Lesson 9 total cost of ownership in e commerce security
Download
1 / 8

Lesson 9 - PowerPoint PPT Presentation


  • 317 Views
  • Updated On :

Lesson 9 Total Cost of Ownership in E-Commerce Security. What Drives TCO?. Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New applications require new solutions. What Drives TCO in Security?. Vendors produce in-secure applications

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Lesson 9 ' - arleen


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Lesson 9 total cost of ownership in e commerce security l.jpg

Lesson 9 Total Cost of Ownership in E-Commerce Security


What drives tco l.jpg
What Drives TCO?

  • Networks Grow in Size and Complexity

  • Scope of Operations Increases

  • Skilled IT labor grows scarce

  • New applications require new solutions


What drives tco in security l.jpg
What Drives TCO in Security?

  • Vendors produce in-secure applications

  • Vulnerabilities proliferate

  • Business processes depend on applications

  • System availability drives profit


Components to consider l.jpg
Components to Consider

  • Initial Cost of Product (25% of life cycle)

  • Vendor Support Services

  • Deployment Services

  • Time for Staff to Install and Configure

  • Training Cost

  • Post Deployment Support


How to reduce tco l.jpg
How to Reduce TCO?

  • Simplify Infrastructure (KISS)

  • Upgrade Infrastructure When Timing is Right

  • Minimize Labor Intensive Activities

  • Consider Remote Management

  • Know Your Assessment Parameters


Slide6 l.jpg

Option 3

Option 2

Option 1

HIGH

Budget Line

T

C

O

Acceptable Risk

Ideal Soln

LOW

HIGH

LOW

Security Risk


Evaluating the options l.jpg
Evaluating the Options

  • Option 1

    • FIREWALL At Gateway Only

  • Option 2

    • DMZ

    • Anti Virus Software on all DMZ machines

  • Option 3

    • DMZ, AV S/W on DMZ Machines

    • VPN Access to all DMZ Machines

    • AV S/W and Firewalls on all Clients


Things to consider l.jpg
Things to Consider

  • Which Option Would You Choose?

  • Could You Determine TCO for Your Project?

  • Given a Set of Devices Could You Compute TCO?


ad