Page 7 - IT_Strategic_Plan_booklet6_revised_cover_FINAL
P. 7

Call to Action

The Citadel operates in an increasingly complex environment where it needs access to
information that will enable it to thrive. This information is provided through various IT systems
that must be accessible while also comply with numerous regulations and secured from cyber
criminals. Requirements from HIPAA, FERPA, PCI, and others create an environment where
access to data must be controlled and measures put in place to enforce those controls. At the
same time, users are becoming more mobile and require access from devices and systems that
are not managed by the college. These changes in user behaviors and the persistent cyber
threat require a disciplined approach to managing IT. The college must evaluate how all of
the IT components work together to support
the college’s strategic mission of promoting
leadership excellence and academic distinction.
With proper governance, IT will align with
the mission and priorities of the institution to
enable success.

As mentioned earlier, an assessment of
the technology infrastructure identified
foundational elements that need to be improved
to support the existing systems as well as
allowing for future enhancements. The diagram
to the right depicts the key components of
a technology architecture and how each
component supports the elements above it.
As the diagram shows, cabling, routing and
switching are the foundation for all IT services.
Without a strong foundation, advancements in
higher level components will be limited and
investments will be inefficient. As you move
up the diagram, the compute environment is the next component that should be optimized.
Typically, this includes virtualization of the server infrastructure to leverage efficiencies in power
consumption, CPU and memory utilization. Storage is typically a combination


ITS Strategic Plan
   2   3   4   5   6   7   8   9   10   11   12