Description
You are approaching the end of your time supporting Sifers-Grayson. Your team leader has asked you to prepare a 2 page research and analysis brief ("briefing paper") for the company's executives in which you identify the five most important technologies which the company should adopt in order to improve its security posture.
Provide specific details as to why each technology is required (what is the vulnerability or weakness that the technology will address). Then, make a recommendation for how the company should implement that technology. You must provide specific, actionable information. Your recommendations must also be based upon recognized best practices. Include the following steps in your research and analysis as you select and evaluate technologies, products, and services that will help improve the company's security posture:
- Identify Candidate Technologies
- Research Products and Services which implement the technologies
- Identify Vendors
- Evaluate Products & Services (use existing market research)
Cite the sources of information used in your research and analysis (document where you obtained your information from). Use a professional citation format and provide a reference list at the end of your briefing paper.

Explanation & Answer

Attached.
Running head: SECURITY TECHNOLOGIES
Security Technologies for Sifers-Grayson.
Students Name:
Tutor:
Date:
1
SECURITY TECHNOLOGIES
2
Any organization has to protect its data adequately as the repercussion of not doing so
can be fatal whenever a security breach made. In the era we are in, technology is growing and
changing is a rapid manner, this call for the need to secure information for any organization
that is out there. Most operations in organizations require technology; hence employees are
always interacting with such elements. Thomson and Solms (2005) say that information is a
crucial asset for all the organizations and therefore needs protection through security
technologies. All the above also applies to Siefers-Grayson. Below are some of the currency
technologies that can be enforced by the organization to help have a stronger se...
