18
InformationGraphics .Biz Case Study : FOXt.

InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Embed Size (px)

Citation preview

Page 1: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

InformationGraphics.Biz

Case Study : FOXt.

Page 2: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

ChallengeThe

Create a graphic that explains an abstract software

concept for FOXt’s security vulnerabilities solution.

Page 3: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

“Here’s what FOXt’s marketing department developed.”

“We need Informationgraphics.biz to clean this up and clarify our message!”

IDM

and

Dire

ctor

ies

Password Vaulting

SSO

Sudo

PowerShell

ADBridge

SSH Mgmt

Privileged User End UserAccess Management

Page 4: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

And please include:

IDMLAD/LDAP

System AdminsEnd Users

Data CentersSAP

OracleLegacy Apps

Unix Linux Windows

Place in the cloud

etc…

Page 5: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

After a few phone calls, emails.We came up with a concept

which was put on paper.

A simple sketch lead to the development and placement of the art elements.

A few tweaks and the initial graphic came to life, followed by a “few” editorial

revisions…

Page 6: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Initial sketch

Version 1

Modify “End Users” so we see people working in a building.

Center Datacenter.Remove “Cloud” from Database B.

Use same treatment as Database A.

Make AD/LDAP largerAnd add label.

Make connecting lines grey.

Create 2 new users.One at the airport andOne in a park.

Page 7: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Version 2

Change format of IDM and combine with Directories.

Remove AD/LDAP.

Move System Administrators.

Remove people and expand building.

We’d like to see the Datacenters as buildings.

Page 8: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Version 3

Page 9: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

We Love It!BUT

We reviewed with the team and we’d like to make a few “slight” changes.

Re-design IDML to a vertical format Remove AD/LAP Add “Access Management” module Change System Administrators to reflect a building with banks of

computers Change End Users to be a large building with many floors which

include:

And here they are:

Accounting HR Inventory Risk / Audit Sales Etc…

Page 10: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Oh YeahI forgotOne more thing…

Could you remove the connecting lines from the illustration and replace with 2 arrows?

No Problem!Here ya go!

Page 11: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Very nice!!

Now

If you could… please

1) Place on a US Map.2) Create a satellite office located in Miami.3) Remove the arrows and replace with lines.4) Place Data Centers in Denver and Dallas.5) Place Access Management in Salt Lake City.6) IDM & Directories should be located in San

Francisco.

No Problem!

Page 12: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

One more thing…

That’s IT!THANK YOU!

Can you place this concept in a global setting?

Of course…

Page 13: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities
Page 14: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

This information / business graphic was used in print, presentation and web.

Page 15: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Empower your sales and marketing teams with effective visual communication tools!

Information and business graphics save time, increase efficiency, and improve communication.

InformationGraphics.Biz

Page 16: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Informationgraphics.bizFor more information please visit

www.informationgraphics.bizEmail:[email protected]

Phone: 831-252-6008

Page 17: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities

Let me help you tell your

story.

Thank you for your time!

Call me @ 832.252.6008

Page 18: InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities