Securing the Host and Data Research Paper

Total Length: 554 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

The bolt and straps can only be released with a key that authorized personnel control. However, the servers could still be tampered with. The primary suggestion would be to implement a policy that requires the server room to remained locked during business hours and only authorized personnel have access to the room.

The three programs compared are Fidelis XPS, Code Green Content Inspector, and Palisade's Packet Sure.

Fidelis XPS

Code Green

Palisade Packet Sure

Price

$132,830.00

$30,000.00

$31,000.00

Performance: Catching Harmful Files

84.00%

90.00%

55.00%

Configuration

Difficult, used command post server setup

Simple with graphic interface

Simplest with setup wizard and walk through instructions

Finger Printing

Comes with its own program, and does not allow outside programs

Fingerprints all sorts of data and allows scenarios to be set up

More difficult to use and requires files to be exported into a flat file for analysis.


Reporting

Produce graphs and was easy to use

Produces graphs and allows integration into other software programs

Clunky interface and slow to use

Overall, Palisade Packet Sure had the most weaknesses that could be used by an attacker to easily remove information without being noticed. It only detected 55% of harmful files, which meant that almost half of the harmful files being transferred back and forth passed through without detection. Additionally, if a network administrator is not very savvy with computer reports, they will have difficulty harvesting and interpreting reports from Palisade, making it nearly impossible to detect exactly what was missing.

The primary weakness with Fidelis is its incompatibility with other programs. At some point, Fidelis will become more susceptible to hackers who would be able….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Securing The Host And Data" (2012, May 29) Retrieved July 4, 2025, from
https://www.aceyourpaper.com/essays/securing-host-data-58365

Latest MLA Format (8th edition)

Copy Reference
"Securing The Host And Data" 29 May 2012. Web.4 July. 2025. <
https://www.aceyourpaper.com/essays/securing-host-data-58365>

Latest Chicago Format (16th edition)

Copy Reference
"Securing The Host And Data", 29 May 2012, Accessed.4 July. 2025,
https://www.aceyourpaper.com/essays/securing-host-data-58365