SlideShare a Scribd company logo
1 of 14
Download to read offline
NETCOM G5




Industry Day 2012
 An Update on 2011




                 COL Matchette
                 NETCOM G5
                                 1
Mission Statement



Enable a reliable and protected LWN by engineering,
integrating,
integrating and sustaining ente se information
                            enterprise
technology solutions and services. Anticipate and
solve enterprise organization mission issues. Oversee
technical and functional requirements development t
based on valid operational needs.




                                                        2
But I Have Lots of Requirements
• IP Transport               • IP Transport                 • Enterprise Support       • Computing Platform 
  Management                   Management                     – Enterprise Services      Management
  – Wireless IP Network        – Firewall Element               Management System        – Backup & Recovery 
     Management                   Manager                       (ESMS)                     Management
• Computing Platform           – IP Network                 • Security Management        – Host‐based Security 
  Management                      Management System           – Identity Management        System (HBSS)
  – Systems Management            (NetMan)                    – Network Access           – Storage Management 
    System (SysMan)            – Network Intrusion              Control (NAC)              System
                                  Prevention System 
                                  Prevention System                                    • Security Management
• Security Management             (NIPS)                    • Enterprise Services & 
  – Crypto‐security                                           Applications               – IAVM IP Network 
                               – Proxy Management                                          Vulnerability Scanner
    Management                 – Router Element               Management
  – IAVM Computing                                            – Directory Services       – Security Information 
                                  Manager                                                  M n g m nt Syst m 
                                                                                                          Sys
    Platform Management
    Platform Management        – Switch Element                 Management
                                                                                           (SIMS)
• Enterprise Support              Managers                  • Enterprise Services & 
  – Domain Name Service        – Virtual Private Network      Applications             • Enterprise Support
    (DNS) Management              (VPN) Management            Management                 – IP Capacity, Availability, 
                               – Wireless Intrusion
                                  Wireless Intrusion          – Database Element
                                                                Database Element           & Performance (CAP) 
• Computing Platform 
         t Pl tf                                                                           Monitoring System
                                  Prevention System             Manager
  Management
                                  (WIPS) 
  – Virtualization 
    Management System 
    (VMS)




                                                                                                                    12
04 NETCOM G5 - COL Matchette
04 NETCOM G5 - COL Matchette

More Related Content

Viewers also liked

Cen group tổ chức tết con rắn
Cen group tổ chức tết con rắnCen group tổ chức tết con rắn
Cen group tổ chức tết con rắnCen Group
 
Hinh anh dang tin
Hinh anh dang tinHinh anh dang tin
Hinh anh dang tinPham Doanh
 
Bloombase Spitfire Messaging Compatibility Matrix
Bloombase Spitfire Messaging Compatibility MatrixBloombase Spitfire Messaging Compatibility Matrix
Bloombase Spitfire Messaging Compatibility MatrixBloombase
 
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xương
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xươngPhẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xương
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xươngLieu Truong
 

Viewers also liked (7)

Sms9
Sms9Sms9
Sms9
 
Cen group tổ chức tết con rắn
Cen group tổ chức tết con rắnCen group tổ chức tết con rắn
Cen group tổ chức tết con rắn
 
Hinh anh dang tin
Hinh anh dang tinHinh anh dang tin
Hinh anh dang tin
 
EstáSchateado
EstáSchateadoEstáSchateado
EstáSchateado
 
Sam u l
Sam u lSam u l
Sam u l
 
Bloombase Spitfire Messaging Compatibility Matrix
Bloombase Spitfire Messaging Compatibility MatrixBloombase Spitfire Messaging Compatibility Matrix
Bloombase Spitfire Messaging Compatibility Matrix
 
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xương
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xươngPhẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xương
Phẫu thuật gọt mặt v line bằng phương pháp mới nhất không cần ghép xương
 

Similar to 04 NETCOM G5 - COL Matchette

Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutionsakshayvreddy
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...☁️Carl Nakamura [MSFT]☁️
 
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...☁️Carl Nakamura [MSFT]☁️
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Reddy Marri
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialistmomentuminfocare
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftCA Nimsoft
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingKaseya
 

Similar to 04 NETCOM G5 - COL Matchette (20)

Axxera Security Solutions
Axxera Security SolutionsAxxera Security Solutions
Axxera Security Solutions
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...
 
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
What's new in windows server 2012 and system center 2012 sp1 for hosting and ...
 
