Fiserv Incorparation Case Study

Great Essays
Project Description
My company Fiserv Incorparated is using Windows server for network operations but those windows servers are not installed with all patches and updates. Now looking at the current network configuration it can been clealy said that seeing the growth of the organization the network needs to be upgraded before the network collapses. Seeing the current network , the company’s and client’s confidential data seems to be at risk.
In order to upgrade a network, proper site survey needs to be carried out which includes all the necessary information about the organization’s current business and the projected growth of the same. This is done to accurately determine the current as well as the future network requirements of the company.
…show more content…
In order to update complete network system in the Fiserv Incorparated it would take around 2 years and will cost around $75 million. As the company has muliiply offices and multiply states it would take 3 years to setup a whole new network in the company and making Four Data Centers (John’s Creek, GA; Phoenix, AZ; Lewisville, TX; and Irving, Tx), Corprate Office, and two major offices as our main hub locations, The John’s Creek and Phoenix Data Center will house the production servers and making the Lewisville Data Center as the disaster recovery location in case a disaster happens at one of the other Data Centers so not to affecting the customers and emplyee’s work load, it would be better to setup DR servers (Disaster recovery). Devlopment server will be housed in the Irving, TX Data Center. There would be four phases of this as follows: …show more content…
Earlier the organization had only one option i.e., to insource their netwrok security and that was very hectic for them as it doubled their efforts, although insource is perceived control, internal accountability, and tailor solution to internal situation. Whereas nowadays there are service providers which provides network security to the organizations. Pros of outsourcing network security are it is cost effective, focus on core business, leverage security experts and leverage complaince.
When company grows rapidly, the network that supported the company often can’t keep pace with expansion. Employees may not realize about the importance of proper plan for the network upgrades. In most of the cases, organizations may simply add various network connection technologies, hardware,of varying quality to simply boost up the network with the growth in the business but oten this type of upgradation causes degradation in the quality of network and so this should have to be done very carefully and with proper

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    The best thing is that if anything needs reconnecting for a different use, all source connections are available in a single space without needing to change any cables. The fiber optic cable would be appropriate because as the business relies on the internet for more and more of their ongoing operations, they are essentially sending and receiving more packets of data. There will be running, on average,…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    AMT2 Service Line Development Task 4 Echo Breen A. Determine the feasibility of one of the proposed service lines in the attached “Service Line Development Case Study” by doing the following: A1. Evaluate the demand for the new service line in the market area defined in the case study. Trinity Community Hospital (TCH) has the opportunity to develop a new orthopedic service line. It is anticipated that there will be a huge increase in need for orthopedic services within the next 5 years; orthopedic cases will increase by 46%, joint and spine procedures will increase by 30% and outpatient joint and spine procedures will increase by 350%.…

    • 1461 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I would suggest to have a windows server 2012 enterprise Depending on the size of the company a minimum of 3 TB of space on raid 10. Use the main server as a host and deploy at least 2…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Industry Example DoD industry partners follow stringent change control processes for configuration management minimizing risk to the government. CISCO, an important industry partner not only implements a CM program for themselves they share their processes and methods as another business offering. Assess and Evaluate the RFC The potential impact to services and service assets and configurations needs to be fully considered prior to the change. Generic questions (such as the "seven Rs") provide a good starting point.…

    • 1234 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The task team has identified these servers as essential to provide the online services we want to offer. A database server, Web server, file server, SMTP server, and LDAP server. These servers need to use open source software and have the capabilities to provide a secure network environment. We must also ensure compliance with GLBA, SOX, and PCI-DSS federal regulations and…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Name Muhammad Shahzad (73537) Who are Agero constituents? Broadly speaking Agero has four different types of constituents which are mentioned below • Drivers • Service provider • OEM • Insurance Companies…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays