Ism4220 Module10 Implementationplan Guymason

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Mason Guy

ISM4220
Executive Summary

The company, having two warehouses on opposite sides of the country, is currently

connecting its networks through a WAN, or wide-area network, through an ISP, or internet

service provider. Internally the networks are handled through a LAN, or local-area network, that

is connected through the ISP through a router and a switch. The information within the networks

of the two warehouses include customer information including names, addresses, phone

numbers, and payment information. Due to the sensitive information held within and passed

between the two networks, the router, switch, and server within both warehouses will be

monitored through an NMS, or network management system.

NMS Comparison

NMS NAME PRICING FEATURES


(per month)
DataDog Estimated Total = $109 - Optimization of application performance

- Logs from all services are automatically

collected, tagged, and correlated

- Creates visualizations and alerts based on log

data

- Custom alerts with a variety of notification

methods

- Dashboards that graph real-time events and

metrics
Pulseway Estimated Total = $495 - Asset discovery allows users to see all endpoints

and deploy a solution in mass

- Automated tasks

- Patch management
Mason Guy
ISM4220
- Mobile apps

- Remote control & support


Sensu Estimated Total = $1,500 - Alerts based on the event filters set by the

company

- Various alert notification methods

- Incident management

- Real-time inventory

- Automated tasks

Other Recommended Techniques

- SNMP Monitoring

- NetFlow Monitoring

- SQL Query Monitoring

Monitored Devices

SITE DEVICES
Site A (California Warehouse) - Router

- Switch

- Server
Site B (North Carolina Warehouse) - Router

- Switch

- Server
Security Recommendations

Due to the sensitivity of the information within the servers located at both warehouses,

the servers should be monitored closely to ensure unauthorized access is prevented.


Mason Guy
ISM4220

IT Personnel Diagram

SNMP traps SNMP traps

SNMP traps Event Monitoring SNMP traps

You might also like