• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

Outsourcing. There are a number of reasons why companies would want to outsource network security:

Extracts from this document...

Introduction

Outsourcing Network Security Research paper submitted in partial fulfillment for INFO 634 Jincy Sarah George Texas A & M University Fall 2007 Introduction Information is as significant as assets for businesses. Network and digital information can support the overall operation of any business and when they are compromised corporations can suffer grim financial consequences. But is it really safe to surrender the network security perilously in the hands of an outsider? This can be answered only if we understand the need for outsourcing and the pros and cons related to outsourcing. Also, this would also include all the IT regulations and knowledge about the different components of the network. Outsourcing can be an option only if all the steps to it are planned well else it will prove to be a futile effort on the part of the organization. Need for Outsourcing There are a number of reasons why companies would want to outsource network security: Challenges in technical expertise staff - In any business, ensuring network security is a 24X7 job. In addition to the system responsibilities, the staff needs to be constantly updated on understanding and shielding against the latest threats. This results in an ever increasing need for security staff accumulating to the budget of staff and related benefits. (Levine,2005) Cost Savings - A comprehensive network security system demands staff with very specialized technical expertise, continuous training, software etc. Outsourcing offers cost savings as they are able to reduce the IT staffing as the need to update security arises. (Mears, 2004) Also, costs of managing the security service works out to be less than hiring in-house, full time security experts. For example a managed security service provider spend about $75,000 a year to monitor a 250 user computer network on a T1 (1.5 MBps) gateway excluding hardware. Replicating these in an organization produces similar hardware costs, plus at least $240,000 in annual compensation to hire three full time specialists" (Information Week Survey, 2002) ...read more.

Middle

The purpose of this act is to avert problems in big organizations by making certain that the higher management is actively involved and responsible for the correctness of data used in reporting the finances of the organization. (Haworth and Pietron, 2006). The data would most often be linked to a computer system which would explain the importance of knowing the Acts. GLB - This act was put in place to bring about a standard for financial institutions to protect personal information. There are some federal agencies have been given the responsibility of establishing standards to ensure the confidentiality of customers and protect against any expected loss of such records. (Bragg, R. et al, 2004) The federal Trade commission safeguards rule says that any financial institution should take serious security measures which would include administrative and technical, whenever they are dealing with sensitive customer data (Bragg, R. et al, 2004, pg. 774) The IT personnel working with any sensitive financial data should be aware of these rules. HIPAA - The Health Insurance Portability and accountability act was introduced to establish standards to safeguard health-related personal information. HIPAA reuires that all health departments and organizations offering health related services should make provisions to adhere to this Act in order to safeguard patient information which they would be using for their activities (Bragg, R. et al, 2004, pg. 776) Again the department of IT in that organization would be held responsible if they were not kept aware of this and sensitive patient health information will be jeopardized. Outsourcing Network Security From the above reading we understand that the move to hand off security functions to outside parties is a tough decision. With numerous government regulations and increased and complexed security issues, its time we looked at some of the benefits and risks of outsourcing to decide. Benefits of Outsourcing Network Security Below are benefits in accordance with Mears (2004) ...read more.

Conclusion

6. Define a partnership model - A good partnership which maps the outcome to payment and incentive structure becomes mutually beneficial to both the parties which results in a successful business relationship. 7. "Negotiate and renegotiate a win win deal" - Clients should make sure short term contracts are signed so that they could "realign expectations and benefits on an annual basis" and also benchmark performance and measure customer satisfaction. 8. Choosing vendors with the "consortia approach" - The market should be scanned for different types of outsourcing service vendors. 9. A good central management plan should be implemented - There should be reponsibilities matrix set along with rules on continuing relations without conflicts 10. Outsourcing relationships must be rejuvenated - It is very important to strike the right balance of trust and control with your outsourcing partner to form a successful business relation. By following these ten steps, managing the outsourcing activities and ongoing communication on all levels will help to better the relationship with the service provider. Conclusion If companies were to decide on outsourcing network security, then it should be made after outlining the organization's overall outsourcing strategy and also the IT department should have the necessary expertise, tools and capacity to manage a successful outsourcing relationship. There are some companies like John Hamalka CIO of Harvard Medical School who feel that there is no benefit to outsourcing because his company deals with sensitive patient data. On the other hand, organizations like Credit Suisse finds that financial savings and IT staffing are two of the greatest benefits of outsourcing network security. There is no best model for outsourcing security. Small companies do not have a committed security staff so they can use service providers to relieve themselves from routine security functions. Whereas large companies may have the staff but they would have to continuously update themselves with new vulnerabilities and compliance issues. Therefore, we can conclude that if outsourcing is clearly planned and monitored, then it is just a matter of time and experience before outsourcing network security becomes a feasible alternative for companies. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Management Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Management Studies essays

  1. Innovation For Business Success. It is possible to be innovative in both large ...

    a succession of people who have the commitment, knowledge and personal capabilities to drive the innovation work. In Toyota and Microsoft this is a deep element of their capability, whereas in family companies, it is often less robust. 15. Innovation can be any combination of product, service, process, technology or

  2. Leadership Theories - this review seeks to determine which theoretical perspectives, theories and schools ...

    FIGURE 18 - PERSPECTIVES IN RELATION TO LEVELS OF ANALYSIS AND ONTOLOGICAL STANCES SELF & IDENTITY = UNIFYING CONCEPTS? This review emphasized both in its conceptual and descriptive findings the importance of self and identity constructs for the theoretical perspectives that underpin leadership (and leader)

  1. General Management - organisation, leadership and theories.

    each time a message is passed from one person to the next. In addition, the message can be distorted if it travels a great distance from its originating source to the ultimate receiver. 4.4.8. Upward Communication. Formal upward communication includes messages that flow from the lower to the higher levels in the organization's hierarchy.

  2. Strategic Audit of Starbucks

    He currently serves as a partner of Spectron Desarrollo, SC, an investment management and consulting firm. He also serves on the boards of directors of The Pepsi Bottling Group, Inc., Corporacion Geo S.A.B. de C.V. and J.C. Penney Company, Inc (Starbucks Coffee, 2009).

  1. Analysis of the Apple Company and reasons for its success.

    Jobs understood what will be the effect that the device could make. It was consistent with his vision for creating a digital lifestyle. The launch of iPod made the most incredible success of Apple through 26 years of Apple's history.

  2. Tesco's Information Systems

    them, and also they are responsible for making sure that advertisements are done for Tesco and their products or services. These are the main responsibilities that the Marketing department has. In order to fulfil them, the marketing department would need to work closely with the finance, purchasing, production and transport departments.

  1. BUSINESS PLAN FOR ESTABLISHMENT OF

    PM team will look at employing an experienced supervisor and training instructor and also young people who love dogs, team-oriented, eager to learn - for the dog-care handler positions. An ongoing in-service training programme will be set for knowledge transfer from the experienced staff (supervisor and training instructor)

  2. Outsourcing Report. Objectives are: To ...

    Employment and Outsourcing One of the most common misconceptions is that offshoring and outsourcing will lead to huge unemployment rates. However, most of the countries cannot deny the fact that they in crisis with respect to creating new jobs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work