Write a short “newsletter” article (3 to 5 paragraphs) for non-technical managers to tell them about the planned replacement for the company’s anti-virus application.
Use your research and findings from your Case Study #1 essay as the basis for this article.
Since this article is for a newsletter, you may use an informal but professional tone (address the reader as “you,” use “we” and “our” to refer to the organization’s perspective).
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.
Answers…Continue to place your Order Now
Discussion: Endpoint Platform Protection
Data insecurity is a common phenomenon among companies. Intruders attack the information systems and illegally access important and private information pertaining to the company. In bid to provide total security to our corporate database, we have taken measures to install a new anti-virus application. It will replace the previous system that is less secure (Aziz, 2013). The step will ensure that data is protected from possible intrusion using other devices, such as phones and servers that result to system lock down, leading to the damage of crucial information by Malwares and viruses (Firstbrook et al., 2009).
Upon purchase of the new system with antivirus application, we will be considering fast check and verification, to ensure that we install a system with absolute protection against our intruders.
Important factors when we install the antivirus
Multilayered endpoint defense: We agreed that before purchasing an EPP, we will test its antivirus security level; it should be able to protect data from both unknown and known users. According to Tokuyoshi (2013), one layer is not able to protect the data from threat-in fact it should be able to destroy all the possible end-to-end technique that is applied by malware developers.
Cost effective Operational impact: We agreed to adopt a system that is easy and cheap to maintain. By all means, we shall reduce management costs that would be incurred by the IT team and the end users of the antivirus. Notably, change from traditional method of corporate database protection to the current one reduces cost impact.
Dynamic Intelligence: A well-coordinated intelligence emanating from most of our system end points and research centers is crucial to deal a blow to possible threats (Wang et al., 2008). We shall ensure that the antivirus application will remain dynamic to maintain high levels of intelligence among our users. A regular update will be possible, coming from all the endpoints.
Aziz, A. (2013). The evolution of cyber attacks and next generation threat protection. In RSA Conference 2013.
Firstbrook, P., Hallawell, A., Girard, J., & MacDonald, N. (2009). Magic Quadrant for Endpoint Protection Platforms.
Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), 12-13.
Wang, Z., Feng, Q., Xu, R., Liu, X., Li, X., & Qi, N. (2008, October). Design and Implementation of Wireless Trusted Access Protocol for Embedded Trusted Endpoints. In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1-5). IEEE.