Research your chosen product using the vendors website

Assignment Help Management Information Sys
Reference no: EM132240172

Case Study : Technology & Product Review for an SIEM Solution

Case Scenario:

Security Operations Control Centers (SOCC) are a necessity for large businesses and government agencies. But, for a small to medium sized business such as Sifers-Grayson, the expense of setting up and operating a SOCC may outweigh the benefits.

Instead of a full SOCC, smaller companies may decide to invest in an enterprise monitoring technology such as a Security Information and Event Management (SIEM) tool. Such tools can be used by to monitor the enterprise, collect information, and report upon security events (generate alerts and alarms).

Your task for this case study is to identify, assess, and recommend an SIEM tool which is appropriate for Sifers-Grayson and which could be used to support the activities of a SOCC should Sifers-Grayson decide to establish this organization as a separate operating unit.

Research:

1. Review the weekly readings.

2. Choose one of the SIEM products from the Gartner Magic Quadrant analyses.

3. Research your chosen product using the vendor's website and product information brochures. (Vendors for highly rated products will provide a copy of Gartner's most recent Magic Quadrant report on their websites but, registration is required.)

4. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about SIEM technologies and solutions.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (SIEM).

2. A review of the features, capabilities, and deficiencies for your selected vendor and product

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

Reference no: EM132240172

Questions Cloud

How the trends you selected might impact future of industry : Analyze how the trends you selected might impact the future of the industry.
What best practices should sifers-grayson follow : Prepare a short "talking points" paper in which you answer the question: What best practices should Sifers-Grayson follow when establishing a SOCC?
The integration-responsiveness framework : Which of the four global strategies (as per the integration-responsiveness framework) is followed by this company?
How would you recruit more highly qualified women : How would you recruit more highly qualified women into the organization? How would you change the culture to make the organizational culture friendlier.
Research your chosen product using the vendors website : Your task for this case study is to identify, assess, and recommend an SIEM tool which is appropriate for Sifers-Grayson and which could be used.
What internal strengths and weaknesses does your company : What internal strengths and weaknesses does your company have?
True regarding accidents and safety in the workplace : Which of the following statements is true regarding accidents and safety in the workplace?
What is the random walk theory of stock prices : What is the random walk theory of stock prices? What does it indicate about the ability of "experts" to forecast accurately the future direction of stock prices
How would you react as a consumer : It can be very easy to send the wrong message using social media. Research a company who made a serious error on social media. Explain what the error was.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How many different estimating techniques were discussed

How many different estimating techniques were discussed in the case?If you were the project manager, which estimate would you use?

  Describe how emrs could help in that situation

Suppose your family lives in Vermont, you attend school in Texas and you break your leg while skiing in Colorado. Describe how EMRs could help in that situation

  Reengineering as a potential strategy

Describe specific situations in which reengineering as a potential strategy - The answer to Is reengineering just another management fad or does it offer something of lasting value

  Create the hypotheses and thesis

arrow the, topic: Big Data: Privacy and Security, to answer one specific question in relation to this.

  What software trends are relevant to managers

Management Information Systems - Software Trends and What kinds of software and software trends are relevant to managers?

  Locate an information security policy

Locate an information security policy which governs employee and company responsibilities.  Do what is required to mask the identity of the organization.

  Describe measurable benefits of progressing up cmmi model

Elaborate on three (3) of the obstacles that must be overcome as a business moves up the CMMI model. Suggest key methods for overcoming the obstacles you have identified.

  Create an entity relationship diagram using uml notation

Create an Entity Relationship diagram using UML notation. To receive full credit for this assignment, your diagram must be well organized and include: A state-wide toll road system (MyStateTolls) allows users to buy an RF tag for use in paying toll..

  Design the presentation to be use in an online collaboration

Create a 10- to 15-slide presentation using a presentation tool. Design the presentation to be used in an online collaboration setting with a group of three or more participants.

  What are some of the technological ways that can be used

What are some of the technological ways that can be used to provide early or immediate detection of unauthorized access as it relates to physical security?

  What are some techniques used by malware

What are some techniques used by malware developers that enable them to disguise their codes to prevent them from being analyzed?

  Describe any four rights of users of information systems

Describe an example of a time when you pointed out another person's mistake. How can you tell whether another person is merely making a mistake or purposely trying to deceive you? What happened in this case?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd