Hello can anyone fix this I received the feedback from my professor and its done wrong the lady that did it is not responding to me but the feedback from the professor is posted so the exact thing can

Running Head: VIRTUALIZATION 0









Virtualization


Student’s Name

Institution

Due Date









IT Infrastructure

The Chief Technology Officer is involved in developing long-term solutions in M3. The IT infrastructure components identified as weak and in need of an upgrade include IT security management and virtualization solutions. The IT security management solution is not reliable in protecting the organization's intellectual properties against internal threats such as employees or external threats such as hackers. Therefore, a complete security threat audit is proposed as part of the solution to identify the threats, both internal and external. It will include compliance needs that authorities might use against M3. The next steps are to protect, detect, respond, and recover lost intellectual properties.

The process of virtualization will make M3 operations secure and easily manageable as any need to increase the IT infrastructure will occur virtually. Incidences of downtime due to faulty servers will get eliminated (Ameen and Hamo, 2013). The solution will increase business continuity prospects if there is a natural disaster as resources will get accessed via the internet, unlike before, where disaster recovery procedures would take days before IT experts and technicians recovered damaged servers to obtain lost data. Therefore, all stakeholders will have confidence in the business operations that M3 does.

The virtualization will enhance resource management as the company will not worry about upgrading activities that require new servers purchased. Thus, the operating costs will significantly reduce as service providers will automatically upgrade (Croson and Drnevich, 2013). Therefore, the solutions include a schedule that further advises the organization to prepare their workforce for cloud solutions as greater agility and easy access to services will occur. The solution will include network, desktop, and server virtualization.


If M3 does not implement the solution, it will continue to experience high operational costs as replacing damaged hardware is costly, leading to low-profit margins. A slow workload deployment will reduce the business processes' efficiency, leading to complaints from clients and other stakeholders. The common server availability problems will persist, leading to low productivity. High power costs persist as the server consumes a lot of power if their number is not regulated by virtualization. Collaboration activities with other team members will not occur, leading to poor business growth for M3. Therefore, the business should highly consider the virtualization solutions provided.

Policies in the Infrastructure

Information security policies will change to include all employees in training and education to practice proper password management techniques. Since servers do not need physical access for information to get lost, employees will act as the first line of defense. The acceptable use policy will change as the shift to virtualization will change employees' constraints and challenges before. If there is any change in the IT resources of M3, then a change management policy is needed for communication to reach all employees. If the entire team is not aware of the change, it might lead to inconsistencies in implementation, putting the company in danger of data loss (Kumar and Charu, 2015).

An incidence response policy covering the servers, desktop, and network virtualization is necessary for the company to manage incidences that put its IT resources in danger. The policy stipulates the workforce involved in the response and the role of each employee. The policy might be a necessity if compliance with authorities is needed. Therefore, the company will cover all gaps that might lead to loss of information or damage its reputation.


References

Ameen, R. Y., & Hamo, A. Y. (2013). Survey of server virtualization. arXiv preprint arXiv:1304.3557.

Drnevich, P. L., & Croson, D. C. (2013). Information technology and business-level strategy: Toward an integrated theoretical perspective. Mis Quarterly, 483-509.

Kumar, R., & Charu, S. (2015). An importance of using virtualization technology in cloud computing. Global Journal of Computers & Technology, 1(2).