1 / 8

Lesson 9 Total Cost of Ownership in E-Commerce Security

Lesson 9 Total Cost of Ownership in E-Commerce Security. What Drives TCO?. Networks Grow in Size and Complexity Scope of Operations Increases Skilled IT labor grows scarce New applications require new solutions. What Drives TCO in Security?. Vendors produce in-secure applications

arleen
Download Presentation

Lesson 9 Total Cost of Ownership in E-Commerce Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lesson 9 Total Cost of Ownership in E-Commerce Security

  2. What Drives TCO? • Networks Grow in Size and Complexity • Scope of Operations Increases • Skilled IT labor grows scarce • New applications require new solutions

  3. What Drives TCO in Security? • Vendors produce in-secure applications • Vulnerabilities proliferate • Business processes depend on applications • System availability drives profit

  4. Components to Consider • Initial Cost of Product (25% of life cycle) • Vendor Support Services • Deployment Services • Time for Staff to Install and Configure • Training Cost • Post Deployment Support

  5. How to Reduce TCO? • Simplify Infrastructure (KISS) • Upgrade Infrastructure When Timing is Right • Minimize Labor Intensive Activities • Consider Remote Management • Know Your Assessment Parameters

  6. Option 3 Option 2 Option 1 HIGH Budget Line T C O Acceptable Risk Ideal Soln LOW HIGH LOW Security Risk

  7. Evaluating the Options • Option 1 • FIREWALL At Gateway Only • Option 2 • DMZ • Anti Virus Software on all DMZ machines • Option 3 • DMZ, AV S/W on DMZ Machines • VPN Access to all DMZ Machines • AV S/W and Firewalls on all Clients

  8. Things to Consider • Which Option Would You Choose? • Could You Determine TCO for Your Project? • Given a Set of Devices Could You Compute TCO?

More Related