SlideShare a Scribd company logo
1 of 10
Download to read offline
What to do with assets?
Location of Assets

1.   Main Data Center - Systems/Host/Storage
2.   DR Data Center – Systems/Host/Storage
3.   Organizations Internal End point – Workstations
4.   Outsource end point – Workstations
5.   Network – data in transit
Method of Securing Assets
1.Network-base
2.Host-based
3.Workstation
4.File/Data Security
Network-Based
1. Perimeter
  •   Firewall
  •   IPS
  •   NAC
2. Content-based
  •   AV
  •   AS
  •   WF
3. VPN
  •   IPSEC
  •   SSL
Host-Based
•   OS hardening
•   Application hardening
•   Access Control
•   HIPS
•   AV
•   AS
•   FW, Application firewall
Workstation
•   OS hardening
•   User hardening
•   HIPS
•   AV
•   AS
•   WF
•   Personal FW
File/Data Security
• Encryption – storage, in-transit
• Data-loss protection – communication
  channels
Security Optimization
•   Log/Security Information Management
•   IP Address Management
•   Vulnerability Management
•   Recovery Management
•   Remediation and Patch Management
•   Policy Audit and Review
Optimization Solution
•   IT Asset Management
•   Infrastructure Management
•   Performance Management
•   WAN Optimization
WAN Optimization
• WAN Acceleration
  – enhance the WAN performance by
    classifying, monitoring and shaping the WAN
    traffic
• WAN Management
  – use techniques such as traffic shaping,
    compression, caching, and protocol
    acceleration to enhance performance

More Related Content

Viewers also liked

Cla august 2007
Cla august 2007Cla august 2007
Cla august 2007
bamoreland
 
Cla december 2007
Cla december 2007Cla december 2007
Cla december 2007
bamoreland
 
Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02
Alyza Mae Bactad
 
Tfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hiteTfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hite
plagakis
 
Marisol Feliz Gonzalez
Marisol  Feliz GonzalezMarisol  Feliz Gonzalez
Marisol Feliz Gonzalez
subjeycepeda
 
Ramona Partido Politico
Ramona Partido  PoliticoRamona Partido  Politico
Ramona Partido Politico
subjeycepeda
 
How to write thesis proposal
How to write thesis proposalHow to write thesis proposal
How to write thesis proposal
biraytiful
 
Sally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet CoverSally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet Cover
BCFbedding
 

Viewers also liked (17)

Cla december 2010
Cla december 2010Cla december 2010
Cla december 2010
 
Cla august 2008
Cla august 2008Cla august 2008
Cla august 2008
 
Cla march 2010
Cla march 2010Cla march 2010
Cla march 2010
 
Rte Introduction W Org Excellence Slide Final
Rte Introduction W Org Excellence Slide FinalRte Introduction W Org Excellence Slide Final
Rte Introduction W Org Excellence Slide Final
 
Cla august 2007
Cla august 2007Cla august 2007
Cla august 2007
 
Cla december 2007
Cla december 2007Cla december 2007
Cla december 2007
 
Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02Introductiontopoliticalscience 100621020245-phpapp02
Introductiontopoliticalscience 100621020245-phpapp02
 
Tfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hiteTfd fpic indonesia_kristen_hite
Tfd fpic indonesia_kristen_hite
 
Marisol Feliz Gonzalez
Marisol  Feliz GonzalezMarisol  Feliz Gonzalez
Marisol Feliz Gonzalez
 
Slideshare_JOSE
Slideshare_JOSESlideshare_JOSE
Slideshare_JOSE
 
Ramona Partido Politico
Ramona Partido  PoliticoRamona Partido  Politico
Ramona Partido Politico
 
How to write thesis proposal
How to write thesis proposalHow to write thesis proposal
How to write thesis proposal
 
Campamento Las Brujas
Campamento Las BrujasCampamento Las Brujas
Campamento Las Brujas
 
Dgt Cinturon
Dgt CinturonDgt Cinturon
Dgt Cinturon
 
History of Horror!
History of Horror!History of Horror!
History of Horror!
 
