Академический Документы
Профессиональный Документы
Культура Документы
Information
Service Line Task Information Owner Acquirer
Checkpoint
IT Security Log Management Bhumesh Nainani Manddeep
IT Security Report Creation Bhumesh Nainani Manddeep
Palo Alto Bhumesh Nainani Manddeep
IT Security Log Management Bhumesh Nainani Manddeep
IT Security Report Creation Bhumesh Nainani Manddeep
F5
IT Security Log Management Bhumesh Nainani Manddeep
IT Security Report Creation Bhumesh Nainani Manddeep
Wan Optimizers
IT Security Log Management Bhumesh Nainani Manddeep
Proxy Solution
IT Security Log Management Bhumesh Nainani Manddeep
Wireless
IT Security Log Management Bhumesh Nainani Manddeep
IT Security Report Creation Bhumesh Nainani Manddeep
Cross skilling plan for IT Security
Information Information Tentative Start date Tentative End date KT Will Be Given By
Acquirer Acquirer
Checkpoint
Rule Implementation -
IT Security 1. Allow/Disallow URL/s
VPN creation -
IT Security 1. Simple VPN creation(Point to Point)
IT Security Troubleshooting
URL Filtering / Application Filtering -
IT Security 1. blocking/Allowing specific URL/Application
Palo Alto
Rule Implementation -
IT Security 1. Allow/Disallow URL/s
IT Security Troubleshooting
URL Filtering / Application Filtering -
IT Security 1. blocking/Allowing specific URL/Application
F5
Rule / Policy Implementation -
IT Security 1. Simple Load Balancing rule creation
IT Security Troubleshooting
Wan Optimizers
Rule / Policy Implementation -
IT Security 1. blocking/Allowing specific URL/Application
IT Security Report Creation
IT Security Troubleshooting
Proxy Solution
Rule / Policy Implementation -
IT Security 1. blocking/Allowing specific URL/Application
IT Security Report Creation
IT Security Troubleshooting
Wireless
IT Security Rule / Policy Implementation
IT Security Troubleshooting
Cross skilling plan for IT Security
Information Information
Information Owner Tentative Start date
Acquirer Acquirer
DONE
10/1/2015 Bhumesh Nainani
DONE
10/1/2015 Bhumesh Nainani
10/1/2015 Bhumesh Nainani DONE
DONE
10/1/2015 Bhumesh Nainani
DONE
10/1/2015 Bhumesh Nainani
10/1/2015 Bhumesh Nainani DONE
DONE
10/1/2015 Bhumesh Nainani
IT Security Checkpoint
Rule Implementation -
IT Security 1. Traffic redirection on other port
2. Traffic in and out on different port
IT Security Troubleshooting
URL Filtering / Application Filtering -
IT Security 1. Application filletring of specific URL or site
2. Custom application filltering
IT Security F5
Rule / Policy Implementation -
1. SSL offloading
IT Security 2. WAN accelaration
3. Complex Load balance rule creation
IT Security Troubleshooting
IT Security Wan Optimizers
Rule / Policy Implementation -
IT Security 1. Application filletring of specific URL or site
2. Custom application filltering
Information Information
Information Owner Tentative Start date
Acquirer Acquirer