Thisa Customer Presentation Ga

Post on 12-Jan-2015

239 views 4 download

description

 

Transcript of Thisa Customer Presentation Ga

Providing Cost Effective IT Infrastructure Solutions

Presenter: Mike Panno

Chief Executive Officer

GuardEra Access Solutions, Inc. – THISA Member

THISA Approach• THISA takes a holistic approach to designing,

implementing, and supporting our customers’ environment

• Starting at client access, THISA partners with industry leaders to provide end-users with reliable, secured access points.

• The goal is to make sure users can access your data reliably and securely, while still limiting your exposure.

Client Access

Identification and Authentication

• Once you’re sure your users can get to your information in a secure fashion, THISA looks to verify their identity and be sure they have access to their applications.

• By using a multi-factor authentication method in front and a user provisioning solution in the data center, you can insure your users are getting access to the data they need based on their roles.

Service Delivery• As we move inside the data center, THISA

starts to focus on serving up the applications quickly and securely.

• Traffic and session monitoring, load balancing and acceleration, and user experience control come into the spotlight.

Service Delivery• As well as serving the data and applications to

the users, THISA is concerned that the data you’re providing is transferred securely and is useful to the user.

• Whether it’s something as ubiquitous as email or as focused as patient information, delivering these applications is crucial to operations.

Enterprise Architecture• Focusing on the infrastructure now, the

applications deployment methods come into play.

• THISA looks at web optimization, application streaming, virtual desktop infrastructures (VDI), and other application delivery platforms to serve up that data.

Technical Architecture• Moving to the last layer of the infrastructure, THISA

looks at the virtual and physical servers, the desktop, server, and application images, the data itself, as well as providing a test environment for all of it.

• Along with deploying the infrastructure, you need to make sure it’s all compliant with industry standards and government regulations.