Vous êtes sur la page 1sur 30

NETWORK SECURITY MAHINDRA SATYAM

MAHINDRA SATYAM
-

BRAND IDENTITY OF SATYAM COMPUTER SERVICES LIMITED


BY

-SATYAM COMPUTER SERVICES LIMITED WAS FOUNDED IN 1987 RAMALINGA RAJU.

-MAHINDRA SATYAM IS A PART OF THE MAHINDRA GROUP WHICH IS ONE OF THE TOP 10 INDUSTRIAL FIRMS BASED IN INDIA. -OFFERS CONSULTING AND INFORMATION TECHNOLOGY (IT) SERVICES - LISTED ON THE NEW YORK STOCK EXCHANGE, THE NATIONAL STOCK EXCHANGE
(INDIA) AND BOMBAY STOCK EXCHANGE (INDIA).

-OFFICES IN 32 COUNTRIES.MAHINDRA SATYAM IS RANKED 17 IN THE LIST OF

IT SERVICES PROVIDERS IN INDIA ACCORDING TO A STUDY BY CYBERMEDIA'S DATAQUEST RESEARCH IN 2011.

THE DATA CENTRE


MAHINDRA SATYAM LTD. HAS SET UP A STATE OF THE ART DATACENTRE AT HYDERABAD FOR ITS SAP PRODUCTION ENVIRONMENT. - THE INFORMATION BEING EXCHANGED IS HIGHLY
CRITICAL AND IN NATURE.

AT THE COMPANY

NETWORK SECURITY
-THE AREA OF NETWORK SECURITY CONSISTS OF THE PROVISIONS
AND POLICIES ADOPTED BY THE NETWORK ADMINISTRATOR TO PREVENT AND MONITOR UNAUTHORIZED ACCESS, MISUSE, MODIFICATION, OR DENIAL OF THE COMPUTER NETWORK AND NETWORK-ACCESSIBLE RESOURCES.

-INVOLVES THE AUTHORIZATION OF ACCESS TO DATA IN A NETWORK, WHICH IS CONTROLLED BY THE NETWORK ADMINISTRATOR. -USERS
ARE ASSIGNED AN ID AND PASSWORD OR OTHER AUTHENTICATING INFORMATION THAT ALLOWS THEM ACCESS TO INFORMATION AND PROGRAMS WITHIN THEIR AUTHORITY.

CHALLENGES

CHALLENGES FOR MAHINDRA SATYAM


-NEEDS TO UPGRADE SAP APPLICATION FROM R/3 4.72 E TO ERP 6.0 -UPGRADE OF SAP APPLICATION REQUIRES UPGRADE & RE-WORKING OF : 1. INFRASTRUCTURE 2. SERVERS 3. STORAGE 4. NETWORKING 5. SECURTIY INFRASTRUCTURE - UPGRADATION OF EXISTING CISCO NETWORK EQUIPMENT

THE OBJECTIVES

KEY OBJECTIVE

ENSURE THAT USERS CONNECTING TO SATYAMS DATA CENTRE/DR CENTRE ARE


ABLE TO ACCESS ONLY AUTHORIZED APPLICATIONS, DATABASES, ETC. AND NOT ABLE TO PERFORM ANY UNAUTHORISED ACTIVITIES.

OTHER
-IMPROVE USER EXPERIENCE BY PROVIDING FUNCTIONALITIES LIKE REVERSE PROXY

-SAFEGUARD THE NETWORK FROM ANY POSSIBLE COMPROMISE DUE TO


DIRECT CONNECTIVITY OF THE USERS WITH THE SERVERS RESIDING IN

SATYAMS INFRASTRUCTURE.

-CONSOLIDATE THE LOGS OF FIREWALLS, INTRUSION PREVENTION SYSTEM (IPS), ANTI-VIRUS, MAIL SERVER, ROUTERS, SWITCHES, ETC.

WHAT TASKS ?

TASKS
-Correlate various security events

-Presenting a Consolidated report

-Event prioritization.

-Mitigating the Risks

THE NETWORK UPGRADATION

THE NETWORK ARCHITECTURE

COMPONENTS

SECURITY

1. ARCHITECTURE

NETWORK ARCHITECTURE

2. COMPONENTS

VARIOUS COMPONENTS

-2 Cisco ACE 4710 Load Balancers with 2 Gbps License

- 4 WS-X6748-GE-TX cards to be inserted in existing Cisco 6500 switches.

-LMS 3.2 to replace existing LMS of CISCO, to be installed on a server

-4 Catalyst 2960 switches

CISCO LOAD BALANCER ACE 4710


Maximize application availability Accelerated application performance Secured data center and applications Facilitates data center consolidation through fewer servers, load balancers, and data center firewalls

CISCO ASA

flexibility, modular scalability, feature extensibility, and lower deployment and operations costs.
-Provide unprecedented services -Purpose-built solutions that integrate world-class firewall, unified communications, security, VPN,

intrusion prevention (IPS), and content security services in a unified platform.

CISCO 2960 SWITCHES features at the network edge, such as sophisticated access control lists (ACLs) and enhanced
security. 2. Auto
ports. 3. Easy network configuration,

1. Intelligent

configuration for specialized applications using Smart upgrades, and

troubleshooting using Cisco Network Assistant software

3. SECURITY

STEPS

. Implementing Reverse

Proxy functionality:

2. Intrusion Prevention System (IPS)

3. Security Information Management solution:

REVERSE PROXY
- PROXY SERVER THAT IS INSTALLED WITHIN THE

NEIGHBOURHOOD

OF ONE OR MORE

SERVERS.

CONNECTIONS COMING FROM THE INTERNET ADDRESSED TO


WEB SERVERS ARE ROUTED THROUGH THE PROXY

ONE OF THE

SERVER, WHICH MAY EITHER DEAL WITH THE REQUEST ITSELF OR


PASS THE REQUEST WHOLLY OR PARTIALLY TO THE MAIN WEB SERVERS.

REVERSE PROXY SERVER

REVERSE PROXY SERVER AT THE COMPANY


Bluecoat Proxy SG -Helps in security,encryption, load distribution , compression, spoon feeding - Protects web servers -Accelerates web content -Simplifies operations -Controls user access -Uses intelligent OS, to distinguish between contents and connections.

FIREWALL SYSTEM AT
THE COMPANY
The Juniper Networks ISG 1000 is fully integrated firewall/VPN system that provides: Multi-gigabit performance Modular architecture Rich virtualization capabilities

JUNIPERS IDS & IPS


-Searchable

database

-Visually correlating the host, attack source and attack type


-

-User friendly reporting module

Satyam implements IDP module of Juniper ISG-2000 to protect internal segments of the network.
-

UPGRADED INFRASTRUCTURE

THANK YOU

Vous aimerez peut-être aussi