Naser SAD Portfolio

docx

School

GURUNANAK INSTITUTE OF TECHNOLOGY *

*We aren’t endorsed by this school

Course

5000

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by ConstableMetalPelican5

Report
Security Portfolio for TCS: Enhancing Cybersecurity Resilience The Security Portfolio for TCS (Tata Consultancy Services) begins with a comprehensive cover page following APA format standards. It serves as an introduction to the document, providing essential details such as the title, author information, and affiliation. 2. Background: The Background section offers a succinct overview of the midterm security assessment conducted on TCS, a leading global IT services and consulting company. This fictitious scenario involves TCS specializing in selling ad spaces within its parent company's magazine. The online database managed by TCS facilitates customer interactions, ad uploads, and payments for magazine placements. The integration with the parent company's database underscores the need for a thorough security assessment to ensure the confidentiality, integrity, and availability of sensitive information. 3. Security Needs and Product Selection: a. Endpoint Protection: Endpoint security is crucial to safeguarding TCS's network from various threats. A suitable product for this need is Symantec Endpoint Protection. It offers advanced threat prevention, detection, and response capabilities. Symantec's endpoint protection provides a multi-layered 1
defense against malware, ransomware, and other cyber threats. Its centralized management console allows efficient monitoring and response to potential security incidents. b. Data Encryption: To address the need for securing sensitive data during transmission, Bitdefender GravityZone Full Disk Encryption stands out. This product offers robust encryption for entire disks, ensuring that data is protected from unauthorized access. Its centralized management simplifies deployment and monitoring, providing a seamless solution for TCS to maintain data confidentiality. c. Network Security: For enhancing network security, Cisco Firepower Threat Defense (FTD) proves to be a reliable choice. Cisco FTD combines firewall capabilities with advanced threat protection, providing a comprehensive defense against cyber threats. Its intrusion prevention system (IPS) and URL filtering capabilities fortify TCS's network perimeter, reducing the risk of unauthorized access and malicious activities. d. Identity and Access Management (IAM): To manage user identities and control access effectively, Microsoft Azure Active Directory (Azure AD) is recommended. Azure AD offers robust identity services, enabling TCS to implement secure and seamless access controls. With features like multi-factor authentication 2
and conditional access policies, Azure AD enhances TCS's IAM capabilities, ensuring that only authorized individuals can access critical resources. e. Security Information and Event Management (SIEM): Splunk Enterprise Security emerges as a powerful SIEM solution for TCS. Splunk consolidates and analyzes security event data from various sources, providing real-time insights into potential security incidents. Its correlation and visualization capabilities empower TCS to proactively detect and respond to security threats, enhancing overall cybersecurity resilience. f. Incident Response and Management: For effective incident response, the selection of IBM Resilient is apt. IBM Resilient offers an incident response platform that streamlines and automates response processes. Its orchestration and automation capabilities enable TCS to respond promptly to security incidents, minimizing the impact and downtime associated with potential breaches. In conclusion, the Security Portfolio for TCS combines industry-leading cybersecurity products tailored to address the specific security needs identified during the midterm assessment. This strategic selection aims to fortify TCS's cyber defenses, ensuring a robust and resilient security posture against evolving threats. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References: Symantec Corporation. (n.d.). Symantec Endpoint Protection. Bitdefender. (n.d.). GravityZone Full Disk Encryption. Cisco Systems, Inc. (n.d.). Cisco Firepower Threat Defense (FTD). Microsoft Corporation. (n.d.). Azure Active Directory. Splunk Inc. (n.d.). Splunk Enterprise Security. IBM Corporation. (n.d.). Resilient Incident Response Platform. 4