Organizational needs of TechFite

Document Type:Business Plan

Subject Area:Technology

Document 1

Thirdly, TechFite needs to comply with the FISMA regulations so that it can safely work on government contracts. Lastly, the company needs a reliable and efficient log scanning tool with a real-time performance so that new network traffics can be easily monitored and controlled. From this analysis, it can be seen that the company’s scope is to acquire sustainable security operations for its activities. It is noted that TechFite is looking forward to expanding its operations by collaborating with other organizations and government agencies. Therefore, this can be seen as a development strategy aimed at securing the firm's data from any unauthorized access or possible manipulation by hackers. Secondly, the firm can acquire big data analytics to help in the processing of large volumes of data.

Sign up to view the full document!

As it has been illustrated that TechFite requires an efficient technique for scanning its large volume of data, it becomes necessary for the company to acquire big data technology so that information processing can be improved (Chen, Chiang & Storey, 2012). This is because, from the case study, it is mentioned that TechFite is experiencing problems in handling the increasing log of network traffic that emerges from its two-firewall system. In addition, it is also stated that TechFite needs an open source solution which can help the firm in automating log correlations of host-based appliances as well as network appliances. The case study also suggests at a possible acquisition of a real-time log scanning and behavior analysis of every incoming network traffic. The first procedure in the adoption process will require that all the company’s information is securely stored in a backup system (Hollenstein, 2004).

Sign up to view the full document!

This is because some essential data might be lost if the process of installation. Another important aspect here is that the firm will need to train its employees about the new processes which have been introduced in the operations. From the diagram below, it can be seen that any request for access is managed by a special console which scans the serves to confirm the authenticity of a particular username and password. Here, a user will be prompted to key in the credentials which are then processed by the epic hyperspace and the primary authentication device. As it has been discussed, TechFite will be launching hardware authentication and user-behavior analytics. Therefore, it implies that every action will be accompanied by a username and security password (Simpson & Schaumont, 2006).

Sign up to view the full document!

Secondly, the firm will benefit from an improved protection level from hackers and fraudsters. When the company’s information is not properly secured, it becomes easy for the internet rogues to manipulate the systems and expose a firm’s information to danger. Thirdly, the firm will benefit from an improved speed and accuracy in the scanning of data. Firstly, the firms’ operational processes may be disrupted due to the implementation of sophisticated software. Secondly, the company risks losing its information to hackers who might succeed in manipulating the backup storage. Lastly, the firm may incur additional expenses in acquiring the software as well as the training of its employees to gain the skills for operating the new technology. There will be an improvement in the coordination of functions within the firm.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable