Discussion of how the selected product could be used by


Assignment

Case Study: Technology & Product Review for Endpoint Protection Solutions

Case Scenario:

Sifers-Grayson(the "client") hasrequested that your company research and recommend an Endpoint Protection Platform, which will provide endpoint protection for the Apple MacBook laptop computers used by some of its employees. The MacBooks arebring your own device (BYOD) computers which some employees use to access company networks and servers while teleworking or working remotely (e.g. at the test range). The company has decided that, for now, it will continue to allow these devices on its networks but, an approved Endpoint Protection Platform must be used to manage the security of these devices.

The client wants an Endpoint Protection product that works with MacBooks (Apple OSX), is easy to use, and automatically updates itself (patches and virus definition files).The "automatic" updates could be a problem since some of the MacBooks are rarely connected to the company's networks. This is especially true for employees who use an intermittent cellular connection to access the company's networks while visiting customers or working at the engineering test range.

Research:

1. Review the readings.

2. Using one of the product lists provided, select a product that works on MacBooks. Research your chosen product using product information sheets (from the vendor's website).

3. Find three or more additional sources which provide (a) product evaluations or reviews for your chosen product or (b) general information about Endpoint Protection Platforms.

Note: Since your client is a contractor to the US Government, you should be careful as to the reputation and nationality of the vendor you select. For example, Kapersky AV products no longer have approval for installation on US Government networks due to sanctions against its home nation.

Write:

Write a 3 page summary of your research ("briefing paper"). At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category (Endpoint Protection Platforms)

2. A review of the features, capabilities, and deficiencies for your selected vendor and product Make certain that you are reviewing the Apple MacBook version of the product.

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Discussion of how the selected product could be used by
Reference No:- TGS02608034

Now Priced at $40 (50% Discount)

Recommended (92%)

Rated (4.4/5)