auxilium.com (aux) group 2 - july 29, 2014 jordan durity curtis holton frank mack steve rawls jason...

Download Auxilium.com (AUX) Group 2 - July 29, 2014 Jordan Durity Curtis Holton Frank Mack Steve Rawls Jason Richardson Francisco Tobar

If you can't read please download the document

Upload: marshall-cummings

Post on 23-Dec-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Auxilium.com (AUX) Group 2 - July 29, 2014 Jordan Durity Curtis Holton Frank Mack Steve Rawls Jason Richardson Francisco Tobar
  • Slide 2
  • What is AUX?
  • Slide 3
  • Our Mission Make Technology an asset for your business not a problem.
  • Slide 4
  • Our Responsibility to You Protect your image by providing redundant, relevant, and reliable service Adapted to the individual or broadened to the corporation Implementing simple security, service, infrastructure, and network policies
  • Slide 5
  • Why do you need AUX?
  • Slide 6
  • Internet Shopping and Usage More than 80% of the online population has used internet to purchase a product 72% of Online Adults are Social Networking Site Users 37% of all world women are online, compared with 41% of men
  • Slide 7
  • Slide 8
  • Protect Your Image 8% of online adults used social networking sites 18% of online Adults are Twitter Users Facebook has 184.2 mill subscribers- US
  • Slide 9
  • Twitter Evolution
  • Slide 10
  • AUX Topology
  • Slide 11
  • Addressing By Team/Division
  • Slide 12
  • Slide 13
  • Equipment Cisco VoIP 7960 phones ThinkCentre M73 SFF Desktop (workstations) Samsung R780 Laptop (SOHO) Servers - Intel Server Board S4600LH2 and S4600LT2-based Systems PROMISE Pegasus2 R8 P2R8HD24US RAID Storage
  • Slide 14
  • Network Equipment Cisco 3560 Switches Cisco 2811 Routers Cisco 1841 Router (SOHO Network) Cisco 2960 Switches WatchGuard Unified Threat Management (UTM) and e-Series or XTM 21
  • Slide 15
  • Topology Overview Cisco Three Layer Hierarchical Model Core Layer Comprised of Two Cisco 2811 Routers DMZ/Web Server from Core Router 1 and ISP from Core Router 2 Cisco Anyconnect VPN Client Software Supports Teleworkers and Contractors WatchGuard Firewall Connects Core Routers to Distribution Layer
  • Slide 16
  • Topology Overview Distribution Layer 2 Cisco 3560 Layer 3 Switches Handles Routing and switching AUX Network Traffic, Secondary firewalls. 3560 switches are connection to a 2960 switch providing access to the Data Center 3560 Distribution Switches - provide redundant links to access layer switches. Data Center - Comprised of a Production, Development, and 3 Storage servers.
  • Slide 17
  • Topology Overview Access Layer 4 Cisco 2960 Switches Dedicated Specific AUX Teams. IT/HR Switch, Executives Switch Social Media Switch Development and Sales Switch. Redundant links to support connectivity and Fault Tolerance. Provides connectivity AUX work Stations and VoIP Cisco 7960 phones.
  • Slide 18
  • AUX Team Overview Aux Teams - Make Technology an asset for your business not a problem. AUX Teams Sales and Marketing Search Engine Optimization Web Design Facebook Team Twitter Team Team Member- accountable to Team Lead and Managers.
  • Slide 19
  • Support Team Overview IT Department 4 highly skilled individuals Network/Desktop Administrator, Security Specialist/Tier 3 Support, Tier 2 Support and Tier 1 Support. Manages AUXs Network, Information Security, and Desktop Issues. Handles all technical support issues from within. Human Resources 3 Positions - HR Supervisor, HR Specialist and HR Recruiter. HR Supervisor -manages the HR Team and implements final policies. HR Specialist - pay roll, scheduling, or HR related issues within the office. HR Recruiter - head hunter, acquires best talent to meet the needs of expansion.
  • Slide 20
  • Team Overview Sales and Marketing Comprised of 2 Sales and Marketing Specialists and 3 representatives. Develops the best strategies to attract, retain and seal the deal. Reps interact with AUXs customers/potential customers directly. Search Engine Optimization (SEO) Develops Web Sites to optimize natural search engine searches. SEO Engineer, SEO Admin and 3 SEO Technicians. SEO Engineer develops strategies for SEO Admin maintains the department and deploys the main SEO strategies. SEO technicians work directly with clients
  • Slide 21
  • Team Overview Web Design 2 Senior Level Web Designers along with a Level 1 and Level 2 Designer. Designs and builds websites, mobile apps, and website as a service applications. Specialist code in PHP, J Java, Java Script, Ruby, Python, HTML, CSS, and XML. Level 1 & 2 developers write the majority of the code on most projects and do QA testing. The most complicated projects will be handled by the Senior Web Designers.
  • Slide 22
  • Team Overview Facebook (FB) FB Team Supervisor, FB Designer and 3 FB Coordinators. Design and maintain Facebook accounts for all of AUXs clients. Team Supervisor manages all work and ensures FB SLAs are met. Designer designs AUXs client Facebook accounts FB Coordinators are responsible for maintain the accounts. Twitter Responsible for handling all aspects of AUXs clients Twitter accounts. Supervisor, a Designer and 3 Coordinators. (Similar Facebook Team)
  • Slide 23
  • Team Overview AUX Executives AUXs Chief Executive Officer (CEO), Vice President (VP), Chief Information Officer (CIO) and Chief Financial Officer CFO). Develop, design, implement and enforce all of AUXs executive decisions. Responsible designing and implementing decisions involving the purpose of their executive role respectfully.
  • Slide 24
  • AUX Network Security Policy ASP states that network security will not be solely implemented at one single layer. Multi-layered Approach-Prevent attacks combining antivirus, personal firewalls and intrusion detection. ASP-Contract employees, employees with telepresence, VPN traffic and related software. Facility Security-Deployed by Siemens Access Control Systems.
  • Slide 25
  • AUX Security Policy (cont.) End-user Computing-prohibits the use of removable media. Random Monthly Sweeps to consist of 20% of all assets. VPN Policy-Cisco AnyConnect VPN Client permits secured communications and access. USB devices fall into same forensics policy as stated above
  • Slide 26
  • Network Firewall and Security Four steps to ensure an adaptive and continuous network policy Secure Monitor Test Improve Watchguards Next-Generation Firewall. Unified Threat Management (UTM) - provides enterprise-grade perimeter defense against viruses, spam and other unwanted traffic
  • Slide 27
  • Network Security UTM Packet filtering Intrusion prevention service, Application control Data loss prevention Advanced persistent threats and zero malware day protection Easy GUI System All Policies Are Subject to Change at the Discretion of Management!
  • Slide 28
  • Conclusion Auxilium.com (AUX)