?
Solved

Two companies sharing data line

Posted on 2011-03-14
2
Medium Priority
?
566 Views
Last Modified: 2012-08-13
Hi Experts,

I have a client  moving into a new office. They will be sub-letting part of their office to another company. Both companies already have servers. Both companies must share a data line and a printer, but must otherwise be kept completely separate, so that neither’s data is accessible from the other.

Please advise the best solution.
0
Comment
Question by:Impex
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 7

Accepted Solution

by:
takenoco earned 1000 total points
ID: 35128707
If their ISP provide more than one IP, you can totally separate the network by setting up a router to each company.

If their ISP only give them one IP, you don't have much choice.  I believe the most secure way is to set up a Active Directory for each company and make sure nothing is share by "Everyone"... the lowest share level you want to give out is "domain users"

0
 
LVL 7

Expert Comment

by:takenoco
ID: 35128769
forgot to say the printer can then be added to the Domain controller to share to all users... (assuming it's a network printer)
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question