190 likes | 314 Views
SHOULD AN ORGANIZATION OUTSOURCE SECURITY?. Analysis by Rachel Nedved , Sean Lorello and Shawn Wilde. Outsourcing Security. What is it?
E N D
SHOULD AN ORGANIZATION OUTSOURCE SECURITY? Analysis by Rachel Nedved, Sean Lorello and Shawn Wilde
Outsourcing Security What is it? • The delegation of specific work (namely IT Security) to a third party for a specified length of time, at a specified cost, and at a specified level of service. (Haag/Cummings, pg 294) Why do it? • Provide better service. • Reduces costs.
Outline: • The Systems Development Life Cycle and development of information systems • Choosing a secure provider of IT security • Availability of reliable IT security companies
(SDLC) Systems Development Life Cycle 1. Planning 2. Analysis 3. Design 4. Development 5. Testing 6. Implementation 7. Maintenance
1. Planning • Three steps to planning • Defining the system to be developed • Setting the project scope • And developing the project plans
2. Analysis 3. Design • Gather the business requirements • Prioritize the requirements • Design the technical architecture • Design the system model
4. Development 5. Testing • This is the point where one would need to identify that outsourcing would be needed for IT security • Where you build the technical architect • Build the database and programs • Write the test conditions • Perform the testing of the system
6. Implementation 7. Maintenance • Write detailed user documentation • Provide training for the system users • Provide an environment to support system changes
In House development & IT Outsourcing working together • Give outsource access to your system • Have your IT guys work alongside with your outsource IT people • Have an IT room in your company
Background Check • Important to run a background check on IT Security firms • Look for • BS7799 • Statement of Auditing Standards No. 70 • Others
Certification • IT companies and certification • Intertek • EMC • Savvis • Others
The Downside to Outsourcing IT • IT company has complete access to all information and systems • They have ability to steal important and strategic information • Stipulations must be included in agreement to secure you company
IT Security Outsourcing Companies Major Companies • Perimeter • Symantec Other Companies • Cognizant • Wipro • IBM-ISS
Cognizant Reliable customer base: • Radio Shack • Citi Group • Nokia • Dish Network • Nestle http://www.cognizant.com
Wipro http://www.wipro.com Awards: • Wipro Technologies: Winner of Indian MAKE Award, 2008 • Wipro Wins International Institute for Software Testing’s Software Testing Best Practice Award • Wipro tops Global MAKE Award 2007 • Wipro wins Verizon’s 2006 Supplier Excellence Award • Wipro awarded HP’s Best Application Solution Implementation for creating world-class BTO service practice • Wipro and Nortel win Outsourcing Excellence Award • Wipro-only Indian company in the BusinessWeek’s IN25 “Champions of Innovation” list. • Wipro BPO Receives Prestigious ‘Outsourcing Excellence’ Award • Winner of Everest Group’s ‘Outsourcing Excellence’ Award • Named Indiatimes ‘BPO Company of the Year’ • Only Indian company to be ranked among the ‘Top 10 Global Outsourcing Providers’ in the IAOP-Fortune Global 100 listings
IBM-ISS Alliance Solutions: • Cisco • Genesys • Infor • Nortel • Novell • Oracle • Red Hat • SAP http://www.ibm.com/services/security
Summary • Proper planning is required (SDLC) to ensure the best result is attained. • Research the security company that you choose: • Ensure appropriate certifications • Make sure terms of agreement with the company are clear • Check references and credentials
Resources "BS 7799 COMPLIANCE & BS7799 MANAGEMENT." 2002. C & A Systems Security . 30 Mar 2009 http://www.securitypolicy.co.uk/bs-7799/ Cognizant. (n.d.). Cognizant Technology Solutions. Retrieved March 30, 2009, from http://www.cognizant.com Haag, S., & Cummings, M. (2008). Management Information Systems for the Information Age: XLMD_Production.xls. New York: McGraw-Hill. IBM-ISS. (n.d.). IBM Alliance Solutions. Retrieved March 30, 2009, from IBM-ISS: http://www-03.ibm.com/solutions/alliance/us/index.html "Our Services." Systems Certifications. 2007. Intertek. 30 Mar 2009 http://www.intertek-sc.com/our_services/?lang=en "Savvis Completes Examination in Conformity with Statement on Auditing Standards No. 70 (SAS 70), Service Organizations." Press Release. 1 December 2008. Savvis. 30 Mar 2009 http://www.savvis.net/corp/News/Press+Releases/Archive/Savvis+Completes+Examination+in+Conformity+with+Statement+on+Auditing+Standards+No+70+Service+Organi.htm "Support and Training." EMC2 Where Information Lives. 2009. EMC Corporation . 30 Mar 2009 http://www.emc.com/support-training/index.htm Wipro. (n.d.). Enterprise Security Services. Retrieved March 30, 2009, from http://www.wipro.com/itservices/ess/index.htm