Preview

Saving the World: Part 2

Satisfactory Essays
Open Document
Open Document
638 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Saving the World: Part 2
Saving the world: Part 2
Introduction
Symantec, one of the world’s leading network security software company is facing many managerial obstacles In today’s global market place, where customer expectation and continuously emerging global competitors have drastically shorted the product lifecycle.
Symantec is facing over 20,000 virus samples each month, not all of which are unique, stand-alone viruses. On top of that, dealing with this critical and time sensitive challenges, requires exceptional talented employee’s that is Symantec’s divers response team spread out in outsourced groups all over the world.
Managers for a company such as Symantec needs to keep the professionals excited about work, even though it is a routine, standardized and chaotic environment they work within.
To manage this, they need to use their technical, human and conceptual skills.
Conceptual skill is the availability to visualize the organization as a whole. Symantec is spread out throughout the whole world, so the managers need to keep track of different time zones so that they have people working 24/7 in case unpredictable viruses would show up.
Symantec, as said before, is one of the world’s leading network security company and it is hard for the managers to motivate each employee, and make them feel special. That is where the human relation skills is necessary from the managers within the company. Since new viruses are popping up randomly without preparation, the managers should let the professional employee’s try to work as self-independent as possible, so that they don’t have any guide lines to keep track of since all virus cases are different.
In addition, the managers need technical skills. They need to be educated with the equipment that is being used within the company, so when distractions or problems show up, they are prepared and experienced with it, and can deal with it fast so not valuable time goes to waste. The operation manager Patrick Fitzgerald needs to play

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    This assignment allows you to fulfill the role of an IT manager in a small business tasked with determining…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The purpose of this paper is to create a policy that will ensure Firion 's compliancy with governmental regulations concerning cyber security as well for the protection of the company and its customers.…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Since 1912 Lockheed-Martin was a concept derived from Glenn Martin with the design of his first airplane in collaboration with the founder of Alco Hydro-Aeroplane Company Malcolm Lockheed (Our History, 2017). The merger between Martin and Lockheed formed the well-known aerospace company Lockheed-Aircraft Company which is currently Lockheed-Martin. However, Lockheed-Martin evolved into a contractor for the U.S. defense in technology and security. Thus, making them extremely vulnerable to outside cyber-attacks and novice 'hackers.' Unfortunately, by 2011 a cyber-attack and Lockheed targeted the company reported no damage to the security.…

    • 750 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FISMA Analysis Paper

    • 1671 Words
    • 7 Pages

    Agencies must produce a total, accurate, and complete assessment of all information and systems including security status, risk, and remediation (IBM, 2007). However, this can be very taxing when systems are “spread across many organizations and geographies” (IBM, 2007, 4.)…

    • 1671 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Antivirus is constantly required as well as updated definitions databases Most viruses target the windows OS because it is the most widespread OS on the planet.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pfizer Case Study

    • 1500 Words
    • 6 Pages

    Pfizer is the world’s largest research-based pharmaceuticals firm and also a well known Pharmaceutical company. So their most of the work depends on research, developing Strategies and innovate. They were trying to find a new way of system which makes their Work more effective and efficient. Pfizer find out that their worker spends more time on Business research and data analysis to the creation of documents and other routine Support like Goggling and making power points and also spending so much time on Menial tasks rather than knowledge work. The average Pfizer employee was spending 20 Percent to 40 percent of his or her time on supporting work (creating documents, typing Notes, doing research, manipulating data, scheduling meetings) and only 60 percent to 80 Percent on knowledge work (strategy, innovation, networking, collaborating, critical Thinking. That’s why Pfizer starting to find a solution of this problem to increase their Efficiency and effectiveness. Pfizer build a new kind of structure by using Microsoft Outlook where their connecting to a outsourcing company where Pfizer can connect with Different worker by email where they can connect with any worker around world and get Cost specification for their requested work. By using this process the time spent on Analysis of data has been reduce, also have many financial benefits and employees also get rid of their boring work.…

    • 1500 Words
    • 6 Pages
    Powerful Essays