2. DIRECTOR OF INFORMATION
TECHNOLOGY
MARCOS FERNANDEZ
Infrastructure/Software
Manager
Shawn Kelly
Security
Officer
Daniel Bewick
System
Administrator
MaryPearl Parnell
System
Administrator
Oscar Madriz
Network Engineer
Johnny Vega
Network Engineer
Marcos Fernandez
3. NETWORK RESTRUCTURE
• Orange Creek, Inc., a Fortune 500 company, has moved into
Lexington and is requesting bids for implementing a network
infrastructure for their banking software company. The primary
function of the new building is to provide office space for
software development and testing of their homegrown banking
software. Both levels of the building are dedicated to
development, test, on-site IT staff, management, and
administration.
5. OPERATING SYSTEM
• Windows 8.1 Enterprise
• Windows Server 2012 R2
• Red Hat Enterprise Linux
• Mac OS X El Capitan
6. FINANCIAL MANAGEMENT SOFTWARE
• Intuit QuickBooks Plus
• Bill Tracker gives you an instant view of your money-out
• Manage forms in a single step—unclutter your "send forms"
queue in a single click.
• Advanced reporting features include a "this year to last month"
filter
• Easily ship packages to US and international destinations with
integrated shipping through UPS, FedEx or USPS.
7. DOCUMENT SIGNING SOFTWARE
• DocuSign Business Premium
• Bulk Send: Send the same document to hundreds of people
• PowerForms: Distribute documents on your website for anyone
to sign on-demand
24. SECURITY CAMERAS INSIDE THE BUILDING
• LOREX 16CH Remote View 2TB DVR Kit
• Software App Supported on Android, iOS, Windows and Lorex
Platforms
• Massive 2TB Storage Capacity
• Visual Range of Up to 40 Meters in Night Lighting Conditions
25. SECURITY CAMERAS OUTSIDE THE
BUILDING
• ACTi D42 Bullet Style Night Vision Network Camera
• 4 Configurable Areas of Privacy Masking
• 0.1 Lux Illumination for Low-Light Video
• Power Over Ethernet (PoE) Compliant
28. POLICIES &PROCEDURES
• AUP
• Data transferred across corporate infrastructure is property of Orange Creek
Inc.
• All data is captured and logged for accountability
• Guest Policy
• All guests are segregated off corporation network
• All guest access must be approved prior to granted connectivity
• Network Access Policy
• No devices are able to connect to network without authorization from IT
staff
• Once approved all devices and traffic are monitored and logged