Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
business

Reduce TCO – Consider Virtualization

April 30, 2010

Server Workstation Applications Storage VMWare IBM Virtualization ZEN MS application Virtualization (App-v) Windows 7 Remote-App Windows 7 Roaming Profiles Windows 7 folder redirection Virtualize – Pano    MS System Center    MS Desktop Optimization Pack for Software Assurance    End User Benefits of desktop virtualization  

Img
compliances

Data Storage Spectrum

April 30, 2010

Fibre-channel iSCSI with Fibre-channel SANs Dell, EMC, HP, IBM and NetApp 10 Gig Ethernet FCoE fibre-channel over Ethernet Thin provisioning? MAID Massive Array Idle Disks – Solid state drives             Tape             Raid             CD             Flash-memory

Img
business

Most significant digital data issues

April 29, 2010

Responsible stewardship: effective recognition of the issue of sustained preservation & access Scalable, extensible and evolvable solutions for building and operating digital repositories in a networked world Trustworthy, verifiable methods for overcoming format obsolescence & providing sustained access to authentic electronic records Resources for digital preservation

Img
security

Defense Against SYN Flood

April 29, 2010

Increase size of connection table Add more servers Trace attack back to source Ask your ISP to filter malicious packets Add firewall Typically “SYN proxy” Partial solution was “SYN-cookies” Reply to SYN with SYN-cookie Allocate no resources until SYN-cookie is returned Egress filtering restricts spoofed IP addresses

Img
compliances

Secure Data Sharing

April 28, 2010

What is it Where is it What is the Risk   Strategic What Policy should be enforced How can the process be Audited Ongoing Process of Sharing Data Tactical Manage Removable Media Encrypt mobile data Provide users with relevant Policy excerpts and Audit acceptance

Img
business

Data Loss Prevention (DLP)

April 28, 2010

Learn from industry analysts, product experts, and customers to gain an understanding of how DLP solutions can help secure your sensitive information no matter where it resides in your organization. How Data Loss Prevention solutions fit into an overall information risk management strategy. How to discover, monitor and control...

Img
security

Sample Vulnerability Assessment results Tracking Form

April 27, 2010

  Unauthorized ports discovered Host Name / description TCP / UDP OS Helpdesk -associated tickets updated or opened                                                              ...

Img
business

Average Web User Statistics

April 26, 2010

Average of: 16 Sessions per Week 26 Unique sites visited 53 Page Views per Session 282 Page Views per Week 9 Hours Per Week 81 Minutes per Session 56 Seconds per Page Speed will become a major business differentiator in a connected world 70% of IT budgets are spent...

Img
business

IT Challenges

April 26, 2010

  48% report a quarter or more of IT projects are delivered late 75% of Internet initiatives fail due to poor planning. 75% of e-business initiatives fail due to poor planning and lack of understanding of the technology. 38% report a quarter or more of IT projects are delivered...

Img
business

Backups alone are not enough

April 25, 2010

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “clumped” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as...

Img
compliances

Record Management: Sarbanes – Oxley Act

April 25, 2010

Signed into law July 30 2002 A direct result of corporate scandals, such as Enron and WorldCom Introduced legislative changes to financial and corporate regulations Intended to “deter and punish” corporate and accounting fraud and corruption, ensure justice for wrongdoers, and protect the interests of workers and shareholders” (Quote:...

Img
business

Sample Telco SLA Considerations

April 24, 2010

  Description Target % Dependencies Additional Comments Uptime/availability of critical Telecom systems       Uptime/availability of critical Telecom systems       Percentage of MAC reduction in Remedy       PBX availability:        Call volume:       International calls:        National  &...

Img
application

Sample Application Hosting Services

April 24, 2010

  Server Administration Application Support Infrastructure Support Upgrades DB Overlays, Cloning, creation and data population         Database Maintenance         Patch Management         Middleware Optimization and Mnagement         Databased Backup Administration         Database Security Administration...

Img
o-s

Common DOS/Windows commands and their Linux counterparts

April 24, 2010

  Copy a file  copy path1filename1 path2filename2  cp path1/filename1 path2/filename2  Copy subdirectory  xcopy path1. path2 /s  cp -R path1 path2  Delete a file  del filename  rm filename  Move a file  move path1filename1 path2  mv path1/filename1 path2      Rename a file  ren filename1 filename2  mv filename1 filename2  List a...

Img
compliances , data-center-soc-noc , security

Helpdesk Research – Analysis

April 23, 2010

Executive Summary After extensive research and evaluation of each Helpdesk’s experiences with Windows Vista and, we have determined that Windows 7 will provide substantial Helpdesk savings for high volume users who switch to Windows 7. Windows 7 can be expected to reduce support costs by $483 per user per...

Img
business

Help Desk Enterprise Integration

April 22, 2010

Service Desk offers true enterprise-class integration services through its unique SNMP and SMTP Listeners. These powerful network listeners watch for alerts from enterprise management platforms such as Remedy, Landesk, CA Unicenter. Tivoli or HP Openview. When relevant events occur, trouble tickets can be automatically generated at the help desk. ...

Img
business , compliances , security

Anatomy of Audit Logging

April 22, 2010

The Information Security Forum’s (ISF) The Standard of Good Practice for Information Security (Version 4.1, January 2005) states that the objective for logging is “To ensure individual accountability and to enable incidents, such as access violations, to be investigated and resolved.” This is easy to state, but a major...

Img
o-s , security

MS IE Advanced Settings (8.0.6001.18702)

April 21, 2010

  Accessability Always expand ALT text for images Unchecked Enable Caret Browsing for new windows and tabs Unchecked Move system caret with focus / selection changes Unchecked Reset text size to medium for new windows and tabs Unchecked Reset test size to medium while zooming* Checked Reset zoom level...

Img
application , business , compliances

Knowledge Lake Imaging Server

April 21, 2010

KnowledgeLake Imaging Server eliminates the costs and challenges of using paper documents, as well as the limitations it puts on your business processes. Built on Microsoft® SharePoint®, KnowledgeLake Imaging Server uses the latest technology to provide features that extend SharePoint’s enterprise content management capabilities throughout your organization.   With KnowledgeLake...

Img
data-center-soc-noc

Sample ERP Lines of Service

April 20, 2010

  Server Administration ERP Application Support ERP Infrastructure Support ERP Upgrade Patch Management       HW & Firmware Updates       DNS Support       Virus Protection       Server OS and Non-DB Backup Administration       Offsite Storage       Maintanence of...

Img
data-center-soc-noc

Help Desk Change Management

April 20, 2010

Today’s distributed computing environment has made change management a nightmare for many organizations.  Today’s Service Desk solution processes new hires, employee transfers, common system upgrades, and other frequently repeated tasks can be managed with ease. The ability to setup dependencies in advance to ensure that the various tasks are...

Img
compliances , security

Help Desk System Considerations

April 19, 2010

Modern day Helpdesk considerations includes the following system capabilities: · Call Management · Problem Resolution · Problem Prevention · Asset Management · Automated Crisis Management · Integrated Service Level Agreements · Change Management · Built-in Reporting · Web Support · Enterprise Integration · Customization Today’s help desk solutions offer a blend of power and ease-of-use. Help Desk gives mid-range and departmental...

Img
compliances , security

Help Desk Call Management

April 18, 2010

The moden Help Desk automates the process of entering caller information. Enter a caller’s name, for example, and all other relevant fields fill in automatically.  And because of our intuitive Windows interface all functions are point and click or if you should choose through the keyboard. Today’s Help Desk makes...

Img
business , compliances , security

Help Desk – Change Controls considerations

April 17, 2010

Package software support Considerations: Third party development and/or maintenance Project Review by Management Restriction on Transfer to Production Documentation Change Control Procedures: Emergency Changes Segregation of Test and Production Approval of system testing Training in new systems Computer Operations Operations Procedures Supervision of Operations: Communications Management Documentation of Procedures...

Img
compliances

HIPAA Heatlthcare Business Considerations Part 3

April 17, 2010

Financial System Data: Master Patient Index Product Management Provider Contract Management Provider Network Modeling Provider Catalog and Selection Provider Credentialing Product P/L Reporting Sales & Marketing Group Contract Administration Enrollment and Eligibility Membership Accounting Customer Service/Call Center Encounter Processing Referral and Authorization Claim Processing and Payment Coordination of Benefits...

Img
compliances , o-s

Legacy Winlogon Initialization

April 16, 2010

During system initialization, before any user applications are active, Winlogon performs the following steps to ensure that it controls the workstation once the system is ready for user interaction: 1. Creates and opens an interactive window station (for example, aWindowsWindowStationsWinSta0 in the Object Manager namespace) to represent the keyboard,...

Img
compliances

HIPAA Heatlthcare Business Considerations Part 2

April 16, 2010

Telecommunications PBX PBX-Voice Mail Key Systems Key Systems – Voice Mail Plexar 1A2Key CDR Help Desk/Bill Back Logger/Recorders Operator/Paging System Video Conference Long Distance Pagers Pagers Alpha/Num Messages ACD CTI Local TeCTI Wireless Phones Cellular Marketing Provider Data Provider Data HR and Payroll Data Healthplan Data EMPI Management Reporting...

Img
business , compliances , security

Help Desk IT Business Spectrum

April 15, 2010

 

Img
business , compliances , security

Threat is a possible danger to the system

April 14, 2010

It is policy to ensure that the balance of risks, vulnerabilities, threats, and countermeasures achieves a residual level of risk that is acceptable based on the sensitivity or criticality of the individual information technology (IT) system. In accordance with SOP, it is the System Owner’s responsibility to prepare or...

Img
business , compliances , security

VA (Vulnerability Assessment) scanning and reporting

April 14, 2010

Documents and action items considerations for reporting requirements (nCircle, Qualys, Nessus, Appscan, SAMATE and other VA Scanning tools). 1. Scope Document (Project Scope) 2. Architecture Document 3. Roles and Responsibilities (Support Plan) 4. Escalation Path (Support Plan) 5. Run books (operations guide) 6. Asset Lists 7. SLA Review and Documentation 8. Metrics and Reporting Documentation 9. Training...

Img
security

Social Engineering Testing

April 13, 2010

Tests of Controls Social engineering techniques are employed in an attempt to obtain information regarding perimeter network devices and their defenses (i.e., IP address ranges, firewalls and default gateways) as well as potential internal targets. The information gathered during the reconnaissance phase outlines the basis of this test. The...

Img