Information Technology Environment (Pertemuan Ke 4)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

INFORMATION TECHNOLOGY ENVIRONMENT

End User End User Device: Mobile Device: Unified Communication:


Security: - PC - Smartphone - Telephony
Antivirus, - Notebook - Tablet - Presence
Encryption, Printing - Thin/Zero Client - Video Conference Interconnection: Microwave,
DLP - Workstation - Audio Conference Broadband, VSAT, Metro-E A
U
T
Wireless Wireless Network: Router & WAN Optimizer
O
Security - Wifi M
A
Network Edge Network:
T
Security: NAC, L2/L3 Switch, PoE Switch, etc
I
IPS/IDS,
Core Network: O
Firewall,
Core Switch, Server Farm Switch, L3 Switch, Load Balancing, etc N
Encryption
Archiving Management & Business Support App: Business Critical App: S
Software
Backup Software Software Monitoring Software Email, Proxy, AD, File ERP, SCM, Billing System, dll O
Security:
Share, Sharepoint, dll F
Antivirus,
T
Encryption
Operating System: UNIX OS: HP-UX, W
- Linux/Windows Solaris, AIX A
R
OS Optimization: E
Cluster, Multipath, Volume Manager

Virtualization: UNIX Virtualization:


Server or Desktop VPAR, LDOM, LPAR

X86 Server: 64-bit Server:Itanium, SPARC,


Blade, Rack, Tower, HPC POWER

Storage Network:
Fiber Channel Switch, iSCSI Ethernet Switch

Backup Tape Library SAN Storage Direct Attached Storage NAS Storage
Appliance
Datacenter:
Raise Floor, AC Precision, UPS, Fire Alarm, CCTV, Datacenter management software

You might also like