Implementation of Bitdefender GravityZone Business Security for IT Security Requirements
Verified
Added on  2023/06/04
|8
|1359
|146
AI Summary
This document provides a plan for implementing Bitdefender GravityZone Business Security for IT security requirements. It includes hardware and software requirements, technical specifications, and a documentation plan for implementation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Project
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents Part A.....................................................................................................................................................2 Steps 1: Report on business requirements........................................................................................2 Steps 2: Evaluate the impact of the new business solutions.............................................................4 Part B.....................................................................................................................................................4 Create a documentation plan for implementation............................................................................4 References.............................................................................................................................................7
Part A Steps 1: Report on business requirements According toSukwong, Kim, & Hoe, (2011),with the raise of cyber attacks, securing organization information and data as possible is on mind of all information technology managers. While antivirus software forever used in conjunction with an exact security best practices plan, each organization antivirus offering better levels of protection from malicious nastiest and malware(Stone-Grosset al.,2013). Therefore, as an IT manager, I would recommend that the organization needs to implement Bitdefender GravityZone Business Security. It helps the organization to provide automatic anti malware, URL filtering, web advisor and firewall protection and managing multiple devices externally and internally. Hardware and software requirements requirementsOperating system CPURAMHDD Minimum system requirements Windows 7,8,8.1,10 Dualcore 1.66Ghz 1 GB1.5GB Recommended system requirements Windows 7,8,8.1,10 IntelCore2 Duo(2Ghz)or equivalent processor 2GB2GB Software requirementsInternet explorer 10 and higher Integrated withMozilla firewall version 30 and higher Google chrome version 34 and higher Outlook 2007, 2010,2013 and 2016 Technical specification of business ï‚·Server operating system such as Windows server 2012, 2012 R2 ï‚·Organization must have an internet connection ï‚·All devices i.e. PCs and laptop must connected with organization database server
Network and interface requirements User interface The user interface for the antivirus software is compatible to any web browsers such as Mozilla, Google Chrome, internet explorer by which users can access the system. Hardware and network interface Since antivirus software is run over the internet, therefore all hardware must be connected with the internet. The hardware and network interface for this application software are WAN- LAN, modem and Ethernet Cross Cables. Software interface The antivirus software must be communicated with the IT managers to determine the traffic reportsand malwarepractices(Cheswick, Bellovin,& Rubin, 2003). Thisapplication software is communicated with CRM of the organization to provide protection. Copyright issues and intellectual properties The organization can use the solution or antivirus software with permitted number of devices of personal computers, mobile phones etc. The organization has an authority to use only solutions, not granted the organization to any rights or title to any intellectual property rights in the documentation or solutions. All rights to the antivirus solutions and documentation including copyrights, trade secrete rights, patents, intellectual property rights and trademarks are reserved by the vendors. IT security requirements The main objective of an organization is to protect their information through unauthorized users, protection against security vulnerabilities, protection against phishing and malware whensurfing,protectionagainstmanipulatedUSBdevices.Thusimplementationsof Bitdefender GravityZone Business Security provide all these securities to organization in successful manner.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Steps 2: Evaluate the impact of the new business solutions Bitdefender GravityZone Business Security offers comprehensive protection for virtual and physical servers and desktops, plus portable devices and provides comprehensive security ad efficient management. It helps the organization to full control and improved organization productivity and reduces malware practices in successful manner(Bitdefender, 2016).Use of this software not only helps the business to protect from unauthorized users but also helps them to secure from any unknown treats. This would help the business to protect from phishing attacks, spyware and viruses, provide robust web protection and quick scan of removal devices(Zaidi, & Rajarajan, 2015). Therefore it can be said that implementation of this solution helps the business to enhance their performance and fulfil all requirements in successful manner. Moreover this would also help them to improve supply chain process of the business. Part B Create a documentation plan for implementation Hardware and software implementation The organization needs to update server, web console, and communication servers and database. The organization needs to install CPUs, RAM and hard disks in computers to successfully install the antivirus software. If an organization can use 250 end points then they needs to use 4 CPUs, 6GB RAM and 50GB hard disk space. Hardware implementation Minimum 2.4 GHz single core CPU Installed RAM, CPU and hard disk Installation of LANs, internet connection Software implementation Windows 7 or Windows 8 operating system installation on PCs
Installation of Google Chrome, Mozilla browsers Windows server 2008, 2012 In order to successfully operating the solutions, organization needs to offers training and development to their staffs members and upgrade skills. This would help the business to function its functionalities in successful manner. Organization needs to conduct one week training to their staff’s members regarding solution functionalities. Total time needed to install the solution in business operations is one month. Main business resources for these solutionsareITstaffsmembers,ITmanagers,server,Personalcomputers,internet connectivity etc. The main result that the business expected from this solution is to protect organization data and improve organization functionalities. Moreover organization also expected to secure the computersbyunauthorizedusersandviruses.ThecostassociatedwithBitdefender GravityZone Business Security is following; Numbers of end points Price25050010002000 Total$ 12,300.00$ 24,600.00$49,200.00$ 98,400.00 Technical architecture for business solutions Connectivity requirements, internet connectivity, all devices are connected in LANs and WANs, mail servers, creating database backups etc. Test results of the business solutions The main objective of test results is intended to shows how effective the solutions helps the organization to protect from unauthorized users and recognizing and blocking phishing sites therefore that clients from beings defrauded by these sites(Roman, Lopez, & Mambo, 2018). Target audience are a user who does not feel more confidence of their own capabilities to determine and avoided phishing attacks.Testing of solutions for business is illustrated in below;
TestingDevicesStatus Malwareprotection test PCsandmobile devices Approved Malwareprotection test PCsandmobile devices Approved Blocked unauthorized users PCsandmobile devices Approved Performance outcomes PCsandmobile devices Approved Anti phishing testPCsandmobile devices Approved
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References Stone-Gross, B., Abman, R., Kemmerer, R. A., Kruegel, C., Steigerwald, D. G., & Vigna, G. (2013). The underground economy of fake antivirussoftware. InEconomicsof information security and privacy III(pp. 55-78). Springer, New York, NY. Sukwong,O.,Kim,H.S.,&Hoe,J.C.(2011).CommercialAntivirusSoftware Effectiveness: An Empirical Study.IEEE Computer,44(3), 63-70. Bitdefender. (2016). Bitdefender GravityZone Installation Guide. [online] Available at: https://www.bitdefender.co.th/resources/GravityZoneEnterprise/Current/ Documentation/en_US/Bitdefender_GravityZone_InstallationGuide_7_enUS.pdf [Accessed 25 Sep. 2018]. Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003).Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc.. Zaidi, K., & Rajarajan, M. (2015). Vehicular internet: security & privacy challenges and opportunities.Future Internet,7(3), 257-275. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges.Future Generation Computer Systems,78, 680-698.