{"id":905,"date":"2019-11-19T07:38:33","date_gmt":"2019-11-19T07:38:33","guid":{"rendered":"https:\/\/os-br.com\/?page_id=905"},"modified":"2023-05-30T15:19:54","modified_gmt":"2023-05-30T15:19:54","slug":"network-operations-center","status":"publish","type":"page","link":"https:\/\/os-br.com\/pt\/network-operations-center\/","title":{"rendered":"Centro de opera\u00e7\u00f5es de rede"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ededed&#8221; background_image=&#8221;https:\/\/os-br.com\/wp-content\/uploads\/2019\/11\/Seamless-NOC.jpg&#8221; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;100px||100px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; header_font_size=&#8221;60px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"hh\" style=\"font-size: 50px;\"><\/h2>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;20px||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;0px||20px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||0px|&#8221; custom_padding=&#8221;||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||0px|&#8221; custom_padding=&#8221;||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Optimus Network Operations Center (\u201cNOC\u201d)<\/h2>\n<p>The Optimus NOC enables our clients to reduce costs and complexity typically associated with network security while improving security posture and easing the compliance burden. We leverage our security expertise to empower a client\u2019s\u00a0\u00a0IT\u00a0\u00a0department, allowing clients to focus on core business activities without distraction.<\/p>\n<p>Optimus\u00a0 will keep your business up and running at optimum capacity,\u00a0\u00a0continuously,\u00a0\u00a0efficiently, and always up-to-date.\u00a0 We will manage our client\u2019s- selected security devices, ensuring appropriate configuration and the ongoing identification and patching of vulnerabilities \u2013\u00a0\u00a0all while staying up-to-date with relevant software upgrades and backups.<\/p>\n<p><strong>NOC<\/strong><strong>\u00a0\u00a0<\/strong><strong>Services<\/strong><\/p>\n<p>The Optimus NOC will improve the performance, availability, resiliency, and visibility of its client network and IT services. The NOC facilitates a comprehensive line of data collection and monitoring tools that can be used alone or as a part of one of our managed services packages. These tools allow for analysis, availability monitoring, and MACD services, as well as incident, vendor, alert, problem and change management.<\/p>\n<p>Optimus NOC\u00a0\u00a0services\u00a0\u00a0include\u00a0\u00a0a\u00a0\u00a0wide\u00a0\u00a0range\u00a0\u00a0of\u00a0\u00a0offerings:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;0px|||&#8221; custom_padding=&#8221;0px|||&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Solutions Architects<\/li>\n<li>Project Managers<\/li>\n<li>VMware, Cisco,\u00a0\u00a0Arista,\u00a0\u00a0Citrix,\u00a0\u00a0F5,\u00a0\u00a0Palo\u00a0\u00a0Alto<\/li>\n<li>Storage as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Printing as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>StagingEquipment\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Video as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Audio-\u00a0\u00a0Video\u00a0\u00a0Support<\/li>\n<li>WANas\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Digital Signage<\/li>\n<li>VDI\u2013\u00a0\u00a0Virtual\u00a0\u00a0Desktops<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Phone Systems\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Video Conferencing<\/li>\n<li>Physical Security<\/li>\n<li>Network Security<\/li>\n<li>Network Management<\/li>\n<li>Desktop Support<\/li>\n<li>Microsoft Management<\/li>\n<li>Backup\u00a0\u00a0Storage\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>ResearchData<\/li>\n<li>Contract Management<\/li>\n<li>Load Balancing<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>DoD\u00a0\u00a0(Department\u00a0\u00a0of\u00a0\u00a0Defense)\u00a0\u00a0Secure\u00a0\u00a0Enclave<\/strong><\/p>\n<p>The\u00a0\u00a0United\u00a0\u00a0States Department of Defense\u00a0\u00a0(DoD) is implementing new information security standards for research contracted to third parties.