SlideShare a Scribd company logo
What to do with assets?
Location of Assets

1.   Main Data Center - Systems/Host/Storage
2.   DR Data Center – Systems/Host/Storage
3.   Organizations Internal End point – Workstations
4.   Outsource end point – Workstations
5.   Network – data in transit
Method of Securing Assets
1.Network-base
2.Host-based
3.Workstation
4.File/Data Security
Network-Based
1. Perimeter
  •   Firewall
  •   IPS
  •   NAC
2. Content-based
  •   AV
  •   AS
  •   WF
3. VPN
  •   IPSEC
  •   SSL
Host-Based
•   OS hardening
•   Application hardening
•   Access Control
•   HIPS
•   AV
•   AS
•   FW, Application firewall
Workstation
•   OS hardening
•   User hardening
•   HIPS
•   AV
•   AS
•   WF
•   Personal FW
File/Data Security
• Encryption – storage, in-transit
• Data-loss protection – communication
  channels
Security Optimization
•   Log/Security Information Management
•   IP Address Management
•   Vulnerability Management
•   Recovery Management
•   Remediation and Patch Management
•   Policy Audit and Review
Optimization Solution
•   IT Asset Management
•   Infrastructure Management
•   Performance Management
•   WAN Optimization
WAN Optimization
• WAN Acceleration
  – enhance the WAN performance by
    classifying, monitoring and shaping the WAN
    traffic
• WAN Management
  – use techniques such as traffic shaping,
    compression, caching, and protocol
    acceleration to enhance performance

More Related Content

PDF
Manage threats and risk
PDF
Complexity of IT security
PDF
challenges in data center
DOCX
Panduan pengembangan
PDF
Cla may 2011
PDF
Cla december 2007
PDF
Cla april 2008
PDF
CLA August 2009
Manage threats and risk
Complexity of IT security
challenges in data center
Panduan pengembangan
Cla may 2011
Cla december 2007
Cla april 2008
CLA August 2009

Viewers also liked (17)

PDF
Cla december 2010
PDF
Cla august 2008
PDF
Cla march 2010
PPTX
Rte Introduction W Org Excellence Slide Final
PDF
Cla august 2007
PDF
Cla december 2007
PPTX
Introductiontopoliticalscience 100621020245-phpapp02
PDF
Tfd fpic indonesia_kristen_hite
XLS
Marisol Feliz Gonzalez
PPT
Slideshare_JOSE
XLS
Ramona Partido Politico
PPT
How to write thesis proposal
DOC
Campamento Las Brujas
PPS
Dgt Cinturon
PPTX
History of Horror!
XLS
Libro1
PDF
Sally Bed Sheets & Duvet Cover
Cla december 2010
Cla august 2008
Cla march 2010
Rte Introduction W Org Excellence Slide Final
Cla august 2007
Cla december 2007
Introductiontopoliticalscience 100621020245-phpapp02
Tfd fpic indonesia_kristen_hite
Marisol Feliz Gonzalez
Slideshare_JOSE
Ramona Partido Politico
How to write thesis proposal
Campamento Las Brujas
Dgt Cinturon
History of Horror!
Libro1
Sally Bed Sheets & Duvet Cover
Ad

Similar to Security and optimization solution primer [compatibility mode] (20)

PDF
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
PPTX
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
PPT
Q2 Briefing Presentation
PDF
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
PPT
Earth linkit servicesoverview
PPT
EarthLink IT Services Overview
PDF
Mobile security chess board - attacks & defense
PPTX
2016 TTL Security Gap Analysis with Kali Linux
PPTX
Essential_Cybersecurity_Presentation.pptx
PPTX
Proact backup and storage vs ransomware 2021
PPTX
Backup_Archive_Replication_Presentation.pptx
PPTX
Build Secure Cloud Solution using F5 BIG-IP on AWS
PDF
Designing a Highly Available Management Cluster for the Cloud
PPTX
Digital Preservation with Archivematica: An Introduction
PPTX
Data Governance and Management in Cloud pak nam
PPTX
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
PPT
First Cloud based enterprise Backup & Recovery in India
PDF
Enterprise Security in Mainframe-Connected Environments
PDF
SIEM.pdf
PDF
Alfresco Records Management 2.0
Solving Real Problems with Apache Spark: Archiving, E-Discovery, and Supervis...
Image Management Using Orthanc in a Multi-Centre Reserach PET Study
Q2 Briefing Presentation
Archiving, E-Discovery, and Supervision with Spark and Hadoop with Jordan Volz
Earth linkit servicesoverview
EarthLink IT Services Overview
Mobile security chess board - attacks & defense
2016 TTL Security Gap Analysis with Kali Linux
Essential_Cybersecurity_Presentation.pptx
Proact backup and storage vs ransomware 2021
Backup_Archive_Replication_Presentation.pptx
Build Secure Cloud Solution using F5 BIG-IP on AWS
Designing a Highly Available Management Cluster for the Cloud
Digital Preservation with Archivematica: An Introduction
Data Governance and Management in Cloud pak nam
Webinar: What Your Object Storage Vendor Isn’t Telling You About NFS Support
First Cloud based enterprise Backup & Recovery in India
Enterprise Security in Mainframe-Connected Environments
SIEM.pdf
Alfresco Records Management 2.0
Ad

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25-Week II
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Assigned Numbers - 2025 - Bluetooth® Document
The Rise and Fall of 3GPP – Time for a Sabbatical?
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
A comparative analysis of optical character recognition models for extracting...
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25-Week II

Security and optimization solution primer [compatibility mode]

  • 1. What to do with assets?
  • 2. Location of Assets 1. Main Data Center - Systems/Host/Storage 2. DR Data Center – Systems/Host/Storage 3. Organizations Internal End point – Workstations 4. Outsource end point – Workstations 5. Network – data in transit
  • 3. Method of Securing Assets 1.Network-base 2.Host-based 3.Workstation 4.File/Data Security
  • 4. Network-Based 1. Perimeter • Firewall • IPS • NAC 2. Content-based • AV • AS • WF 3. VPN • IPSEC • SSL
  • 5. Host-Based • OS hardening • Application hardening • Access Control • HIPS • AV • AS • FW, Application firewall
  • 6. Workstation • OS hardening • User hardening • HIPS • AV • AS • WF • Personal FW
  • 7. File/Data Security • Encryption – storage, in-transit • Data-loss protection – communication channels
  • 8. Security Optimization • Log/Security Information Management • IP Address Management • Vulnerability Management • Recovery Management • Remediation and Patch Management • Policy Audit and Review
  • 9. Optimization Solution • IT Asset Management • Infrastructure Management • Performance Management • WAN Optimization
  • 10. WAN Optimization • WAN Acceleration – enhance the WAN performance by classifying, monitoring and shaping the WAN traffic • WAN Management – use techniques such as traffic shaping, compression, caching, and protocol acceleration to enhance performance