Proposal for Network Security Executive

256 views 6 pages ~ 1596 words Print

Introduction

Since its start, the information Assurance research Company has made significant progress. Factors such as good management and credible workers, as well as the utilization of cutting-edge data research and analysis technology, have aided the company’s success by expanding client coverage. I believe the organization values and recognizes the importance of network security in its operations. I’d like to introduce Beyond Security’s AVDS (Automated Vulnerability Detection System), which provides vulnerability evaluation and management solutions for a company network.

Security Risks and Challenges

The Information Assurance Company’s security is jeopardized as the company grows in complexity. The risk also comes due to the use of outdated security software that may not withstand the new generation threats. The number of targeted attacks from competitors or malicious individuals and vulnerabilities within the company systems also pushes for the need of a better network security software.

Security Software Description

AVDS software is designed to offer the overall protection of the company network and data to ensure secure usability and integrity of operations (BeyondSecurity, 2017). The software is designed with accuracy to detect and correct any security vulnerabilities in the company network. The system has the capacity to support a network of between 50-200,000 nodes and hence is suitable for such a growing company. AVDS tests each of the nodes within the network and gives a report on the security weaknesses identified. The user determines the range of IPs to be tested and the reports is given within a few hours. AVDS Databases holds over 10,000 known threats that are constantly updated after any discoveries (BeyondSecurity, 2017). The system allows network scanning across the overall company network despite the location or coverage from a central location thus easing vulnerability management processes. The network security manager can customize the IP settings by pinpointing the most vulnerable ones and in turn identify the necessary patches and remedies.

Software Purpose

AVDS Software addresses a range of security vulnerabilities within a network. First it deals with access control by authenticating users and their device to recognize them and give limited access to possible attackers. The software can block suspicious devices or users using the encrypted security policies and thus reducing the chances of network hackers (Cisco, 2017). The software will also shield the company’s hardware and software from malicious software’s such as viruses, Trojan, worms, and spyware. These malware that are likely to cause damage, alter or even spy on the data stored or exchanged across the company network. Purchasing this AVDS software will help in detection and tracking of files that may contain dormant and active malwares remove them and fix the possible damages made.

Application Security

The Information Research Assurance Company makes use of diverse applications in delivery of its mission and to meet the business needs. These applications handle critical data and processes and therefore should be secure from any security threats. Most of these applications are either purchased or customary made by the company IT staff but are however vulnerable for attack through holes causing network intrusion (Jackson, 2014). The good news is that the company will worry no more about the Application Security since the AVDS will offer the necessary hardware and software protection. The software will also be in a position to perform behavioral analytics to detect any abnormal behaviors within the network. These abnormal behaviors could signal possible security threats that may require attention. The system will also handle SQL injections and database security details.

Data Security and Integrity

Data security and integrity is paramount to the Information Research Assurance Company (Cisco, 2017). The software also comes with data loss prevention tools that bars the staff or other people within the organization from sending sensitive information to other networks. The Data Loss prevention Technologies prohibits the printing, uploading or sharing of this critical data to others through insecure ways.

Email and Web Security

The developers of AVDS software also acknowledges the security threats in email gateways. Emails contain personal information and important documents and should therefore be kept safe (Jackson, 2014). Attackers take advantage of this channel to send emails with links that leads the recipient to a malware site that may in turn cause breach of information or loss of sensitive data. This software will also offer email security by blocking suspicious messages from attackers and as well regulate the outbound mails thus hinder the loss of any critical data (Cisco, 2017). The software also comes with firewalls that protects the company network form other networks such as the internet which may pose a security threat to the internal network. The software will make use of set instructions in blocking and allowing traffic across the company network. Within the software are intrusion prevention tools that blocks and tracks any malware files across the network to avoid the spread and reinfection.

Web and Mobile Security

Websites are malware hubs and therefore, AVDS will offer a web security solution that will secure web gateways and regulate the websites used by the staff by denying access to malicious ones. Safe and secure communication will also be met with the purchase of this security software that will ensure proper authentication and security measures in the VPN (Virtual Private Network) and hence offer secure end to end communication. The network could also be attacked through the wireless network and this comprehensive security software will take care of such issues. Mobile devices are also sources of malwares present in mobile applications. There is an increase in the number of cooperate mobile application systems that may be vulnerable to attack and cause data damage or loss (BeyondSecurity, 2017). The software comes with a component that will control any mobile devices accessing the network. AVDS will also promote network access segmentation by classifying the IP addresses base on location and devices and offer or deny access rights after conducting security analysis.

Case Studies and Testimonials

Both big and small organizations do make use of the AVDS network vulnerability testing system. An example is the University Hospital of Brussels (UZB) has a network comprising of 150 servers coupled with 2000 terminals and loads of applications. The hospital attends to about 400, 000 patients in a year and stores and access the health records electronically. The ability to keep such an amount of health records secure is a challenge to medical staff (BeyondSecurity, 2017). The company relied on yearly contracts for network vulnerability tests. The tests would be conducted yearly both from the interior and exterior covering a minimum IPs. This type of testing covered a small scope and offered a report on the current vulnerabilities. It was also expensive and time consuming and left holes for possible attacks.

After consulting BeyondSecurity, the hospital IT managers Pattyn and his team were offered the AVDS that allowed them to perform determine the IPs to test without limitations and gather detailed and precise vulnerability reports (BeyondSecurity, 2017). The team confessed on the efficiency of the system, low costs incurred and the improvement in security measures due to timely and routinely vulnerability tests. They were able to successfully implement the system, first by prioritizing the most vulnerable servers, applications and eventually to all the physical and wireless devices within the network. Pattyn Confesses the efficiency of the AVDS that has helped them control, test and manage network security in the hospital. The system has kept them aware of the network vulnerabilities, showing trends and giving updated security reports. TU (Technical University) Delft is another customer of the AVDS that overcome hacking and infection security threats in the school systems. The institution was able to achieve automated network security scanning. I have also interacted with the system working as an IT manager in BeamLight Agencies. We managed to break through the constant hacking and malware issues despite using other renown security tools that were not comprehensive.

Benefits of the Software

The AVDS software will offer accurate and in depth security testing thus offering credible security reports. The use of this system will encourage timely response to identified security threats in a routine manner as well as offering precise reports possible due to the wide network scanning capacity. The system is efficient because the vulnerability testing procedures do not cause or interruptions to the normal business operations (BeyondSecurity, 2017). Other benefits includes the automatic scans of new ports and applications. AVDS has the capacity to handle multiple networks and hence suitable for the Information Assurance to test both the networks Reston Virginia and the New York Headquarters. The software comes at a cost of 500$ per year inclusive of the installation cost. This is much cheaper because it the testing may be done daily, weekly or monthly depending of the user needs. There is also a one-time cost an additional cost of user training and familiarization with the system of 2000$.

Conclusion

Without putting up proper security measures, Information Assurance may be exposed to security calamities that may damage the reputation of the company and affect the overall business operations. Purchasing the AVDS system will assure ensure safe business operations and offer confidence to the clients, partners, and thus healthy business operations. The system is cost effective, can support multiple networks and a higher number of nodes. Its processes are also time efficient and do not interrupt other business operations.

References

BeyondSecurity,. (2017). AVDS Case Studies. Beyondsecurity.com. Retrieved 31 January 2017, from http://www.beyondsecurity.com/avds_case_studies.html?submissionGuid=92797b86-bed2-42ed-974c-dddead1e778d

Cisco,. (2017). What Is Network Security?. Cisco. Retrieved 31 January 2017, from http://www.cisco.com/c/en/us/products/security/what-is-network-security.html

Jackson, B. (2014). The Practice of Network Security Monitoring. Network Security, 2014(10), 4. http://dx.doi.org/10.1016/s1353-4858(14)70099-6

May 17, 2023
Number of pages

6

Number of words

1596

Downloads:

37

Writer #

Rate:

4.4

Expertise Data Analysis
Verified writer

RiaSm02 is great for all things related to education. Sharing a case study that I could not understand for the life of mine, I received immediate help. Great writer and amazing service that won’t break the bank!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro