problem1) problem should be answered in your own words. Though, when you use the words of others in any answers, you must use quotation marks and attribute the source right there following APA style recommendations. Make sure to cite references right there using APA style when you paraphrase the words of others.
Provide a separate bibliography for each problem following APA style recommendations. The bibliography for each problem is outside scope of the 4 double-spaced pages and must be placed at the end of each problem.
Choose two Vulnerability Analysis tools BeyondTrust Retina CS and Retina CS by eEye Digital Security and describe their major features and functionality. Compare and contrast their relative strengths and weaknesses when used in the three (3) scenarios describeed below:
a) The system to be developed is intended to be operational in the large enterprise environment and the system itself when fully developed would be of a size typically found in large enterprise deployments like DOD, large banks or similar sized operations where integration and deployment includes use in the networked environment.
b) The system to be developed is intended to be operational in the midmarket sized firm that has branches located countrywide. Familiar exs may include a fast food chain of outlets like Burger King, a nationwide clothing store or similar set of replicated stores where integration and deployment includes use in a networked environment.
c) The system to be developed is intended to be operational in the small market firm or small business firm or even in home usage. Familiar exs may include an income tax preparation package by a small tax consulting firm.
Ensure to frame your answer in logical argumentations and referenced research results using the text and credible outside sources. Make sure that your answer is written in the contexts of security and trusted systems.