Product review for endpoint protection solutions

Assignment Help Basic Computer Science
Reference no: EM131063784

Case Study #1: Technology & Product Review for Endpoint Protection Solutions

Case Scenario:

A client hasrequested that your company research and recommend an Endpoint Protection Platform which will provide host-based protection for the laptop PC's used by its field representatives. These laptops are running the Windows 8/8.1 operating system. The laptops currently use Microsoft Windows Defender and Microsoft Windows Firewall. The client's IT manager wants a product that is easy to use, can be deployed on individual laptops, and automatically updates its self.The client's field representatives use a cellular connection to access the Internet while visiting customers and taking orders via a web-based ordering system. The laptops are also used to access web-based corporate email servers and additional web-based applications used for internal business operations.

Research:

1. Review the Week 1 readings.

2. Choose one of the Endpoint Protection Platform products from the Gartner Magic Quadrant analysis (link provided in the weekly readings).  Then, research your chosen product using the vendor's website and product information brochures. (Vendors for highly rated products will provide a copy of Gartner's most recent Magic Quadrant report on their websites but, registration is required.)

3. Find three or more additional sources which provide reviews for (a) your chosen product or (b) information about Endpoint Protection Platforms.

Write:

Write a 3 page summary of your research ("briefing paper"). At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (Endpoint Protection Platforms)

2. A review of the features, capabilities, and deficiencies for your selected vendor and product

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your briefing paper, make sure that you address security issues using standard terms (e.g.5 Pillars IA, 5 Pillars Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Reference no: EM131063784

Questions Cloud

The best way to position a brand marketers : What is the best way to position a brand Marketers have different views of how to position a brand. Some value structured approaches such as the competitive positioning model described in the chapter, which focuses on specific points-of-parity and..
Formal structuring of data : In this research assessment, you will scrutinize, interpret, and evaluate secondary data. To accomplish this, you will select a research study using three credible sources and perform the following tasks:
Explain how the us foreign policy has developed : Explain how the US foreign policy has developed in relation to Asian nations in recent times. What key events have shaped the relationship? What can we learn from the experiences of the past fifty years?
The best way to position a brand marketers : What is the best way to position a brand Marketers have different views of how to position a brand. Some value structured approaches such as the competitive positioning model described in the chapter, which focuses on specific points-of-parity and..
Product review for endpoint protection solutions : A client hasrequested that your company research and recommend an Endpoint Protection Platform which will provide host-based protection for the laptop PC's used by its field representatives.
What is the friction factor of the duct : A 50 x 50 cm duct is 10 m in length. Nitrogen enters at M1 = 3.0 and leaves at M2 = 1.7, with T2 = 280 K and P2 = 7 x 104 N/m2. Find the static and stagnation conditions at the entrance.
The best way to position nestle : What is the best way to position Nestlé? Marketers have different views of how to position a brand. Some value structured approaches such as the competitive positioning model described in the chapter, which focuses on specific points-of-parity and..
Compute the amount of gross profit realized each year : Compute the amount of gross profit realized each year, assuming Wetzel uses the installment-sales method
Draw free body diagram of columns and beams : Draw free body diagram of columns and beams for section AA. Assume EI as constant throughout, and consider the dimensions and loads given in excel file attached.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Write down sructured english for clyde-s narrative

On a trip lasting more than one day, we permit hotel, taxi, and airfare also meal allowances. Same times apply for meal expenses. Write down sructured English for Clyde's narrative of the reimbursement policies.

  Compute the shortest distance from new york to london

Compute the shortest distance from New York to London

  Best selling product

Give the SQL statement that will find the best selling product(most frequently sold). Output the product name and number sold.

  Provide a critical review of the current market

Your task is to provide a critical review of the current market for online education as well as providing an overview and definition of what online education is and how it works.

  Program should contain menu driven program

1.Program should contain menu- driven program. 2.One function shows the user how to use the program.

  Discuss and explain at least six different features of excel

Discuss and explain at least six different (unique) features of Excel that make it a valuable business tool. Discuss what type of Excel skills would be important in today's job market and why. Be specific.

  Perceptions of product create its personality

Perceptions of product create its personality. Bottom, round the back. And even there they are ugly. Is that essential? Could they not, in some small degree, give pleasure?

  Functionality for a contact management system

logging in a user, and maintaining contact information. Within each use case, create the expected flow (happy-path) and one alternate flow (an exception).

  Patient care applications

Patient care applications

  You are expected to research the necessary commands

You are expected to research the necessary commands by themselves. There are numerous web sites available that discuss Linux networking. You are expected to list your sources of information for the different tasks.

  Explain why database integrity constraints are important

Explain why database integrity constraints are important to ensure data quality and list the types of constraints that can be used with a relational database.

  Explain how itpm best practices

Explain how ITPM best practices can align the IT portfolio with business requirements in order to create the greatest possible value for the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd