Tuesday, May 5, 2020

Anomaly Detection Systems in Networks †Free Samples to Students

Question: Discuss about the Anomaly Detection Systems in Networks. Answer: Introduction IBM Internet security systems, which was previously known as Internet Security Systems, or ISS or ISSX kept after its ticker symbol in NASDAQ. It provides software security, since 1994. IBM acquired it in 2006 and since then it became IBM internet Security Systems. IBM Internet Security Systems has its headquarter in Sandy Springs, which is near Atlanta (Georgia, USA). Previously the activities related to development was carried out in Mountain View( California, USA), Reading, UK and Sydney, Australia but now it has been relocated in Atlanta. It has offices worldwide in, Brussels, Belgium, Brisbane, Tokyo, Banglore, Hortolandia (Braxil), Southfield, Michigan(USA), Toronto, Ontario (Canada), Boulder (USA), Krakow (Pland), Heredia, Costa Rica (Arnold et al., 2016). In 1992, Christopher Klaus while he was in Georgia Institute of Technology developed the first version of Internet Security Scanner. In 1994, he founded Internet Security Systems (ISS) for further development and to Market Internet Security Scanner, which later was called Internet Scanner. Chris Klaus became the Chief Technology Officer, while Tom Noonan became became the Chief Executive Officer in the year 1995. David Strohm of Greylock Ventures and Bob Davoli of Sigma Partners in the year 1996 were the first venture capitalist to invest in Internet Security systems, in 1997 the second venture capitalist were Ted Schlein from Kleinner Perkins ( Sinharoy et al., 2015). Later products in Seurity Software were developed which included Netework Sensor and Server Sensor. On August 2006 IBM approached the company with a an intention to acquire the co pany for $1.36 billion acquired Internet Security Systems, it also wanted to acquire its subsidiary and hence the total amount came up to $1.93 billion. The deal got its approval on October 16 2006. From then it got its name IBM Security systems. Strengths IBM security systems were the first to reach globally, nodoubt they are financially very strong. The management skills of IBMSS are very good and efficient. They have Innovative labs that help in innovative production. The have a strong brand reputation. There is integration in the products and services offered by IBM security systems. Weakness- Providing the software solutions requires lots of costs. Their main focus is only large enterprises, small enterprises does not benefit much from the products and services provided by IBM. Opportunities- There is a scope of growth worldwide in the IT security services. Their focus is on high-end business and IT consulting. Expansion in their operations in countries like china would benefit the company a lot. Threat The employee cost is increasing because of the demand in production and operations the cost of hiring the employees is increasing. The company has to face completion from other cyber security companies like CISCO. There is a consolidation in the end markets. The company is facing an intense competition from low wages countries like China and Indonesia. Slow down in global economy has affected major IT companies as well in the past and it is a potential threat in future as well PESTL Analysis Political environment The political environment of few countries where IBM system securities operate are not that stable, hence it affects the operations of IT industries as well. The government of USA has announced that US companies that outsource IT works to other countries, they will not get tax benefit. Instability in economic conditions in developing countries, terrorist attacks and war like situations affects the operations of the IT industries to a lot extent(Sari, 2015). Environmental- More and more emphasis is put on the application on energy efficient processes and equipments, the IT companies are nowadays focusing on carbon footprints, energy utilization, water consumption. Social- The social environment differs from the country to country, English being the widely spoken language in most of the countries. Education level differs from country to country, therefore there always arises a demand for skillful manpower if a particular country has less skillful manpower they hire from other countries. Technological- Change and up gradation in technologies affect the products and services provided by the IT Industries, there also is demand to train the employees according to the change in the technology for better productivity and operations. Legal The tax benefits and relevant regulations regarding the establishment of Special economic zones depend from country to country, like in India there is a