SlideShare a Scribd company logo
TÜV Informationstechnik GmbH  Member of TÜV NORD Group TSI: Trusted Site Infrastructure The certification program for data center - more than availability health checks
AGENDA Certification Process TSI Criteria TSI Certification Benefits Introduction to TUV Cost
TÜV´s in Germany TÜV Rheinland / Berlin-Brandenburg TÜV Süddeutschland TÜV Rheinland / Berlin-Brandenburg TÜV Saarland
TÜV NORD Group
TÜV NORD in Europe Grandvilliers Croydon Best Essen Madrid Mailand Athen Istanbul Katowice Prag Bratislava Novi Sad Slavonski Brod Moskau Plovdiv Tallin Kolding Hannover Hamburg Espoo Bologna Riga Wilna Bukarest Göteborg Ankara Donezk Budapest
TÜV NORD worldwide San José Clifton Buenos Aires Rio de Janeiro Dammam Abu Dhabi Teheran Mumbai Barat Bangkok Shanghai Hong Kong Tokyo Seoul Taipeh Almaty
Qualified personnel provide the basis  for high-level services 70% of all employees work in the technical domain. More than 2/3 of these are graduate engineers, and the rest are master craftsmen or technicians ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TÜViT  Our Principles TÜViT  -  The Trust Provider for  Quality  and  Security  in Information Technology works TÜViT  is a private company and does not develop, sell or integrate any products ! Manufacturers ,[object Object],[object Object],[object Object],Special interest groups Branches S hare holders/members Government Independent from unbiased impartial
TÜViT  Our Vision in the field of Information Technology and Telecommunication
Quality  And Security IT and Telecom-munication IT and Telecom-munication IT and Telecom-munication TÜVit  Our Mission
TÜViT   Topics Company Systems Components Project
Information Technology on all Layers Company Systems Components Project Evaluation of IT Security Optimization of IT Quality Privacy Security Management Quality Management Service Management Physical Security Network Security Secure e-Business Usability   Content Quality Monitoring Reliability Document Management Evaluation of Security Software Security Hardware Functional Tests Improvement of Processes Models Project Management
Information Technology Methods Company Systems Components Project IT Security IT Quality quid! / ULD ISO 27001 / ISO 17799 GSM SAS / TU4 Baseline Protection ISO 9000 ITIL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CMMI  SPICE V-Model  RUP IEEE 1233 ISO 12119 ISO 9241 Common Criteria / ITSEC FIPS 140 ZKA-Criteria Trust Site Hardware Laboratory
IT-Security Accreditations Company Systems Components Project ISO 17799 / BS7799-2 GSM SAS / TU.4 quid! / ULD Baseline Protection Common Criteria / ITSEC FIPS 140-1/-2 ZKA-Criteria Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy
IT-Security Knowledge Company Systems Components Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISO 27001 / ISO 17799 GSM SAS / TU.4 quid! / ULD Baseline Protection Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy Common Criteria / ITSEC FIPS 140 ZKA-Criteria
Trusted site infrastructure Trusted site  infrastructure for  Data Center
Trusted site infrastructure Functional security based on three columns Informational technical Organizational Physical FUNCTIONAL SECURITY
Trusted site infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],風險來源
Trusted site infrastructure Environment Criteria, e.g.  ( 地理環境) The building surrounds the information technology which has been installed and offers external protection. The location of the building plays a role with regard to the surrounding hazard potentials, as does the actual position of the security area within the building. If these factors are taken into consideration, potential sources of hazard can be prevented from the very beginning. Environmental hazards originating from water, explosions, ruins and debris, vibration and shaking and hazardous substances should definitely be avoided. In the same way, traffic routes which carry hazardous substances should be avoided, in order to prevent possible direct negative effects and also indirect effects, such as for example blocked access. 資料機房的座落地點: 水災,爆炸,暴動,震動,危險物質,交通狀況 Environment Criteria
 
Structural aspects e.g.  ( 建築結構) Trusted site infrastructure Walls (VdS 2334), windows and doors must offer protection against unauthorized access (DIN V ENV 1627) and fire and smoke (DIN 18095). In the same way, it must be ensured that no sections of the building are under threat from water (VdS 2007), EM/RF interference fields (EN 50147 Part 1) or close proximity to dangerous production processes. The building must be provided with external protection against lightning strike (DIN VDE 0185 Part 3) and must allow the security area to be located in a separate fire protection area (DIN 4102). The supply lines have to be laid in protective structures. EN 1047-2 specifies that in order to ensure the functioning of the IT systems and the data media in case of fire, the items requiring protection may only be exposed to defined maximum temperature and humidity limits. 資料機房的座落地點:防盜,防火,雷擊,溫濕度承受度 Structural aspects
 

More Related Content

What's hot

Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
TheAnfieldGroup
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Mike Boudreaux
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
Mowaten Masry
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
IEC 61511 introduction
IEC 61511 introduction IEC 61511 introduction
IEC 61511 introduction
KoenLeekens
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
Living Online
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
John Kingsley
 
