How the selected product could be used by your client

Assignment Help Computer Engineering
Reference no: EM132035727

Question: Instructions: Case Study 4: Technology & Product Review for an SIEM Solution

Case Scenario: Security Operations Control Centers (SOCC) are a necessity for large businesses and government agencies. But, for a small to medium sized business such as Sifers-Grayson, the expense of setting up and operating a SOCC may outweigh the benefits. Instead of a full SOCC, smaller companies may decide to invest in an enterprise monitoring technology such as a Security Information and Event Management (SIEM) tool. Such tools can be used by to monitor the enterprise, collect information, and report upon security events (generate alerts and alarms). Your task for this case study is to identify, assess, and recommend an SIEM tool which is appropriate for Sifers-Grayson and which could be used to support the activities of a SOCC should Sifers-Grayson decide to establish this organization as a separate operating unit.

Research: 1. Review the weekly readings.

2. Choose one of the SIEM products from the Gartner Magic Quadrant analyses.

3. Research your chosen product using the vendor's website and product information brochures. (Vendors for highly rated products will provide a copy of Gartner's most recent Magic Quadrant report on their websites but, registration is required.)

4. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about SIEM technologies and solutions.

Write: Write a 3 page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (SIEM).

2. A review of the features, capabilities, and deficiencies for your selected vendor and product

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars IA, 5 Pillars Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

Reference no: EM132035727

Questions Cloud

Explain the role of domain name system : Explain The role of Address Resolution Protocol (ARP). What is its vulnerability? Explain The role of Domain Name System (DNS). What is its vulnerability?
Banks size by looking at a balance sheet : What would be some indications for a banks size by looking at a balance sheet?
How are the programs funded : How are the programs funded? What are the pros and cons of having children raise funds for these sports?
What is the payoff of a collar involving a long call : What is the payoff of a collar involving a long call and short put at the same strike price of $1.20/£?
How the selected product could be used by your client : Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance.
Why do the numbers of overweight or obese children continue : Identify issues related to the ineffectiveness of the education approach in reducing the numbers of obese and overweight children.
What was the value of the ira at the end of 12 years : What was the value of the Ira at the end of 12 years?
Unbiased expectations theory is correct : If the unbiased expectations theory is correct, what should the current rate be on 3-year Treasury securities?
Describe the volatility of currency : List the foreign currencies that the company Alliance Global Group Inc. has exposure and describe the volatility of each currency.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program to sort a number of strings using bubblesort

Write a program to sort a number of strings using bubblesort. Input is a number of strings and the output is the sortedlist based on the length of strings.

  Identify a minimum of three is or it applications

demonstrate factual knowledge, understanding and the application of technology related issues. identify a minimum of three IS or IT applications.

  Evaluate the three standard organizations including ieee

Evaluate the three standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.

  Boundary node routers and interior node routers

Explain how are the boundary node routers are different from the interior node routers in the DS domain? The answer requires to be at least 300 words. Also involve any references.

  Use apa format and have a list of references

As you are aware a software product license grants individuals the legal right to run or access a software program. A license agreement governs the use of the licensed software program. One of the ongoing sagas in Information Technology is the que..

  Describe how you would plan an iis7 application hosting and

explain how you would plan an iis7 application hosting and what you would take into consideration to tailor it to

  Write a heap method named incrementpriority

Write a Heap method named incrementPriority that, given the position of an element in the array just described, adds 1 to its value and reorganizes the heap.

  Create an application with four classes

Create an application with four classes. Three of the classes should contain data and behavior characteristics for circle, rectangle, and cylinder.

  What is the effect on the execution time of lda

In the micro program for ASC (Chapter 6), the sequence for indirect address computations is repeated for each ASC instruction requiring that computation.

  Develop a plan on how to support a business

Develop a plan on how to support a business need with software, this software will have data points that we need to map.

  What does a voip phone do with a pstc phone

What does a VoIP phone do that the PSTC phone can't do in the way of service, not cost of service.

  The difference between roles and groups

The difference between roles and groups

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd