What to do with assets?
Location of Assets

1.   Main Data Center - Systems/Host/Storage
2.   DR Data Center – Systems/Host/Storage
3.   Organizations Internal End point – Workstations
4.   Outsource end point – Workstations
5.   Network – data in transit
Method of Securing Assets
1.Network-base
2.Host-based
3.Workstation
4.File/Data Security
Network-Based
1. Perimeter
  •   Firewall
  •   IPS
  •   NAC
2. Content-based
  •   AV
  •   AS
  •   WF
3. VPN
  •   IPSEC
  •   SSL
Host-Based
•   OS hardening
•   Application hardening
•   Access Control
•   HIPS
•   AV
•   AS
•   FW, Application firewall
Workstation
•   OS hardening
•   User hardening
•   HIPS
•   AV
•   AS
•   WF
•   Personal FW
File/Data Security
• Encryption – storage, in-transit
• Data-loss protection – communication
  channels
Security Optimization
•   Log/Security Information Management
•   IP Address Management
•   Vulnerability Management
•   Recovery Management
•   Remediation and Patch Management
•   Policy Audit and Review
Optimization Solution
•   IT Asset Management
•   Infrastructure Management
•   Performance Management
•   WAN Optimization
WAN Optimization
• WAN Acceleration
  – enhance the WAN performance by
    classifying, monitoring and shaping the WAN
    traffic
• WAN Management
  – use techniques such as traffic shaping,
    compression, caching, and protocol
    acceleration to enhance performance

Security and optimization solution primer [compatibility mode]

  • 1.
    What to dowith assets?
  • 2.
    Location of Assets 1. Main Data Center - Systems/Host/Storage 2. DR Data Center – Systems/Host/Storage 3. Organizations Internal End point – Workstations 4. Outsource end point – Workstations 5. Network – data in transit
  • 3.
    Method of SecuringAssets 1.Network-base 2.Host-based 3.Workstation 4.File/Data Security
  • 4.
    Network-Based 1. Perimeter • Firewall • IPS • NAC 2. Content-based • AV • AS • WF 3. VPN • IPSEC • SSL
  • 5.
    Host-Based • OS hardening • Application hardening • Access Control • HIPS • AV • AS • FW, Application firewall
  • 6.
    Workstation • OS hardening • User hardening • HIPS • AV • AS • WF • Personal FW
  • 7.
    File/Data Security • Encryption– storage, in-transit • Data-loss protection – communication channels
  • 8.
    Security Optimization • Log/Security Information Management • IP Address Management • Vulnerability Management • Recovery Management • Remediation and Patch Management • Policy Audit and Review
  • 9.
    Optimization Solution • IT Asset Management • Infrastructure Management • Performance Management • WAN Optimization
  • 10.
    WAN Optimization • WANAcceleration – enhance the WAN performance by classifying, monitoring and shaping the WAN traffic • WAN Management – use techniques such as traffic shaping, compression, caching, and protocol acceleration to enhance performance