Preview

Defender Direct Case Study

Good Essays
Open Document
Open Document
606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Defender Direct Case Study
Case 9, Defender Direct, Inc.: A Business of Growing Leaders
Company Name: Defender Direct, Inc.
Topic of the Week: Leadership, Policy, and Culture
Synopsis of the Situation
Dave Lindsey the founder and CEO of Defender Direct started the business from the ground up and used proven concepts as well as his own leadership to develop a successful security alarm company. It all began when Mr. Lindsey was passed over for a promotion and decided enough is enough and started the business out of his home with the help of his wife. Defender Direct started out with meager beginnings; however, over 10 years grew to one of the largest security and satellite dealers in the Midwest. Dave Lindsey gives the credit for the growth to the employees of the organization
…show more content…
Direct Defender could expand into the commercial arena. Businesses are looking for dependable security solutions with and online portal to handle request and help secure their business.
3. Create and develop their own line of security systems with monthly monitoring that are possibly more cost effective and better monitoring.
Selected Alternative Solution
Direct Defender could expand into the commercial arena. Businesses are looking for dependable security solutions with and online portal to handle request and help secure their business.
Defender Direct is already a leader in the consumer segment for selling and installation of security systems; it seems like a natural progression to crossover to the commercial segment. Defender direct has a proven track record when it comes security systems the only difference when it comes to dealing with business segment would be the training and implementation of a new team at each business unit that could sell to businesses and install for commercial clients. This would most likely not create any new product offerings other than to another segment. Selling to the commercial segment could also increase revenues and provide for guaranteed renewal of contracts and new business for new locations.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    3. Who will have access to the systems and how will this access be monitored?…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Focus specifically on guard services and high-level consulting audits, while outsourcing or referring to vendors for security equipment and system needs (ADT)…

    • 2342 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Request for Proposals

    • 26335 Words
    • 106 Pages

    INTRODUCTION Statement of Purpose The State Government, Department of Finance and Administration, hereinafter referred to as the State, has issued this Request for Proposal (RFP) to define the State's minimum service requirements; solicit proposals; detail proposal requirements; and, outline the State’s process for evaluating proposals and selecting the contractor. Through this RFP, the State seeks to buy the best services at the most favorable, competitive prices and to give ALL qualified businesses, including those that are owned by minorities, women, persons with a disability, and small business enterprises, opportunity to do business with the state as contractors and sub-contractors. The State intends to secure a contract for Information Security Assessment Services…

    • 26335 Words
    • 106 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this Multi Layered Security Plan we will describe how we will improve the security of each domain and how to protect our information. We will update all firewalls on the infrastructure and secure our ports that are open and stop incoming traffic that is malicious. All anti-virus software will be updated throughout the company. All IT employees will be informed about the new MLS Plan that we putting into effect once the Senior management approves it.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Case Study Assetguard Case

    • 1041 Words
    • 5 Pages

    Based on given conditions our recommendation is to launch AssetsGuard insurance product line for the following reasons:…

    • 1041 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Enhancements to the external customers were also a huge success. Customers were now able to resolve technical issues via web-based support, and this led to happier customers, and more profitability by those who were more likely to remain loyal to Cisco. The case analysis to follow ventures into more depth with some of these web enhancements and business processes that made Cisco what it is today, one of the great providers of web-connected business applications.…

    • 1866 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    Symantec, Initials. (n.d.). Cyber attacks increasingly target home users for financial gain . Retrieved from http://complianceandprivacy.com/News-Symantec-report-home-users.asp…

    • 768 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Disaster Recovery Plan

    • 638 Words
    • 3 Pages

    Online services must be protected to ensure that both employees and customers will be able to access the programs and information to continue running the business. Sales, shipping information, customer database, and the virtual interaction provided to customers must be available. Basic functions within the main offices must remain available, including power, sales, the phones, and customer service.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Dan & bradstreet and intuit to offer new suite of online D&B services to small business owners. (2001). Retrieved , , from Dun & Bradstreet Launches Small Business Services, Millions of QuickBooks Customers to Have-Access to Business Information Tools Web site: http://investor.dnb.com/ireye/.…

    • 1593 Words
    • 7 Pages
    Powerful Essays