0% found this document useful (0 votes)
114 views4 pages

IT Infrastructure: Submitted To: Submitted By: Muhammad Bilal Rafi Enrollment: 03-135171-003

Ubox Systems was hired to implement a cloud-based security solution for a global retail chain. The project involved [1] setting up security policies, [2] connecting servers to Active Directory, [3] building out the cloud environment, [4] testing the system, and [5] training users. The project was completed over 1.5 months and successfully handed over to the client's IT department.

Uploaded by

bilal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views4 pages

IT Infrastructure: Submitted To: Submitted By: Muhammad Bilal Rafi Enrollment: 03-135171-003

Ubox Systems was hired to implement a cloud-based security solution for a global retail chain. The project involved [1] setting up security policies, [2] connecting servers to Active Directory, [3] building out the cloud environment, [4] testing the system, and [5] training users. The project was completed over 1.5 months and successfully handed over to the client's IT department.

Uploaded by

bilal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

IT Infrastructure

Submitted to: MUHAMMAD ZUNNURAIN HUSSAIN


Submitted By: Muhammad Bilal Rafi

Enrollment: 03-135171-003
Case Study-2

Ubox Systems was selected to implement a cloud-based security solution for a global retail Chain. As
part of this project, Ubox Systems provided the engineering manpower to implementing a “Pinchpoint”
Cloud Web Security Gateway, including:

• Security policies setup


• Building of server connects to Active Directory
• Cloud environment buildout
• System testing
• User training
The project was completed over a period of 1.5 months and successfully handed over to client’s IT
department

Q: Write down the functional and no functional requirement in that case study

Functional Requirements:
Scanning & Filtering
Web Filtering
Anti-Phishing
Antivirus, Anti-malware and Malicious Browser Codes Protection (Flash, Silverlight, scripts).
The antimalware product must be different from McAfee (the Bank current antivirus solution)
Real-time Security Scanning
Real-Time Social Networking and Web 2.0 Security like Facebook, LinkedIn, and other Web 2.0
destinations

Classification
URL Database Filtering
Antivirus, Antimalware and Malicious Browser Codes
Advanced Real-time Content Classification
Real-Time Social Networking and Web 2.0 Content Classification

Application and User Aware


Application and Protocol Control
User Identification
Visibility of SSL Encrypted Traffic

Management
Central Management and Reporting for all Deployed Devices/Software
Web User Interface Required Role Based Administration
Easy to use General Setup Interface
Easy to use and Granular Policy Configuration & Customization
Advanced Reporting Required Forensics
Real-Time Session tracking
Granular Policies Required Quota & Time Scheduling in Policies

Deployment
Deployment in Transparent and Proxy Modes
Integrates to Active Directory
Integrates to Cisco ASA Firewalls & Cisco Network Devices Support Appliance, Virtual
Appliance, Software or Mixed Versions
The Bank will deploy SWG for its Field Offices Internet access gateway in UK or in Germany.
The Management and Reporting solution of the proposed solution should be able to manage
and provide reporting for the Field Offices SWG appliances

Evolutions
Evolution to a Mixed with SaaS Solution
Evolution to Unified Content Security (Email, DLP, Web)

Integrated solution
Integrated and all in one solution: all the required features in only one box

Local Support
Local Support and/or Local representation by providing a proposed plan for Post Warranty
Service Plan and Technical Support Plan including the proof that the Bidder will be able to
provide on-site support. The supplier and/or local agent shall provide support 24 hours, seven
days a week by phone and on-site interventions by operations and application specialists. For
critical and high-level severity problems, the supplier shall meet the following response time.

Other non-functional requirements:

The Non-functional Requirements make application effective and efficient to use.

Performance Requirements
 The system should perform all the actions correct and frequently.
 The system should give response within frequently time.
 The system should give response within a reasonable time.

Understandability

 The website should be easily understandable


 User will learn to use it easily without any hurdles.
 It’s easy to use for the next time.
 A reader can easily comprehend it.

Efficiency

 The system should be efficient.


 Easy to use for users.
 It is designed to achieve efficiency.
 The speed & quality will increment.

Security

 The system should be secure

Availability:

 The system should be available 24/7.


 Users can access it easily at anytime and use it to upload their MRI images to check
their results.
 The system should response within reasonable time.
 User could easily access it.

Maintainability

 The system should be maintained.


 The system should be configured easily.

You might also like