tax benefit for establishment of SEZ, so it acts as a positive factor for the IT companies (Rea Parker, 2013). Core Competencies of the company Effective management is one of the major competencies of the country, apart from that, products and services and IT solutions offered by the Companies have helped in capturing the market share largely, they are market leaders, and global expansion, they are operating in many countries (Yaeli et al., 2014). The application of new technologies in storage, transportation, and reverse logistics have given significant reduction in costs and there is improvement in customer service. The supply chain management services of IBM security systems offers, logistics strategy and network optimization, improvement of ware house process. The implement process and technology change to improvise the inventory and warehouse operations by envisioning of distribution process, proper selection of the software and its implementation, the layout of the warehouse and its design. Tracking the time taken by employee, calculating the estimated time taken for a task. Comparing the records, the actual vs. the estimated time of the task (Cash et al., 2016). The objective of IBM Security Systems is to acquire, increase and retain customers. IBM announced that the company has collaborated its different channels of sales and marketing staffs into one group. They aim at optimizing the channel strategy to maximize the value. They asses, evaluate and make strategies for the customers to address markets, marketing, sales, services and online interaction. They help integration, analysis and management of cross-channel relationship marketing using innovation in technology to encourage increase in revenue and reduce costs(Arnold et al., 2016). The IT operations at IBM includes collection of IT data from various sources, they analyze those data in a broader context, identifying the problems in advance. Extraction from key operational data types, like log file, events, trouble tickets and performance metrics. It aims at achieving faster mean time to repair, MTTR. Reduction of costs through operational efficiency. It focuses on countering cyber threats and frauds(Mahmood Afzal, 2013). The services provided by IBM security systems are related to detection, addressing and prevention of integrated security breaches. Services like, Cloud security, Advanced fraud protection network protection, mobile security and security intelligence and operations are provided by IBM security( De Assuncao Netto, 2014). It also provides data security services and hardware security modeling. At IBM human resources functions in a way that encourages change by finding new ways to implement new strategies. Many HR groups, they wait for business requests for administrative individual transactions(Ferrara, Mclean Caputo, 2014). They normally act as a brake that stops the change, but this is not a scenario in IBM. The HR department changed the traditional way used for training and development (Hamlen Thuraisingham, 2013) . References Arnold, B., Baset, S. A., Dettori, P., Kalantar, M., Mohomed, I. I., Nadgowda, S. J., ... Youssef, A. S. (2016). Building the IBM Containers cloud service.IBM Journal of Research and Development,60(2-3), 9-1. Cash, S., Jain, V., Jiang, L., Karve, A., Kidambi, J., Lyons, M., ... Patel, N. (2016). Managed infrastructure with IBM Cloud OpenStack Services.IBM Journal of Research and Development,60(2-3), 6-1. De Assuncao, M. D., Netto, M. A. S. (2014).U.S. Patent No. 8,832,239. Washington, DC: U.S. Patent and Trademark Office. Ferrara, E., McClean, C., Caputo, M. (2014). The forrester wave: Managed security services: North america, q4, 2014.Forrester Research, November. Hamlen, K. W., Thuraisingham, B. (2013). Data security services, solutions and standards for outsourcing.Computer Standards Interfaces,35(1), 1-5. Mahmood, T., Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. InInformation assurance (ncia), 2013 2nd national conference on(pp. 129-134). IEEE. Rea, L. M., Parker, R. A. (2014).Designing and conducting survey research: A comprehensive guide. John Wiley Sons. Sari, A. (2015). A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications.Journal of Information Security,6(02), 142. Sinharoy, B., Swanberg, R., Nayar, N., Mealey, B., Stuecheli, J., Schiefer, B., ... Eisen, S. (2015). Advanced features in IBM POWER8 systems.IBM Journal of Research and Development,59(1), 1-1. Yaeli, A., Bak, P., Feigenblat, G., Nadler, S., Roitman, H., Saadoun, G., ... Sandbank, T. (2014). Understanding customer behavior using indoor location analysis and visualization.IBM Journal of Research and Development,58(5/6), 3-1.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.