\u00a0\u00a0As\u00a0\u00a0described\u00a0\u00a0in\u00a0\u00a0the\u00a0\u00a0Defense\u00a0Federal\u00a0\u00a0Acquisition\u00a0\u00a0Regulation\u00a0\u00a0Supplement\u00a0\u00a0(DFARS),\u00a0\u00a0research\u00a0\u00a0utilizing or developing Controlled Defense\u00a0\u00a0Information\u00a0\u00a0(CDI) is subject to the standards outlined by the\u00a0\u00a0National Institute of Standards and Technology\u00a0\u00a0Special\u00a0\u00a0Publication\u00a0\u00a0800-171\u00a0\u00a0(NIST\u00a0\u00a0SP\u00a0\u00a0800-171).<\/p>\n<p>Optimus\u00a0 has the expertise to comply with these standards for contracts with the DFARS\u00a0\u00a0standards. \u00a0We consult with these organizations to ensure compliance and prepare for likely, even broader regulations\u00a0 \u00a0regarding the safeguarding of\u00a0\u00a0Controlled\u00a0\u00a0Unclassified\u00a0\u00a0Information\u00a0\u00a0(CUI).<\/p>\n<p>Optimus is\u00a0\u00a0one of the only providers able to implement a Secure\u00a0\u00a0Computing Enclave that meets the security standards established by the\u00a0\u00a0Research\u00a0\u00a0Security\u00a0\u00a0Office\u00a0\u00a0(RSO).<\/p>\n<p>A\u00a0\u00a0Secure\u00a0\u00a0Computing\u00a0\u00a0Enclave\u00a0\u00a0includes\u00a0\u00a0the\u00a0\u00a0following\u00a0\u00a0core\u00a0\u00a0design\u00a0\u00a0principles:<\/p>\n<ul>\n<li><strong>Security<\/strong>:\u00a0\u00a0SCE traffic should be segmented and secured to safeguard information related to federal research according to government standards.<\/li>\n<li><strong>Agility<\/strong>:\u00a0\u00a0The\u00a0\u00a0SCE architecture should be agile enough to adapt\u00a0\u00a0to the fluid nature of changing organizational\u00a0\u00a0and regulatory requirements.<\/li>\n<li><strong>Performance<\/strong>: Computing resources should be appropriate for researcher requirements and add additional functionality if possible,\u00a0\u00a0while still being operable by minimal staff.<\/li>\n<li><strong>Availability<\/strong>: Computing resources should be selected and maintained in a manner that will create high\u00a0\u00a0levels of availability to\u00a0\u00a0better assist researchers in conducting their work.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||0px|&#8221; custom_padding=&#8221;||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>NaaS\u00a0\u00a0(Networking\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service)<\/strong><\/p>\n<p>Optimus also offers Networking as a Service\u00a0\u00a0(Naas), which affords companies greater flexibility and even performance gains in their network infrastructure.\u00a0 NaaS provides a\u00a0\u00a0solution for companies seeking to operate and managing their networks and run\u00a0\u00a0IT\u00a0\u00a0more efficiently through an on-demand provisioning model.<\/p>\n<p>With our on-demand purchasing, companies can be more cost-conscious and pay only for the networking services they need.\u00a0\u00a0Optimus&#8217;s NaaS can also\u00a0\u00a0help companies that want greater flexibility in provisioning without\u00a0\u00a0having\u00a0\u00a0to rearchitect networks or\u00a0\u00a0redo contracts from the ground up.\u00a0 NaaS offers Return on Investment\u00a0\u00a0(\u201cROI\u201d),\u00a0\u00a0enabling clients to trade Capex for Opex and refocus personnel\u2019s time and effort on other\u00a0\u00a0priorities.<\/p>\n<p>As well, Optimus offers additional tools that enable proof of compliance and standards performance to secure\u00a0\u00a0a client\u2019s business and its data.\u00a0\u00a0The\u00a0\u00a0following\u00a0\u00a0is\u00a0\u00a0an\u00a0\u00a0overview\u00a0\u00a0of\u00a0\u00a0the\u00a0\u00a0standards applicable\u00a0\u00a0to\u00a0\u00a0its\u00a0\u00a0NOC:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;0px|||&#8221; custom_padding=&#8221;0px|||&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>VDI\u00a0\u00a0\u2013\u00a0\u00a0Virtual\u00a0\u00a0Desktops<\/li>\n<li>Phone\u00a0\u00a0Systems\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Service\u00a0\u00a0TAMU\u2019s\u00a0\u00a0Entire\u00a0\u00a0System<\/li>\n<li>Video\u00a0\u00a0Conferencing<\/li>\n<li>Physical\u00a0\u00a0Security<\/li>\n<li>Network\u00a0\u00a0Security<\/li>\n<li>Network\u00a0\u00a0Management<\/li>\n<li>Desktop\u00a0\u00a0Support<\/li>\n<li>Microsoft\u00a0\u00a0Management<\/li>\n<li>Research\u00a0\u00a0Data<\/li>\n<li>Contract\u00a0\u00a0Management<\/li>\n<li>Load\u00a0\u00a0Balancing<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li>Solutions\u00a0\u00a0Architects<\/li>\n<li>Project\u00a0\u00a0Managers<\/li>\n<li>VMware,\u00a0\u00a0Cisco,\u00a0\u00a0Arista,\u00a0\u00a0Citrix,\u00a0 F5,\u00a0\u00a0Palo\u00a0\u00a0Alto<\/li>\n<li>\u00a0Storage\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(SaaS)<\/li>\n<li>Printing\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(PaaS)<\/li>\n<li>Staging\u00a0\u00a0Equipment\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Video\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(VaaS)<\/li>\n<li>Video\u00a0\u00a0Support<\/li>\n<li>AV\u00a0\u00a0Support<\/li>\n<li>WAN\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li>\n<li>Digital\u00a0\u00a0Signage<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_color=&#8221;#002041&#8243; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.17.6&#8243; background_layout=&#8221;dark&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 style=\"text-align: center;\">For More Information on Optimus Network Operations Center<\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;mailto:sam@sas-us.com&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||20px|&#8221; z_index_tablet=&#8221;500&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Optimus Network Operations Center (\u201cNOC\u201d) The Optimus NOC enables our clients to reduce costs and complexity typically associated with network security while improving security posture and easing the compliance burden. We leverage our security expertise to empower a client\u2019s\u00a0\u00a0IT\u00a0\u00a0department, allowing clients to focus on core business activities without distraction. Optimus\u00a0 will keep your business up [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h2><strong>Seamless<\/strong><strong>\u00a0\u00a0<\/strong><strong>Network Operations Center (\u201cNOC\u201d)<\/strong><\/h2><p>The SeamlessNOC enables our clientrs to reduce costs and complexity typically associated with network security while improving security posture and easing the compliance burden.<br \/>We leverage our security expertise to empower a client\u2019s\u00a0\u00a0IT\u00a0\u00a0department, allowing clients to focus on core business activities without distraction.<\/p><p>Seamless\u00a0\u00a0will keep your business up and running at optimum capacity,\u00a0\u00a0continuously,\u00a0\u00a0efficiently, and always up-to-date.\u00a0 We will manage our client\u2019s- selected security devices, ensuring appropriate configuration and the ongoing identification and patching of vulnerabilities \u2013\u00a0\u00a0all while staying up-to-date with relevant software upgrades and backups.