Explain how the selected product could be use by your client

Assignment Help Computer Engineering
Reference no: EM131812525

Assignment

Case Study: Technology & Product Review for Endpoint Protection Solutions

Case Scenario:

Sifers-Grayson(the "client") hasrequested that your company research and recommend an Endpoint Protection Platform, which will provide endpoint protection for the Apple MacBook laptop computers used by some of its employees. The MacBooks arebring your own device (BYOD) computers which some employees use to access company networks and servers while teleworking or working remotely (e.g. at the test range). The company has decided that, for now, it will continue to allow these devices on its networks but, an approved Endpoint Protection Platform must be used to manage the security of these devices.

The client wants an Endpoint Protection product that works with MacBooks (Apple OSX), is easy to use, and automatically updates itself (patches and virus definition files).The "automatic" updates could be a problem since some of the MacBooks are rarely connected to the company's networks. This is especially true for employees who use an intermittent cellular connection to access the company's networks while visiting customers or working at the engineering test range.

Research:

1. Review the readings.

2. Using one of the product lists provided, select a product that works on MacBooks. Research your chosen product using product information sheets (from the vendor's website).

3. Find three or more additional sources which provide (a) product evaluations or reviews for your chosen product or (b) general information about Endpoint Protection Platforms.

Note: Since your client is a contractor to the US Government, you should be careful as to the reputation and nationality of the vendor you select. For example, Kapersky AV products no longer have approval for installation on US Government networks due to sanctions against its home nation.

Write:

Write a 3 page summary of your research ("briefing paper"). At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (Endpoint Protection Platforms)

2. A review of the features, capabilities, and deficiencies for your selected vendor and product Make certain that you are reviewing the Apple MacBook version of the product.

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Reference no: EM131812525

Questions Cloud

Determine whether more people prefer coke or pepsi : You have been assigned to determine whether more people prefer Coke or Pepsi. Assume that roughly half the population prefers Coke and half prefers Pepsi.
Determine the cost of the merchandise sold for each sale : Question - Perpetual Inventory Using FIFO. Determine the cost of the merchandise sold for each sale and the inventory balance after each sale
Describe the culture of two of those groups : Describe the culture of 2 of those groups, including values, beliefs, rituals, clothing, food, and so on. Be sure to include a definition of culture.
Discuss indicates ordinary and preference shares : With the issue of capitalization shares, the given information indicates ordinary and preference shares
Explain how the selected product could be use by your client : Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats.
Which of the given portfolios has the lowest risk : Shares of company A are sold at$10 per share. Shares of company B are sold at$50 per share. According to a market analyst, 1 share of each company.
Research on cultural differences in nonverbal communication : Explain how nonverbal communication such as personal space, posture, body movement, gestures, touch, and facial expressions vary cross culturally.
Discuss executors strategy of electing the marital deduction : Assume there were no state death taxes. From a tax standpoint, was the executor's strategy of electing the marital deduction
Prepare budgetary entries : Prepare budgetary entries, using general ledger control accounts only, for each of the following unrelated situations

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd