Keane Organization

15
Megan Nardini- Team leader Nicholas DeSandro Rasul S. Swiggett

Transcript of Keane Organization

Page 1: Keane Organization

Megan Nardini- Team leaderNicholas DeSandroRasul S. Swiggett

Page 2: Keane Organization

Keane is a company that believes in a positive approach to all business relationships. We want all employees to know that they will be held accountable for what they do and how they do it. We expect all employees to be direct with one another, confronting issues in a positive manner and to be cooperative with and respectful of each other. We encourage you to be proactive in your approach to your work here, looking for opportunities to create better products, efficiencies and customer service.

Page 3: Keane Organization

In 2005, Keane outgrew their location in Conshohocken, PA and moved to their current location in Wayne, more than doubling their floor space. The company had been in Conshohocken for a number of years and, while they enjoyed moderate growth there, there was never a need for a major overhaul of their network. Since moving to their new location, they have grown by over 40 employees and added over 75 new clients. In addition, in 2005 they acquired SAFE Risk Management Systems, LLC based in Baltimore, MD and The CapitaLink Group based in New York City.  This growth in employees, clients and locations has pushed their network to its capacity.

Based on Keane’s explosive growth in the last few years and their aggressive growth forecasts for the future, the company recognizes the immediate need to overhaul their current network so that it can handle current as well as future needs.

Page 4: Keane Organization

The computers, data, assets and network of Keane will be used by the employees of the company in an unlimited manner while performing the responsibilities of their position. While employees of Keane have access to the internet, all activities are monitored to protect the interests of Keane. The employees and users of the network will be able to access the internet, in limited amounts, for their own personal use. They will also be able to use the company’s email for not only businesses but for personal use as well. This email usage will be limited in scope and cannot include non-business related attachments. Employees and users will use their own good judgment to determine limited amounts. However, if there are any questions, they can seek guidance from their immediate supervisors.

Page 5: Keane Organization

Only company issued laptops will be used to connect to the network remotely. This will be done via a VPN. Security will be achieved through encryption and a token for authentication. The user will be disconnected after twenty (20) minutes of inactivity. Only one connection per user at a time will be allowed. Total connection time will not exceed sixteen hours in one twenty four hour time period. All VPN connections will be treated as in house network connections for the purpose of and subject to the security policy. Any and all vendors who will access the VPN will be treated as employees for the purpose of this Security Policy. All VPN passwords will be kept secure.

Page 6: Keane Organization

All VPN activity will be monitored. Any employee who uses the VPN in a manner that is not in keeping with this Security Policy, or in a manner that is in fact illegal, will lose all rights and privileges of the VPN and will be disciplined up to and including termination of job as well as prosecution if applicable. The network and the VPN are now secured with IDS, Intrusion Detection System. Any employee who intentionally surpasses or on any other way disables or attempts to disable the system will be held accountable for any negative effects. This includes making any restitution, being disciplined up to and including termination of the position and prosecution according to the law.

Page 7: Keane Organization

Proximity cards will be used to get into the Keane office.

All computers will have anti-virus programs that will be installed over the network, and will run every day at noon.

Page 8: Keane Organization

Firewalls are used in the Keane network to protect the network from any malicious intent as well as benign intent that nonetheless damages or hurts the network in any way. This policy will be adhered to by all of the employees and vendors of Keane.

All computers on the network have firewalls that come with the OS. These software firewalls will be used. There is also hardware firewalls located in front of the VPN Hub, in front of the email server, between the data server and the web server and in front of the proxy server.

Page 9: Keane Organization

Employees will not have access to any of the firewalls on the network. The firewall administrator, a member of the IT staff, as well as his/her back up will manage the firewalls, including patches and updates. The OS firewalls will generally have automatic updates. However, as these are not fail safe, the firewall administrator will manually check for updates for the internal firewalls on a weekly basis. The firewall administrator will also check for updates and patches for the hardware firewalls on a weekly basis.

Application traffic policy will be as follows: all inbound packets and connections will be blocked unless it has been specifically permitted. All outbound packets will be allowed to pass unless it has been specifically prohibited, such as adult entertainment sites, gambling, social networking etc.

Page 10: Keane Organization

Naming: Colors, example: Email server: Pink

Running Windows Server2003 Dell Blade servers

hot-swappable and they function for good purposes such as web hosting and cluster computing

Page 11: Keane Organization

Dell PCs with Windows XP Professional Microsoft Office 2003

Page 12: Keane Organization

Remote access policy that Keane will have in place will be a Citrix VPN connection.

Remote users will be able to access the network from anywhere as long as there is an Internet connection

VPN tunneling protocol will be under L2TP/IPSec and will be encrypted with the 168-bit Triple DES algorithm

IP addresses will be static IPs

Page 13: Keane Organization

VPN will be located on a router that will be located in the server room only people that will have VPN access will be the users

who go to different clients and work from home VPN will log out a user after 20 minutes of

inactivity All VPN activity will be monitored.

Page 14: Keane Organization
Page 15: Keane Organization

Have the network running in a timely manner Make sure that everyone’s e-mail account is

working Have all laptops for mobile users updated and have

VPN installed Test VPN connection Have all security software installed and updated Have all PCs updated with Microsoft updates Make sure network uptime is 99.95%