11 Success Story – Education Sector Challenge! - Object naming policy evolution for 5 CMAs - More than 13500 objects and 4500 rules need to be reviewed.

Slides:



Advertisements
Similar presentations
Smart Q Start How you enter into your Qivana Business will greatly influence where and how fast you go in Qivana.
Advertisements

Mitel and VMware 3/25/ _8465.
Intelligent Pressure and DMA Management
CheckPoint Check Point Certified Managed Security Expert NGX Visit:
National Strategy Joint Assessment Mission 1.Capacity Building and Institutional Development 2.Governance and Rule of Law 3.Economic Policy 4.Productive.
School Shop. Welcome to my shop. You have 10p How much change will you get? 7p 3p change.
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
UCSD Medical Center - Hillcrest Campus Case Study Gerry White Facilities Design & Construction University of California, San Diego.
Server Technology Confidential Page 1, June 22,2009 Server Technology Global Services.
Utility program + driver program Thomas Wat 4D (21)
Bell Schedules Club Time is available from 8:05-8:20  1 st 8:20 – 9:15  2 nd 9:20 – 10:10  3 rd 10:15 – 11:05  4 th 11:10 – 12:50 A(11:10)
Apprenticeship Grant for Employers of 16 to 24 year olds (AGE 16 to 24) Employer Update Presented by Insert presenters name and title Insert date of presentation.
Enabling VDI & Application Virtualization
Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Microsoft ® Forefront ® Unified Access Gateway Infrastructure Planning and Design Published: December 2009 Updated: July 2010.
Everything your business needs to know but probably doesn’t.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
NETWORKING CLASSIFICATION OF COMPUTERS * Size *Cost *#of users *Storage capacity.
Why Improve Datacenter Automation? “ Studies show up to 80% of network availability incidents and 60% of security issues can be tied to human error” CIO.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 3: Upgrading from a Previous Version of Windows.
AGENDA Tools used in SQL Server 2000 Graphical BOL Enterprise Manager Service Manager CLI Query Analyzer OSQL BCP.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Services not available everywhere. Business customers only. CenturyLink may change, cancel, or substitute offers and services, or vary them by service.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Physical Cleaning Disconnect Power Open the Case.
Chapter 5: System Software: Operating Systems and Utility Programs.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Module 13: Configuring Availability of Network Resources and Content.
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
Computer Update March Just a Bit of an Update Equipment Security.
Andrea Ricci - ISIS Brussels, 12 April 2012 Smart Grids: Overview of the study and main challenges 1.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Software.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Module 15 Managing Windows Server® 2008 Backup and Restore.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
6/13/2015 Visit the Sponsor tables to enter their end of day raffles. Turn in your completed Event Evaluation form at the end of the day in the Registration.
SCD Monthly Projects Meeting 2014 Scientific Linux Update Rennie Scott January 14, 2014.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Instant File Recovery and Data Protection for Windows ® Networks.
McAfee Support | McAfee Helpline Number
mcafee technical support number 1 (800) Mcafee customer service
«My future profession»
Configuration Management using Ansible
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
HUAWEI eSight Secure Center Feature Introduction
McAfee Customer Support Number
Unit 2 Computer Systems HND in Computing and Systems Development
Introduction to Operating Systems
Panda is the mostly used Anti-virus Panda is the top antivirus to protect your computer from injurious viruses. Panda Antivirus is the best antivirus.
McAfee Support Number
NTC 324 RANK Perfect Education/ ntc324rank.com.
11/8/2018 5:04 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Bethesda Cybersecurity Club
Prudence Condom Brand Situation Analysis “ Branding evolution”
Brown County General Hospital Virtualization Project
Theppatorn Rhujittawiwat
Presentation transcript:

11 Success Story – Education Sector Challenge! - Object naming policy evolution for 5 CMAs - More than objects and 4500 rules need to be reviewed and analyzed Professional Services engagement: 10-days project - Identify all the objects belonging to a network list provided by Customer - Clone all these objects using a new specific naming policy - Replace everywhere the old objects by the new cloned objects (rules, groups, etc.) [Protected] For public distribution

2 Success Story – Health Sector Challenge! - 2 McAfee Sidewinder stand-alone firewalls - Merge the 2 security policies in 1 Smart Management, managing 2 clusters - Install and configure the full R75.40 Gaia architecture - Convert and import 3000 objects and 600 rules - Clean and merge the objects base, removing duplicates - Optimize the rule bases with SmartOptimize services: From 305 rules to 38 rules for the 1 st firewallFrom 305 rules to 38 rules for the 1 st firewall From 297 rules to 50 rules for the 2 nd firewallFrom 297 rules to 50 rules for the 2 nd firewall Professional Services engagement: 10-days project [Protected] For public distribution

3 Success Story – Banking Sector - 1 CMA has been deleted by mistake - Last mds_backup was 8 months old, using it would revert all the CMAs of the MDS Challenge! Professional Services engagement: 5-days project - Policy restore from gateway package - Rebuild entirely the deleted CMA - Recover 8500 objects - Recover 2 policy packages: 900 rules 900 rules 400 rules 400 rules -400 rules [Protected] For public distribution