Introduction
Micro Widgets, Incorporated is a dynamic organization constantly looking to expand its customer base. To do so, the company utilizes the skills of a mobile sales force. Being mobile, the sales force requires access to the corporate network from time to time while on the road. The Chief Information Officer (CIO) issued a mandate that all employees of the organization have remote access to the corporate network. This enables the sales force to do their job. It also affords the company the ability to offer the benefit of working from home to the employees of the organization. This document will outline the protocols, roles and services necessary to offer remote access to anyone working for the organization.
Remote Access
Before discussing any specific solutions to provide remote access to the employees, the concept of remote access needs a clear definition. “Remote access is the ability to get access to a computer or a network from a distance. A remote access server is the computer and associated software that is set up to handle users seeking access to the network remotely” (Rouse, 2005). Opening a server or firewall to allow access without taking specific measures to secure the corporate network opens the organization to the potential for theft, data loss or downtime. A properly deployed remote access solution includes security measures to prevent this from happening.
Virtual Private Network
A Virtual Private Network (VPN) is the mechanism a remote user uses to connect a remote access server. For a Micro Widgets, Incorporated employee, a VPN allows for a secure transmission of data between two points across the Internet. “Companies maintain VPNs so that employees can access files, applications, printers, a...
... middle of paper ...
... organization and its data.
References
Geier, E. (2013). How (and why) to set up a VPN today. Retrieved from http://www.pcworld.com/article/2030763/how-and-why-to-set-up-a-vpn-today.html Microsoft. (2014). Network policy and access services. Retrieved from http://technet.microsoft.com/en-us/network/bb545879.aspx
Microsoft. (2014). Routing and remote access service. Retrieved from http://technet.microsoft.com/en-us/library/dd469790.aspx
Microsoft. (2009). VPN tunneling protocols. Retrieved from http://technet.microsoft.com/en-us/library/dd469817(v=ws.10).aspx
Perrin, C. (2008). Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/#.
Rouse, M. (2005). Remote access. Retrieved from http://searchmidmarketsecurity.techtarget.com/definition/remote-access
In order to protect the application servers from the internet, the most common un-trusted network, the proposal suggests a firewall to be installed between the internal network and external router. The firewall would be an Adaptive Security Appliance (ASA) firewall, "the ASA is not just a pure hardware firewall. In brief, the Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive
VPN – Virtual Private Network - a method employing encryption to provide secure access to a remote computer over the Internet.
Project Name: Wireless Network Connection and Access for all offsite employees, mobile devices and buildings.
Telehealth is the monitoring via remote exchange of physiological data between a patient at home and health care professionals at hospitals or clinics to assist with diagnosis and treatment. As our society ages and health care costs increase, government and private insurance payers are seeking technological interventions. Technological solutions may provide high quality healthcare services at a distance, utilize professional resources more effectively, and enable elderly and ill patients to remain in their own homes. Patients may experience decreased hospitalization and urgent care settings, and out of home care may not be required as the patient is monitored at home. However, no study has been able to prove telehealth benefits conclusively. This change in health care delivery presents new ethical concerns, and new relationship boundaries between health care professionals, patients, and family members. This paper will discuss telehealth benefits in specific patient populations, costs benefits of using telehealth, and concerns of using telehealth.
A Capital One Financial Corporation has established such workplace by providing mobility and flexibility to their employees in business units. They implemented a concept “virtual workplace” which is based on reconfiguring office space and use of up to date mobile technology. It gives employees opportunity to be more productive since they are able to work from any place they would choose. According to the Benefits Survey Report from the Society for Human Resource Management published i...
For overall cost of ownership and ease of deployment company should consider a cloud based service. Because of web based service user can access system from anywhere, upgrades delivered automatically and access on any device.
Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network. “You must have a general understanding of security terminology and specifications as it relates to configuring hardware and software systems.”(Roberts, Richard M. 599). That quote states that by knowing and understanding security terms and specifics, you can
In addressing the problem, the proposed research will use the case study method to examine the plan, design, and implementation of WLAN technologies at Berean. At present, the non-wireless local area network (LAN) technologies employed by Berean include 10/100BaseT Ethernet at each desktop. Ethernet ports at the desktop are switch connected to an Asynchronous Transfer Mode (ATM) T1 backbone. Berean¡¦s one remote facility connects to the network using switched Frame Relay services along with Internet Virtual Private Network (VPN) connections.
... their high-speed connections to get into the corporate network. A VPN is the answer to providing secure and flexible access for traveling and work-at-home employees. It also works for secure office-to-office connectivity.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
A reliable environment for teams to exchange information in a secure manner may be a necessity for virtual teams; therefore, security can pose another challenge. Different types of projects may require different levels of security. A virtual private network may be necessary to ensure that information is passed securely to the desired recipients. Authentication and encryption techniques can guarantee secure transmission of electronic...
The workplace today goes beyond just the walls and ceilings that surround an office environment or office building. According to the International Telework Association and Council, 44.4 million Americans worked from home at least part of the time in 2004, up 7.5% from just on year earlier (Earthweb, 2005). Though it may be very convenient to work from home, the choice can bring its own set of problems. There are financial reasons, efficiencies, and even managing time are just a few to name that bring about many challenges and issues that any remote employee would face in that type of work environment.
On the more positive side, wireless networking allows leaders to share resources with their team operating by means of wireless media, such as microwaves, cellular technology, and radio frequencies. Wireless networking is paving the way for technology integration around the world. The use of collaboration tools allows ongoing conversations among leaders, their subordinates, board members, and community members. Professional development is one area where collaboration can have an enormous impact on management leadership. When leaders can casually share new approaches and practices with each other through a technology connection to their workplace, both leaders and their team will benefit. One way of doing this is to create an Internet mailing list where they can share questions, problems, solutions, successful techniques, and less successful techniques. The Internet is enabling digital video to achieve professional-quality and two-way interaction. This will be one of the rare cases where management leadership will be leading a technological shift in society as a whole. Hand-held devices are high-tech gadgets, now more powerful than early Windows or Macintosh machines. Handheld devices offer more versatility than full-size computers and are much more portable than the alternative personal device, the ...
If you’ve ever been a network administrator, the call you dread the most might be one you receive in the middle of the night by some panicked employee stating that a portion of your critical network has gone down. What troubleshooting options are available to provide answers to your network problem? Besides having a proactive helpdesk that can “read” the mind of your network, an important part of troubleshooting involves using a network protocol analyzer. If you’ve done your research, you realize that there are many choices on the market today that may satisfy your needs but make a dent your company’s pocket book. Plus, you have to factor in training your helpdesk on how to use this new tool and if it will provide some type of return on investment (ROI).
With the rise of mobile working whereby companies employ from different regions without necessarily having employees enclosed in one building, they end up employing more skilled and qualified workers regardless of their location. This has been made possible by companies embracing virtual meetings and video conferencing where managers and