wi-fi info: 1547-guest password: internetaccess! rockland ... · networking equipment of other...
TRANSCRIPT
![Page 1: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/1.jpg)
ROCKLANDBUSINESSASSOCIATION
Technology Initiative GroupMarch 2017
WI-FIINFO:1547-GuestPassword:InternetAccess!
![Page 2: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/2.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group
AgendaMarch8th,2017
1. Co-Chairs’Welcome(5min)
• JustinSchwartz,AtlanticTomorrow’sOffice
• AnthonyPatton,fifteenfortysevenCriticalSystemsRealty
2. ReviewTIG’sProgressonTechIssues&Cyber-Security(5min)
3. MacroITCyber-Security/Threats/IndustrySectors(15min)
• Presenter:RobDeVita,ChiefSalesOfficer,fifteenfortyseven
4. Whatisadatacenter?(15min)
5. GeneralQ&A(15min)
6. TouroftheData&DisasterRecoveryCenter(20mins.)
![Page 3: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/3.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group
ReviewTIG’sProgressonTechIssues&Cyber-Security
![Page 4: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/4.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group
ProgressonTechIssues&Cyber-Security
Ø Cyber-Security
Ø IdentityTheft
Ø SocialMedia
Ø Ransomware
Ø Trendsfor2016/17
![Page 5: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/5.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group
MARCHTOPICS:
MacroITCyber-Security/Threats/Regulations
&DataCenters
![Page 6: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/6.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group• Presenter: RobDeVita,ChiefSalesOfficer,
fifteenfortysevenCriticalSystemsRealtyRob is a native New Yorker, born and raised on Long Island. Rob now is based inthe firm’s Dallas, TX office and travels the country as a memberfifteenfortyseven’s executive leadership team, develop relationships andengineering solutions at all levels for the all of the firm’s properties. Prior tojoining the firm in 2015, Rob has 15+ years of sales leadership experience atAT&T, Telx Group and Cologix, with a concentration in Datacenter and ManagedServices.
is a leading developer and operator of custom-designed datacenters. Formed by a group of experienced executives from the financial and datacenter industries, 1547 is investing in carefully selected datacenter properties. Together, the team has over 60 years of experience in operating, developing, and renovating datacenter space, along with extensive experience in performing exploratory market and feasibility due diligence studies. This wealth of experience allows 1547 to be well positioned to acquire, develop and operate strategically-located, custom built datacenter properties.
From Concept to Completion.
![Page 7: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/7.jpg)
Source:(PwC– CybersecurityBriefingMar 2015)
Gartner estimates
39%increaseinsecurity spend
isstartingtodominatetechnology prioritization
CYBERSECURITY
80%ofGlobal2000reportingcybersecuritypreparationstothe board.
SlidesCourtesyof
![Page 8: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/8.jpg)
Inthe news2014: a year with far-reaching vulnerabilities,faster attacks, files held for ransom, and farmore malicious code than in previous years.
Source:SymantecAnnualThreatReport
JPMorgan Chase Hacking Affects 76 Million Households
August 2014
Target Cyber Breach Hits40 Million Payment Cardsat Holiday Peak
Jan 2014
Home Depot Admits 56 Million Payment Cards at Risk after Cyber Attack
September 2014
Sony’s Unprecedented Cyber Attack: Deep, Costly, Controversial
December 2014
CyberSecuritybreachesdetectedin2014 increased
48%over 2013
Therewere estimated
42.8 Millioncyberattacksin 2014,roughly117,339attacksa day
Estimated financiallossin2014 is
$2.7 Billionajumpof 34%over 2013
Source:(PwC– TheGlobalStateofInformationSecuritySurvey 2015)
SlidesCourtesyof
![Page 9: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/9.jpg)
FactorsdrivingCyberSecurity marketgrowth
CybersecurityisnowaMain Streetissue.Everyoneofusis affected.Cybersecuritystoriesarenowcommoninallmassmedia outlets.
Thethreatcontinuestoaccelerateincapabilityand scale.Consumersandregulatorsaredemandingbusinessesdeployeffective solutions
1 Gartner Forecast: Information Security Worldwide, 2012 – 2018, 3Q14 Update
$94.5Bin 20171
$80Bin 2015
Enormousexpansion in devicesprovides an exponential
numberofnewopportunitiesforhackers.
The security market is dominatedby large companies that milk theirantivirus cows and have very little
incentiveto innovate
SlidesCourtesyof
![Page 10: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/10.jpg)
CyberSecurityencompassesabroadrange ofdisciplines
ACCESS CONTROL TELECOM&NETWORKINFOSECURITYGOVERNANCE
SOFTWAREDEVSECURITY CRYPTOGRAPHY
A collection ofmechanisms Network structures, Identification ofan Controls that areincluded The principles, meansandthat work together tocreate transmissionmethods, organization’s information within systems and methods of disguisingsecurity architectureto transport formatsand assets and the development applications software and the information to ensureitsprotect the assets ofthe security measures usedto and implementation of steps used intheir integrity, confidentiality, andinformationsystem provide availability, integrity, policies,standards, development authenticity
and confidentiality procedures, andguidelines
Eg: RSA, MyOneLogin Eg. Cisco,Checkpoint Eg: EMC Eg. Ounce Labs,Waratek Eg. Vormetric
SECURITYARCHITECTURE&
DESIGNOPERATIONS SECURITY BUS.CONTINUITYAND
DISASTER RECOVERYLEGAL, REGULATIONS,
COMPLIANCE PHYSICAL SECURITY
Concepts,principles, Identify the controlsover Addresses thepreservation Addresses computercrime Addresses thethreats,structures andstandards hardware, media and the of the business in the face
oflaws and the investigative vulnerabilities, and
used to design, implement, operators withaccess major disruptions to normal techniques that can beused countermeasures that canbemonitor, andsecure, privileges to any of these businessoperations to determine if a crimehas used to physically protectanoperatingsystems, resources been committed, and enterprise’s resourcesandequipment, networks, methods to gatherevidence sensitive informationapplications,
Eg: Red Seal Eg: ArcSight,Splunk Eg: Accenture,PwC Eg: Hardware vendors
10
1547(SOC2,PCIandDR)
SlidesCourtesyof
![Page 11: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/11.jpg)
The Problem
Fortune500companiesarein asecurity crisis
Toomanyinternetconnected devices
Existingsecuritytoolskeepsecuritydataproprietaryandsiloedanduseantiquatedlicensingmodels,causingskyrocketingcostsandineffective solutions
SlidesCourtesyof
![Page 12: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/12.jpg)
ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group
WhatisaDatacenter?
![Page 13: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/13.jpg)
REDUNDANCY PROCESSINFRASTRUCTURE
Multiple Generators, multiple power feeds, UPS Systems,
Cooling, automatic failover for each system incase of an
emergency
SOC2 and PCI Compliance insures datacenters are following
document processes for all critical infrastructure
Industrial grade infrastructure from commercial power feeds to
cooling infrastructure.
What is a Datacenter
SECURITY
Physical Security including perimeter fencing, man traps, onsite security guards, video
surveillance
![Page 14: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/14.jpg)
What are they kind of like: Your basic IT closet
14
SecurePower/Back Up/UPS Security Cooling Connectivity
![Page 15: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/15.jpg)
What do they look like
15
![Page 16: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/16.jpg)
What do datacenters have in commonWhat basic kinds of datacenters are there
SecurePower/Back Up/UPS Security/Recordation Cooling/Environment Connectivity/MultipleCarriers
Multi-Tenant,Co-Location FullyDedicated
![Page 17: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/17.jpg)
What can datacenters provide
Some datacenters will build to suit – either for your own dedicated wholesale space or building (see Wholesale), caged areas for your own dedicated servers (see Co-Lo), or with a “cloud” structure that puts your data into a remotely accessible within their corporate Cloud, with varying levels of access. (See Cloud).)
A wholesale datacenter refers to a relatively large datacenter where the provider only wishes to lease large blocks of space and power, typically defined private suites or large cages, to its customers. These facilities are Turn-Key move in ready with UPS Backed power and cooling. These solutions can be customizable
Colocation facilities provide space, power, cooling, and physical security for the server, storage, and networking equipment of other firms—and connect them to a variety of telecommunications and network service providers. Space can be leased by the rack level with a variety of power solutions available
BUILT TO SUITWHOLESALE
C0LOCATIONWORKPLACE RECOVERY
This is often a turn—key solution. Datacenters with “Cloud” services can put your data into a remotely accessible within their corporate Cloud, with varying levels of access remote. Some clouds are for archive, and some are for access like a regular file server. These are usually for back up and mirrored at several facilities and require multi-year contracts
CLOUD
This space offered in both dedicated and shared models, offers customers the ability to migrate their work staff incase of an emergency to our datacenter with complete access to their mission critical environment. This space is backed by either UPS and or Generator power. Conference rooms and private offices are also usually available.
![Page 18: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers](https://reader034.vdocuments.mx/reader034/viewer/2022050114/5f4b27f503173766aa7e5712/html5/thumbnails/18.jpg)
ü Overallcompanygrowthv Needforspeed/multimediav Newconnectivitycontracts
v Structure/spreadofoperation
ü Environment(Regulatory,Technology)v Securitypractices/compliance
v Staff/vendorsv Firewall
ü Upcomingneededchangeinsystemequipmentv CAPEXvs.OPEX
v Extendingservicewarranty,vs.replacementv Equipmentconsolidation
ü “Archive”needschangingovertimev GBtoPB
v Moreactiverecallv Indexing
ü Disasterrecoveryandbusinesscontinuityü Criticalmass
Some Strategic Operational AssessmentRationales for Datacenter Services