Cover: Information Security Roles Essay

Submitted By darrin669
Words: 530
Pages: 3

March 21, 2014
IS4550T
Week 1
Unit 1 Lab 1
Turnbough
ITT-Technical Institute (Arlington)

Unit 1 Assignment 1 For the organization that wants to monitor and control use of the Internet by implementing content filtering; wants to eliminate personal use of organization owned IT assets and systems; wants to monitor and control use of the e-mail system by implementing e-mail security controls; and wants to be compliant with GLBA. The organization can purchase licenses for ContentProtect® Professional Suite by ContentWatch, Inc. This software will allow the IT department to enforce the Acceptable Use Policy, because with ContentProtect® Professional Suite it increases productivity and decreases liability by blocking unwanted content; it integrates with Safe Search features in popular search engines, it provides dynamic real-time filtering, detailed charts and graphs for reporting, web-based remote administration, it provides advanced reporting by allowing administrators to view reports anywhere and at any time. It also fits the organization’s want to eliminate personal use of organization owned IT assets and systems, because it has ContentWatch’s Application Manager permits administrators to manage applications that users can run on their desktop computers. The organization can purchase licenses for Email Filtering by Bloxx. This service claims to stops spam emails at network edge. It also controls non-business emails coming into the network by either completely blocking them or delaying delivery to the non-business folder. It also blocks malware and phishing emails with multiple anti-virus engines. It also maintains a full audit trail of all inbound and outbound email in an easily searchable Activity Log. The Gramm-Leach-Bliley Act of 1999 (GLBA), Title V, requires financial services organizations to insure the security and confidentiality of customer records and information. Title V has both privacy and security requirements for the protection of nonpublic personal information. Among the many requirements, organizations must adopt a "written security program" that includes administrative, technical, and physical safeguards for protecting customer information. Information Shield can save organizations thousands of dollars in their compliance efforts by helping address many of the critical aspects of GLBA. Information Shield has two different software names that will help the organization become compliant with GLBA. First software is called…