Security - planning your deployment architecture

Prior to procuring and implementing the hardware and software that make up Sterling™ Order Management System Software, you need to plan your deployment architecture.

To plan your deployment architecture, complete the following tasks:

  • Conduct an analysis of the current security infrastructure in your organization.
  • Conduct an analysis of authentication and authorization mechanisms in your organization to identify the steps needed to incorporate them into Sterling Order Management System Software.
  • Conduct an analysis of your data encryption mechanisms for deploying Sterling Order Management System Software over the internet.
  • Conduct an analysis of your organization's network topology required to deploy Sterling Order Management System Software.

Completing these tasks enables you to:

  • Estimate your server requirements.
  • List the major security software and hardware needed to implement Sterling Order Management System Software.