StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Microsoft's Security Measures - Case Study Example

Cite this document
Summary
The paper "Microsoft's Security Measures" states setting a firm's agenda without proper security settings in place is inappropriate for most firms. A comprehensible security management system that manages numerous security components across multiple devices is extremely crucial to the company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Microsofts Security Measures
Read Text Preview

Extract of sample "Microsoft's Security Measures"

Analysis of Microsoft Corporation Introduction Any association that has a PC framework and delicate data needs to safeguard that data. Information security is an important aspect of the modern human activities and processes due to the increased use of technology and networks, which pose threats to private and confidential data or information. It is critical to underline on getting ready for conceivable dangers and developing strategies to minimize the vulnerabilities that exist in a framework and its security approaches. The best threat to PC structures and their data originates from the people, through activities that are either noxious or uninformed. At the point when the event is harmful, some inspiration or objective of the hackers must be determined and addressed through the most appropriate measures. For example, the goal could be aimed at upsetting ordinary business operations, consequently denying information accessibility and production. Microsoft has been a leader in the design and programming of computer software, including operating systems and software applications. However, the future of Microsoft, as said by Steve Ballmer, the company’s CEO, is that of both a hardware and software corporation. According to the CEO, in about five to ten years, the company will be a manufacturer of devices as an addition to its software services and applications. The hardware, which the company is expected to manufacture in the future, includes Windows 8 Surface Tablets. In addition, it is postulated that the company will produce Windows 8 Smartphones. The entry into the mobile phone and telecommunication industry by Microsoft is likely to shape or change the competitiveness of this industry to a large extent hence the need for security. This clearly shows that Microsoft Corporation requires adequate security measures. Security Measures used by Microsoft Corporation and Data Security from Hackers Most firms such as Microsoft Corporation are on the look for superior and successful ways of managing their safety infrastructure. Nonetheless, technological advancement is a human innovation, but it surpasses human control. This is why most companies are afraid of security threats brought about by change while at the same time; they have to embrace technology as a means of improving their sales. Network threats and attacks are some of the challenges facing security personnel in various industries. This has pushed security operators to consider using complex systems or models to ensure compliance. In addition, these security threats call for stringent and network-wide security policies. The reason why most companies consider using sophisticated security settings is because the existing security management solutions are not helping such firms to meet their business needs. It is vital for security operators with an organization to use solutions with a single interface to assist in managing all aspects of a defense mechanism (Hui, K., Hui & Yue, 2012). For instance, one of the best security solutions for a large organization is the Jupiter Networks NetScreen-Security Manager (Hui, K., Hui & Yue, 2012). This tool helps IT department within Microsoft Corporation to control the entire device lifecycle through both sing and centralized solution. It also provides visibility with numerous set investigative and reporting tools. Through the use of the above tool managerial staff and device, technicians become capable of improving management effectively and secure, thus, reducing other unnecessary costs and maximize profits by using technology in marketing their products. The Bell-Lapadula model is another representation that has limitations, one being its strictness. A computer with covert channels may agree with for instance, Bell-Lapadula model, but will not comply with non-interference. Another type is known as a Chinese-Wall model that also offers security to most organizations such as Microsoft Corporation (Gralla, 2012). As firms are increasingly turning to Internet to help increase their productivity, the importance of having a proper security tool cannot be overruled. Through the Internet, most businesses are likely to improve the investment opportunities, improve customer satisfaction, and enhance the business relationship between companies that operate online stores. In that regard, it is paramount for organizations to utilize greater control of their systems through effective management of security threats. Microsoft Corporation emphasizes that both internal and external users must be controlled to ensure that the company and clientele data is safeguarded. Protection of company’s intellectual properties, clientele’s privacy, and other important information are very crucial since they are what made the firms meet their strategic business objectives. Microsoft Corporation believes that in order to effectively manage company security to help achieve a security-access balance, IT organization members must work towards a common goal. This is because if the IT organization teams are not geared to a similar goal that is complex (Gralla, 2012). Cooperation between enterprises means that organizations must fight to ensure that security consequences are minimized to allow organizations to work in a secure environment. For instance, if the organization’s network is accessible, then holes may be created by security administrators, thus compromising the firm’s general security. Most importantly, the creation of security policies is a vital role for security managers to help ease business traffic (Hui, K., Hui & Yue, 2012). This will in turn assist in creating a good relationship between the company and its clients. IT professional at Microsoft Corporation face numerous challenges in their daily duties in the management of complex network environments full of security threats. In light of various security threats, security personnel embraces the use appropriate systems and tools that are essential for their job responsibilities. They ensure that these devices or systems are in good condition to avoid unnecessary access by hackers. This way, the security personnel at Microsoft Corporation provides that they offer tight integration of network applications to control preserved information (Hui, K., Hui & Yue, 2012). How Does Microsoft Corporation Manage the Identity of Customers, Employees, and Consultants At Microsoft, it is clear that employees, customers, and consultants are assisted realize their potential. Microsoft Corporation uses an identity Integration Server Known as the MIIS, which is an identity administration (IdM) item offered by Microsoft (Gralla, 2012). It is an administration that totals personality related data from numerous information sources (Microsoft News Center, 2012). The objective of MIIS is to furnish associations with a bound together perspective of a user’s/assets character over the heterogeneous undertaking and give systems to computerize routine errands. MIIS oversees data by recovering identity data from the sources of the organization’s information and putting away the data in the connector space as connector space articles or CSEntry objects. The CSEntry articles are then mapped to sections in the Metaverse called Metaverse items or MVEntry objects. This structural engineering permits information from divergent associated information sources to be assigned to the same MVEntry object. All back-end information is put in a Microsoft SQL Server (Microsoft News Center, 2012). For instance, through the Metaverse an association’s email framework can be connected to its HR database to the association’s PBX structure to some other information vault containing significant client, employee and consultant’s data. Each worker’s qualities from the email framework and the HR database are foreign made into the connector space through particular administration operators. The email framework can then the connection to individual properties from the representative entrance, for example, the worker’s phone number. On the off chance that a workers phone number changes, the new phone number will consequently be spread to the email framework. One of the objectives of the personality administration is to make and bolster definitive wellspring of data for each known ascribe and to protect information uprightness as indicated by foreordained business rules. On the IdM business of items, MIIS emerges by executing state-based building design. Because of this methodology MIIS obliges no product/drivers/specialists/shims being introduced in the target framework as it has been tested by Microsoft (Cusumano, 2007). What information systems does Microsoft Corporation use to run its enterprise around the world? Microsoft developed an ERP programming or system that was simpler to install, more sensible, obliged less usage time and involved lower startup costs. A large portion of these frameworks were more secluded, which permitted the establishment to continue in smaller additions with less backing from data innovation experts. Other little organizations chose to outsource their ERP needs to sellers. For an altered measure of cash, the seller would supply the change and the bolster staff expected to actualize and look after it. This choice regularly demonstrated simpler and less expensive than purchasing and executing an entire framework, especially when the product and innovation appeared to be liable to wind up obsolete one (Carr, 2012). In most cases, Microsoft uses EPR and the Internet to manage its enterprise globally, it employs a particular pattern in ERP improvement and utilization includes merchants making the product accessible to customer organizations on the Internet known as facilitated ERP or Web-sent ERP, this pattern has likewise added to making ERP frameworks available to many organizations. At the point when an organization decides to run its ERP frameworks through a Web-based host, the product is not bought by or introduced to the customer group (Microsoft News Center, 2012). Rather, it dwells on the merchants host PC, where customers access it through an Internet association. As opposed to scattering ERP to different corporate locales and acquiring the expenses of numerous servers expected to run the product, Web-sent ERP brings together the framework. It is noteworthy that utilizing the Web to get to a solitary ERP framework at a focal area. Running ERP frameworks on a host PC soothes many organizations from the need to buy a centralized server PC or contract data innovation authorities that back the framework. Furthermore, this course of action permits customer groups to spare cash by paying just for the ERP applications they utilize instead of needing to purchase a specific number of modules. Essentially, ERP sellers go about as use administration suppliers (ASPs) for a few customer firms (Carr, 2012). Conclusion Since Microsoft has been a leader in the design and programming of computer software, including operating systems and software applications, it requires securing its information in the highest level possible. Setting organization agenda without a proper security setting in place is inappropriate for most firms. A comprehensible security management system that manages numerous security components across multiple devices is extremely crucial to the organization. However, technological advancement accompanied with various security threats remains a major challenge. A security network provides a unifying platform that aligns security administration with the IT organization’s arrangements in place. This will help users to have access to their information that is important in controlling several duties within the entire organization. Regardless of the security measure in place for Microsoft, it will remain on the look for superior and successful ways of managing their security infrastructure to improve on productivity. References Button, M. (2008). Doing Security: Critical Reflections and an Agenda for Change. New York: Palgrave Macmillan. Carr, A. (2012). Microsoft Wipes The Slate. Fast Company, (169), 122-148. Cusumano, M. A. (2007). What Road Ahead for Microsoft the Company? Communications of the ACM, 50(2), 15-18. Gralla, P. (2012). Steve Ballmer: Microsofts future is in making hardware, not just software. Computerworld, 1 Hui, K., Hui, W., & Yue, W. T. (2012). Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. Journal Of Management Information Systems, 29(3), 117-156. Microsoft News Center. (2012). Telefónica and Microsoft to Deploy New Global Video Platform. Microsoft News Center, 1. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Needs Analysis of Microsoft Corporation Research Paper”, n.d.)
Needs Analysis of Microsoft Corporation Research Paper. Retrieved from https://studentshare.org/information-technology/1687647-needs-analysis-of-microsoft-corporation
(Needs Analysis of Microsoft Corporation Research Paper)
Needs Analysis of Microsoft Corporation Research Paper. https://studentshare.org/information-technology/1687647-needs-analysis-of-microsoft-corporation.
“Needs Analysis of Microsoft Corporation Research Paper”, n.d. https://studentshare.org/information-technology/1687647-needs-analysis-of-microsoft-corporation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Microsoft's Security Measures

Network Management and Security in the Office

Let's look at these security measures: Most Linux system have not been infected with a virus.... There are three critical areas to consider when comparing Linux to Windows XP as a potential candidate for network operating system platforms: vulnerability to both attacks from outside the company's LAN/WAN and internally through security breeches, patch management with respect to the continual need to apply security patches, and availability and distribution of security information....
7 Pages (1750 words) Essay

Research paper in Information technology articals

Hence it is essential… This research paper delves deep into three latest reports in the field of virtualization, networking and security in operating system. The article nder research reports about the new version of Microsoft's sleek and strong server operating system which is enhanced in options by virtualization, networking and security....
5 Pages (1250 words) Essay

Earliest Microsoft Operating Systems

Replacing the administrator-by-default philosophy of Windows XP the Vista introduced an advanced security system called User Account Control which was a new restricted User mode.... The paper "Earliest Microsoft Operating Systems" discusses that the Windows Server 2008 will be built to ship only 64-bit....
7 Pages (1750 words) Coursework

A porters 5 forces analysis of Microsoft Corporation

Hence, microsoft's suppliers may not try to take more advantages of the company.... Although the organisation has obtained clear dominance in the software industry, its market position is being continually threatened these days.... For instance, the emergence of Linux… ting system (OS) in 1998 intensified the market competition and caused Microsoft to lose a significant portion of its market share (Red Hat Enterprise Linux)....
2 Pages (500 words) Essay

Microsoft Baseline Security Analyzer

Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you?... What measures should you… I didn't receive a complete security assessment for my personal computer because the MBSA could not complete one or more requested checks.... I will also take protective measures in establishing password expirations for my user accounts.... Focus on the overall “security assessment” risk rating that appears at the top of your report....
7 Pages (1750 words) Essay

Dominant Position of Microsoft Corporation

Gates wanted Intel to incorporate its internet sources in a web server linked to microsoft's Tiger program.... This means the web server would have less effect on the market, produce low sales, and include Intel to microsoft's web server tools.... microsoft's management could have shared the company's application programming line with Intel or any other additional party.... These third party corporations could gain full access to microsoft's source code, systems, and records (Abramson, 2005)....
4 Pages (1000 words) Essay

Hacking the Accounting Information System

ccounting Information System is a process which needs high security as many crucial and essential data are handled in it.... The business organisations have the responsibility to invent and install upgraded security system to ensure confidentiality and risk free environment for the company and its customers.... The Microsoft security response centre states the Microsoft Active Protection was a program that provide security for program that gives anti –hacking tool facility....
4 Pages (1000 words) Research Paper

History of Microsoft

A year later, microsoft's FORTRAN, a second software language was launched, followed by a 1978 version, COBOL.... This paper, History of Microsoft, stresses that the cultural legend, Microsoft Corporation, is the biggest software developer in the world with yearly profits of over $32 billion....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us