Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Training Executive Brief <ul><li>The East West Connection </li></ul>
AGENDA <ul><li>PURPOSE </li></ul><ul><li>PROBLEM </li></ul><ul><li>SECURITY FUNCTIONAL REQUIREMENTS </li></ul><ul><li>STAN...
PURPOSE <ul><li>Provide network centric solution to support delivery of desktop training to over three-thousand Soldiers a...
PROBLEM <ul><li>Physical infrastructure in schoolhouse aged </li></ul><ul><li>Performing IA related activities that should...
SECURITY FUNCTIONAL REQUIREMENTS <ul><li>Auditing and compliance with security policies </li></ul><ul><li>Service manageme...
STANDARD FUNCTIONAL REQUIREMENTS  <ul><li>Access control via CAC </li></ul><ul><li>Virtual environment </li></ul><ul><li>B...
USE CASE: USER TO CLOUD  <ul><ul><li>Functional Requirements: </li></ul></ul><ul><ul><ul><li>Scalable storage/ elasticity ...
QUANTITATIVE/QUALITATIVE MATRIX <ul><li>Storage max: 90% </li></ul><ul><li>Bandwidth consumption/saturation: 70% </li></ul...
 
<ul><li>QUESTIONS? </li></ul>
Upcoming SlideShare
Loading in …5
×

The East West connection

1,405 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

The East West connection

  1. 1. Training Executive Brief <ul><li>The East West Connection </li></ul>
  2. 2. AGENDA <ul><li>PURPOSE </li></ul><ul><li>PROBLEM </li></ul><ul><li>SECURITY FUNCTIONAL REQUIREMENTS </li></ul><ul><li>STANDARDS </li></ul><ul><li>USE CASE </li></ul><ul><li>QUANTITATIVE/QUALITATIVE MATRIX </li></ul>
  3. 3. PURPOSE <ul><li>Provide network centric solution to support delivery of desktop training to over three-thousand Soldiers annually. </li></ul>
  4. 4. PROBLEM <ul><li>Physical infrastructure in schoolhouse aged </li></ul><ul><li>Performing IA related activities that should not be on the performance network </li></ul><ul><ul><li>Vulnerability scanning, protocol analyzing, etc. </li></ul></ul><ul><li>Variety of vendors training to be delivered </li></ul><ul><ul><li>Cisco, CompTIA, Microsoft, Unix, Solaris </li></ul></ul>
  5. 5. SECURITY FUNCTIONAL REQUIREMENTS <ul><li>Auditing and compliance with security policies </li></ul><ul><li>Service management </li></ul><ul><li>Configuration management </li></ul>
  6. 6. STANDARD FUNCTIONAL REQUIREMENTS <ul><li>Access control via CAC </li></ul><ul><li>Virtual environment </li></ul><ul><li>Bandwidth to support training mission </li></ul><ul><li>AGM compliant </li></ul>
  7. 7. USE CASE: USER TO CLOUD <ul><ul><li>Functional Requirements: </li></ul></ul><ul><ul><ul><li>Scalable storage/ elasticity </li></ul></ul></ul><ul><ul><ul><li>Interoperability: Cisco, Skillport, Landwarnet, etc. </li></ul></ul></ul><ul><ul><ul><li>Capacity planning for storage and bandwidth </li></ul></ul></ul><ul><ul><ul><li>Endpoint security </li></ul></ul></ul><ul><ul><ul><li>Event auditing and reporting </li></ul></ul></ul>
  8. 8. QUANTITATIVE/QUALITATIVE MATRIX <ul><li>Storage max: 90% </li></ul><ul><li>Bandwidth consumption/saturation: 70% </li></ul><ul><li>Availability: 99.999% 5/16 </li></ul><ul><li>Model based management </li></ul>
  9. 10. <ul><li>QUESTIONS? </li></ul>

×