Cnr Global Business Profile V2.8
Cnr Global Business Profile V2.8Cnr Global Business Profile V2.8
Cnr Global Business Profile V2.8
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialist
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Cloud computing 2012
Cloud computing 2012Cloud computing 2012
Cloud computing 2012
 
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
 
Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Cnr global business profile v2.8
Cnr global business profile v2.8Cnr global business profile v2.8
Cnr global business profile v2.8
 
Axxera
AxxeraAxxera
Axxera
 
TruWest
TruWestTruWest
TruWest
 

More from USARMYNETCOM

12 Vendor Process - Walton Cheung
12 Vendor Process - Walton Cheung12 Vendor Process - Walton Cheung
12 Vendor Process - Walton CheungUSARMYNETCOM
 
11 ABITS - David Conlan
11 ABITS - David Conlan11 ABITS - David Conlan
11 ABITS - David ConlanUSARMYNETCOM
 
10 SIGCoE - COL Fraley
10 SIGCoE - COL Fraley10 SIGCoE - COL Fraley
10 SIGCoE - COL FraleyUSARMYNETCOM
 
09 ADCCP - LTC Brown
09 ADCCP - LTC Brown09 ADCCP - LTC Brown
09 ADCCP - LTC BrownUSARMYNETCOM
 
08 ACC-APG - Debra Parra
08 ACC-APG - Debra Parra08 ACC-APG - Debra Parra
08 ACC-APG - Debra ParraUSARMYNETCOM
 
06 JIE - Michael Bomba
06 JIE - Michael Bomba06 JIE - Michael Bomba
06 JIE - Michael BombaUSARMYNETCOM
 
07 CON - LTC Chugg
07 CON - LTC Chugg07 CON - LTC Chugg
07 CON - LTC ChuggUSARMYNETCOM
 
05 JEN - Jeanna Garland
05 JEN - Jeanna Garland05 JEN - Jeanna Garland
05 JEN - Jeanna GarlandUSARMYNETCOM
 
03 Cyber Vision - Mr. Bradford
03 Cyber Vision - Mr. Bradford03 Cyber Vision - Mr. Bradford
03 Cyber Vision - Mr. BradfordUSARMYNETCOM
 
02 SJA - Ethics - Susan Turley
02 SJA - Ethics - Susan Turley02 SJA - Ethics - Susan Turley
02 SJA - Ethics - Susan TurleyUSARMYNETCOM
 

More from USARMYNETCOM (11)

12 Vendor Process - Walton Cheung
12 Vendor Process - Walton Cheung12 Vendor Process - Walton Cheung
12 Vendor Process - Walton Cheung
 
11 ABITS - David Conlan
11 ABITS - David Conlan11 ABITS - David Conlan
11 ABITS - David Conlan
 
10 SIGCoE - COL Fraley
10 SIGCoE - COL Fraley10 SIGCoE - COL Fraley
10 SIGCoE - COL Fraley
 
09 ADCCP - LTC Brown
09 ADCCP - LTC Brown09 ADCCP - LTC Brown
09 ADCCP - LTC Brown
 
08 ACC-APG - Debra Parra
08 ACC-APG - Debra Parra08 ACC-APG - Debra Parra
08 ACC-APG - Debra Parra
 
06 JIE - Michael Bomba
06 JIE - Michael Bomba06 JIE - Michael Bomba
06 JIE - Michael Bomba
 
07 CON - LTC Chugg
07 CON - LTC Chugg07 CON - LTC Chugg
07 CON - LTC Chugg
 
05 JEN - Jeanna Garland
05 JEN - Jeanna Garland05 JEN - Jeanna Garland
05 JEN - Jeanna Garland
 
03 Cyber Vision - Mr. Bradford
03 Cyber Vision - Mr. Bradford03 Cyber Vision - Mr. Bradford
03 Cyber Vision - Mr. Bradford
 
01 - MG Lynn
01 - MG Lynn01 - MG Lynn
01 - MG Lynn
 
02 SJA - Ethics - Susan Turley
02 SJA - Ethics - Susan Turley02 SJA - Ethics - Susan Turley
02 SJA - Ethics - Susan Turley
 

04 NETCOM G5 - COL Matchette

  • 1. NETCOM G5 Industry Day 2012 An Update on 2011 COL Matchette NETCOM G5 1
  • 2. Mission Statement Enable a reliable and protected LWN by engineering, integrating, integrating and sustaining ente se information enterprise technology solutions and services. Anticipate and solve enterprise organization mission issues. Oversee technical and functional requirements development t based on valid operational needs. 2
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. But I Have Lots of Requirements • IP Transport  • IP Transport  • Enterprise Support • Computing Platform  Management Management – Enterprise Services  Management – Wireless IP Network  – Firewall Element  Management System  – Backup & Recovery  Management  Manager (ESMS) Management • Computing Platform  – IP Network  • Security Management – Host‐based Security  Management Management System  – Identity Management System (HBSS) – Systems Management  (NetMan) – Network Access  – Storage Management  System (SysMan) – Network Intrusion  Control (NAC) System Prevention System  Prevention System • Security Management • Security Management (NIPS) • Enterprise Services &  – Crypto‐security  Applications  – IAVM IP Network  – Proxy Management Vulnerability Scanner Management – Router Element  Management – IAVM Computing  – Directory Services  – Security Information  Manager M n g m nt Syst m  Sys Platform Management Platform Management – Switch Element  Management (SIMS) • Enterprise Support Managers • Enterprise Services &  – Domain Name Service  – Virtual Private Network  Applications  • Enterprise Support (DNS) Management (VPN) Management Management – IP Capacity, Availability,  – Wireless Intrusion Wireless Intrusion  – Database Element Database Element  & Performance (CAP)  • Computing Platform  t Pl tf Monitoring System Prevention System  Manager Management (WIPS)  – Virtualization  Management System  (VMS) 12