• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

Outsourcing. There are a number of reasons why companies would want to outsource network security:

Extracts from this document...

Introduction

Outsourcing Network Security Research paper submitted in partial fulfillment for INFO 634 Jincy Sarah George Texas A & M University Fall 2007 Introduction Information is as significant as assets for businesses. Network and digital information can support the overall operation of any business and when they are compromised corporations can suffer grim financial consequences. But is it really safe to surrender the network security perilously in the hands of an outsider? This can be answered only if we understand the need for outsourcing and the pros and cons related to outsourcing. Also, this would also include all the IT regulations and knowledge about the different components of the network. Outsourcing can be an option only if all the steps to it are planned well else it will prove to be a futile effort on the part of the organization. Need for Outsourcing There are a number of reasons why companies would want to outsource network security: Challenges in technical expertise staff - In any business, ensuring network security is a 24X7 job. In addition to the system responsibilities, the staff needs to be constantly updated on understanding and shielding against the latest threats. This results in an ever increasing need for security staff accumulating to the budget of staff and related benefits. (Levine,2005) Cost Savings - A comprehensive network security system demands staff with very specialized technical expertise, continuous training, software etc. Outsourcing offers cost savings as they are able to reduce the IT staffing as the need to update security arises. (Mears, 2004) Also, costs of managing the security service works out to be less than hiring in-house, full time security experts. For example a managed security service provider spend about $75,000 a year to monitor a 250 user computer network on a T1 (1.5 MBps) gateway excluding hardware. Replicating these in an organization produces similar hardware costs, plus at least $240,000 in annual compensation to hire three full time specialists" (Information Week Survey, 2002) ...read more.

Middle

The purpose of this act is to avert problems in big organizations by making certain that the higher management is actively involved and responsible for the correctness of data used in reporting the finances of the organization. (Haworth and Pietron, 2006). The data would most often be linked to a computer system which would explain the importance of knowing the Acts. GLB - This act was put in place to bring about a standard for financial institutions to protect personal information. There are some federal agencies have been given the responsibility of establishing standards to ensure the confidentiality of customers and protect against any expected loss of such records. (Bragg, R. et al, 2004) The federal Trade commission safeguards rule says that any financial institution should take serious security measures which would include administrative and technical, whenever they are dealing with sensitive customer data (Bragg, R. et al, 2004, pg. 774) The IT personnel working with any sensitive financial data should be aware of these rules. HIPAA - The Health Insurance Portability and accountability act was introduced to establish standards to safeguard health-related personal information. HIPAA reuires that all health departments and organizations offering health related services should make provisions to adhere to this Act in order to safeguard patient information which they would be using for their activities (Bragg, R. et al, 2004, pg. 776) Again the department of IT in that organization would be held responsible if they were not kept aware of this and sensitive patient health information will be jeopardized. Outsourcing Network Security From the above reading we understand that the move to hand off security functions to outside parties is a tough decision. With numerous government regulations and increased and complexed security issues, its time we looked at some of the benefits and risks of outsourcing to decide. Benefits of Outsourcing Network Security Below are benefits in accordance with Mears (2004) ...read more.

Conclusion

6. Define a partnership model - A good partnership which maps the outcome to payment and incentive structure becomes mutually beneficial to both the parties which results in a successful business relationship. 7. "Negotiate and renegotiate a win win deal" - Clients should make sure short term contracts are signed so that they could "realign expectations and benefits on an annual basis" and also benchmark performance and measure customer satisfaction. 8. Choosing vendors with the "consortia approach" - The market should be scanned for different types of outsourcing service vendors. 9. A good central management plan should be implemented - There should be reponsibilities matrix set along with rules on continuing relations without conflicts 10. Outsourcing relationships must be rejuvenated - It is very important to strike the right balance of trust and control with your outsourcing partner to form a successful business relation. By following these ten steps, managing the outsourcing activities and ongoing communication on all levels will help to better the relationship with the service provider. Conclusion If companies were to decide on outsourcing network security, then it should be made after outlining the organization's overall outsourcing strategy and also the IT department should have the necessary expertise, tools and capacity to manage a successful outsourcing relationship. There are some companies like John Hamalka CIO of Harvard Medical School who feel that there is no benefit to outsourcing because his company deals with sensitive patient data. On the other hand, organizations like Credit Suisse finds that financial savings and IT staffing are two of the greatest benefits of outsourcing network security. There is no best model for outsourcing security. Small companies do not have a committed security staff so they can use service providers to relieve themselves from routine security functions. Whereas large companies may have the staff but they would have to continuously update themselves with new vulnerabilities and compliance issues. Therefore, we can conclude that if outsourcing is clearly planned and monitored, then it is just a matter of time and experience before outsourcing network security becomes a feasible alternative for companies. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Management Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Management Studies essays

  1. Innovation For Business Success. It is possible to be innovative in both large ...

    For those which are not yet at a mature point in this regard, that should indeed be a goal, and until it is maturely in place, it constitutes a risk factor. 11. Innovation becomes part of everyone's mindset in the best of firms.

  2. Strategic Audit of Starbucks

    Teruel has been a Starbucks director since September 2005. Teruel served as vice chairman of Colgate-Palmolive Company, a consumer products company, from July 2004 to April 2007, when he retired. Prior to being appointed vice chairman, he served as Colgate- Palmolive's executive vice president responsible for Asia, Central Europe, Africa and Hill's Pet Nutrition.

  1. Analysis of the Apple Company and reasons for its success.

    iPod sales were phenomena and have passed the company's computer sales. Apple was making profit while other technology companies suffered. In the October of 2001 Apple began introducing iPod and in the spring of 2002, Apple sold more than 10 million units.

  2. Outsourcing Report. Objectives are: To ...

    The advances in technology are helping to tighten up manufacturing schedules and manage supply chain that cover over very large areas of sourcing locations and multiple suppliers. At the same time they need to comply with social and cultural issues, local regulations and currency differences.

  1. BUSINESS PLAN FOR ESTABLISHMENT OF

    Finally, stabilization of ROA and ROE Y3 mirrors the solid equity fundamentals and effective capacity utilization (App. 13). The close resemblance between both indicators in realistic and optimistic cases is explained by high equity/assets ratio (79%-98%). Here, high cash balances are again the explanation behind overstated net assets under the pessimistic scenario if compared to the realistic case.

  2. Ryanair Holdings PLC - Strategic Audit

    Michael O'Leary has served as a director since July 2, 1996 and a director of Ryanair Limited since November 25, 1988. Mr. O'Leary has been Chief Executive of Ryanair Limited since January 1, 1994. James R. Osborne has served as a director of Ryanair Holdings since August 22, 1996, as a Director of Ryanair Limited since April 12, 1995.

  1. Airbus versus Boeing

    to commercial applications, the bargaining power of these industries as they fight for additional share of the commercial market is at the advantage of the aircraft industry. The Bargaining Power of Buyers Airline companies and leasing companies often force cutthroat competition between the aircraft manufacturers.

  2. Tesco's Information Systems

    Also the records that are kept by the Human Resources department must have information on the needs and activities of the business. So as you can see that the Human Resources department, have got a lot of responsibility in terms of getting the best new employees, and making them reach

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work