAN Optimization
• WAN Acceleration
  – enhance the WAN performance by
    classifying, monitoring and shaping the WAN
    traffic
• WAN Management
  – use techniques such as traffic shaping,
    compression, caching, and protocol
    acceleration to enhance performance

More Related Content

Viewers also liked

Cla august 2007
Cla august 2007Cla august 2007
Cla august 2007
bamoreland
 
Cla december 2007
Cla december 2007Cla december 2007
Cla december 2007
bamoreland
 
Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02
Alyza Mae Bactad
 
Tfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hiteTfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hite
plagakis
 
Marisol Feliz Gonzalez
Marisol  Feliz GonzalezMarisol  Feliz Gonzalez
Marisol Feliz Gonzalez
subjeycepeda
 
Ramona Partido Politico
Ramona Partido  PoliticoRamona Partido  Politico
Ramona Partido Politico
subjeycepeda
 
How to write thesis proposal
How to write thesis proposalHow to write thesis proposal
How to write thesis proposal
biraytiful
 
Sally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet CoverSally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet Cover
BCFbedding
 

Viewers also liked (17)

Cla december 2010
Cla december 2010Cla december 2010
Cla december 2010
 
Cla august 2008
Cla august 2008Cla august 2008
Cla august 2008
 
Cla march 2010
Cla march 2010Cla march 2010
Cla march 2010
 
Rte Introduction W Org Excellence Slide Final
Rte Introduction W Org Excellence Slide FinalRte Introduction W Org Excellence Slide Final
Rte Introduction W Org Excellence Slide Final
 
Cla august 2007
Cla august 2007Cla august 2007
Cla august 2007
 
Cla december 2007
Cla december 2007Cla december 2007
Cla december 2007
 
Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02
 
Tfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hiteTfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hite
 
Marisol Feliz Gonzalez
Marisol  Feliz GonzalezMarisol  Feliz Gonzalez
Marisol Feliz Gonzalez
 
Slideshare_JOSE
Slideshare_JOSESlideshare_JOSE
Slideshare_JOSE
 
Ramona Partido Politico
Ramona Partido  PoliticoRamona Partido  Politico
Ramona Partido Politico
 
How to write thesis proposal
How to write thesis proposalHow to write thesis proposal
How to write thesis proposal
 
Campamento Las Brujas
Campamento Las BrujasCampamento Las Brujas
Campamento Las Brujas
 
Dgt Cinturon
Dgt CinturonDgt Cinturon
Dgt Cinturon
 
History of Horror!
History of Horror!History of Horror!
History of Horror!
 
Libro1
Libro1Libro1
Libro1
 
Sally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet CoverSally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet Cover
 

Similar to Security and optimization solution primer [compatibility mode]

Q2 Briefing Presentation
Q2 Briefing PresentationQ2 Briefing Presentation
Q2 Briefing Presentation
Kurt Carlsen
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
scomoore
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
scomoore
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
Lahav Savir
 
Designing a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the CloudDesigning a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the Cloud
Arron Stebbing
 

Similar to Security and optimization solution primer [compatibility mode] (20)

Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
 
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
Image Management Using Orthanc in a Multi-Centre Reserach PET StudyImage Management Using Orthanc in a Multi-Centre Reserach PET Study
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
 
Q2 Briefing Presentation
Q2 Briefing PresentationQ2 Briefing Presentation
Q2 Briefing Presentation
 
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan VolzArchiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
 
Designing a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the CloudDesigning a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the Cloud
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
 
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS SupportWebinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
 
SIEM.pdf
SIEM.pdfSIEM.pdf
SIEM.pdf
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conference
 
Cloud slides
Cloud slidesCloud slides
Cloud slides
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Security and optimization solution primer [compatibility mode]

  • 1. What to do with assets?
  • 2. Location of Assets 1. Main Data Center - Systems/Host/Storage 2. DR Data Center – Systems/Host/Storage 3. Organizations Internal End point – Workstations 4. Outsource end point – Workstations 5. Network – data in transit
  • 3. Method of Securing Assets 1.Network-base 2.Host-based 3.Workstation 4.File/Data Security
  • 4. Network-Based 1. Perimeter • Firewall • IPS • NAC 2. Content-based • AV • AS • WF 3. VPN • IPSEC • SSL
  • 5. Host-Based • OS hardening • Application hardening • Access Control • HIPS • AV • AS • FW, Application firewall
  • 6. Workstation • OS hardening • User hardening • HIPS • AV • AS • WF • Personal FW
  • 7. File/Data Security • Encryption – storage, in-transit • Data-loss protection – communication channels
  • 8. Security Optimization • Log/Security Information Management • IP Address Management • Vulnerability Management • Recovery Management • Remediation and Patch Management • Policy Audit and Review
  • 9. Optimization Solution • IT Asset Management • Infrastructure Management • Performance Management • WAN Optimization
  • 10. WAN Optimization • WAN Acceleration – enhance the WAN performance by classifying, monitoring and shaping the WAN traffic • WAN Management – use techniques such as traffic shaping, compression, caching, and protocol acceleration to enhance performance