<\/p><p><strong>NOC<\/strong><strong>\u00a0\u00a0<\/strong><strong>Services<\/strong><\/p><p>The Seamless NOC will improve the performance,\u00a0\u00a0availability,\u00a0\u00a0resiliency, and visibility of\u00a0\u00a0its client network and\u00a0\u00a0IT services.\u00a0\u00a0The\u00a0\u00a0NOC\u00a0\u00a0facilitates\u00a0\u00a0a comprehensive line of data collection and monitoring tools that can be used alone or as a part of one of our managed services packages.\u00a0 These tools allow for analysis, availability monitoring,\u00a0\u00a0and\u00a0\u00a0MACD services, as well as incident,\u00a0\u00a0vendor,\u00a0\u00a0alert, problem and change management.<\/p><p>Seamless NOC\u00a0\u00a0services\u00a0\u00a0include\u00a0\u00a0a\u00a0\u00a0wide\u00a0\u00a0range\u00a0\u00a0of\u00a0\u00a0offerings:<\/p><ul><li>SolutionsArchitects<\/li><li>Project Managers<\/li><li>VMware, Cisco,\u00a0\u00a0Arista,\u00a0\u00a0Citrix,\u00a0\u00a0F5,\u00a0\u00a0Palo\u00a0\u00a0Alto<\/li><li>Storage as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Printing as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>StagingEquipment\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Video as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Audio-\u00a0\u00a0Video\u00a0\u00a0Support<\/li><li>WANas\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Digital Signage<\/li><li>VDI\u2013\u00a0\u00a0Virtual\u00a0\u00a0Desktops<\/li><li>Phone Systems\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>VideoConferencing<\/li><li>Physical Security<\/li><li>Network Security<\/li><li>Network Management<\/li><li>Desktop Support<\/li><li>Microsoft Management<\/li><li>Backup\u00a0\u00a0Storage\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>ResearchData<\/li><li>Contract Management<\/li><li>LoadBalancing<\/li><\/ul><p><strong>DoD\u00a0\u00a0(Department\u00a0\u00a0of\u00a0\u00a0Defense)\u00a0\u00a0Secure\u00a0\u00a0Enclave<\/strong><\/p><p>The\u00a0\u00a0United\u00a0\u00a0States Department of Defense\u00a0\u00a0(DoD) is implementing new information security standards for research contracted to third parties,\u00a0\u00a0such as the Texas\u00a0\u00a0A&M\u00a0\u00a0University\u00a0\u00a0System.\u00a0\u00a0As\u00a0\u00a0described\u00a0\u00a0in\u00a0\u00a0the\u00a0\u00a0Defense<\/p><p>Federal\u00a0\u00a0Acquisition\u00a0\u00a0Regulation\u00a0\u00a0Supplement\u00a0\u00a0(DFARS),\u00a0\u00a0research\u00a0\u00a0utilizing or developing Controlled Defense\u00a0\u00a0Information\u00a0\u00a0(CDI) is subject to the standards outlined by the\u00a0\u00a0National Institute of Standards and Technology\u00a0\u00a0Special\u00a0\u00a0Publication\u00a0\u00a0800-171\u00a0\u00a0(NIST\u00a0\u00a0SP\u00a0\u00a0800-171).<\/p><p>Seamless\u00a0\u00a0has the expertise to comply with these standards for contracts with the DFARS\u00a0\u00a0standards.\u00a0\u00a0RCDRC<br \/>will consult with these organizations to ensure compliance and prepare for likely, even broader regulations\u00a0 \u00a0regarding the safeguarding of\u00a0\u00a0Controlled\u00a0\u00a0Unclassified\u00a0\u00a0Information\u00a0\u00a0(CUI).<\/p><p>Seamless is\u00a0\u00a0one of the only providers able to implement a Secure\u00a0\u00a0Computing Enclave that meets the security standards established by the\u00a0\u00a0Research\u00a0\u00a0Security\u00a0\u00a0Office\u00a0\u00a0(RSO).<\/p><p>A\u00a0\u00a0Secure\u00a0\u00a0Computing\u00a0\u00a0Enclave\u00a0\u00a0includes\u00a0\u00a0the\u00a0\u00a0following\u00a0\u00a0core\u00a0\u00a0design\u00a0\u00a0principles:<\/p><ul><li>Security:\u00a0\u00a0SCE traffic should be segmented and secured to safeguard information related to federal research according to government standards.