Security system assessment
Use Cases and Deployment Scope
Our client uses this software for security purposes. It provides security against different online threats, captures or identifies any phishing attacks. A lot of risks are covered and controlled by using this software. It identifies the vulnerabilities and potential threats so that proper action is taken in advance. It provides network security to all the devices connected through the network.
Pros
- It identify and report security breaches
- It secures VPN access
- Wireless network security is optimized
- Voip security risks are addressed
Cons
- Although it has lot of artificial intelligence to identify risks and threats, it should stop any attack or information gathering from intruders
- It utilizes lot of system resources, it should be improved
- It makes system slow, it should be addressed
Most Important Features
- Its interface is simple, interactive and easy to use
- Large support community
- Easy to install
Return on Investment
- The resource security ensures business system continuity against any contingency
- Work interruptions due to malware and other threats are minimzed
- It ensures long term use of the IT systems. Eg if Windows is corrupted every day then you will incur extra cost for reinstall. It saves cost.
Alternatives Considered
Norton Secure VPN
Other Software Used
Oracle Access Management, AWS Identity & Access Management, AVG AntiVirus Business Edition
