Write an overview for the security technology category

Assignment Help Management Information Sys
Reference no: EM131943975

Assignment

Case Study: Technology & Product Review for an SIEM Solution

Case Scenario:

Security Operations Control Centers (SOCC) are a necessity for large businesses and government agencies. But, for a small to medium sized business such as Sifers-Grayson, the expense of setting up and operating a SOCC may outweigh the benefits. Instead of a full SOCC, smaller companies may decide to invest in an enterprise monitoring technology such as a Security Information and Event Management (SIEM) tool. Such tools can be used by to monitor the enterprise, collect information, and report upon security events (generate alerts and alarms). Your task for this case study is to identify, assess, and recommend an SIEM tool which is appropriate for Sifers-Grayson and which could be used to support the activities of a SOCC should Sifers-Grayson decide to establish this organization as a separate operating unit.

Research:

1. Review the weekly readings.

2. Choose one of the SIEM products from the Gartner Magic Quadrant analyses.

3. Research your chosen product using the vendor's website and product information brochures. (Vendors for highly rated products will provide a copy of Gartner's most recent Magic Quadrant report on their websites but, registration is required.)

4. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about SIEM technologies and solutions.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (SIEM).

2. A review of the features, capabilities, and deficiencies for your selected vendor and product

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g.5 Pillars IA, 5 Pillars Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

1. There is no penalty for writing more than 3 pages but, clarity and conciseness are valued. If your essay is shorter than 3 pages, you may not have sufficient content to meet the assignment requirements (see the rubric).

2. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

3. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131943975

Questions Cloud

Total asset turnover-equity multiplier-roa and roe : How will this change in accounts receivable policy affect Dakota’s net income, total asset turnover, equity multiplier, ROA, and ROE?
List the characteristics of effective design patterns : List the characteristics of effective design patterns. Define the terms design focus and granularity in the context of WebApp design patterns?
What are demographic characteristics of your target market : What are the demographic characteristics of your target market and why are they important? Where is your target market located geographically.
Model to accommodate the design inflow : ENV3104 Hydraulics - Build your model using any programming language or spreadsheet) for solving the kinematic wave equations for computing depth and flow rate
Write an overview for the security technology category : Write a 3 page summary of your research. Write an introduction or overview for the security technology category (SIEM).
Cause prices of bonds to increase as result of their actions : If bond portfolio managers expect interest rates to increase in the future, which could cause the prices of bonds to increase as a result of their actions.
Provide the initial treatment goals and plan : Provide an assessment related to client symptomology along with a DSM and ICDdiagnosis based on client assessment.
Briefly describe the service encounter : Briefly describe the service encounter. What was the source/reason for your satisfaction (if an IDEAL encounter) OR your dissatisfaction.
Evaluate the nature versus nurture controversy : Critically evaluate the nature versus nurture controversy in brain development and formulate one resolution to this debate.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Create the architecture for the bsu coin network

Create the architecture for the BSU Coin network. You will need to have your infrastructure reviewed by the professor prior to submission.

  Discussing the use of tablets vs desktopstablets are said

discussing the use of tablets vs. desktopstablets are said to be replacing desktop computers. dell hp and others have

  Would edi pay for itself within the first 5 years

Would EDI pay for itself within the first 5 years?- What Effects Aside From Cost Might Mr. Mcneely Consider When Implementing Edi?

  What are your thoughts about conducting therapy

What are your thoughts about conducting therapy via the internet, How would you approach a student who either tried to friend you on Facebook, text with you or wanted to tweet with you on Twitter

  Have they made important acquisitions

Have they made important acquisitions? Have they been acquired? Have any new companies made important inroads into their market share?

  Explain how it might be applied in the work environment

Explain how it might be applied in the work environment. Discuss the potential benefits of adding this new technology. Discuss the potential drawbacks of adding this new technology.

  Show the strategic issues faced by cliptomania web store

Cliptomania Web Store's e-business launch - Show the strategic issues faced by Cliptomania Web Store in launching and developing their e-business.

  Comment on the ethical issues and choice points response

Comment on the ethical issues and Choice Point's response. Did Choice Point choose wisely? Consider that question from the viewpoint of customers.

  Evaluating policy performance

Compare and contrast methods of evaluation and prescription in terms of time and the types of claims produced by each.

  Context diagram vs case diagramcompare and contrast a

context diagram vs. case diagramcompare and contrast a context diagram using data flow diagram dfd modeling and a use

  Technological innovations in spreading christianity

Utilization of Information Technology in churches in the U.S - It indicates how churches in the United States utilized technological innovations in spreading Christianity.

  Explain the schema and global catalog

Describe how to install Active Directory, including a explanation of how it functions.Explain the schema and global catalog.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd