Implementation of Bitdefender GravityZone Business Security for IT Security Requirements
VerifiedAdded on  2023/06/04
|8
|1359
|146
AI Summary
This document provides a plan for implementing Bitdefender GravityZone Business Security for IT security requirements. It includes hardware and software requirements, technical specifications, and a documentation plan for implementation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Project
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Part A.....................................................................................................................................................2
Steps 1: Report on business requirements........................................................................................2
Steps 2: Evaluate the impact of the new business solutions.............................................................4
Part B.....................................................................................................................................................4
Create a documentation plan for implementation............................................................................4
References.............................................................................................................................................7
Part A.....................................................................................................................................................2
Steps 1: Report on business requirements........................................................................................2
Steps 2: Evaluate the impact of the new business solutions.............................................................4
Part B.....................................................................................................................................................4
Create a documentation plan for implementation............................................................................4
References.............................................................................................................................................7
Part A
Steps 1: Report on business requirements
According to Sukwong, Kim, & Hoe, (2011), with the raise of cyber attacks, securing
organization information and data as possible is on mind of all information technology
managers. While antivirus software forever used in conjunction with an exact security best
practices plan, each organization antivirus offering better levels of protection from malicious
nastiest and malware (Stone-Gross et al., 2013). Therefore, as an IT manager, I would
recommend that the organization needs to implement Bitdefender GravityZone Business
Security. It helps the organization to provide automatic anti malware, URL filtering, web
advisor and firewall protection and managing multiple devices externally and internally.
Hardware and software requirements
requirements Operating
system
CPU RAM HDD
Minimum
system
requirements
Windows
7,8,8.1,10
Dual core
1.66Ghz
1 GB 1.5GB
Recommended
system
requirements
Windows
7,8,8.1,10
Intel Core 2
Duo(2Ghz) or
equivalent
processor
2GB 2GB
Software requirements Internet explorer 10 and higher
Integrated with Mozilla firewall version 30 and higher
Google chrome version 34 and higher
Outlook 2007, 2010,2013 and 2016
Technical specification of business
ď‚· Server operating system such as Windows server 2012, 2012 R2
ď‚· Organization must have an internet connection
ď‚· All devices i.e. PCs and laptop must connected with organization database server
Steps 1: Report on business requirements
According to Sukwong, Kim, & Hoe, (2011), with the raise of cyber attacks, securing
organization information and data as possible is on mind of all information technology
managers. While antivirus software forever used in conjunction with an exact security best
practices plan, each organization antivirus offering better levels of protection from malicious
nastiest and malware (Stone-Gross et al., 2013). Therefore, as an IT manager, I would
recommend that the organization needs to implement Bitdefender GravityZone Business
Security. It helps the organization to provide automatic anti malware, URL filtering, web
advisor and firewall protection and managing multiple devices externally and internally.
Hardware and software requirements
requirements Operating
system
CPU RAM HDD
Minimum
system
requirements
Windows
7,8,8.1,10
Dual core
1.66Ghz
1 GB 1.5GB
Recommended
system
requirements
Windows
7,8,8.1,10
Intel Core 2
Duo(2Ghz) or
equivalent
processor
2GB 2GB
Software requirements Internet explorer 10 and higher
Integrated with Mozilla firewall version 30 and higher
Google chrome version 34 and higher
Outlook 2007, 2010,2013 and 2016
Technical specification of business
ď‚· Server operating system such as Windows server 2012, 2012 R2
ď‚· Organization must have an internet connection
ď‚· All devices i.e. PCs and laptop must connected with organization database server
Network and interface requirements
User interface
The user interface for the antivirus software is compatible to any web browsers such as
Mozilla, Google Chrome, internet explorer by which users can access the system.
Hardware and network interface
Since antivirus software is run over the internet, therefore all hardware must be connected
with the internet. The hardware and network interface for this application software are WAN-
LAN, modem and Ethernet Cross Cables.
Software interface
The antivirus software must be communicated with the IT managers to determine the traffic
reports and malware practices (Cheswick, Bellovin, & Rubin, 2003). This application
software is communicated with CRM of the organization to provide protection.
Copyright issues and intellectual properties
The organization can use the solution or antivirus software with permitted number of devices
of personal computers, mobile phones etc. The organization has an authority to use only
solutions, not granted the organization to any rights or title to any intellectual property rights
in the documentation or solutions. All rights to the antivirus solutions and documentation
including copyrights, trade secrete rights, patents, intellectual property rights and trademarks
are reserved by the vendors.
IT security requirements
The main objective of an organization is to protect their information through unauthorized
users, protection against security vulnerabilities, protection against phishing and malware
when surfing, protection against manipulated USB devices. Thus implementations of
Bitdefender GravityZone Business Security provide all these securities to organization in
successful manner.
User interface
The user interface for the antivirus software is compatible to any web browsers such as
Mozilla, Google Chrome, internet explorer by which users can access the system.
Hardware and network interface
Since antivirus software is run over the internet, therefore all hardware must be connected
with the internet. The hardware and network interface for this application software are WAN-
LAN, modem and Ethernet Cross Cables.
Software interface
The antivirus software must be communicated with the IT managers to determine the traffic
reports and malware practices (Cheswick, Bellovin, & Rubin, 2003). This application
software is communicated with CRM of the organization to provide protection.
Copyright issues and intellectual properties
The organization can use the solution or antivirus software with permitted number of devices
of personal computers, mobile phones etc. The organization has an authority to use only
solutions, not granted the organization to any rights or title to any intellectual property rights
in the documentation or solutions. All rights to the antivirus solutions and documentation
including copyrights, trade secrete rights, patents, intellectual property rights and trademarks
are reserved by the vendors.
IT security requirements
The main objective of an organization is to protect their information through unauthorized
users, protection against security vulnerabilities, protection against phishing and malware
when surfing, protection against manipulated USB devices. Thus implementations of
Bitdefender GravityZone Business Security provide all these securities to organization in
successful manner.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Steps 2: Evaluate the impact of the new business solutions
Bitdefender GravityZone Business Security offers comprehensive protection for virtual and
physical servers and desktops, plus portable devices and provides comprehensive security ad
efficient management. It helps the organization to full control and improved organization
productivity and reduces malware practices in successful manner (Bitdefender, 2016). Use of
this software not only helps the business to protect from unauthorized users but also helps
them to secure from any unknown treats. This would help the business to protect from
phishing attacks, spyware and viruses, provide robust web protection and quick scan of
removal devices (Zaidi, & Rajarajan, 2015).
Therefore it can be said that implementation of this solution helps the business to enhance
their performance and fulfil all requirements in successful manner. Moreover this would also
help them to improve supply chain process of the business.
Part B
Create a documentation plan for implementation
Hardware and software implementation
The organization needs to update server, web console, and communication servers and
database. The organization needs to install CPUs, RAM and hard disks in computers to
successfully install the antivirus software. If an organization can use 250 end points then they
needs to use 4 CPUs, 6GB RAM and 50GB hard disk space.
Hardware implementation
Minimum 2.4 GHz single core CPU
Installed RAM, CPU and hard disk
Installation of LANs, internet connection
Software implementation
Windows 7 or Windows 8 operating system installation on PCs
Bitdefender GravityZone Business Security offers comprehensive protection for virtual and
physical servers and desktops, plus portable devices and provides comprehensive security ad
efficient management. It helps the organization to full control and improved organization
productivity and reduces malware practices in successful manner (Bitdefender, 2016). Use of
this software not only helps the business to protect from unauthorized users but also helps
them to secure from any unknown treats. This would help the business to protect from
phishing attacks, spyware and viruses, provide robust web protection and quick scan of
removal devices (Zaidi, & Rajarajan, 2015).
Therefore it can be said that implementation of this solution helps the business to enhance
their performance and fulfil all requirements in successful manner. Moreover this would also
help them to improve supply chain process of the business.
Part B
Create a documentation plan for implementation
Hardware and software implementation
The organization needs to update server, web console, and communication servers and
database. The organization needs to install CPUs, RAM and hard disks in computers to
successfully install the antivirus software. If an organization can use 250 end points then they
needs to use 4 CPUs, 6GB RAM and 50GB hard disk space.
Hardware implementation
Minimum 2.4 GHz single core CPU
Installed RAM, CPU and hard disk
Installation of LANs, internet connection
Software implementation
Windows 7 or Windows 8 operating system installation on PCs
Installation of Google Chrome, Mozilla browsers
Windows server 2008, 2012
In order to successfully operating the solutions, organization needs to offers training and
development to their staffs members and upgrade skills. This would help the business to
function its functionalities in successful manner. Organization needs to conduct one week
training to their staff’s members regarding solution functionalities. Total time needed to
install the solution in business operations is one month. Main business resources for these
solutions are IT staffs members, IT managers, server, Personal computers, internet
connectivity etc.
The main result that the business expected from this solution is to protect organization data
and improve organization functionalities. Moreover organization also expected to secure the
computers by unauthorized users and viruses. The cost associated with Bitdefender
GravityZone Business Security is following;
Numbers of end points
Price 250 500 1000 2000
Total $ 12,300.00 $ 24,600.00 $ 49,200.00 $ 98,400.00
Technical architecture for business solutions
Connectivity requirements, internet connectivity, all devices are connected in LANs and
WANs, mail servers, creating database backups etc.
Test results of the business solutions
The main objective of test results is intended to shows how effective the solutions helps the
organization to protect from unauthorized users and recognizing and blocking phishing sites
therefore that clients from beings defrauded by these sites (Roman, Lopez, & Mambo, 2018).
Target audience are a user who does not feel more confidence of their own capabilities to
determine and avoided phishing attacks. Testing of solutions for business is illustrated in
below;
Windows server 2008, 2012
In order to successfully operating the solutions, organization needs to offers training and
development to their staffs members and upgrade skills. This would help the business to
function its functionalities in successful manner. Organization needs to conduct one week
training to their staff’s members regarding solution functionalities. Total time needed to
install the solution in business operations is one month. Main business resources for these
solutions are IT staffs members, IT managers, server, Personal computers, internet
connectivity etc.
The main result that the business expected from this solution is to protect organization data
and improve organization functionalities. Moreover organization also expected to secure the
computers by unauthorized users and viruses. The cost associated with Bitdefender
GravityZone Business Security is following;
Numbers of end points
Price 250 500 1000 2000
Total $ 12,300.00 $ 24,600.00 $ 49,200.00 $ 98,400.00
Technical architecture for business solutions
Connectivity requirements, internet connectivity, all devices are connected in LANs and
WANs, mail servers, creating database backups etc.
Test results of the business solutions
The main objective of test results is intended to shows how effective the solutions helps the
organization to protect from unauthorized users and recognizing and blocking phishing sites
therefore that clients from beings defrauded by these sites (Roman, Lopez, & Mambo, 2018).
Target audience are a user who does not feel more confidence of their own capabilities to
determine and avoided phishing attacks. Testing of solutions for business is illustrated in
below;
Testing Devices Status
Malware protection
test
PCs and mobile
devices
Approved
Malware protection
test
PCs and mobile
devices
Approved
Blocked
unauthorized users
PCs and mobile
devices
Approved
Performance
outcomes
PCs and mobile
devices
Approved
Anti phishing test PCs and mobile
devices
Approved
Malware protection
test
PCs and mobile
devices
Approved
Malware protection
test
PCs and mobile
devices
Approved
Blocked
unauthorized users
PCs and mobile
devices
Approved
Performance
outcomes
PCs and mobile
devices
Approved
Anti phishing test PCs and mobile
devices
Approved
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Stone-Gross, B., Abman, R., Kemmerer, R. A., Kruegel, C., Steigerwald, D. G., & Vigna, G.
(2013). The underground economy of fake antivirus software. In Economics of
information security and privacy III (pp. 55-78). Springer, New York, NY.
Sukwong, O., Kim, H. S., & Hoe, J. C. (2011). Commercial Antivirus Software
Effectiveness: An Empirical Study. IEEE Computer, 44(3), 63-70.
Bitdefender. (2016). Bitdefender GravityZone Installation Guide. [online] Available at:
https://www.bitdefender.co.th/resources/GravityZoneEnterprise/Current/
Documentation/en_US/Bitdefender_GravityZone_InstallationGuide_7_enUS.pdf
[Accessed 25 Sep. 2018].
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet security:
repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc..
Zaidi, K., & Rajarajan, M. (2015). Vehicular internet: security & privacy challenges and
opportunities. Future Internet, 7(3), 257-275.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78,
680-698.
Stone-Gross, B., Abman, R., Kemmerer, R. A., Kruegel, C., Steigerwald, D. G., & Vigna, G.
(2013). The underground economy of fake antivirus software. In Economics of
information security and privacy III (pp. 55-78). Springer, New York, NY.
Sukwong, O., Kim, H. S., & Hoe, J. C. (2011). Commercial Antivirus Software
Effectiveness: An Empirical Study. IEEE Computer, 44(3), 63-70.
Bitdefender. (2016). Bitdefender GravityZone Installation Guide. [online] Available at:
https://www.bitdefender.co.th/resources/GravityZoneEnterprise/Current/
Documentation/en_US/Bitdefender_GravityZone_InstallationGuide_7_enUS.pdf
[Accessed 25 Sep. 2018].
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet security:
repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc..
Zaidi, K., & Rajarajan, M. (2015). Vehicular internet: security & privacy challenges and
opportunities. Future Internet, 7(3), 257-275.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78,
680-698.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.