Verified Document

Securing The Host And Data Research Paper

The bolt and straps can only be released with a key that authorized personnel control. However, the servers could still be tampered with. The primary suggestion would be to implement a policy that requires the server room to remained locked during business hours and only authorized personnel have access to the room. The three programs compared are Fidelis XPS, Code Green Content Inspector, and Palisade's Packet Sure.

Fidelis XPS

Code Green

Palisade Packet Sure

Price

$132,830.00

$30,000.00

$31,000.00

Performance: Catching Harmful Files

84.00%

90.00%

55.00%

Configuration

Difficult, used command post server setup

Simple with graphic interface

Simplest with setup wizard and walk through instructions

Finger Printing

Comes with its own program, and does not allow outside programs

Fingerprints all sorts of data and allows scenarios...

It only detected 55% of harmful files, which meant that almost half of the harmful files being transferred back and forth passed through without detection. Additionally, if a network administrator is not very savvy with computer reports, they will have difficulty harvesting and interpreting reports from Palisade, making it nearly impossible to detect exactly what was missing.
The primary weakness with Fidelis is its incompatibility with other programs. At some point, Fidelis will become more susceptible to hackers who would be able to easily access information using newer programs.

Cite this Document:
Copy Bibliography Citation

Related Documents

Securing Virtual Machines
Words: 1016 Length: 3 Document Type: Term Paper

Virtualized Server Security Virtualized servers are faced with similar security concerns as their physical counterparts. The only difference is that virtualized servers have other threats that are specific to virtualized machines. Virtualization is a new technology, and with any new technology, there are new threats and security concerns that will accompany it. When compared to its physical counterparts, virtualized servers are more prone to threats because they are clustered. If one

Securing Computer Hardware Using Tpm
Words: 1288 Length: 4 Document Type: Research Paper

Trusted Platform Module is a dedicated microprocessor that is designed to secure computer hardware. TPM secures hardware by integrating cryptographic keys into the computer devices. According to Potter (2009) the cryptographic keys are specific to the host system and they are used for authenticating the host systems hardware. Using hardware-based cryptography will ensure that all the information stored in the hardware is protected from any external software attacks. TPM security

Advances in Technology Have Transformed the Way
Words: 1448 Length: 5 Document Type: Essay

advances in technology have transformed the way that firms are addressing security related issues. This is because most devices have become much smaller and they are often focused on providing users with remote access. As a result, these kinds of platforms are a potential danger to all organizations. ("Guidelines for Securing Mobile Devices," 2012) Evidence of this can be seen with observations in a report prepared by Stanford University which

SL/https De-Encryption SSL/https is Widely
Words: 17577 Length: 63 Document Type: Dissertation

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use

Invention of the Internet Has
Words: 6685 Length: 20 Document Type: Capstone Project

This software is used to perform common tasks like storage, data back up and data transfers. Small and medium businesses have embraced this technology because it involves no start up costs (like servers, hard disks, technicians etc.) therefore making it cost effective. Basically payment is based on the storage space taken by the user, again, this makes it user friendly. It may also be referred to as hosted storage. The flying

Information Technology IT Security Systems
Words: 3128 Length: 11 Document Type: Essay

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now