Security - planning your deployment architecture
Prior to procuring and implementing the hardware and software that make up Sterling™ Order Management System Software, you need to plan your deployment architecture.
To plan your deployment architecture, complete the following tasks:
- Conduct an analysis of the current security infrastructure in your organization.
- Conduct an analysis of authentication and authorization mechanisms in your organization to identify the steps needed to incorporate them into Sterling Order Management System Software.
- Conduct an analysis of your data encryption mechanisms for deploying Sterling Order Management System Software over the internet.
- Conduct an analysis of your organization's network topology required to deploy Sterling Order Management System Software.
Completing these tasks enables you to:
- Estimate your server requirements.
- List the major security software and hardware needed to implement Sterling Order Management System Software.