Libro1
Libro1Libro1
Libro1
 
Sally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet CoverSally Bed Sheets & Duvet Cover
Sally Bed Sheets & Duvet Cover
 

Similar to Security and optimization solution primer [compatibility mode]

Q2 Briefing Presentation
Q2 Briefing PresentationQ2 Briefing Presentation
Q2 Briefing Presentation
Kurt Carlsen
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
scomoore
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
scomoore
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
Lahav Savir
 
Designing a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the CloudDesigning a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the Cloud
Arron Stebbing
 

Similar to Security and optimization solution primer [compatibility mode] (20)

Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
 
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
Image Management Using Orthanc in a Multi-Centre Reserach PET StudyImage Management Using Orthanc in a Multi-Centre Reserach PET Study
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
 
Q2 Briefing Presentation
Q2 Briefing PresentationQ2 Briefing Presentation
Q2 Briefing Presentation
 
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan VolzArchiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
 
Earth linkit servicesoverview
Earth linkit servicesoverviewEarth linkit servicesoverview
Earth linkit servicesoverview
 
EarthLink IT Services Overview
EarthLink IT Services OverviewEarthLink IT Services Overview
EarthLink IT Services Overview
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
 
2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux2016 TTL Security Gap Analysis with Kali Linux
2016 TTL Security Gap Analysis with Kali Linux
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Build Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWSBuild Secure Cloud Solution using F5 BIG-IP on AWS
Build Secure Cloud Solution using F5 BIG-IP on AWS
 
Designing a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the CloudDesigning a Highly Available Management Cluster for the Cloud
Designing a Highly Available Management Cluster for the Cloud
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Data Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak namData Governance and Management in Cloud pak nam
Data Governance and Management in Cloud pak nam
 
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS SupportWebinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
 
SIEM.pdf
SIEM.pdfSIEM.pdf
SIEM.pdf
 
Alfresco Records Management 2.0
Alfresco Records Management  2.0Alfresco Records Management  2.0
Alfresco Records Management 2.0
 
How to evaluate data protection technologies - Mastercard conference
How to evaluate data protection technologies -  Mastercard conferenceHow to evaluate data protection technologies -  Mastercard conference
How to evaluate data protection technologies - Mastercard conference
 
Cloud slides
Cloud slidesCloud slides
Cloud slides
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Security and optimization solution primer [compatibility mode]

  • 1. What to do with assets?
  • 2. Location of Assets 1. Main Data Center - Systems/Host/Storage 2. DR Data Center – Systems/Host/Storage 3. Organizations Internal End point – Workstations 4. Outsource end point – Workstations 5. Network – data in transit
  • 3. Method of Securing Assets 1.Network-base 2.Host-based 3.Workstation 4.File/Data Security
  • 4. Network-Based 1. Perimeter • Firewall • IPS • NAC 2. Content-based • AV • AS • WF 3. VPN • IPSEC • SSL
  • 5. Host-Based • OS hardening • Application hardening • Access Control • HIPS • AV • AS • FW, Application firewall
  • 6. Workstation • OS hardening • User hardening • HIPS • AV • AS • WF • Personal FW
  • 7. File/Data Security • Encryption – storage, in-transit • Data-loss protection – communication channels
  • 8. Security Optimization • Log/Security Information Management • IP Address Management • Vulnerability Management • Recovery Management • Remediation and Patch Management • Policy Audit and Review
  • 9. Optimization Solution • IT Asset Management • Infrastructure Management • Performance Management • WAN Optimization
  • 10. WAN Optimization • WAN Acceleration – enhance the WAN performance by classifying, monitoring and shaping the WAN traffic • WAN Management – use techniques such as traffic shaping, compression, caching, and protocol acceleration to enhance performance