wi-fi info: 1547-guest password: internetaccess! rockland ... · networking equipment of other...

18
ROCKLAND BUSINESS ASSOCIATION Technology Initiative Group March 2017 WI-FI INFO: 1547-Guest Password: InternetAccess!

Upload: others

Post on 15-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATION

Technology Initiative GroupMarch 2017

WI-FIINFO:1547-GuestPassword:InternetAccess!

Page 2: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group

AgendaMarch8th,2017

1. Co-Chairs’Welcome(5min)

• JustinSchwartz,AtlanticTomorrow’sOffice

• AnthonyPatton,fifteenfortysevenCriticalSystemsRealty

2. ReviewTIG’sProgressonTechIssues&Cyber-Security(5min)

3. MacroITCyber-Security/Threats/IndustrySectors(15min)

• Presenter:RobDeVita,ChiefSalesOfficer,fifteenfortyseven

4. Whatisadatacenter?(15min)

5. GeneralQ&A(15min)

6. TouroftheData&DisasterRecoveryCenter(20mins.)

Page 3: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group

ReviewTIG’sProgressonTechIssues&Cyber-Security

Page 4: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group

ProgressonTechIssues&Cyber-Security

Ø Cyber-Security

Ø IdentityTheft

Ø SocialMedia

Ø Ransomware

Ø Trendsfor2016/17

Page 5: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group

MARCHTOPICS:

MacroITCyber-Security/Threats/Regulations

&DataCenters

Page 6: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group• Presenter: RobDeVita,ChiefSalesOfficer,

fifteenfortysevenCriticalSystemsRealtyRob is a native New Yorker, born and raised on Long Island. Rob now is based inthe firm’s Dallas, TX office and travels the country as a memberfifteenfortyseven’s executive leadership team, develop relationships andengineering solutions at all levels for the all of the firm’s properties. Prior tojoining the firm in 2015, Rob has 15+ years of sales leadership experience atAT&T, Telx Group and Cologix, with a concentration in Datacenter and ManagedServices.

is a leading developer and operator of custom-designed datacenters. Formed by a group of experienced executives from the financial and datacenter industries, 1547 is investing in carefully selected datacenter properties. Together, the team has over 60 years of experience in operating, developing, and renovating datacenter space, along with extensive experience in performing exploratory market and feasibility due diligence studies. This wealth of experience allows 1547 to be well positioned to acquire, develop and operate strategically-located, custom built datacenter properties.

From Concept to Completion.

Page 7: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

Source:(PwC– CybersecurityBriefingMar 2015)

Gartner estimates

39%increaseinsecurity spend

isstartingtodominatetechnology prioritization

CYBERSECURITY

80%ofGlobal2000reportingcybersecuritypreparationstothe board.

SlidesCourtesyof

Page 8: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

Inthe news2014: a year with far-reaching vulnerabilities,faster attacks, files held for ransom, and farmore malicious code than in previous years.

Source:SymantecAnnualThreatReport

JPMorgan Chase Hacking Affects 76 Million Households

August 2014

Target Cyber Breach Hits40 Million Payment Cardsat Holiday Peak

Jan 2014

Home Depot Admits 56 Million Payment Cards at Risk after Cyber Attack

September 2014

Sony’s Unprecedented Cyber Attack: Deep, Costly, Controversial

December 2014

CyberSecuritybreachesdetectedin2014 increased

48%over 2013

Therewere estimated

42.8 Millioncyberattacksin 2014,roughly117,339attacksa day

Estimated financiallossin2014 is

$2.7 Billionajumpof 34%over 2013

Source:(PwC– TheGlobalStateofInformationSecuritySurvey 2015)

SlidesCourtesyof

Page 9: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

FactorsdrivingCyberSecurity marketgrowth

CybersecurityisnowaMain Streetissue.Everyoneofusis affected.Cybersecuritystoriesarenowcommoninallmassmedia outlets.

Thethreatcontinuestoaccelerateincapabilityand scale.Consumersandregulatorsaredemandingbusinessesdeployeffective solutions

1 Gartner Forecast: Information Security Worldwide, 2012 – 2018, 3Q14 Update

$94.5Bin 20171

$80Bin 2015

Enormousexpansion in devicesprovides an exponential

numberofnewopportunitiesforhackers.

The security market is dominatedby large companies that milk theirantivirus cows and have very little

incentiveto innovate

SlidesCourtesyof

Page 10: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

CyberSecurityencompassesabroadrange ofdisciplines

ACCESS CONTROL TELECOM&NETWORKINFOSECURITYGOVERNANCE

SOFTWAREDEVSECURITY CRYPTOGRAPHY

A collection ofmechanisms Network structures, Identification ofan Controls that areincluded The principles, meansandthat work together tocreate transmissionmethods, organization’s information within systems and methods of disguisingsecurity architectureto transport formatsand assets and the development applications software and the information to ensureitsprotect the assets ofthe security measures usedto and implementation of steps used intheir integrity, confidentiality, andinformationsystem provide availability, integrity, policies,standards, development authenticity

and confidentiality procedures, andguidelines

Eg: RSA, MyOneLogin Eg. Cisco,Checkpoint Eg: EMC Eg. Ounce Labs,Waratek Eg. Vormetric

SECURITYARCHITECTURE&

DESIGNOPERATIONS SECURITY BUS.CONTINUITYAND

DISASTER RECOVERYLEGAL, REGULATIONS,

COMPLIANCE PHYSICAL SECURITY

Concepts,principles, Identify the controlsover Addresses thepreservation Addresses computercrime Addresses thethreats,structures andstandards hardware, media and the of the business in the face

oflaws and the investigative vulnerabilities, and

used to design, implement, operators withaccess major disruptions to normal techniques that can beused countermeasures that canbemonitor, andsecure, privileges to any of these businessoperations to determine if a crimehas used to physically protectanoperatingsystems, resources been committed, and enterprise’s resourcesandequipment, networks, methods to gatherevidence sensitive informationapplications,

Eg: Red Seal Eg: ArcSight,Splunk Eg: Accenture,PwC Eg: Hardware vendors

10

1547(SOC2,PCIandDR)

SlidesCourtesyof

Page 11: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

The Problem

Fortune500companiesarein asecurity crisis

Toomanyinternetconnected devices

Existingsecuritytoolskeepsecuritydataproprietaryandsiloedanduseantiquatedlicensingmodels,causingskyrocketingcostsandineffective solutions

SlidesCourtesyof

Page 12: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ROCKLANDBUSINESSASSOCIATIONTechnology Initiative Group

WhatisaDatacenter?

Page 13: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

REDUNDANCY PROCESSINFRASTRUCTURE

Multiple Generators, multiple power feeds, UPS Systems,

Cooling, automatic failover for each system incase of an

emergency

SOC2 and PCI Compliance insures datacenters are following

document processes for all critical infrastructure

Industrial grade infrastructure from commercial power feeds to

cooling infrastructure.

What is a Datacenter

SECURITY

Physical Security including perimeter fencing, man traps, onsite security guards, video

surveillance

Page 14: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

What are they kind of like: Your basic IT closet

14

SecurePower/Back Up/UPS Security Cooling Connectivity

Page 15: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

What do they look like

15

Page 16: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

What do datacenters have in commonWhat basic kinds of datacenters are there

SecurePower/Back Up/UPS Security/Recordation Cooling/Environment Connectivity/MultipleCarriers

Multi-Tenant,Co-Location FullyDedicated

Page 17: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

What can datacenters provide

Some datacenters will build to suit – either for your own dedicated wholesale space or building (see Wholesale), caged areas for your own dedicated servers (see Co-Lo), or with a “cloud” structure that puts your data into a remotely accessible within their corporate Cloud, with varying levels of access. (See Cloud).)

A wholesale datacenter refers to a relatively large datacenter where the provider only wishes to lease large blocks of space and power, typically defined private suites or large cages, to its customers. These facilities are Turn-Key move in ready with UPS Backed power and cooling. These solutions can be customizable

Colocation facilities provide space, power, cooling, and physical security for the server, storage, and networking equipment of other firms—and connect them to a variety of telecommunications and network service providers. Space can be leased by the rack level with a variety of power solutions available

BUILT TO SUITWHOLESALE

C0LOCATIONWORKPLACE RECOVERY

This is often a turn—key solution. Datacenters with “Cloud” services can put your data into a remotely accessible within their corporate Cloud, with varying levels of access remote. Some clouds are for archive, and some are for access like a regular file server. These are usually for back up and mirrored at several facilities and require multi-year contracts

CLOUD

This space offered in both dedicated and shared models, offers customers the ability to migrate their work staff incase of an emergency to our datacenter with complete access to their mission critical environment. This space is backed by either UPS and or Generator power. Conference rooms and private offices are also usually available.

Page 18: WI-FI INFO: 1547-Guest Password: InternetAccess! ROCKLAND ... · networking equipment of other firms—and connect them to a variety of telecommunications and network service providers

ü Overallcompanygrowthv Needforspeed/multimediav Newconnectivitycontracts

v Structure/spreadofoperation

ü Environment(Regulatory,Technology)v Securitypractices/compliance

v Staff/vendorsv Firewall

ü Upcomingneededchangeinsystemequipmentv CAPEXvs.OPEX

v Extendingservicewarranty,vs.replacementv Equipmentconsolidation

ü “Archive”needschangingovertimev GBtoPB

v Moreactiverecallv Indexing

ü Disasterrecoveryandbusinesscontinuityü Criticalmass

Some Strategic Operational AssessmentRationales for Datacenter Services