Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

use this when responding to the two questions . In responding to other students, identify any potential weaknesses in one of the examples provided.

I need help with answering these responses.

use this when responding to the two questions . In responding to other students, identify any potential weaknesses in one of the examples provided.

1)Proactive security is implementing security so that breaches never happen. It is also known as offensive security. An example of proactive security is Cisco Web Security. It monitors and analyze automatically. When any type of compromise occurs, it quickly determines the scope of the damage, remediate it, and get things back running like normal. You can run this security on a cisco appliance or on a branch router so that it doesn’t create extra traffic to the corporate gateway. It allows you to add security easily as the company grows. You can see all traffic as it is happening and even scan in real time for new and known malware.

Need assignment help for this question?

If you need assistance with writing your essay, we are ready to help you!

OUR PROCESS

Order

Payment

Writing

Delivery

Why Choose Us: Cost-efficiency, Plagiarism free, Money Back Guarantee, On-time Delivery, Total Сonfidentiality, 24/7 Support, 100% originality

Reactive security is fixing the threats and dangers of the past and present. It is also known as defensive security. Disaster recovery is imminent to organizations. EiQ Continuous Security intelligence uses both reactive and proactive security monitoring. The longer an attack goes undetected, the greater the damage and the higher the data loss.

Cisco Web Security Appliance. (n.d.). Retrieved January 28, 2017, from http://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html

Reactive IT Security Monitoring Solutions | EiQ Networks. (n.d.). Retrieved January 28, 2017, from https://www.eiqnetworks.com/how-we-help/reactive-security-monitoring

2)Proactive Technology:A true proactive service would consist of locating and remediating any problems before they even start which involves procedures like , having a precluded consistent onsite visit that are not going to be dictated by a emergency , performing server health checks regularly to ID any warning signs before they become a problem, interacting with every employee to see how they are doing and to see if  they could get help making tasks easier to perform or if there’s something nagging them that they maybe keep to themselves.


Periodically going over help desk issues the see if there maybe indication of a large scale problem and lastly systematically analyze the true health of a clients relationship to see if there maybe any trouble or deficiencies among them.

Reactive Technology:
Reactive technology is often regarded as extinguishing fires and living in chaos employees wait to tell the managers there is a problem, they wait until the problem is to big or they wait until they bring in tech support on-site sitting in a conference room and they all come in one by one instead of calling tech support when the problem first arrives and get it taken care of right away.  Timing is a key difference between proactive and reactive 


Resource:
Proactive Technology:http://www.bizjournals.com/boston/how-to/technology/2016/03/what-proactive-technology-service-actually-means.html

Reactive Technology:
http://smallbusiness.chron.com/similarities-differences-proactive-reactive-hr-14395.html

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"