CMGTCB 554 IT Infrastructure IT Infrastructure Recommendations Part 2

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

CMGTCB554

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

16

Uploaded by GeneralCrownTiger25

Report
1 International Plastics Inc. – Recommendations Part 2 University of Phoenix IT Infrastructure/ CMGTCB/554 Ongart (peng) Ratchaworapong 5/27/2023 Grade: MA
2 IT Infrastructure Recommendations The recommendations included in the chart identify the IT infrastructure that can increase business performance. Many of the components are using outdated technology or create data silos between locations and between business units. Upgrading the various components and technologies can increase productivity, reduce data silos, gain insight and visibility to business operations through business intelligence and reporting. Networking Having a successful digital transformation, it is critical to have a robust and reliable network infrastructure in place. This ensures critical resources and data are easily accessible without interruptions, enabling seamless collaboration among team members. Additionally, a robust network infrastructure facilitates a better understanding of operational processes and can aid in identifying areas for improvement and optimization. A solid network infrastructure is the backbone of any digital transformation initiative and enables agility, innovation, and growth. Improving Networking Speed Upgrading the network infrastructure from 100base-T to 1000base-T significantly enhances network performance. This higher bandwidth capacity facilitates quicker data transmission and reception, reducing latency and improving overall network performance. Large files, such as multimedia content or data backups, can be transferred more rapidly, saving time and increasing productivity. This upgrade improves response times, network reliability, and scalability. Upgrading to 1000base-T provides scalability for accommodating future growth and increasing network demands. As the business expands and adds more devices and users, the higher bandwidth capacity ensures the network can handle the increased traffic. This scalability allows the business to future-proof the network infrastructure, avoiding the need for immediate
3 upgrades as requirements evolve. The increased bandwidth accommodates more simultaneous connections and supports more significant network traffic without experiencing congestion or slowdowns. This reliability ensures consistent network access and minimizes interruptions, enabling employees to work efficiently without disruptions caused by network bottlenecks. Upgrading to 1000base-T can be a partial overhaul of the existing infrastructure. The new standard is backward-compatible with 100base-T, meaning devices operating at lower speeds can still connect to the upgraded network. This compatibility allows for a gradual transition, minimizing disruption and cost. Additionally, as 1000base-T becomes more prevalent, the cost of compatible networking equipment decreases, making it a cost-effective choice for improving network performance. 1000base-T supports various media types, including commonly used copper cabling, such as Cat5e, Cat6, or Cat6a, used in ethernet networks. This flexibility allows the business to leverage existing cabling infrastructure and equipment, reducing the need for extensive rewiring or infrastructure changes. Network Security Network security is a critical aspect of any IT infrastructure. Next-generation firewalls (NGFWs) offer advanced security features beyond traditional firewall capabilities. Cisco, a leading provider of networking solutions, offers a range of NGFW solutions that provide comprehensive network protection. The benefits of Cisco's NGFWs include many robust features that protect the network and safeguard sensitive data from threats. Application Awareness : NGFWs have deep packet inspection capabilities, allowing them to identify and control applications at a granular level. This enables the business
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 to enforce application-specific security policies and prioritize critical applications for optimal network performance. Intrusion Prevention System (IPS) : NGFWs integrate IPS functionality, actively monitoring and protecting against network threats and vulnerabilities. They can detect and block malicious traffic, including known and emerging threats, ensuring the network remains secure and protected from cyber-attacks. Web Filtering and Content Filtering : NGFWs include robust web filtering and content filtering capabilities, allowing the business to control and manage access to websites and online content. This helps enforce acceptable usage policies, prevent access to malicious or inappropriate websites, and mitigate the risk of malware infections. VPN and Remote Access : NGFWs offer secure VPN (Virtual Private Network) capabilities, enabling remote workers to access the network from anywhere securely. This ensures that data transmission remains encrypted and protected, even when employees are connecting from external networks. Centralized Management and Reporting : NGFWs can provide centralized management consoles that allow IT support teams to configure, monitor, and manage security policies across the network. Additionally, advanced reporting features provide insights into network traffic, security events, and policy violations, aiding incident response and compliance monitoring. IP Subnets for Optimized Network Operations
5 The implementation of IP subnets plays a critical role in optimizing network operations and preventing network congestion. By organizing network devices into logical groups through subnetting, the business can efficiently utilize IP addresses, eliminating unused ones. This approach is particularly beneficial when integrating additional wireless and mobile devices into the network. Implementing IP subnets ensures streamlined communication and collaboration across various devices, enhancing productivity and performance. Additionally, IP subnets contribute to improved network management, enabling businesses to monitor and troubleshoot network issues more effectively. In addition to network optimization, IP subnets enhance network security by providing a natural barrier between network segments. Each subnet can be assigned to network security policies, access controls, and firewalls, effectively isolating and protecting sensitive data or critical systems. In a security breach, subnetting helps contain the impact and limits the potential for lateral movement within the network. Wi-Fi Technologies Wi-Fi technologies are essential for modernizing the business environment, enabling wireless connectivity for various devices, and facilitating seamless communication, collaboration, and productivity. It will provide enhanced mobility and flexibility. Mobility allows employees to access company resources, applications, and data from different locations, fostering flexibility and enabling agile workstyles. Wi-Fi enables the business to connect many devices to the network, including laptops, smartphones, tablets, and other smart devices. This connectivity facilitates seamless integration and communication between devices, allowing employees to use their preferred tools and technologies. Wi-Fi connectivity also supports Bring Your Own Device (BYOD), where employees can use their personal devices for work,
6 enhancing convenience and productivity. Wi-Fi technologies have advanced security features that help protect sensitive business data. Wi-Fi networks can utilize encryption protocols, such as WPA2 or WPA3, to ensure secure communication between devices and prevent unauthorized access. Additionally, network segmentation and access controls can be implemented to segregate different user groups and restrict access to specific resources, as in the IP subnets. Regular firmware updates and vulnerability assessments are essential to maintain network security and safeguard against threats. With the increased use of mobile devices, Mobile Device Management (MDM) can help secure and manage devices to enforce security policies, ensuring compliance and mitigating risks associated with mobile device use. Cloud-Based Platforms Cloud-based platforms offer a range of benefits that can significantly affect how the business operates. From increased accessibility to improved scalability, numerous advantages exist to using cloud-based platforms for storage and application servers that can be leveraged to enhance organizational efficiency and effectiveness. Cloud-Base Storage Moving from NAS iOmega P800M to a cloud-based platform offers numerous benefits that can transform how the organization manages and access its data. By adopting a cloud-based platform, the business can achieve enhanced accessibility, flexibility, and scalability. The advantage of a cloud-based platform is the enhanced accessibility it provides. Cloud storage allows business users to access data from anywhere using any device with a secure internet connection. This flexibility enables remote work, collaboration among distributed teams, and seamless access to files and resources, increasing productivity and efficiency. The scalability of a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 cloud-based platform allows virtually unlimited storage capacity compared to the limitations of physical hardware such as the NAS iOmega P800M. As data volumes grow, the business can quickly scale storage needs without investing in additional hardware or undergoing complex migration processes. This scalability ensures that organizations can adapt to changing data requirements and accommodate future growth seamlessly. Migrating to a cloud-based platform eliminates the need for maintaining and upgrading on-premises hardware like the NAS iOmega P800M. This shift from capital to operational expenditure allows businesses to reduce upfront costs, optimize IT budgets, and allocate resources more efficiently. Cloud storage also eliminates physical maintenance, reducing the time and effort spent on hardware management. Additionally, migrating cloud-based storage provide robust data security measures, including encryption, access controls, and regular backups. By ensuring the safety and integrity of stored data, potential risks such as hardware failure, data loss, and security breaches are prevented. Cloud service providers often have robust disaster recovery plans and redundancies to ensure high availability and data redundancy. Many cloud service providers adhere to stringent security and compliance standards, ensuring data is handled following industry regulations. It is essential for the cloud service provider with the business operating in a highly regulated sector as the provider can help meet regulatory requirements. Cloud-Based Computing Server Environment Migrating from an on-premises Windows Server to a cloud-based environment offers several advantages for businesses. Firstly, it eliminates the need for physical hardware, reducing costs associated with maintenance and upgrades. The shift from capital to operational
8 expenditure allows the business to reduce upfront costs, optimize IT budgets, and allocate resources more efficiently. Cloud service providers typically offer flexible pricing models, allowing the business to pay for the resources used. Additionally, the business can avoid costs associated with power consumption, cooling, and physical space required for on-premises data centers. Cloud-based platforms provide scalability, allowing the business to adjust resources to efficiently meet changing workloads and demands. The business can quickly provision additional server instances with cloud services to accommodate growth. This flexibility enables agility and responsiveness, ensuring the business has the necessary resources to meet changing needs without the delays and complexities of traditional hardware procurement. The cloud-based environment facilitates enhanced accessibility and remote access, enabling workers to access company data securely from anywhere. As with cloud-based storage, cloud-based application servers empower remote work and enable employees to collaborate and access critical data and applications from remote locations. It also ensures business continuity in case of disruptions or office closures, as employees can continue their work uninterrupted. Cloud platforms offer advanced security measures and disaster recovery options, ensuring the protection and availability of critical business data. Upgrading to a cloud-based environment reduces costs and enhances data security, accessibility, and operational efficiency. The business can benefit from robust security features such as data encryption, access controls, regular backups, and disaster recovery capabilities. Cloud providers typically have dedicated security teams and adhere to industry best practices, helping to mitigate risks and safeguard sensitive information through shared responsibility. With shared responsibility, cloud service providers handle the underlying server infrastructure's maintenance, updates, and security
9 patches. This ensures the business is always running on the latest software versions, benefiting from improved features and security enhancements. It alleviates the burden on in-house IT staff, having more time and resources to focus on strategic initiatives. There are factors to consider when migrating the on-premises Windows servers to a cloud-based platform, such as data migration, application compatibility, vendor selection, costs, and assessing the skills of existing IT staff to manage and maintain the new environment. Proactively considering and addressing these challenges, the business can mitigate risks and ensure a successful migration that maximizes the benefits of the cloud while minimizing disruptions to operations. Microsoft Office O365 and Email Migration Moving from an on-premises Exchange server to Microsoft Office 365 (O365) offers several significant benefits, particularly enhanced email security. O365 provides advanced security features that can significantly strengthen the email infrastructure and protect against evolving threats. Migrating to O365 includes robust email filtering and anti-malware capabilities. O365 employs advanced threat protection technologies like Exchange Online Protection (EOP) to scan incoming and outgoing emails for potential threats. This includes detecting and blocking spam, viruses, phishing attempts, and other forms of malicious content. By leveraging security capability and continuous updates from Microsoft, it can enhance defenses against email-based attacks and reduce the risk of security breaches and data loss. Another advantage is the integration of intelligent threat detection and prevention mechanisms within O365. It utilizes machine learning algorithms and behavioral analytics to identify suspicious email patterns and potential security risks. O365 also offers comprehensive
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 data loss prevention (DLP) capabilities to safeguard sensitive email data. This includes the ability to scan emails for specific types of sensitive data, such as social security numbers or credit card information, and apply appropriate actions, such as encryption or blocking the transmission of such data. Additionally, O365 enables the benefit of enhanced email encryption capabilities. With Transport Layer Security (TLS) encryption protocols and Secure/Multipurpose Internet Mail Extensions (S/MIME), O365 ensures that email communications are encrypted in transit, making it significantly more challenging for unauthorized individuals to intercept or access sensitive information. This helps protect confidential data from unauthorized disclosure. This is critical, especially for the R&D department, to protect intellectual property (IP) and sensitive research data from cyber-attack interception. O365 provides a centralized administration console for managing email security settings and policies. This simplifies configuring and enforcing security measures across the entire email infrastructure. With advanced threat protection, intelligent threat detection, data loss prevention, email encryption, and centralized administration, O365 provides a robust and comprehensive email security solution. By leveraging these capabilities, it can strengthen defenses against email-based threats, reduce the risk of data breaches, and ensure email communications' confidentiality, integrity, and availability. Desktop Computing Upgrading desktop computers and software is essential to improve performance and system security. Upgrading desktops to performance-designed systems with up-to-date operating systems can reduce vulnerabilities and improve overall system stability. Systems must run smoothly and efficiently without unexpected disruptions or downtime.
11 Deploying the latest software versions of Microsoft 365 Business Standard can also provide benefits. It is designed to provide protection against vulnerabilities with built-in virus protection, ensuring systems are secure and protected against potential threats. Additionally, it provides access to the latest features, which can improve productivity and efficiency across the organization. With enhanced collaboration capabilities, Microsoft 365 Business Standard can also increase productivity from any location. This software can help business units and teams stay connected across the five locations or when working remotely by providing access to shared files and documents and communication tools like chat and video conferencing and connecting to the ERP system or accessing cloud storage or cloud-based applications. Cloud-based Enterprise Resource Planning (ERP) System Migrating the on-premises ERP (Enterprise Resource Planning) system to SAP S/4 HANA, a cloud-based platform, can significantly benefit the business. SAP S/4 HANA offers advanced features and capabilities that can transform how the business manages operations and processes and make more informed decisions based on real-time insights. By migrating to SAP S/4 HANA, the ERP system becomes accessible across all business units and locations, eliminating data silos and promoting seamless collaboration. The cloud- based nature of SAP S/4 HANA enables users to access critical information and perform essential tasks from anywhere, anytime, using various devices. This increased accessibility facilitates better communication, improves productivity, and empowers employees to make data- driven decisions. SAP S/4 HANA leverages in-memory computing, which enables high-speed processing and analysis of vast amounts of data in real time. This capability provides instant
12 access to accurate and up-to-date information, allowing faster and more informed decision- making. With advanced automation and intelligent features that streamline and optimize business processes, the system integrates various modules, such as finance, sales, procurement, production, and supply chain management, enabling end-to-end visibility and seamless data flow. The business can achieve higher operational efficiency, reduced costs, and improved overall productivity by automating manual tasks, reducing paperwork, and eliminating redundant processes. As a cloud-based platform, SAP S/4 HANA provides scalability and flexibility to accommodate the changing needs and growth of the business. The system can scale based on demand, allowing it to quickly adjust resources and adapt to evolving market conditions. It also includes powerful analytics and reporting capabilities that enable the business to derive actionable insights from their data. The system offers pre-built analytics dashboards, customizable reports, and advanced data visualization tools, empowering users to analyze performance, identify trends, and track key metrics in real time. Finally, migrating to SAP S/4 HANA eliminates the need for maintaining and managing complex on-premises ERP infrastructure. The cloud-based nature of the platform shifts responsibility of hardware maintenance, system updates, and security to the cloud provider. This lessens the commitment of the IT department, frees up resources, and lowers operational costs.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
13 The disadvantages of upgrading the infrastructure or migrating to a cloud-based platform will incur significant costs for the initial implementation. Also, the current IT staff will need the necessary skills to support the new infrastructure. Protecting the business’s sensitive data is a major concern using outdated technologies. Without making IT infrastructure improvements International Plastics Inc. is vulnerable to cyber-attacks as the technology is no longer supported by the vendor and will not receive security updates. Challenges and Considerations There are suitable improvements that can be made to the current IT infrastructure. However, these improvements can have obstacles and expenses that must be considered. In particular, the initial implementation costs may require significant investment, including upgrades to hardware, licensing fees for new software, and training for IT staff to ensure they can use the new technologies effectively. Data security during migration is critical to protecting sensitive business information from unauthorized access or theft. Outdated technologies pose a challenge since vendors may no longer support them and are more vulnerable to security breaches. The organization must address these challenges and be prepared to allocate sufficient resources for training and support, partner with reputable cloud service providers to ensure data security and implement robust security measures to safeguard data at all times. With the recommendations of the proposed upgrades, management can leverage business intelligence (BI) to gain insights into network performance, security threats, cloud-based performance, and ERP to gather data and information across the business units using real-time analytics. Using BI can consolidate many data points to make better-informed business decisions to anticipate and adjust appropriately to shifts in the market to adjust production levels to meet market demands.
14 Conclusion With emerging technologies, upgrading IT infrastructure components and migrating to cloud-based platforms are critical for enhancing business performance. The benefits of upgrading from 100base-T to 1000base-T, migrating to cloud-based storage and virtual server environments, and implementing IP subnets include improved network performance, scalability, accessibility, security, and optimized communication and collaboration. Although these upgrades and migrations come with challenges and costs, they are necessary to ensure data security, flexibility, and operational efficiency. The organization can streamline operations by adopting these improvements and drive growth and success in the increasingly competitive business environment.
15 References Amazon Web Services. (2023). AWS VPN CloudHub . Retrieved from https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/aws-vpn- cloudhub.html Amazon Web Services. (2023). Shared Responsibility Model . Retrieved from AWS: https://aws.amazon.com/compliance/shared-responsibility-model/ Cisco Systems, Inc. (2023). Compare Industry Next-Generation Firewalls (NGFWs) . Retrieved from Cisco.com: https://www.cisco.com/c/m/en_hk/products/security/firewalls/competitive- comparison.html Cisco Systems, Inc. (2023, 02 13). Configure IP Addresses and Unique Subnets for New Users . Retrieved from Cisco.com: https://www.cisco.com/c/en/us/support/docs/ip/routing- information-protocol-rip/13788-3.html#anc5 Jyoti, P. (2022, 10 22). 5 Microsoft Exchange Benefits for Modern-Day Enterprises . Retrieved from NetCom Learning: https://www.netcomlearning.com/blogs/19/5-microsoft- exchange-benefits-for-modern-day-enterprises.html Microsoft. (2023, 04 24). Ways to migrate multiple email accounts to Microsoft 365 or Office 365 . Retrieved from Learn Microsoft: https://learn.microsoft.com/en-us/exchange/mailbox-migration/mailbox-migration SAP. (2022, June). Mapping Your Journey to SAP S/4HANA - A Practical Guide for Senior IT Leadership . Retrieved from SAP.com: https://www.sap.com/products/erp/s4hana-private- edition.html?pdf-asset=44b3ebd5-4b7d-0010-87a3-c30de2ffd8ff&page=6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
16