How the selected product could be used by your client

Assignment Help Computer Engineering
Reference no: EM131594083

Case Study Assignment: Technology & Product Review for an SIEM Solution

Case Scenario:

Agile Belair (the "client") is a high technology company with multiple locations ("satellite campuses") within a metropolitan area. Due to the sensitive nature of their business and the risk of intellectual property theft, the company needs a robust Security Information and Event Monitoring solution (SIEM) which is capable of detecting and responding to attacks.The company had tried building its own SIEM solution to collect and interpret log files and event data. But, during pilot testing they determined that the product was lacking in its reporting and alerting capabilities. Their custom solution also had problems handling the high volume of event data being reported from its satellite campuses.

The client's Chief Technology Officer has asked your company to research and recommend a product which will allow them to incorporate anext generationSIEM solution into their multi-campus infrastructure. The CTO specifically wants an SIEM solution that combines real-time monitoring, threat analytics, and event management / reporting.

Research:

1. Review the readings.

2. Choose one of the SIEM products from the Gartner Magic Quadrant analyses.

3. Research your chosen product using the vendor's website and product information brochures. (Vendors for highly rated products will provide a copy of Gartner's most recent Magic Quadrant report on their websites but, registration is required.)

4. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about SIEM technologies and solutions.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (SIEM).

2. A review of the features, capabilities, and deficiencies for your selected vendor and product

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g.5 Pillars IA, 5 Pillars Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Reference no: EM131594083

Questions Cloud

Calculate total fees both in dollars : Calculate total fees, both in dollars and as a percent of assets under management, for portfolio returns of:
Why do buy the things you buy : Why do buy the things you buy? What truly influences your purchases of any product especially as it relates it relates to online purchases?
Find the percentage change in bond price : Find the percentage change in bond price
Determine the theoretical foundation of business problems : Determine the theoretical foundation of business problems through the analysis of relevant, quality sources.
How the selected product could be used by your client : Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk.
What are your views on the death penalty : What are your views on the death penalty. What are your views on the death penalty for juvenile offenders
What is after-tax equivalent annual worth of investment : What is the after-tax equivalent annual worth of this investment over the five year period which ends with the sale of the machine?
Find the values of the constants a b and c : In Exercises, find the values of the constants a, b, and c in order that A = B.
May smith freely resell his pampered pooches shares : Pampered Pooches, Inc. proposes a merger with Sit Means Sit, Inc. (SMS). May Smith freely resell his Pampered Pooches shares?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why valuable time is lost in planning

Valuable time is lost in planning. Substantial savings could be realized if corporations would cut down on planning and concentrate on implementing.

  Questiongiven assigned block of ip addresses 1949964018 a

questiongiven assigned block of ip addresses 194.99.64.018 a router 194.99.64.33 managing this block of ip addresses

  Define the legislation governing web accessibility in europe

evalute and contrast the legislation governing Web accessibility in Europe with that in the US.

  Relational database with microsoft access

Relational Database with Microsoft Access 2010.

  Assume that the cross section of each strand is a circle

A regional telephone company has 10 million subscribers. Each of their telephones is connected to a central office by a copper twisted pair. The average length of these twisted pairs is 10 km. How much is copper in the local loops worth.

  Draw the shear force and bending moment diagrams

MECT 6322 - Computer Aided Engineering Final Exam. Deflection and reactions at the nodes (define the nodes as required). Draw the shear force and bending moment diagrams (using FEM). Compare the maximum deflection using FEM with analytical results

  What is proficient by page buffering

What is proficient by page buffering

  Sorting the array

Write down a program which stores lists of the names (the last name first) and ages in parallel arrays and sorts names into alphabetical order keeping the ages along with the correct names.

  Explain a minimum of three 3 heuristics to optimize the

your supervisors and customers are very impressed with the database you have put together. however there is still that

  How would you record performance metric for system x model q

Suppose that you are looking into purchasing a new computer system. You have suitable benchmark results for all of the systems that you are considering except for System X Model Q. How would you record the performance metrics for System X model Q?

  Questionyour microsoft windows 2000-based office network

questionyour microsoft windows 2000-based office network has three domains- alpha beta and omega all in the similar

  Determining occurance as incident or disaster

Categorize the following occurrences as an incident or disaster. If an occurrence is a disaster, find whether or not business continuity plans would be called into play.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd