preview

Adopting Virtualization to Handle Configuration Problems of Aircraft Solutions

Decent Essays

One big recommendation to handle the configuration problem of Aircarft Solutions’s firewall and hardware architecture would be to adopt virtualization. “Virtualization is the single most effective way to reduce IT expenses while boosting efficiency and agility.” Virtualization is the method of forming a virtual computer system instead of obtaining physical IT hardware. Because of the rapid changes and developments in the IT world, it is suggested that AS should gradually adopt the virtualization of its systems. The advantages of virtualization are diverse. By adopting virtualization, AS will be able to separate its physical layer from the virtual machines. This will make sure that the damage and threats by malicious attacks are minimal. …show more content…

Impact on Business Processes
Impact will be clearly seen one AS implements the virtualization and IT related hardware costs will be reduced and AS will be able to focus on the business needs. When we reduce the hardware cost it means that it directly will affect the price of maintenance like cooling, actual physical storage and powering the devices. There can be advance upfront cost due to Aircraft solution might incur for the implementation. The cost for that would be roughly about $80,000 for new hardware. This though would be a short term cost but would have many long term advantages as it will help the company withstand the pressures of a market that is hyper competitive.
Recommended Solution – Policy
It is crucial to reexamine the security policy of Aircraft Solutions in order to safeguard the protection of IT systems. In today’s world where technology is changing every day and malicious attempts are being developed and improvised rapidly, it is unreasonable to have a long gap between policy revisions. Therefore it is recommended that IT administrators and managers update the policies twice a year.
The policy will need to certify the following issues:-
• Hardware – documentation of all IP addresses
• Vulnerability – DOS, hacking, open ports, scope of access, data loss and network scans
• Traffic – Confirm that all incoming and outgoing traffic is

Get Access