<\/li><\/ul><ul><li>Agility:\u00a0\u00a0The\u00a0\u00a0SCE architecture should be agile enough to adapt\u00a0\u00a0to the fluid nature of changing organizational\u00a0\u00a0and regulatory requirements.<\/li><\/ul><ul><li>Performance: Computing resources should be appropriate for researcher requirements and add additional functionality if possible,\u00a0\u00a0while still being operable by minimal staff.<\/li><\/ul><ul><li>Availability: Computing resources should be selected and maintained in a manner that will create high\u00a0\u00a0levels of availability to\u00a0\u00a0better assist researchers in conducting their work.<\/li><\/ul><p><strong>NaaS\u00a0\u00a0(Networking\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service)<\/strong><\/p><p>Seamless also offers Networking as a Service\u00a0\u00a0(Naas), which affords companies greater flexibility and even performance gains in their network infrastructure.\u00a0 NaaS provides a\u00a0\u00a0solution for companies seeking to operate and managing\u00a0their networks and run\u00a0\u00a0IT\u00a0\u00a0more efficiently through an on-demand provisioning model.<\/p><p>With our on-demand purchasing, companies can be more cost-conscious and pay only for the networking services they need.\u00a0\u00a0Seamless\u2019s NaaS can also\u00a0\u00a0help companies that want greater flexibility in provisioning without\u00a0\u00a0having\u00a0\u00a0to rearchitect networks or\u00a0\u00a0redo contracts from the ground up.\u00a0 NaaS offers Return on Investment\u00a0\u00a0(\u201cROI\u201d),\u00a0\u00a0enabling clients to trade Capex for Opex and refocus personnel\u2019s time and effort on other\u00a0\u00a0priorities.<\/p><p>As well, Seamless offers additional tools that enable proof of compliance and standards performance to secure\u00a0\u00a0a client\u2019s business and its data.\u00a0\u00a0The\u00a0\u00a0following\u00a0\u00a0is\u00a0\u00a0an\u00a0\u00a0overview\u00a0\u00a0of\u00a0\u00a0the\u00a0\u00a0standards applicable\u00a0\u00a0to\u00a0\u00a0its\u00a0\u00a0NOC:<\/p><ul><li>VDI\u00a0\u00a0\u2013\u00a0\u00a0Virtual\u00a0\u00a0Desktops<\/li><li>Phone\u00a0\u00a0Systems\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Service\u00a0\u00a0TAMU\u2019s\u00a0\u00a0Entire\u00a0\u00a0System<\/li><li>Video\u00a0\u00a0Conferencing<\/li><li>Physical\u00a0\u00a0Security<\/li><li>Network\u00a0\u00a0Security<\/li><li>Network\u00a0\u00a0Management<\/li><li>Desktop\u00a0\u00a0Support<\/li><li>Microsoft\u00a0\u00a0Management<\/li><li>Research\u00a0\u00a0Data<\/li><li>Contract\u00a0\u00a0Management<\/li><li>Load\u00a0\u00a0Balancing<\/li><li>Solutions\u00a0\u00a0Architects<\/li><li>Project\u00a0\u00a0Managers<\/li><li>VMware,\u00a0\u00a0Cisco,\u00a0\u00a0Arista,\u00a0\u00a0Citrix,\u00a0 F5,\u00a0\u00a0Palo\u00a0\u00a0Alto<\/li><li>\u00a0Storage\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(SaaS)<\/li><li>Printing\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(PaaS)<\/li><li>Staging\u00a0\u00a0Equipment\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Video\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service\u00a0\u00a0(VaaS)<\/li><li>Video\u00a0\u00a0Support<\/li><li>AV\u00a0\u00a0Support<\/li><li>WAN\u00a0\u00a0as\u00a0\u00a0a\u00a0\u00a0Service<\/li><li>Digital\u00a0\u00a0Signage<\/li><\/ul>","_et_gb_content_width":"","footnotes":""},"class_list":["post-905","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":24,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/905\/revisions"}],"predecessor-version":[{"id":2186,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/905\/revisions\/2186"}],"wp:attachment":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/media?parent=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}