Infrastructure Compliance

CCO’s Infrastructure Compliance technology practice area helps organizations with topics ranging from identity management, to single sign-on, provisioning & deprovisioning of employees, security policies, high availability & disaster recovery, content retention policies, eDiscovery, and the like.  Effectively the areas of an organization that controls the onboarding and access by employees to information, the middle part of operations of keeping systems secure, online, and protected, and the tailend of operations of making sure an employee is properly deprovisioned when they are terminated or leave the organization.  And not just real time access to network resources, but the need to terminate access to protected data files that the user may have downloaded and saved to a local hard drive of their home system, tablet, or mobile phone.  Infrastructure compliance works closely with enterprise content management and endpoint governance ensuring that data “expires” and is not accessible the minute the employee’s access is terminated.

The Infrastructure Compliance practice provides business assistance in the following areas:

Identity Management – Allow for provisioning and deprovisioning of accounts across multiple disparate directories and provide for cross-platform authentication options.

Business Compliance – Allowing organizations to comply with governmental and industry regulations and to prevent data leakage.

Business Continuity – Ensuring a resumption of business processing in the event of localized or regionalized disaster

Business Data Processing – Providing for a scalable framework for storing, processing, and viewing business data and intellectual property.

 

The Infrastructure Compliance practice assists organizations choose, design, implement, migrate, integrate, and support a variety of products and technologies (solutions that are installed inhouse and on-premise as well as solutions that are hosted in the cloud).  Some of the technologies and solutions include:

Identity/Authentication (Forefront Identity Manager, Ping Identity, Hitachi ID Identity Manager, Oracle Identity Manager, Forefront Unified Access Gateway)

Data Protection (SQL Server 2012 AlwaysOn Availability Groups, SQL Server 2010 Failover Cluster Instances, Hyper-V Live Migration / Replica, VMware HA/DRS, Forefront Threat Management Gateway)

Data Processing (SQL Server 2012 Database Services, SQL Server 2012 Analysis Services, SQL Server 2010 Data Warehousing, SQL Azure)

Data Compliance and Leak Prevention (Active Directory Rights Management Services, Active Directory Certificate Services, Gigatrust Enterprise Rights Management)