StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security - Case Study Example

Cite this document
Summary
This case study "Information Security" focuses on the best practices for the IT systems of an IT solutions firm called Check Point Software Technologies Ltd. Check Point is charged with the development, marketing and supporting different categories of software plus…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Information Security
Read Text Preview

Extract of sample "Information Security"

Download file to see previous pages

Supporting different categories of software plus combined hardware and software products as well as services designed for IT security, providing a portfolio of data security, network security alongside other management solutions. A large portion of the network security solutions offered by the company comply with the manner of operation of an NXG platform, that offers an integrated security architecture; centralized and real-time security updates; central enforcement and management of security policy.

The company also provides a host of solutions that target data security. This is attained through the Pointsec product line, capable of protecting and encrypting sensitive corporate data resident on PCs plus other mobile computing facilities. Check Point’s Open Platform for Security (OPSEC) framework permits clients to expand the capabilities of the company’s services and products whilst enhancing integration with top-level hardware appliances as well as third-party security software utilities.

The particular services and products offered by the company include virtual private network (VPN) and firewall gateways, VPN and firewall security appliances, end-point security, subscriptions for real-time security updates, collaborative business enterprise support and enterprise-focused support. Checkpoint has up to 500 employees with the following departments: Executive, Accounting, Administration, Network Development, Network Management, Human Resource Management, Production Database Management, Software Development and Marketing.

The IT facilities owned by Check Point encompass web servers, SQL Accounting servers, DNS servers, File Server, Microsoft Exchange Mail Server, Active Directory Main Controller, Proxy Server, Share Market Analyzer Server, SMS Server as well as CRM Database Server. Additionally, the LAN or WAN connections that form the operating environment for the aforementioned servers will be treated as IT facilities.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security Case Study Example | Topics and Well Written Essays - 5500 words, n.d.)
Information Security Case Study Example | Topics and Well Written Essays - 5500 words. https://studentshare.org/information-technology/1850721-project
(Information Security Case Study Example | Topics and Well Written Essays - 5500 Words)
Information Security Case Study Example | Topics and Well Written Essays - 5500 Words. https://studentshare.org/information-technology/1850721-project.
“Information Security Case Study Example | Topics and Well Written Essays - 5500 Words”. https://studentshare.org/information-technology/1850721-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security

Information Security Proposal

Also the privacy issues of the… Being mobile phone users it is essential for us to understand how the company deals with the Information Security and the measures that are in place for the IT disaster recovery plan as Information Security Proposal Aim and Objectives of Project: To identify the issue faced by mobile phone network providers in regards to the privacy issues and the network downtime issues.... Justification of the Project:Information Security issues within firms are many....
2 Pages (500 words) Essay

Information Security and Ethics

The organization may also be required to back up the data in safe external Information Security and Ethics Security Threat A of the security threat, its impact, and an example.... xample is a network router Installation of firewall, security passwords, and data encryption should be done.... ork citedInternet security, Encyclopedia of Business 2nd ed.... om/small/Inc-Mail/Internet-security.... What can be done keep information secure from the threat....
2 Pages (500 words) Essay

Certifications information security professionals. (job search)

Information Security officer and security specialist Jobs which have been advertised require SSP and CISSP certifications and… The requirement for these certifications is issued in seeking to ensure the individuals who are hired are considered to have satisfactory knowledge and proficiency to handle aspects of security on information and technology systems (Harris, 2010).... These certifications Certifications Information Security Professionals There are various certifications which are requiredin various Information Security jobs which are offered to specialists within the industry....
1 Pages (250 words) Essay

Information Security Management

"Information Security Management" paper is mainly concerned with the management of the security for the information of the customer.... hellip; This research has presented a comprehensive overview of Information Security and management.... This research has outlined the main Information Security vulnerabilities and hazards.... Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational Information Security measures....
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

The "Information Security Policy of Organization" research describes the development of multi-dimensional Information Security policy implementation.... This type of Information Security policy will be able to address all aspects of information management and handling for an organization.... hellip; In nonexistence appropriate Information Security policy we can have a situation that can lead to potential information exploitation cases....
6 Pages (1500 words) Research Paper

Information Security Audit and Assurance

This paper, Information Security Audit and Assurance, outlines that in the ever-changing society, the need for comprehensive security measures cannot be overstated.... nbsp;… As the paper highlights, Information Security has grown to become one of the world's greatest assets since it might make the difference between failure and success.... The continued emergence of various security-related challenges in the recent past has not made things any better....
7 Pages (1750 words) Case Study

Enterprise Information Security and Privacy

In the paper “Enterprise Information Security and Privacy” the author focuses on e-commerce, which captured the online marketing arena.... The 'Payment Card Industry Data security Standard (PCI DSS)' is a unique system.... In today's time when security has become such an important factor PCI, DSS has brought standardization for growingSeventy-nine percent of organizations in our study had at least one data breach.... It also helps in increasing customer satisfaction by negotiating their security concerns....
6 Pages (1500 words) Assignment

Concept Mapping for Information Security

… The paper "Concept Mapping for Information Security   " is a good example of a term paper on information technology.... The paper "Concept Mapping for Information Security   " is a good example of a term paper on information technology.... Concept Map Attacks - Likelihood and impact Phishing and Spear Phishing Attack Likelihood: Low Phishing is one of the most common security attacks that make use of the emails in order to trick the users to reveal their personal details....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us