Preview

Defender Direct Case Study

Good Essays
Open Document
Open Document
606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Defender Direct Case Study
Case 9, Defender Direct, Inc.: A Business of Growing Leaders
Company Name: Defender Direct, Inc.
Topic of the Week: Leadership, Policy, and Culture
Synopsis of the Situation
Dave Lindsey the founder and CEO of Defender Direct started the business from the ground up and used proven concepts as well as his own leadership to develop a successful security alarm company. It all began when Mr. Lindsey was passed over for a promotion and decided enough is enough and started the business out of his home with the help of his wife. Defender Direct started out with meager beginnings; however, over 10 years grew to one of the largest security and satellite dealers in the Midwest. Dave Lindsey gives the credit for the growth to the employees of the organization
…show more content…
Direct Defender could expand into the commercial arena. Businesses are looking for dependable security solutions with and online portal to handle request and help secure their business.
3. Create and develop their own line of security systems with monthly monitoring that are possibly more cost effective and better monitoring.
Selected Alternative Solution
Direct Defender could expand into the commercial arena. Businesses are looking for dependable security solutions with and online portal to handle request and help secure their business.
Defender Direct is already a leader in the consumer segment for selling and installation of security systems; it seems like a natural progression to crossover to the commercial segment. Defender direct has a proven track record when it comes security systems the only difference when it comes to dealing with business segment would be the training and implementation of a new team at each business unit that could sell to businesses and install for commercial clients. This would most likely not create any new product offerings other than to another segment. Selling to the commercial segment could also increase revenues and provide for guaranteed renewal of contracts and new business for new locations.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    3. Who will have access to the systems and how will this access be monitored?…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This MLS Plan will describe how the IT department will improve the security of each domain and how to protect the company’s information. The IT department will update all firewalls on the infrastructure and make sure to secure all ports that are open. This will help stop incoming traffic that is malicious. Another protection utilized will be anti-virus software,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    Authorized secure remote access, Traffic inspection and Coordinated Threat Control, Centralized security management and enterprise-wide visibility and control.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Focus specifically on guard services and high-level consulting audits, while outsourcing or referring to vendors for security equipment and system needs (ADT)…

    • 2342 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    INTRODUCTION Statement of Purpose The State Government, Department of Finance and Administration, hereinafter referred to as the State, has issued this Request for Proposal (RFP) to define the State's minimum service requirements; solicit proposals; detail proposal requirements; and, outline the State’s process for evaluating proposals and selecting the contractor. Through this RFP, the State seeks to buy the best services at the most favorable, competitive prices and to give ALL qualified businesses, including those that are owned by minorities, women, persons with a disability, and small business enterprises, opportunity to do business with the state as contractors and sub-contractors. The State intends to secure a contract for Information Security Assessment Services…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Satisfactory Essays

    In this Multi Layered Security Plan we will describe how we will improve the security of each domain and how to protect our information. We will update all firewalls on the infrastructure and secure our ports that are open and stop incoming traffic that is malicious. All anti-virus software will be updated throughout the company. All IT employees will be informed about the new MLS Plan that we putting into effect once the Senior management approves it.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Case Study Assetguard Case

    • 1041 Words
    • 5 Pages

    Based on given conditions our recommendation is to launch AssetsGuard insurance product line for the following reasons:…

    • 1041 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Enhancements to the external customers were also a huge success. Customers were now able to resolve technical issues via web-based support, and this led to happier customers, and more profitability by those who were more likely to remain loyal to Cisco. The case analysis to follow ventures into more depth with some of these web enhancements and business processes that made Cisco what it is today, one of the great providers of web-connected business applications.…

    • 1866 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    Symantec, Initials. (n.d.). Cyber attacks increasingly target home users for financial gain . Retrieved from http://complianceandprivacy.com/News-Symantec-report-home-users.asp…

    • 768 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Disaster Recovery Plan

    • 638 Words
    • 3 Pages

    Online services must be protected to ensure that both employees and customers will be able to access the programs and information to continue running the business. Sales, shipping information, customer database, and the virtual interaction provided to customers must be available. Basic functions within the main offices must remain available, including power, sales, the phones, and customer service.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Dan & bradstreet and intuit to offer new suite of online D&B services to small business owners. (2001). Retrieved , , from Dun & Bradstreet Launches Small Business Services, Millions of QuickBooks Customers to Have-Access to Business Information Tools Web site: http://investor.dnb.com/ireye/.…

    • 1593 Words
    • 7 Pages
    Powerful Essays