panda admin secure "my company" robert perry

16

Upload: rock-perry

Post on 21-Mar-2016

219 views

Category:

Documents


0 download

DESCRIPTION

Panda Admin Secure "MY COMPANY" Robert Perry classwork assignment for final presentation of Project Management Class.

TRANSCRIPT

Page 1: Panda Admin Secure "MY COMPANY" Robert Perry
Page 2: Panda Admin Secure "MY COMPANY" Robert Perry

This document will discover the team members and define their interaction with the team

project. The following diagram is a visual representation of the team hexarchy and corporate ladder.

This visual representation of the team is explained after the picture with descriptions of how each

team member will fit into the project. The end goal of the project is to increase the security of the

computer networks at MY COMPANY. This

team will also recreate this process for

external production in the channels of

vendors and customers of MY COMPANY.

The end goal is to defeat the threat of

VIRUS or MALWARE by reducing the total

threat at each communication point. If all of

the customers and vendors of MY COMPANY

were protected the same way, then there

would be zero chance of external friendly

fire by mistake. This increased security also

prevents intentional sabotage and employee

malice because of the extended features of

the protection services. Process XPS shows

the diagram in large detail.

The Management Team: The management team identifies the needs of the company. Security

needs, software needs, and evaluates the effectiveness of the implemented decisions. They can

command all of the departments lower down on the chain of command.

Software Engineering: Responsible for coordinating the right antivirus solution with the

technology available. A software engineer configures the antivirus software/hardware equipment in the

Data Center, configures the antivirus software/hardware in the offices, and configures the server for the

right antivirus solution. This includes implementing SQL services, monitoring logs, and researching

effectiveness of antivirus solutions.

Process.xps

Page 3: Panda Admin Secure "MY COMPANY" Robert Perry

Technical Design: Supports the software engineer with any technical hardware requirements to

reduce the involvement of the software engineer in the routine processes. The software engineer relies

on the technical designer to get each hardware device up to date and up to software requirements. The

technical designer may have a team of its own to complete requests made by the software engineer.

These requests could be parts ordering, tracking hardware, tracing software, implementing requests

made by the engineer.

Data Center Operator: Assures the function and stability of the data center. This data center

operates to distribute antivirus solutions to the organization and to the branches of the organization.

Data center operators answer to the software engineer and to the technical design team. They can

provide data and logs to the other teams if there are problems that cannot be resolved at a standard

level.

Customer Support: Support for the direct customers, vendors, and inner organization. This is a

team of 5 – 15 individuals on 24/7 monitoring support. They have access to information databases about

current, past, and future threats. They are responsible for communicating their troubleshooting sessions

to the quality assurance team. They log all of their daily conversations and interactions with customers

for knowledge base archiving.

Quality Assurance: Makes sure that all of the previous teams and team members are

functioning effectively. Also, QA is responsible for the knowledgebase. They plan for future

improvements in the software by recognizing flaws and detailing the real world scenarios to the

engineer.

Sales Team: The sales team ensures the spread of the security solutions throughout the

organization. They ensure that all employees have this antivirus solution at the office, at home, and on

Page 4: Panda Admin Secure "MY COMPANY" Robert Perry

the road. They also are responsible for communicating with the customers, vendors, and other branches

of “MY COMPANY”.

It is my experience that custom software applications and the forms of software productions that

are discussed statistically here are prone to disaster for several reasons. First and foremost software

failure can be contributed to the lack of research prior to the development phase. Developing software

is not an easy task to attempt at any level. Developing custom software applications requires ongoing

support prior to development in order to repair mistakes or fix bugs. Many individuals that take on the

tasks involved with creating software applications are not financially capable of carrying out the

maintenance after the product is published.

Secondly, software is forgotten about after it is installed on a user's computer unless the application

is up front and hard to ignore. How many programs are on your computer that you have neglected for

more than 30 days? You can find this out in your Add/Remove Applications in the control panel. Making

an application that does not tie up the system with memory consumption is difficult to achieve. How

many applications are running in your system memory that is unnecessary? Chances are there are about

5 to 7 programs running in your computer right now that you do not absolutely need.

