peer to-peer-networking

7
Peer to Peer networking.. May not be a good fit after all. 5 key points to consider if you are P2P in your network JDTech… Solutions that Work! Desktop | Network | Information Security Services 888-580-44550 www.jdtechsolutions.net

Upload: jdtechsolutions

Post on 16-Jul-2015

44 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Peer to-peer-networking

Peer to Peer networking.. May not be a good fit after all.5 key points to consider if you are P2P in your network

JDTech… Solutions that Work!

Desktop | Network | Information Security Services888-580-44550www.jdtechsolutions.net

Page 2: Peer to-peer-networking

Lack of Accountability

Networks usually have shared accounts.

No one is responsible for the data

Poses compliance liability

Hard to track changes

Insecure by nature

www.jdtechsolutions.net | 888-580-4450 | [email protected]

Desktop Services | Network Services | Information Security ServicesSecaucus, North Bergen, Jersey City, Union City, Edgewater, Weehawken, Hoboken, Newark, New York City, Brooklyn

Page 3: Peer to-peer-networking

No Centralized Backup Solution.

Information is distributed across many computers

Backup cost increases if buying individual licenses

No centralized view

Backup accuracy is hard to check

Restoring the right file may become an issue.

www.jdtechsolutions.net | 888-580-4450 | [email protected]

Desktop Services | Network Services | Information Security ServicesSecaucus, North Bergen, Jersey City, Union City, Edgewater, Weehawken, Hoboken, Newark, New York City, Brooklyn

Page 4: Peer to-peer-networking

Duplicate Data

Multiple file versions.

No easy control

Creates office confusion

Slows down operations

Complicates backups

www.jdtechsolutions.net | 888-580-4450 | [email protected]

Desktop Services | Network Services | Information Security ServicesSecaucus, North Bergen, Jersey City, Union City, Edgewater, Weehawken, Hoboken, Newark, New York City, Brooklyn

Page 5: Peer to-peer-networking

Security Risk

File access is wide open

Risk increases if wireless network is implemented

Internal and external threats

Fosters identify theft

www.jdtechsolutions.net | 888-580-4450 | [email protected]

Desktop Services | Network Services | Information Security ServicesSecaucus, North Bergen, Jersey City, Union City, Edgewater, Weehawken, Hoboken, Newark, New York City, Brooklyn

Page 6: Peer to-peer-networking

Malware Spread

Fertile ground for viruses and Trojans

Poses risk for other computers connected to the network

Can be exploited as a Zombie

Hard to identify the root cause

www.jdtechsolutions.net | 888-580-4450 | [email protected]

Desktop Services | Network Services | Information Security ServicesSecaucus, North Bergen, Jersey City, Union City, Edgewater, Weehawken, Hoboken, Newark, New York City, Brooklyn

Page 7: Peer to-peer-networking

JDTech Provides IT Services in Northern NJ and NYC.

Contact us for details about our services and solutions at 888-580-4450.