Reference no: EM131812525
Assignment
Case Study: Technology & Product Review for Endpoint Protection Solutions
Case Scenario:
Sifers-Grayson(the "client") hasrequested that your company research and recommend an Endpoint Protection Platform, which will provide endpoint protection for the Apple MacBook laptop computers used by some of its employees. The MacBooks arebring your own device (BYOD) computers which some employees use to access company networks and servers while teleworking or working remotely (e.g. at the test range). The company has decided that, for now, it will continue to allow these devices on its networks but, an approved Endpoint Protection Platform must be used to manage the security of these devices.
The client wants an Endpoint Protection product that works with MacBooks (Apple OSX), is easy to use, and automatically updates itself (patches and virus definition files).The "automatic" updates could be a problem since some of the MacBooks are rarely connected to the company's networks. This is especially true for employees who use an intermittent cellular connection to access the company's networks while visiting customers or working at the engineering test range.
Research:
1. Review the readings.
2. Using one of the product lists provided, select a product that works on MacBooks. Research your chosen product using product information sheets (from the vendor's website).
3. Find three or more additional sources which provide (a) product evaluations or reviews for your chosen product or (b) general information about Endpoint Protection Platforms.
Note: Since your client is a contractor to the US Government, you should be careful as to the reputation and nationality of the vendor you select. For example, Kapersky AV products no longer have approval for installation on US Government networks due to sanctions against its home nation.
Write:
Write a 3 page summary of your research ("briefing paper"). At a minimum, your summary must include the following:
1. An introduction or overview for the security technology category (Endpoint Protection Platforms)
2. A review of the features, capabilities, and deficiencies for your selected vendor and product Make certain that you are reviewing the Apple MacBook version of the product.
3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.
4. A closing section in which you restate your recommendation for a product (include the three most important benefits).
As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.
Formatting Instructions
Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.
Determine whether more people prefer coke or pepsi
: You have been assigned to determine whether more people prefer Coke or Pepsi. Assume that roughly half the population prefers Coke and half prefers Pepsi.
|
Determine the cost of the merchandise sold for each sale
: Question - Perpetual Inventory Using FIFO. Determine the cost of the merchandise sold for each sale and the inventory balance after each sale
|
Describe the culture of two of those groups
: Describe the culture of 2 of those groups, including values, beliefs, rituals, clothing, food, and so on. Be sure to include a definition of culture.
|
Discuss indicates ordinary and preference shares
: With the issue of capitalization shares, the given information indicates ordinary and preference shares
|
Explain how the selected product could be use by your client
: Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats.
|
Which of the given portfolios has the lowest risk
: Shares of company A are sold at$10 per share. Shares of company B are sold at$50 per share. According to a market analyst, 1 share of each company.
|
Research on cultural differences in nonverbal communication
: Explain how nonverbal communication such as personal space, posture, body movement, gestures, touch, and facial expressions vary cross culturally.
|
Discuss executors strategy of electing the marital deduction
: Assume there were no state death taxes. From a tax standpoint, was the executor's strategy of electing the marital deduction
|
Prepare budgetary entries
: Prepare budgetary entries, using general ledger control accounts only, for each of the following unrelated situations
|