Essay PreviewMore ↓
Computer network security and integrity is a large concern among all types and sizes of companies. The options for solving security risks are as varied as the companies themselves. However, it is possible to break down the methods for dealing with security risks into three major categories. Companies have the option to:
1. Select best of breed products for their various security needs and assemble the products together to form their own customized solutions.
2. Purchase a security suite that contains security products that will address their various security needs.
3. Outsource security to another company rather than handle it internally.
This paper will summarize primary research conducted by Kang-hun Lee, Yonghoon Choi, Mike Loveridge, Tom Gonzales and David Linford over a three month period to determine market trends in the security software industry.
A survey instrument was prepared to capture the following data.
1. What do companies consider threats to their network environment?
2. What preferences do they have regarding specific security services?
3. What sort of security option do they prefer when choosing between: best of breed, suites or outsourcing.
Findings and analysis
Once the data were collected, we were able to organize and analyze the results. This section will both specify the analytical procedures we used as well as report on the findings. There are three (will be more when other sections get put in) primary types of analysis that we performed.
1. Find the security software preference
2. Segment the market based on preferred security options
Finding the security software preference
We analyzed the preference data from two perspectives. First of all, we took the data as a whole in order to describe the overall market.
The first type of analysis that we performed consisted of finding the percentage of respondents that preferred each of the three security options. The results of this analysis are summarized on chart 1.
We found at this point that most of the people who took the survey overwhelmingly preferred a security suite approach. Most of those who preferred best of breed indicated that if a suite could provide a best of breed package, then they would prefer a suite.
How to Cite this Page
"Computer Network Security Alternatives." 123HelpMe.com. 07 Apr 2020
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Information security for modern enterprises Nowadays, life of the person has totally changed due to technology in this in internet plays an important role to give the new life style. In this new generation every things done by the internet with in seconds and no matter how work is large or small. In every business securing enterprise information has never been more challenging. Because new generation fully educated with technology and revolutions. The technology has set the main goal on to youth of the every nation in all around the world because they are sharp minded.... [tags: Security, Information security, Computer security]
1381 words (3.9 pages)
- Assigning the precise amount of network capacity in the right place at the right time is no simple task. Network Planners cannot afford to overbuild, as this would consume scarce investment resources that could be better used elsewhere. They also cannot delay expansion as this may result in poor service to customers and under-utilize other network assets. A balanced approach is needed in order to meet the rapidly growing and changing traffic demands. Advanced network planning and design software provides benefit to network planners in the following ways: 1) Advanced Network Planning provisions effective utilization of all network resources affecting network capacity, including both physical... [tags: Implementation, Design, Computer network]
1374 words (3.9 pages)
- Alternatives of Network File System Since human beings have used Computers , the request of being rich ,and getting more information quicker than before has increased . Have you ever found yourself rushing from one computer to another in your office or home ,attending to several different jobs at various location. Or do you often find yourself moving files that need printing from a PC that you happen to be working on the PC that is Connected to the printer . You may have heard a lot about the advantages of using the internet for sending e-mail, and decided that you want to get connected .... [tags: Papers]
3531 words (10.1 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)
- Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to prevent people or things from getting in their network.... [tags: Computer Network Security]
868 words (2.5 pages)
- Neumann, P. G. (1994). Risks of passwords. Communications Of The ACM, 37(4), 126. doi:10.1145/175276.175289 This is a brief qualitative analysis of all the risks associated with passwords. It lists the common failure mode of passwords at the time with a little commentary on each. The types are exhaustive attacks, educated guess, derivation, capturing unencrypted passwords, trapdoors, bogus password creation, bypassing authentication, and non-atomic password checking. The author’s opinion is that most password management techniques are only successful at dealing with the first three attack modes.... [tags: Computer security, Authentication, Password]
1161 words (3.3 pages)
- Everything that is connected in a network is a part of a bigger network. Hence, a lot of information that is exchanged in a network is also accessible to a wide range of threats. There has to be some form of security, which can protect this valuable information from falling into the wrong hands. Major concerns of threats are misuse of information, manipulation of data and also destruction of valuable information. Network security plays a major role in protecting a network’s data from these types of threats.... [tags: Computer network, Internet]
1184 words (3.4 pages)
- Wireless Communication Security Abstract In today’s society advances in technology are growing rapidly. Businesses and people are taking full advantage of the improving ways of transmitting data internally and externally. One of the mediums today in transmitting data is via wireless communication systems. It is obvious that this data will need to be secure for many reasons. These will be the questions I will pose in this paper. Will this be a secure means of transmitting data. How sure are we of the means of security that we have available to us as consumers of this technology.... [tags: Research Paper Technology Papers]
1802 words (5.1 pages)
- Network Security 1. What is network security. Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself. Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks.... [tags: Technology Security Network]
1619 words (4.6 pages)
- Network Security When it comes to networking and the security of networks, there are several different methods of protecting networks. Of these differing methods, some of them sound similar, but provide differing levels of security. In the following paragraphs, I will try to explain the differences between some of the methods used. Explain the difference between historical and statistical logging. Logging is a simple way of keeping a record of activity on a network. There are several types of logs that can be kept, each providing different data that can be analyzed to provide information on potential ways of improving security over time.... [tags: Network Security Hacking ]
932 words (2.7 pages)
We also found nascent interest in outsourcing as an option. However, that interest is still small compared with the other options. Most of the individuals that we interviewed preferred to directly control their computer networks. They knew their systems and felt that they could run the system more effectively than an outside company.
One point to consider here though is that we interviewed the information systems people in the various companies. They would likely see little value in outsourcing their own positions.
Security preference by size and industry
At this point, we compared the security software preferences with the industry and with the size of the industry. Smaller companies tended to have greater preference for a suite. Furthermore, both the larger and smaller companies more frequently mentioned outsourcing as an option than the mid-sized companies. These results are summarized in
The interviews revealed that technical expertise in a company combined with the company’s industry and resources to help determine the security preference.
For example, during one interview the individual felt that he had insufficient expertise to effectively protect his network. He indicated that he would gladly outsource the function to another company. If outsourcing were not an option he would strongly prefer a security suite.
In some cases, the size of the company could predict an interest in a security suite. Often, the smaller companies simply did not have enough resources or people to implement high-end network security. They either used a suite, or simply had very little security.
The company’s industry helped to determine how much expertise the company had at its disposal. Thus, a small technical company often had sufficient expertise to assemble a best of breed security option. When companies with high expertise chose a suite, it was for the convenience rather than due to a lack of skill within the company.
Segmenting the market
We segmented the market for two reasons. The first reason was to learn what types of people are in the security suite market and try to describe them. The second reason was to learn if the segments could predict software security preference. While we found three segments based on purchasing preferences, these segments did not predict which security option they preferred.
We followed several steps in order to perform a statistical segmentation of the market.