Transcript of Auxilium.com (AUX) Group 2 - July 29, 2014 Jordan Durity Curtis Holton Frank Mack Steve Rawls Jason...
- Slide 1
- Auxilium.com (AUX) Group 2 - July 29, 2014 Jordan Durity Curtis
Holton Frank Mack Steve Rawls Jason Richardson Francisco Tobar
- Slide 2
- What is AUX?
- Slide 3
- Our Mission Make Technology an asset for your business not a
problem.
- Slide 4
- Our Responsibility to You Protect your image by providing
redundant, relevant, and reliable service Adapted to the individual
or broadened to the corporation Implementing simple security,
service, infrastructure, and network policies
- Slide 5
- Why do you need AUX?
- Slide 6
- Internet Shopping and Usage More than 80% of the online
population has used internet to purchase a product 72% of Online
Adults are Social Networking Site Users 37% of all world women are
online, compared with 41% of men
- Slide 7
- Slide 8
- Protect Your Image 8% of online adults used social networking
sites 18% of online Adults are Twitter Users Facebook has 184.2
mill subscribers- US
- Slide 9
- Twitter Evolution
- Slide 10
- AUX Topology
- Slide 11
- Addressing By Team/Division
- Slide 12
- Slide 13
- Equipment Cisco VoIP 7960 phones ThinkCentre M73 SFF Desktop
(workstations) Samsung R780 Laptop (SOHO) Servers - Intel Server
Board S4600LH2 and S4600LT2-based Systems PROMISE Pegasus2 R8
P2R8HD24US RAID Storage
- Slide 14
- Network Equipment Cisco 3560 Switches Cisco 2811 Routers Cisco
1841 Router (SOHO Network) Cisco 2960 Switches WatchGuard Unified
Threat Management (UTM) and e-Series or XTM 21
- Slide 15
- Topology Overview Cisco Three Layer Hierarchical Model Core
Layer Comprised of Two Cisco 2811 Routers DMZ/Web Server from Core
Router 1 and ISP from Core Router 2 Cisco Anyconnect VPN Client
Software Supports Teleworkers and Contractors WatchGuard Firewall
Connects Core Routers to Distribution Layer
- Slide 16
- Topology Overview Distribution Layer 2 Cisco 3560 Layer 3
Switches Handles Routing and switching AUX Network Traffic,
Secondary firewalls. 3560 switches are connection to a 2960 switch
providing access to the Data Center 3560 Distribution Switches -
provide redundant links to access layer switches. Data Center -
Comprised of a Production, Development, and 3 Storage servers.
- Slide 17
- Topology Overview Access Layer 4 Cisco 2960 Switches Dedicated
Specific AUX Teams. IT/HR Switch, Executives Switch Social Media
Switch Development and Sales Switch. Redundant links to support
connectivity and Fault Tolerance. Provides connectivity AUX work
Stations and VoIP Cisco 7960 phones.
- Slide 18
- AUX Team Overview Aux Teams - Make Technology an asset for your
business not a problem. AUX Teams Sales and Marketing Search Engine
Optimization Web Design Facebook Team Twitter Team Team Member-
accountable to Team Lead and Managers.
- Slide 19
- Support Team Overview IT Department 4 highly skilled
individuals Network/Desktop Administrator, Security Specialist/Tier
3 Support, Tier 2 Support and Tier 1 Support. Manages AUXs Network,
Information Security, and Desktop Issues. Handles all technical
support issues from within. Human Resources 3 Positions - HR
Supervisor, HR Specialist and HR Recruiter. HR Supervisor -manages
the HR Team and implements final policies. HR Specialist - pay
roll, scheduling, or HR related issues within the office. HR
Recruiter - head hunter, acquires best talent to meet the needs of
expansion.
- Slide 20
- Team Overview Sales and Marketing Comprised of 2 Sales and
Marketing Specialists and 3 representatives. Develops the best
strategies to attract, retain and seal the deal. Reps interact with
AUXs customers/potential customers directly. Search Engine
Optimization (SEO) Develops Web Sites to optimize natural search
engine searches. SEO Engineer, SEO Admin and 3 SEO Technicians. SEO
Engineer develops strategies for SEO Admin maintains the department
and deploys the main SEO strategies. SEO technicians work directly
with clients
- Slide 21
- Team Overview Web Design 2 Senior Level Web Designers along
with a Level 1 and Level 2 Designer. Designs and builds websites,
mobile apps, and website as a service applications. Specialist code
in PHP, J Java, Java Script, Ruby, Python, HTML, CSS, and XML.
Level 1 & 2 developers write the majority of the code on most
projects and do QA testing. The most complicated projects will be
handled by the Senior Web Designers.
- Slide 22
- Team Overview Facebook (FB) FB Team Supervisor, FB Designer and
3 FB Coordinators. Design and maintain Facebook accounts for all of
AUXs clients. Team Supervisor manages all work and ensures FB SLAs
are met. Designer designs AUXs client Facebook accounts FB
Coordinators are responsible for maintain the accounts. Twitter
Responsible for handling all aspects of AUXs clients Twitter
accounts. Supervisor, a Designer and 3 Coordinators. (Similar
Facebook Team)
- Slide 23
- Team Overview AUX Executives AUXs Chief Executive Officer
(CEO), Vice President (VP), Chief Information Officer (CIO) and
Chief Financial Officer CFO). Develop, design, implement and
enforce all of AUXs executive decisions. Responsible designing and
implementing decisions involving the purpose of their executive
role respectfully.
- Slide 24
- AUX Network Security Policy ASP states that network security
will not be solely implemented at one single layer. Multi-layered
Approach-Prevent attacks combining antivirus, personal firewalls
and intrusion detection. ASP-Contract employees, employees with
telepresence, VPN traffic and related software. Facility
Security-Deployed by Siemens Access Control Systems.
- Slide 25
- AUX Security Policy (cont.) End-user Computing-prohibits the
use of removable media. Random Monthly Sweeps to consist of 20% of
all assets. VPN Policy-Cisco AnyConnect VPN Client permits secured
communications and access. USB devices fall into same forensics
policy as stated above
- Slide 26
- Network Firewall and Security Four steps to ensure an adaptive
and continuous network policy Secure Monitor Test Improve
Watchguards Next-Generation Firewall. Unified Threat Management
(UTM) - provides enterprise-grade perimeter defense against
viruses, spam and other unwanted traffic
- Slide 27
- Network Security UTM Packet filtering Intrusion prevention
service, Application control Data loss prevention Advanced
persistent threats and zero malware day protection Easy GUI System
All Policies Are Subject to Change at the Discretion of
Management!
- Slide 28
- Conclusion Auxilium.com (AUX)