Understanding sil
Understanding silUnderstanding sil
Understanding sil
rajesh kumar ramaswamy
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
APEXMarCom
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
Leonard Watson
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Enzo M. Tieghi
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers
Ahmed Gamal
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
RoutecoMarketing
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety Case
IQPC
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) security
ericv83
 
High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08
Richard Holmes
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introduction
KoenLeekens
 
Juniper LN2600
Juniper LN2600Juniper LN2600
Juniper LN2600
Juniper Networks
 

What's hot (20)

Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
IEC 61511 introduction
IEC 61511 introduction IEC 61511 introduction
IEC 61511 introduction
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
 
Understanding sil
Understanding silUnderstanding sil
Understanding sil
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety Case
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) security
 
High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08High Security Group Presentation 6.10.08
High Security Group Presentation 6.10.08
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introduction
 
Juniper LN2600
Juniper LN2600Juniper LN2600
Juniper LN2600
 

Similar to 德國TSI公司簡報-1

德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
俠客科技
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
ISA Boston Section
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentation
Kalyani Technologies
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
FSIPL1
FSIPL1FSIPL1
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
John Kingsley
 
Mynd company presentation
Mynd   company presentationMynd   company presentation
Mynd company presentation
Davide Enrico Arnoldi
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
dbrownindustrialdefender
 
TTTech Company Overview
TTTech Company OverviewTTTech Company Overview
TTTech Company Overview
TTTech Computertechnik AG
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
ananthakrishnansblit
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
amallblitz0
 
Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)
Analog Devices, Inc.
 
ESS Software and Firmware
ESS Software and FirmwareESS Software and Firmware
ESS Software and Firmware
Peter Ewers MIET FInstSMM
 
3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic
Coralee Lazebnikova
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
 
How to get started in cybersecurity
How to get started in cybersecurityHow to get started in cybersecurity
How to get started in cybersecurity
Stephen Jesukanth Martin
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
Larry Vandenaweele
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
Alan Tatourian
 
secure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfsecure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdf
ssuser64a562
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
CSA Group
 

Similar to 德國TSI公司簡報-1 (20)

德國TSI公司簡報-2
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Kalyani technologies corporate presentation
Kalyani technologies corporate presentationKalyani technologies corporate presentation
Kalyani technologies corporate presentation
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
FSIPL1
FSIPL1FSIPL1
FSIPL1
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Mynd company presentation
Mynd   company presentationMynd   company presentation
Mynd company presentation
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
 
TTTech Company Overview
TTTech Company OverviewTTTech Company Overview
TTTech Company Overview
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
 
Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)Data and Power Isolation (Design Conference 2013)
Data and Power Isolation (Design Conference 2013)
 
ESS Software and Firmware
ESS Software and FirmwareESS Software and Firmware
ESS Software and Firmware
 
3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic3DPrinting5MinGuide_Infographic
3DPrinting5MinGuide_Infographic
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
How to get started in cybersecurity
How to get started in cybersecurityHow to get started in cybersecurity
How to get started in cybersecurity
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
secure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfsecure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdf
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 

More from 俠客科技

合作廠商
合作廠商合作廠商
合作廠商
俠客科技
 
愛酌客事業iDrink
愛酌客事業iDrink愛酌客事業iDrink
愛酌客事業iDrink
俠客科技
 
Swipy 處處收款
Swipy 處處收款Swipy 處處收款
Swipy 處處收款
俠客科技
 
資策會華文電子商務
資策會華文電子商務資策會華文電子商務
資策會華文電子商務
俠客科技
 
宏鑫生技簡報
宏鑫生技簡報宏鑫生技簡報
宏鑫生技簡報
俠客科技
 
Format 1
Format 1Format 1
Format 1
俠客科技
 
Ppt Product
Ppt ProductPpt Product
Ppt Product
俠客科技
 
Ppt Institute
Ppt InstitutePpt Institute
Ppt Institute
俠客科技
 
Stonehawkshaw
StonehawkshawStonehawkshaw
Stonehawkshaw
俠客科技
 
Tl Dog
Tl DogTl Dog
Tl Dog
俠客科技
 
Pdf Goalq
Pdf GoalqPdf Goalq
Pdf Goalq
俠客科技
 

More from 俠客科技 (17)

