Explain how the selected product could be use by your client

Assignment Help Computer Engineering
Reference no: EM131812525

Assignment

Case Study: Technology & Product Review for Endpoint Protection Solutions

Case Scenario:

Sifers-Grayson(the "client") hasrequested that your company research and recommend an Endpoint Protection Platform, which will provide endpoint protection for the Apple MacBook laptop computers used by some of its employees. The MacBooks arebring your own device (BYOD) computers which some employees use to access company networks and servers while teleworking or working remotely (e.g. at the test range). The company has decided that, for now, it will continue to allow these devices on its networks but, an approved Endpoint Protection Platform must be used to manage the security of these devices.

The client wants an Endpoint Protection product that works with MacBooks (Apple OSX), is easy to use, and automatically updates itself (patches and virus definition files).The "automatic" updates could be a problem since some of the MacBooks are rarely connected to the company's networks. This is especially true for employees who use an intermittent cellular connection to access the company's networks while visiting customers or working at the engineering test range.

Research:

1. Review the readings.

2. Using one of the product lists provided, select a product that works on MacBooks. Research your chosen product using product information sheets (from the vendor's website).

3. Find three or more additional sources which provide (a) product evaluations or reviews for your chosen product or (b) general information about Endpoint Protection Platforms.

Note: Since your client is a contractor to the US Government, you should be careful as to the reputation and nationality of the vendor you select. For example, Kapersky AV products no longer have approval for installation on US Government networks due to sanctions against its home nation.

Write:

Write a 3 page summary of your research ("briefing paper"). At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (Endpoint Protection Platforms)

2. A review of the features, capabilities, and deficiencies for your selected vendor and product Make certain that you are reviewing the Apple MacBook version of the product.

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Reference no: EM131812525

Questions Cloud

Determine whether more people prefer coke or pepsi : You have been assigned to determine whether more people prefer Coke or Pepsi. Assume that roughly half the population prefers Coke and half prefers Pepsi.
Determine the cost of the merchandise sold for each sale : Question - Perpetual Inventory Using FIFO. Determine the cost of the merchandise sold for each sale and the inventory balance after each sale
Describe the culture of two of those groups : Describe the culture of 2 of those groups, including values, beliefs, rituals, clothing, food, and so on. Be sure to include a definition of culture.
Discuss indicates ordinary and preference shares : With the issue of capitalization shares, the given information indicates ordinary and preference shares
Explain how the selected product could be use by your client : Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats.
Which of the given portfolios has the lowest risk : Shares of company A are sold at$10 per share. Shares of company B are sold at$50 per share. According to a market analyst, 1 share of each company.
Research on cultural differences in nonverbal communication : Explain how nonverbal communication such as personal space, posture, body movement, gestures, touch, and facial expressions vary cross culturally.
Discuss executors strategy of electing the marital deduction : Assume there were no state death taxes. From a tax standpoint, was the executor's strategy of electing the marital deduction
Prepare budgetary entries : Prepare budgetary entries, using general ledger control accounts only, for each of the following unrelated situations

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain how enumeration can be considered first contact

Describe scanning and enumeration. Discuss the pros and cons of 2 scanning and enumeration tools. Explain how enumeration can be considered first contact.

  What were the advances in information technology that

prepare a 300- to 500-word paper that answers the following questionwhat were the advances in information technology

  Define the three way tcp/ip handshake in connection setup

Come up with a diagram and explain the three way TCP/IP handshake in connection setup and the 3 way TCP/IP handshake in connection release.

  Description of the facts of the investigation and case

Need to make report on small cases- 7 cases altogether in 1 assignment. 2 assignment has 7 cases as well.

  Build a lottery game application

Create a lottery game application. Generate four random numbers, each between 0 and 9 (inclusive). Allow the user to guess four numbers.

  What are the policies for visitors and contractors

what are the policies for visitors and contractors, how does this impact physical security

  Can statistical thesaurus generation be utilized to develop

question 1 will the clustering process always come to the same final set of clusters no matter what the starting

  Writa a paper based on system failure

Writa a paper based on system failure: Faster system processors, Software and hardware compatibility, High system capacity, Information system policies, Security system, and High reputation for software and hardware vendors.

  Write a function numi - compqgl

Write a function numI - compQGL(fname,a, b,m,n) that approximates the integral of a function from a to b by applying the m-point Gauss-Legendre rule.

  Explain why is a well-thought-out cabling infrastructure

why is a well-thought-out cabling infrastructure design so important in meeting the network performance expectations of

  How important is the internet to most companies

How significent is the Internet to most companies? How have companies improved the sales / service / performance process utilizing the Internet.

  What information can be brought to bear

We do know that the client has an advertising plan and budget in place where in he is presently spending 5% on creation of ad and 95% on airing of the commercial. It has been seen that the quality of advertise designing is falling and not upto the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd