Technology & Product Review for Application Lifecycle Management Tools


Research: 1. Review the weekly readings. 2. Using Google or another search engine, identify an Application Life Cycle Management product which could meet the needs of Sifers-Grayson. Then, research your chosen product using the vendor’s website and product information brochures. 3. Find three or more additional sources which provide reviews for (a) your chosen product or (b) information about Application Life Cycle Management. Write: Write a 3 page summary of your research. At a minimum, your summary must include the following: 1. An introduction or overview for the security technology category (Application Lifecycle Management) 2. A review of the features, capabilities, and deficiencies for your selected vendor and product 3. Discussion of how the selected product could be used by Sifers-Grayson to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc. 4. A closing section in which you restate your recommendation for a product (include the three most important benefits). As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, “governance,” confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary if you need a refresher on acceptable terms and definitions.