Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe PROtect Cyber Security Management Tool Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe
CYBER SECURITY CONCERNS 67% of Businesses Reported an Incident Incidents and Crime Growing Rapidly Professional Services, Lost Business Opportunities, Down-time Average SMB Security Incident Costs $38,000 President Elect’s First 100 Days National Focus on Cyber Security Problem – what is the problem you are trying to solve? Why is it important? Why should we care? (use the materials from the project charter)
WHY YOU NEED PROtect SMB Driven Services Cross-platform Access Tools & Education Cross-platform Access Web Portal Mobile Application Ease of Use Created for Non-IT Professionals Customer Support Solution – description of the solution – what is it? how does it work? (use the materials from the project charter)
ENTERPRISE ARCHITECTURE Prototype demonstration in class. (MIS 3504)
PROCESS MODEL OVERVIEW Data and process model overview – what is the data model of the solution? What is the process model (MIS 2502 and MIS 3504)
PROCESS MODEL OVERVIEW Data and process model overview – what is the data model of the solution? What is the process model (MIS 2502 and MIS 3504)
Users Jackson Taylor Administrator “I am looking for a service that allows me to manage threats that may occur for our company stemming from the employee’s personal devices.” Taylor Sales Associate “I use my personal laptop and cell phone to complete a majority of my work tasks while I am on the road.”
Solution Demonstration PROtect
Phase 2 Phase 1 Phase 3 Implementation Plan Where We Are Now Customer Acquisition Customer Support Web Portal & Mobile App Development Phase 1 What’s Next Additional Monitoring IDS/IPS DNS Phase 2 Where We Want To End Up Consulting Services Pen Testing Proactive Services Corporate Partnerships Phase 3 Implementation plan – what steps do you need to take to put your solution into operation? How did you get here? (MIS 3535)
FINANCIAL SCOPE Basic financials for years 1, 2, and 3 including income (sales and other sources) and expenses (marketing, salaries, computing, servers, etc.) (use the template)
Professional threat protection for your business. Goodbye Cyber Threats PROtect Professional threat protection for your business.