InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an...

18
InformationGraphics .Biz Case Study : FOXt.

Transcript of InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an...

Page 1: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

InformationGraphics.Biz

Case Study : FOXt.

Page 2: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

ChallengeThe

Create a graphic that explains an abstract software

concept for FOXt’s security vulnerabilities solution.

Page 3: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

“Here’s what FOXt’s marketing department developed.”

“We need Informationgraphics.biz to clean this up and clarify our message!”

IDM

and

Dire

ctor

ies

Password Vaulting

SSO

Sudo

PowerShell

ADBridge

SSH Mgmt

Privileged User End UserAccess Management

Page 4: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

And please include:

IDMLAD/LDAP

System AdminsEnd Users

Data CentersSAP

OracleLegacy Apps

Unix Linux Windows

Place in the cloud

etc…

Page 5: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

After a few phone calls, emails.We came up with a concept

which was put on paper.

A simple sketch lead to the development and placement of the art elements.

A few tweaks and the initial graphic came to life, followed by a “few” editorial

revisions…

Page 6: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Initial sketch

Version 1

Modify “End Users” so we see people working in a building.

Center Datacenter.Remove “Cloud” from Database B.

Use same treatment as Database A.

Make AD/LDAP largerAnd add label.

Make connecting lines grey.

Create 2 new users.One at the airport andOne in a park.

Page 7: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Version 2

Change format of IDM and combine with Directories.

Remove AD/LDAP.

Move System Administrators.

Remove people and expand building.

We’d like to see the Datacenters as buildings.

Page 8: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Version 3

Page 9: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

We Love It!BUT

We reviewed with the team and we’d like to make a few “slight” changes.

Re-design IDML to a vertical format Remove AD/LAP Add “Access Management” module Change System Administrators to reflect a building with banks of

computers Change End Users to be a large building with many floors which

include:

And here they are:

Accounting HR Inventory Risk / Audit Sales Etc…

Page 10: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Oh YeahI forgotOne more thing…

Could you remove the connecting lines from the illustration and replace with 2 arrows?

No Problem!Here ya go!

Page 11: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Very nice!!

Now

If you could… please

1) Place on a US Map.2) Create a satellite office located in Miami.3) Remove the arrows and replace with lines.4) Place Data Centers in Denver and Dallas.5) Place Access Management in Salt Lake City.6) IDM & Directories should be located in San

Francisco.

No Problem!

Page 12: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

One more thing…

That’s IT!THANK YOU!

Can you place this concept in a global setting?

Of course…

Page 13: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.
Page 14: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

This information / business graphic was used in print, presentation and web.

Page 15: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Empower your sales and marketing teams with effective visual communication tools!

Information and business graphics save time, increase efficiency, and improve communication.

InformationGraphics.Biz

Page 16: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Informationgraphics.bizFor more information please visit

www.informationgraphics.bizEmail:[email protected]

Phone: 831-252-6008

Page 17: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.

Let me help you tell your

story.

Thank you for your time!

Call me @ 832.252.6008

Page 18: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.