ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 06 Jun 2017 My Price 11.00

Case Study #4: Technology & Product Review

Case Scenario:

A client company has asked you to research and recommend a product which will allow them to upgrade or replace their first generation Security Information and Event Management (SIEM) product with a unified solution that combines real-time monitoring, threat analytics, and event management / reporting. The company currently relies upon host-based anti-virus applications, host-based firewalls, and firewall capabilities provided by the premises router to provide protection for its internal networks, servers, and workstations.

 

Case Study #4: Technology & Product Review for an SIEM ReplacementCase Scenario:A client company has asked you toresearch and recommend a product which will allow themto upgrade or replace their frst generaTon Security InFormaTon and Event Management (SIEM)product with a unifed soluTon that combines real-Tme monitoring, threat analyTcs, and eventmanagement / reporTng. The company currently relies upon host-based an±-virus applica±ons, host-based frewalls, and frewall capabili±es provided by the premises router to provide protec±on For itsinternal networks, servers, and worksta±ons.The IT Manager set up this security architecture and believes that it is su²cient For the frm’sneeds. But, the frm’s insurance company has threatened a signifcant increase in its business insurancepremiums iF the company doesn’t implement stronger protec±on against network-based threats. Theinsurance company’s risk assessment also iden±fed email a³achments and uncontrolled web browsingas addi±onal high risk areas, which need to be addressed and mi±gated. The client wants a product thatis comprehensive but doesn’t require a great deal oF training beFore it can be used.A quick Internetsearch revealed two product categories that ft this descrip±on:Security InForma±on and Event Management (SIEM)Unifed Threat Management (UTM)Research:1.Readings on SIEM and UTM products.2.Choose one oF theSIEM or UTMproducts From the Gartner Magic Quadrant analyses.3.Research your chosen product using the vendor’s website and product inForma±on brochures.(Vendors For highly rated products will provide a copy oF Gartner’s most recent Magic Quadrantreport on their websites but, registra±on is required.)4.´ind three or more addi±onal sources which provide reviews For (a) your chosen product or (b)general inForma±on about SIEM / UTM technologies and solu±ons.Write:Write a two to three page summary oF your research. At a minimum, your summary mustinclude the Following:1.An introduc±on or overview For the security technology category (SIEM or UTM, not both).2.A review oF the Features, capabili±es, and defciencies For your selected vendor and product3.Discussion oF how the selected product could be used by your client to support itscybersecurity objec±ves by reducing risk, increasing resistance to threats/a³acks, decreasingvulnerabili±es, etc.4.Address security issues using standard terms (e.g. 5 Pillars IA, 5 Pillars InForma±on Security).See the resources listed under Course Resources > Cybersecurity Concepts Review Fordefni±ons and terminology.

Attachments:

Answers

(11)
Status NEW Posted 06 Jun 2017 07:06 AM My Price 11.00

-----------

Attachments

file 1496734734-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)