SlideShare a Scribd company logo
1 of 22
Web Tech Home Improvement Corporate Security Plan 2007 WTHI Web Tech Home Improvement
Corporate Security: Pieces of the Process
Need for a Digital Video solution ,[object Object],[object Object],[object Object]
Enhanced Video Surveillance Capability Video is Collected over the network from Each Site’s Recording system by a Central Unit in Chicago, where it can be reviewed, stored, and recalled at any time. Video Cameras monitor each office
Need for a Badge Control Solution: ,[object Object],[object Object],[object Object]
Badge Access Control The Central Access Control Computer in Chicago Sends Data to and Receives Data from the 3 other WTHI locations in Los Angeles, Dallas, and Washington, DC.
WAN Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
WAN TRAFFIC DIAGRAM  The WAN Upgrade is the Core Component of the WTHI Security Plan
PROPOSED WAN UPGRADE ,[object Object],[object Object],[object Object],[object Object]
Benefits of a Single  Internet Gateway Firewall Solution: ,[object Object],[object Object],[object Object]
Internet Gateway  (Firewall Upgrade with IDS)
Cisco Client VPN Secure Logon: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of a Web Filter ,[object Object],[object Object],[object Object]
Benefits of a Spam Filter ,[object Object],[object Object],[object Object]
Enterprise Anti-Virus Upgrade ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Access Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost of Implementation: Total Capital Asset Expenditure: $442,079.00 $84,000.00 Intrusion Detection $10,000.00 Web Filter $24,000.00 AntiSpam $70,000.00 AntiVirus $52,188.00 Badge Systems $56,251.00 Video Systems $95,000.00 SecurID $10,100.00 Firewalls $  8,000.00 VPN Router $32,500.00 WAN Routers
Recurring Costs: 131,200.00 per yr Total Annual Recurring Expense: $  $10,000.00  annually Technical Support Contracts $121,200.00 annually WAN Service Charges $10,100.00 monthly WAN Service Charges
Payoff Time in Terms of Revenue: ,[object Object],[object Object],[object Object]
Payoff Time in Terms of Revenue (continued): ,[object Object],[object Object]
Cost of not updating the existing security enterprise: ,[object Object],[object Object],[object Object],[object Object]
Web Tech Home Improvement WTHI Web Tech Home Improvement

More Related Content

What's hot

Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...ManageEngine, Zoho Corporation
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-IIManageEngine
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016Fanky Christian
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product PresentationFanky Christian
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheetguest3f034b
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerManageEngine, Zoho Corporation
 
I aspire instant call center
I aspire instant call centerI aspire instant call center
I aspire instant call centerHamid Kaber
 
Security from the Inside
Security from the InsideSecurity from the Inside
Security from the InsideNaomi Weisz
 
Managed select-hosting
Managed select-hostingManaged select-hosting
Managed select-hostingCodero
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentationSoap MacTavish
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisManageEngine, Zoho Corporation
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Blockmail Overview
Blockmail OverviewBlockmail Overview
Blockmail Overviewniallmmackey
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 

What's hot (20)

Ssmart case study
Ssmart   case studySsmart   case study
Ssmart case study
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
Spamtitan_brochure_V3
Spamtitan_brochure_V3Spamtitan_brochure_V3
Spamtitan_brochure_V3
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product Presentation
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
 
I aspire instant call center
I aspire instant call centerI aspire instant call center
I aspire instant call center
 
Security from the Inside
Security from the InsideSecurity from the Inside
Security from the Inside
 
Managed select-hosting
Managed select-hostingManaged select-hosting
Managed select-hosting
 
Ccnsp trainer presentation
Ccnsp trainer presentationCcnsp trainer presentation
Ccnsp trainer presentation
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 
Why Configuration Management Matters
Why Configuration Management MattersWhy Configuration Management Matters
Why Configuration Management Matters
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Blockmail Overview
Blockmail OverviewBlockmail Overview
Blockmail Overview
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Telecom provider germany ncm casestudy
Telecom provider germany ncm casestudyTelecom provider germany ncm casestudy
Telecom provider germany ncm casestudy
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 

Viewers also liked

Network Solution
Network SolutionNetwork Solution
Network Solutionchris20854
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network Selectionamiable_indian
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
 
Wireless Isp Overview
Wireless Isp OverviewWireless Isp Overview
Wireless Isp Overviewjvsihag
 
ISP business plan
ISP business plan ISP business plan
ISP business plan ontor omi
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
 
Network proposal
Network proposalNetwork proposal
Network proposalWaldo Botha
 
Network Design
Network DesignNetwork Design
Network Designcornimar
 
Faster to 5G
Faster to 5GFaster to 5G
Faster to 5GEricsson
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 

Viewers also liked (13)

Network Solution
Network SolutionNetwork Solution
Network Solution
 
Attacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network SelectionAttacking Automatic Wireless Network Selection
Attacking Automatic Wireless Network Selection
 
Wireless Abc
Wireless AbcWireless Abc
Wireless Abc
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Wireless Backhaul
Wireless BackhaulWireless Backhaul
Wireless Backhaul
 
Wireless Isp Overview
Wireless Isp OverviewWireless Isp Overview
Wireless Isp Overview
 
ISP business plan
ISP business plan ISP business plan
ISP business plan
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment BasicsVery High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
 
Network proposal
Network proposalNetwork proposal
Network proposal
 
Network Design
Network DesignNetwork Design
Network Design
 
Faster to 5G
Faster to 5GFaster to 5G
Faster to 5G
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 

Similar to WTHI Web Tech Home Improvement Corporate Security Plan 2007

Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation LiveInsight24
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilitiesservice007
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...Dryden Geary
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 

Similar to WTHI Web Tech Home Improvement Corporate Security Plan 2007 (20)

Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
CursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdfCursoFirewallWG_2022.pdf
CursoFirewallWG_2022.pdf
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation Live
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
whats-new_Fireware_v11-10
whats-new_Fireware_v11-10whats-new_Fireware_v11-10
whats-new_Fireware_v11-10
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilities
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
 
Arup
ArupArup
Arup
 
Tech t18
Tech t18Tech t18
Tech t18
 
Comprehensive AAP
Comprehensive AAPComprehensive AAP
Comprehensive AAP
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 

WTHI Web Tech Home Improvement Corporate Security Plan 2007

  • 1. Web Tech Home Improvement Corporate Security Plan 2007 WTHI Web Tech Home Improvement
  • 2. Corporate Security: Pieces of the Process
  • 3.
  • 4. Enhanced Video Surveillance Capability Video is Collected over the network from Each Site’s Recording system by a Central Unit in Chicago, where it can be reviewed, stored, and recalled at any time. Video Cameras monitor each office
  • 5.
  • 6. Badge Access Control The Central Access Control Computer in Chicago Sends Data to and Receives Data from the 3 other WTHI locations in Los Angeles, Dallas, and Washington, DC.
  • 7.
  • 8. WAN TRAFFIC DIAGRAM The WAN Upgrade is the Core Component of the WTHI Security Plan
  • 9.
  • 10.
  • 11. Internet Gateway (Firewall Upgrade with IDS)
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Cost of Implementation: Total Capital Asset Expenditure: $442,079.00 $84,000.00 Intrusion Detection $10,000.00 Web Filter $24,000.00 AntiSpam $70,000.00 AntiVirus $52,188.00 Badge Systems $56,251.00 Video Systems $95,000.00 SecurID $10,100.00 Firewalls $ 8,000.00 VPN Router $32,500.00 WAN Routers
  • 18. Recurring Costs: 131,200.00 per yr Total Annual Recurring Expense: $ $10,000.00 annually Technical Support Contracts $121,200.00 annually WAN Service Charges $10,100.00 monthly WAN Service Charges
  • 19.
  • 20.
  • 21.
  • 22. Web Tech Home Improvement WTHI Web Tech Home Improvement