StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analysis of the Problems of XYZ Company - Assignment Example

Cite this document
Summary
The purpose of this paper is to present a report on the problems of XYZ Company. The problem of the company is that their Information Technology security system is not upgraded as per the market requirement, and the information is not safe. It analyses solution and alternative of the problems of XYZ company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Analysis of the Problems of XYZ Company
Read Text Preview

Extract of sample "Analysis of the Problems of XYZ Company"

Analysis of the Problems of XYZ Company 1. Background and Purpose The purpose of this paper is to present the report on the problems of XYZ Company. The problem of the company is that their Information Technology security system is not upgraded as per the market requirement, and the information is not safe. Thus, the company will set criteria for the solution to these problems. On the basis of their criteria, a best service provider agency for IT security system will be chosen. Moreover, the suggestions and recommendations will help to improve the current situation of the company after analyzing the problems and the best possible solutions. Herein, it should be noted that the XYZ Company is a well-known company in the food manufacturing industry. The company is having number of employees working in it. There are several departments within the company. However, the information technology department needs some improvement for that this Yardstick report will provide the solution. 2. Problem • There is no information technology security system due to which the confidential information of the company is not safe. • Information technology department is not upgraded and advanced as per the industry and market requirement. 3. Solution and Alternative In order to improve the information technology security system to keep the confidential information of the company in safe hands it is necessary that the IT security system should be strong enough. For this, it is possible that the XYZ Company can hire other security service provider company that can help to upgrade their IT security system. As there are different types of risks involved such as the hacker attack, lack of physical security, and risks from internal employees (Whitman & Mattord, 2010). Therefore, a strong IT security system can be a best solution for XYZ Company. The internal employees are responsible to keep the information confidential. However, to keep the information confidential from vendors it is necessary that the employees use software and never share their passwords with any other person. Moreover, it can be said that the associated threats and vulnerabilities can be dealt with the help solutions such as training programs, control and monitoring system, checklist, and daily basis reports. For all these services, there are many agencies that are developing the specific software for the companies. There are few top agencies that are offering these services. There are three service provider agencies that can be considered and those are; • Multi-tasking service providers • B&B agency • GHQ IT service providers 4. Criteria In order to select the final service provider for the company, it must be the best in the field of information technology to the organizations and advises best in the business and provide a best security to the systems. Thus, the XYZ Company is seeking best network security policy and procedure. Need for the remote access policy and tools, wireless communication standards, server security policy with lab security policy and information logging standards, and software installation policy. Overall it can be said that the information security management should be provided with proper policies, tools and software for XYZ Company security. In addition, the cost of the services should be affordable. Those service providers who will be providing best and all required services according to the criteria under the affordable and reasonable budget will be preferred. In other simple words, it can be said that there will be few defined assessment criteria on which the service provider agencies will be assessed for the XYZ Company. Those assessment criteria are; • Cost • Number of services for IT management • Buffer memory for backup of the data • Contingency plans 5. Comparison Considering the services of all three service provider agencies for XYZ Company, it can be said that the comparison between their services and the required criteria will help to finalize one. As according to the assessment criteria the first factor that is cost depends on the budget of the company. The budget of the company is $10000 in which all services, trainings for their employees, and new systems are included. The considerable agencies cost $12000, $14000 and $11000 for their services. The following graph will help to analyze the costs and budgets offered by service provider agencies. Furthermore, it can be said that the number of services for IT management also matters a lot for XYZ Company before finalizing any agency. Herein, it should be noted that all three agencies are offering different services from each other. However, the following chart will help to understand that which agency is close to the criteria or number of services. Number of services for IT management Multi-Tasking Service Providers B&B Agency GHQ IT Service Providers control and monitoring system yes yes yes checklist yes yes yes daily basis reports yes no no software yes yes yes training programs yes yes no Buffer memory for back of the data is also one of the main factors for the management of IT security system. The management of the company is more concern about their data. The company wants to back up the entire data if in any case they miss out any information they can get it back. Multi-Tasking Service Providers B&B Agency GHQ IT Service Providers Yes No Yes The company requires contingency planning for their IT security system and policy. An effective contingency plan with strong objectives will attract the company. The contingency plan should have a perfectly designed framework and responsibilities for the organization to mitigate the possible risks. Herein, it should be noted that B&B Agency is also offering the contingency plans to mitigate the all types of risks. However, it is not offering any solution to deal the risks from internal employees. Multi-Tasking Service Providers B&B Agency GHQ IT Service Providers Yes Yes Yes 1. Conclusion and Recommendation From the aforementioned information about the problem and its solution it can be concluded that Multi-Tasking Service Providers are close enough to the XYZ Company’s required criteria. They are offering maximum required services in $11000. Although, it is a little high than the company’s budget however, it is lower than other agencies services cost. Moreover, it has a good reputation in the market. In addition, it deals all types of risks and their contingency plan framework is designed to deal the risks and mitigate the risk factors. Thus, it is recommended that the XYZ Company should choose Multi-Tasking Service Providers as their IT security service providers and the company should organize the training programs for their employees to improve the level of information technology. Reference Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analysis of the Problems of XYZ Company Assignment”, n.d.)
Analysis of the Problems of XYZ Company Assignment. Retrieved from https://studentshare.org/management/1684898-yardstick-report
(Analysis of the Problems of XYZ Company Assignment)
Analysis of the Problems of XYZ Company Assignment. https://studentshare.org/management/1684898-yardstick-report.
“Analysis of the Problems of XYZ Company Assignment”, n.d. https://studentshare.org/management/1684898-yardstick-report.
  • Cited: 1 times

CHECK THESE SAMPLES OF Analysis of the Problems of XYZ Company

The Development of a Theoretical and Conceptual Human Resource Management

On 2009, xyz company became the world's sixth largest carmaker as well as Italy's largest carmaker.... xyz company-based cars are constructed all around the world, with the largest number produced outside Italy being built inBrazil, where they are best-sellers.... xyz company has a long history of licensing its products to other countries regardless of local political or cultural persuasion (Robbins, 2009).... However the xyz company's operations are increasingly being affected by a lack of uniformity in work standards among its employees in different manufacturing plants....
21 Pages (5250 words) Essay

XYZ Pharmaceutical

inancial statement analysis may be done for variety of purposes, which may range from a simple analysis of the short-term liquidity position of the firm to a comprehensive assessment of the strengths and weaknesses of the firm in various areas.... inancial statements contain a wealth of information, which, if properly analyzed and interpreted, can provide valuable insights into a xyz company's performance and position.... That's why, a successful organization of media event by xyz company will yield long-term benefits to the xyz company....
2 Pages (500 words) Essay

Growth Strategies to Achieve Competitive Advantage

McKinsey and Ansoff are the two models that would be effective in the context of xyz power utility company.... The paper includes a detailed analysis of these two models and their implications in this case.... This paper is all about possible growth strategies for the XYZ power utility company which owned by the government company based in a developing state of southern Africa.... There are strategic models like McKinsey model, Ansoff model that could be followed by the company in the process of adopting growth strategy....
7 Pages (1750 words) Essay

Network Implementation at XYZ Company

The business of xyz company is spread over a lot of cities and having various sub-divisions of corporation.... The main goals of xyz company regarding the Routing and Remote Access service or RRAS technology is to offer following facilities to business staff and management: ... A Routing and Remote Access service will offer xyz company's end users facility regarding the remote access to our organizations network.... owever in case of new Remote Access service or RRAS technology establishment at xyz company we could face some problems regarding the data security and network privacy....
4 Pages (1000 words) Essay

Negotiating Strategy on XYZ Airport Services

In line with this, negotiator such as in the case of xyz company should consider not only the culture but also the personality of the people behind the Airport Authority.... Therefore, it is necessary on the part of xyz company to satisfy the personality, needs and wants of the people behind the Airport Authority.... hellip; From this paper, it is clear that given that Airport Authority believes that the problem lies behind the poor management of xyz workforce, XYZ should prove that the company has poor facilities and is seriously in need of financial assistance in order to replace the old facilities in both domestic and international airport....
4 Pages (1000 words) Essay

Safety and Health Management System Development

ecommendations form the final step that will include the provision of ideas that can be used to change the current situation of xyz.... n the case of xyz, being the first safety will provide me with the chance to assess the company through various steps on its safety standards, create a report and later provide recommendations that will ensure enhanced levels of health and safety.... The assessment will require different resources from the company that includes the following....
7 Pages (1750 words) Research Paper

Risk management case

Identify four significant and distinct risks, from the perspective of xyz Ltd.... A table would be a suitable way to present your answers, with columns for the risks, the strategy and the type of strategyFor such company as XYZ Ltd that specializes in technological devices for customers with visual impairment, risks in project implementation can be associated with its planning, cooperation with the provider of services, TECHNO company in particular, the quality of components chosen by TECHNO and risk of losing potential customers due to the high competition in this sphere....
2 Pages (500 words) Essay

Security Analysis of A2Z and Redesign of its Network

hrough the results of the NMAP scan, the official network diagram of xyz before merging with ABC is shown.... The author of this paper "Security analysis of A2Z and Redesign of its Network" discusses the statistical network analysis on the examples of two companies, including the quantitive network analysis ranking of assets, NMAP, password cracking, policy creation, information about security policies.... The findings included the location of the company that was One Microsoft Way, Redmond, WA 98052-6399....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us