Sebastian Ramirez, Ch 8, OPTION B
1. As my particular small company, I will share with you our currently business model, and a vendor we have chosen to outsource our computer security to. My small business is a pizza shop where all my financial and product data are stored on a ERM system. Our system is largely monitored by myself, and the two managers I have employed at the business. I have chosen to outsource our computer security has it will cost less than to maintain internally. My managers, nor myself have the revenue adequate enough to gain the knowledge or manage the ERM system internally. For this reason I have chose Symantec Partners to oursource our security towards. A second reason, and one for hiring Symantec Partners, is that experience (in addition to low-costs) is essential to mainitain a secure internal information system. With experience, Symantec can provide us what we cannot ourselves, consistant base of security, and knowledge of solutions in the case ...view middle of the document...
Purely in terms of operating costs, utilizing an individual within my business to manage the security system will prevent me from spending uncessary funds twoardsa third0paty provider. My third argument against outsourcing computer security would be in fact not having control over the security itself. To expand on this idea, if I identify a certain indescrpency in my system, I may not have the access to alter the security on the spot. Awaiting for the third-party entity to respond back to me with a solution may be the time an infiltratot breaches my information system. Overall, there are both advantages and disadvantages to outsourcing the computer security. It depends on what specific security you find as a priority, and allocating on such needs is necessary to making that respective decision.
3. Astreya Partners: Targets large sized businesses, and the focuses on implanting security for a diverse range of possible incryptions for large/big data sets. They’re prices reflect largely on the large clients they work with, most notably Google, Asana, Ericson, and Flex. Their typical pricing model consists of:__________
Symantec: Although diverse in their services, Symantec is largely known for their security protection target towards mid – small size business, in addition to household components as well. Symantec is known for their diverse models of security protection, and contain individuals with flexible performance curves and execution. Their typical pricing model consists of: _______
Kaspersky: Based upon my research and own experience, Kaspersky is largely known for their services targeted towards household users. Their software is largely characterized by security protection against incriptions targeted towards personal and work computers. As a result, Kaspersky is known for their precise protection towards individual assets, rather than mid-large data sets. Their pricing model consists of: _________________
I would like to mention a desclaimer to my findings above. All three entities offer a wide variety of services applicable to a diverse range of clients and markets. My descriptions above capture their greater known uses and products, yet are not solely representative of the findings presented.