Introduction
The Gartner Magic Quadrant predicts the market by use of two-dimension matrix by evaluation of the different merchants depending on the degree of Vision and Ability to Implement. Merchants within this quadrant result from the marketing in giving out new characteristics that offer security to customers from emerging threats (Riadi, 2018). The specialist's abilities instead of treating the firewall as a product as well as having a good track record of avoiding vulnerabilities within their security commodity.
To achieve the vulnerabilities, SWOT (Strengths, Weaknesses/Limitations, opportunities, and Threats) analysis strategy was used (Verizon, 2019). SWOT strategy provides analysis of the factors that a business has control as well as external issues which a company cannot control (Verizon, 2019). Internally controlled factors include weaknesses and strengths, while external factors comprise of threats and opportunities. SWOT is a recommended analysis technique for a business (Riadi, 2018).
Security Strengths
Both hardware and software systems with protection from anti-virus, anti-malware, and firewalls programs are robust to network threats. Also, employees' responsibility in respecting the use of right and secure passwords to protect the computer systems as well as the projects and applications (Riadi, 2018). Maintaining other physical factors such as preventing computers, physical theft can act as a strength. Offering protection to trade names, trademarks, copyrights as well as patents is another source of power.
Security Weaknesses
Dataset within an organization is the most crucial thing, failure to offer enough security can offer vulnerability, which may put data at risk. According to SWOT analysis, several vulnerabilities may exist:
Physical weaknesses - these include environmental responsibilities and mistakes carried out daily. i) Casual Attitude- the general Attitude of the business employees on security is a common vulnerability which can be hazardous to business data. If the business does not provide any strictness on the security issue, the employees may be reluctantly leading to loss of data (Grebennikov, 2014).
Unattended Asset - This involves leaving a business asset unattended. Leaving a computer device with company data unlocked may result in high-risk potential within a business. Exploitation can be carried out by exploiters on the company business leading to loss of critical information (Grebennikov, 2014).
Administrative vulnerabilities - these refer to general business administration mistakes most business administrators make. They include; lack of funding for security issues - this vulnerability can result in extra cost on purchase on lost machines, data, as well as organization time and funding on areas with high potential risk. Lack of strictness on security issues may raise potential threats to the business (Grebennikov, 2014).
Ways to Overcome Vulnerabilities Within a Business
The organization should provide strictness and procedures to follow to curb both physical vulnerably as well as administration issues. The organization should consider installing security programs such as firewalls and anti-virus programs to prevent technical problems such as malware attack and cyber-attacks.
Comparison Between the Organizational Vulnerabilities With the Current Trend
The current security trends are robust and offer more security to business data compared to the vulnerabilities provided (Chen, 2013). The current security trends protect data using a two-step authentication method which offers additional data protection incase an organization computer is stolen. Data is backed up on a cloud server, which makes it accessible without affecting the organization activities (Chen, 2013).
Conclusion
According to Gartner's Magic Quadrant documentation on the firewall, the Open Web Application Security Project (OWASP) and Verizon Data Breach Investigation Report there is a higher possibility of having a more robust security system (Verizon, 2019). This is because the three documents offer a structured approach to business vulnerabilities and how they can be solved. Through an evaluation of the business weaknesses and giving mitigation strategies can give rise to potential security improvements.
References
Chen, K., Zhang, Y., & Lian, Y. (2013). Vulnerability-Based Backdoors: Threats from Two-step Trojans. 2013 IEEE 7th International Conference on Software Security and Reliability. doi:10.1109/sere.2013.19
Grebennikov, N. (2014). Kaspersky Lab erneut "Leader" in Gartner Magic Quadrant. IT-Szene Munchen, 9(2), 12-13. doi:10.1007/s40567-014-0016-5
Riadi, I., Umar, R., & Sukarno, W. (2018). The vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP). Jurnal Informatika, 12(2), 53. doi:10.26555/jifo.v12i2.a8292
Verizon: 2019 Data Breach Investigations Report. (2019). Computer Fraud & Security, 2019(6), 4. doi:10.1016/s1361-3723(19)30060-0
Cite this page
Gartner Magic Quadrant: Security Merchants Ranked by Vision & Implementation - Essay Sample. (2023, Feb 01). Retrieved from https://midtermguru.com/essays/gartner-magic-quadrant-security-merchants-ranked-by-vision-implementation-essay-sample
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Levenes Test for Equality of Variances T-Test for Equality of Means
- Paper Example on Media Ethics Theory
- Essay Sample on Community Music Therapy
- The Samsonite Organization - Evaluation Paper
- Data Analytics and Financial Impact of Optum Lab - Essay Sample
- Gender & Leadership: Impact on Organizational Performance - Essay Sample
- Toyota's Environmental Pollution: Ethical Actions & Behaviour - Research Paper