合作廠商
合作廠商合作廠商
合作廠商
 
愛酌客事業iDrink
愛酌客事業iDrink愛酌客事業iDrink
愛酌客事業iDrink
 
Swipy 處處收款
Swipy 處處收款Swipy 處處收款
Swipy 處處收款
 
資策會華文電子商務
資策會華文電子商務資策會華文電子商務
資策會華文電子商務
 
宏鑫生技簡報
宏鑫生技簡報宏鑫生技簡報
宏鑫生技簡報
 
About Suntech
About SuntechAbout Suntech
About Suntech
 
Kado
KadoKado
Kado
 
Format 1
Format 1Format 1
Format 1
 
Ppt Product
Ppt ProductPpt Product
Ppt Product
 
Ppt Institute
Ppt InstitutePpt Institute
Ppt Institute
 
Apl Paint2
Apl Paint2Apl Paint2
Apl Paint2
 
Stonehawkshaw
StonehawkshawStonehawkshaw
Stonehawkshaw
 
Sleepless
SleeplessSleepless
Sleepless
 
Apl Paint
Apl PaintApl Paint
Apl Paint
 
Tl Dog
Tl DogTl Dog
Tl Dog
 
Pdf Goalq
Pdf GoalqPdf Goalq
Pdf Goalq
 
Present
PresentPresent
Present
 

Recently uploaded

Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
hartfordclub1
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 

Recently uploaded (20)

Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf2024-6-01-IMPACTSilver-Corp-Presentation.pdf
2024-6-01-IMPACTSilver-Corp-Presentation.pdf
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 

德國TSI公司簡報-1

  • 1. TÜV Informationstechnik GmbH Member of TÜV NORD Group TSI: Trusted Site Infrastructure The certification program for data center - more than availability health checks
  • 2. AGENDA Certification Process TSI Criteria TSI Certification Benefits Introduction to TUV Cost
  • 3. TÜV´s in Germany TÜV Rheinland / Berlin-Brandenburg TÜV Süddeutschland TÜV Rheinland / Berlin-Brandenburg TÜV Saarland
  • 5. TÜV NORD in Europe Grandvilliers Croydon Best Essen Madrid Mailand Athen Istanbul Katowice Prag Bratislava Novi Sad Slavonski Brod Moskau Plovdiv Tallin Kolding Hannover Hamburg Espoo Bologna Riga Wilna Bukarest Göteborg Ankara Donezk Budapest
  • 6. TÜV NORD worldwide San José Clifton Buenos Aires Rio de Janeiro Dammam Abu Dhabi Teheran Mumbai Barat Bangkok Shanghai Hong Kong Tokyo Seoul Taipeh Almaty
  • 7.
  • 8.
  • 9. TÜViT Our Vision in the field of Information Technology and Telecommunication
  • 10. Quality And Security IT and Telecom-munication IT and Telecom-munication IT and Telecom-munication TÜVit Our Mission
  • 11. TÜViT Topics Company Systems Components Project
  • 12. Information Technology on all Layers Company Systems Components Project Evaluation of IT Security Optimization of IT Quality Privacy Security Management Quality Management Service Management Physical Security Network Security Secure e-Business Usability Content Quality Monitoring Reliability Document Management Evaluation of Security Software Security Hardware Functional Tests Improvement of Processes Models Project Management
  • 13.
  • 14. IT-Security Accreditations Company Systems Components Project ISO 17799 / BS7799-2 GSM SAS / TU.4 quid! / ULD Baseline Protection Common Criteria / ITSEC FIPS 140-1/-2 ZKA-Criteria Trusted Site Check of CA’s acc. SigG - Infrastructure - Security Qualification (SQ) ® - Privacy
  • 15.
  • 16. Trusted site infrastructure Trusted site infrastructure for Data Center
  • 17. Trusted site infrastructure Functional security based on three columns Informational technical Organizational Physical FUNCTIONAL SECURITY
  • 18.
  • 19. Trusted site infrastructure Environment Criteria, e.g. ( 地理環境) The building surrounds the information technology which has been installed and offers external protection. The location of the building plays a role with regard to the surrounding hazard potentials, as does the actual position of the security area within the building. If these factors are taken into consideration, potential sources of hazard can be prevented from the very beginning. Environmental hazards originating from water, explosions, ruins and debris, vibration and shaking and hazardous substances should definitely be avoided. In the same way, traffic routes which carry hazardous substances should be avoided, in order to prevent possible direct negative effects and also indirect effects, such as for example blocked access. 資料機房的座落地點: 水災,爆炸,暴動,震動,危險物質,交通狀況 Environment Criteria
  • 20.  
  • 21. Structural aspects e.g. ( 建築結構) Trusted site infrastructure Walls (VdS 2334), windows and doors must offer protection against unauthorized access (DIN V ENV 1627) and fire and smoke (DIN 18095). In the same way, it must be ensured that no sections of the building are under threat from water (VdS 2007), EM/RF interference fields (EN 50147 Part 1) or close proximity to dangerous production processes. The building must be provided with external protection against lightning strike (DIN VDE 0185 Part 3) and must allow the security area to be located in a separate fire protection area (DIN 4102). The supply lines have to be laid in protective structures. EN 1047-2 specifies that in order to ensure the functioning of the IT systems and the data media in case of fire, the items requiring protection may only be exposed to defined maximum temperature and humidity limits. 資料機房的座落地點:防盜,防火,雷擊,溫濕度承受度 Structural aspects
  • 22.