Software developers that begin developing applications for production use often abandon the

project long before it begins. This is due in part to several reasons. Mainly, checking source code for

copyright infringement leads to numerous changes. Sometimes the changes to the source code will

disable the program from running correctly or even running at all. After fighting a software development

for months without producing an income for the efforts is the final reason why many software

applications are considered runaway.

Answering the six fundamental questions that each project manager should address is not an easy

Page 5: Panda Admin Secure "MY COMPANY" Robert Perry

process. With assistance from many different resources, support staff, and mentors any business

professional can answer the following questions (six questions);

What Business Situation is Being Addressed?

What do you need to do?

What will you do?

How will you do it?

How will you know you did it?

How well did you do?

Every time a business professional approaches these six questions, a magnitude of variable

answers is presented. Often times the answers can lead to more questions that can lead the executive

professional on a path further towards confusion. On the other hand, this could become a successful

project management approach if the organization has in place the right set of Process Groups.

It becomes relevant in a corporate environment to maintain a level of communications that

embodies the entire organization. A structure of governing individuals forms the joints at which each

branch of the organization can build. Designating structure to each branch gives objectives to the

Process Group so they can complete tasks assigned. Typically there are five different process group

branches available to the organization. They are;

Scoping Process Group

Planning Process Group

Launching Process Group

Monitoring and Controlling Process Group

Closing Process Group

Page 6: Panda Admin Secure "MY COMPANY" Robert Perry

To recap on what the entire process consists of look at the following illustration.

If the company represented here is able to answer the six questions related to the methodology,

they would represent each question with a symbol. The easiest symbol to use is a circle and each one

can be a different color. To earn a seal of approval, each process group must complete the six questions

plus, add one additional question that would benefit the project. This is also known as earning the five

stars because a project is classified as five star if it is a complete win.

An example for the +1 question would be: Does X-project contain profitability factors? +1 could

also be a series of arguments relating to another Processing Group’s final outcome. Say if the Launching

Process Group completed the six questions and the Monitoring/Controlling Process Group wanted to

know answers relating to their answers, then the +1 question would apply at that time.

Page 7: Panda Admin Secure "MY COMPANY" Robert Perry

WWee hhaavvee aann ooppppoorrttuunniittyy ttoo iinnccrreeaassee tthhee oovveerraallll nneettwwoorrkk sseeccuurriittyy iinnssiiddee tthhee ggrroouupp ooff ccoommppuutteerr nneettwwoorrkkss aatt MMyy CCoommppaannyy.. IItt iiss wwiitthh ggrreeaatt ooppppoorrttuunniittyy tthhaatt MMyy CCoommppaannyy wwiillll bbeenneeffiitt ffrroomm tthhee ssttaattee ooff tthhee aarrtt PPaannddaa AAddmmiinn SSeeccuurree SSooffttwwaarree.. WWiitthhiinn tthhee nneexxtt ttwwoo wweeeekkss MMyy CCoommppaannyy wwiillll hhaavvee iinn ppllaaccee ttoottaall nneettwwoorrkk sseeccuurriittyy ffrroomm ttoopp ttoo bboottttoomm..

TToo aacchhiieevvee tthhee ssuucccceessss ooff ttoottaall nneettwwoorrkk sseeccuurriittyy,, PPaannddaa AAddmmiinn SSeeccuurree ooppttiimmiizzeess eeaacchh ccoommppuutteerr ssyysstteemm wwiitthh aa ttoottaall nneettwwoorrkk sseeccuurriittyy llaayyeerriinngg.. OOvveerraallll llaayyeerriinngg iiss cceennttrraalliizzeedd oonn aa ssiinnggllee ppooiinntt iinn RReeaall--ttiimmee.. TThhee mmoosstt ssuucccceessssffuull ppoorrttiioonn ooff AAddmmiinn SSeeccuurree iiss tthhee nnaattiivvee aabbiilliittyy ttoo pprreevveenntt tthhrreeaatt bblloocckkiinngg.. NNoott hhaavviinngg tthhee tthhrreeaatt bblloocckkiinngg ccaappaabbiilliittyy iiss oonnee rreeaassoonn wwhhyy mmoosstt ootthheerr aannttiivviirruuss pprroodduuccttss ffaaiill..

TThhee rriisskk ooff rreemmaaiinniinngg iinn bbuussiinneessss wwiitthhoouutt aa RReeaall--ttiimmee tthhrreeaatt pprreevveennttiioonn ssyysstteemm rreemmaaiinnss hhiigghh.. EEaacchh ddaayy tthhaatt ggooeess bbyy wwiitthhoouutt tthhiiss ttyyppee ooff llaayyeerreedd sseeccuurriittyy iiss aammpplliiffyyiinngg tthhee rriisskk.. MMyy CCoommppaannyy aanndd tthhee oorrggaanniizzaattiioonnss iitt rreepprreesseennttss ddeeppeenndd oonn pprrootteeccttiioonn ffrroomm tthhee iinndduussttrryy lleeaaddeerr iinn BBuussiinneessss NNeettwwoorrkk SSeeccuurriittyy SSoolluuttiioonnss..

Page 8: Panda Admin Secure "MY COMPANY" Robert Perry

Panda Antivirus

Network Secure

Email Protect

Daily Virus Scan

Daily Definition

Update

A

Configure Server with

Layered Security

Client Security Updates

Backup Data for

Client

Remove Existing

Antivirus

Order Antivirus Product

Waiting on new Panda Antivirus

for Networks

Antivirus inadequate

must replace with new.

Current Antivirus

Network of Computers

Go with Panda?

B

End

http://www.pandasecurity.com/usa/enterprise/

A

“TO BE”“AS IS”

“MY COMPANY” needs to evaluate the current existing antivirus methods and security practices. This process system shows the “AS IS” status of the office network computer equipment. It asks one question in relation to a single type of antivirus security and looks for a decision.

“MY COMPANY” chooses to use Panda Admin Secure Corporate Antivirus. This process system shows the “TO BE” status of the office network computer equipment. It describes the system of panda and posts delays to the completion of the process chain. Currently the status of the process chain is “Waiting on new Panda Antivirus for Networks.

Page 9: Panda Admin Secure "MY COMPANY" Robert Perry

Over the past ten years “My Company” has taken many different approaches to answering the

call to increase its network security. Panda Security provides coverage by way of layered security for the

entire chain of office computers. “My Company” needs to break away from the individually managed

antivirus software applications and move into a corporate structured antivirus solution.

With Panda Secure, a multi layered security grid is established and deployed at the server level.

Some of these layers include network traffic, file traffic, Internet use, Intranet use, and email. “My

Company” will benefit from this much security as it approaches the phase of operations aimed at the

Public Sector in business. Through the server side monitoring software logs will display all activities in

each layer as indicators detect illicit activity. In addition to monitoring logs, client update rollout and

software assurance is conducted on the server machine.

When “My Company” is virus free and hacker proof for the duration of SIX months, the project

will be complete. A good indication of this will be when the activity logs reflect a deficit in attempted

attacks or if the attacks cease all together.

It is wisdom that is learned when the wise observe the wise. When the owl sees that the fox

chases a rat into a field, it then realizes that the cunningness of the fox might be able to feed him. The

owl sits in observance and waits for the fox to lure prey from above. The fox in return also uses the owl

to its own advantage. The Rat, although weakened by two predators, has no equal underground.

Is this a business philosophy? While you are the predator you are also the pray? No, it teaches

you to be wise and observe your fellow predators. With business philosophy, you can take a power hold

on a team because you realize the weaknesses and strengths of each member. Better than using

philosophy, use respect as authority. If you continually look at an individual as someone you admire and

like, they will in return admire and like you.

Page 10: Panda Admin Secure "MY COMPANY" Robert Perry

There are however, rules to abide to in any institution or community. Rules of society and

mutual respect govern the bylaws of a business and its predecessors. When you speak as you are a

leader, and you are a proven financial win, than people automatically look up to you. It’s not simple to

succeed and always win. This is why you must first instill in your employees trust.

It is an infrequent occurrence that two people completely trust one another. Without trust you

have no basic relationship. You must equalize trust between yourself and multiple individuals around

you. If the trust is broken for even a minute, everyone in the equilibrium knows and feels this. Trust is

only once gained and it takes a lifetime to re-establish.

Second, equal working time is divided between the shifts of Customer Service Representatives

and the Data Center Engineers. Two teams of Customer Services Representatives work either one of six

hours, a day or a night. Two teams of Data Center Engineers work the alternate six hour shifts, a day or a

night. A total of four shifts of six hours per team work around the clock a total of 42 hours per seven

days. Once a team reaches seven days, it takes a two day break in the routine of the shifts. Starting with

the team that goes first and continuing every two days until every team has two days off.

For the team that generates three times more income than it consumes, a bonus of the missed

two shifts is paid back in cash. Income earnings may come from helping sales teams or generating ad

revenues’ to help spread the word about the security of MY COMPANY.

To prevent the run over of time allotment in this project, the following suggestions are

introduced to the project. These suggestions are meant to streamline the project by grouping similar

tasks with multiple individuals and assigning new frequency of occurrences to the assigned groups. The

first diagram represents the initial proposal. The second diagram represents the adjusted proposal with

corrections for time and process compression.

Page 11: Panda Admin Secure "MY COMPANY" Robert Perry

The processes involved with the first diagram show that the Server preparation is managed by a

single administrative group and the client machines are maintained by the individual user.

Deploy antivirus software to client and server

computers.

Client machine preperation for Panda

Antivirus.

Power User Process Group

Server preperation for Admin Secure.

Administrative Process Group

Backup files.

Clear server coputer of old antivirus software.

Backup files.

Deploy New

Antivirus Software

Recover missing

user files.

Clear client computer of old antivirus

software.

Test Security with known threats to prove

effective installation.

Deploy antivirus software to client

and server computers.

Client machine preperation User

Group

Server preperation

Administrative Group

Backup all client and server files at a central location.

Install Admin Secure and deploy client installations from

server.

Create startup script to deploy new

antivirus.

Remove old antivirus software.

Test new antivirus software with known

threats.

Test recovery of user files.

Automated Installation of new

antivirus.

Test automation of updates from server

repository.

Page 12: Panda Admin Secure "MY COMPANY" Robert Perry

The effectiveness of the Admin Secure installation automation requires that a script run at

startup for each client machine. The script tells the client computers to open a port in the firewall of

each client and prepare a directory for installation of the new antivirus software. The script is

automatically generated by the Admin Secure server software and can be distributed to the client

computers over the network share.

Each client computer must be prepared by removing the original antivirus software. The user

can do this task because it is not an administrative task. The uninstall process will require the user to

restart the computer at the end of the sequence. After the computer restarts, the script that is setup to

run after reboot is enacted. The automated installation process will commence without the need of user

interaction and the time saved from going to each computer individually will cover the compression

requirements set forth in the project scope.

There are some instances that this project could not be compressed further. These include the

complications related to the removal of older antivirus software and users that do not know how to do

the task assigned. These problems cannot be avoided and could potentially delay the project further.

Was business value realized? Business value remains to be proven in the production of security

layering over a computer network. The reason for this is that no one can determine an actual figure to

place on the value of information within a business network. Most of the information within the

network is invaluable and if lost, could never be recovered (either financially or physically). The value of

a layered security platform is more a question of practicality than object-ability.

Was the client satisfied with the project results? This is the most important question being

asked during the audit process. The reason that it is the most important question is because the client is

the most important being in a business process. Without the client, there would be no business to

conduct in the first place. The client satisfaction factorization remains a lifelong pursuit. As long as the

Page 13: Panda Admin Secure "MY COMPANY" Robert Perry

business operates at full capacity, there will always be clients that raise questions of concern for their

implemented security methods.

Questions like; Can Panda Admin Secure prevent internal theft of information? Can MY COMPANY

provide 24/7 support to our company? Will there be any compensation for loss due to neglect on MY

COMPANY’s employees? These questions are thoughtful but only give a glimpse at some of the true life

scenarios in the business world today. If there were ways to prevent computerized theft of information

before it happened, than MY COMPANY aspires to learn more about these methods and prepare to

deter these predators.

Planning is never enough when dealing with computers and network environments.

There are thousands of variables to consider that at first glance seem insignificant. Most computer users

know how to operate the computer. Most computer users know how to avoid mistakes that can lead to

viral infections that could compromise sensitive data. There are few individuals in the workplace today

that actually abide by the ethics practiced by the guidelines set forth in the company bylaws. The truth

to these findings is that people will practice socialization over job performance nine out of ten times.

There is a great need for socialization in the work place but, only at the right time.

Unfortunately, social networking websites count for a majority of the viral infections found on

computers today. To completely prohibit participation in social networking is almost like prohibiting

employees to use the bathroom during the day. The reason for this is because social networking leads to

better business, higher sales capacity, and strengthened long term relationships. Social networking is

often harmful to computer networks in most cases but, it is not prohibited in many companies.

Panda Admin Secure has the ability to detect malware from ads that generate the malicious

code. With the practices of routine updates and daily scans on computers in the network, an additional

layer of security is achieved. This additional security is unlike any other corporate antivirus software

Page 14: Panda Admin Secure "MY COMPANY" Robert Perry

available in the market today. What makes Panda Admin Secure the most economical, most efficient,

and best overall antivirus product for corporate environments is the inclusion of the true prevent and

network protect features.

At the start of the “MY COMPANY” project, all of the knowledge of Panda Admin Secure

software could not predict the factors of human error. Human error remains the one factor that

prevents this project from closure on a 100% successful rating. Because of human error, the end users

should be protected against ignorance and neglect before the software is included in and on their

computers. The way to accomplish this is to set up expectations before hand with the employees that

utilize the computers on a daily basis. Interviews should have been made with each employee to

determine what their daily routine consists of. After interview inspections of internet trend tracking

(cookie reading) will help to verify that the interviewee is stating the truth and not trying to deceive the

network engineer.

The project is completed under budget and on time due to the tremendous planning that was

involved in the project. Because of the existing server architecture and network design, the deployment

process of installing Panda Admin Secure onto the client machines went well. There were no computers

that did not accept the software. There were no Windows related errors that prevented the installation

of the security platform. The technical support department at Panda headquarters assisted the

engineers, knowledge base developers, and mainframe technicians 100%.

The team members continue to produce sales and continue to produce security for all of the

parties involved with the “MY COMPANY” company. This project revealed strengths in relationships with

vendors, customers, and third party candidates because it was able to identify the predators from the

allies. The companies that declined to include secure business practices with MY COMPANY will no

longer be a threat to MY COMPANY nor will they continue to conduct business as insecure operators.

Page 15: Panda Admin Secure "MY COMPANY" Robert Perry

The opportunities given to those external parties proved that there are companies in business that are

not concerned with security of technology as much as they ought to be.

The future of MY COMPANY is more secure with fewer threats from external sources. The fewer

threats will prove to be a win fall for MY COMPANY because it will not require as much money outflow

in the security sector in the future. Fewer security risks overall means that less predators will be able to

steal vital information from the MY COMPANY computer network. Panda Admin Secure will assist MY

COMPANY and its external partners for generations or until new threats arise that are unique in nature.

Page 16: Panda Admin Secure "MY COMPANY" Robert Perry