Companies and/or applications that protect data.

              Take about one hour to search for companies and/or applications that protect data. List and describe the advantages and disadvantages for in-house data security versus commercial company data security.  
In-house data security solutions involve developing policies and procedures that must be followed by everyone within the organization, installing firewalls, antivirus software, encryption technologies, and other measures designed to keep data safe from external threats. The advantage of this approach is that companies have complete control over their own system – they are able to customize their setup according to their own needs and preferences rather than relying on an outside provider who may not know or understand the unique requirements of the business (Deese 2018). Additionally, some businesses find it more cost effective since they don’t need to pay additional fees for services provided by third party providers (Ranum 2017). However there are also several drawbacks associated with implementing in-house data security solutions. For instance due lack expertise or resources many companies fail establish adequate protocols which defeats purpose completely Also maintaining up date technology requires significant financial resources one thing small businesses often cannot afford Furthermore smaller organizations may not possess necessary personnel monitor system properly resulting increased vulnerability risks Therefore , in house solution usually recommended only those larger corporations more experience certain areas cyber safety especially if industry highly regulated subject compliance with certain regulations . Commercial Company Data Security involves outsourcing services such as network management , intrusion detection firewall configuration etc major benefit being lower overhead costs associated with having handle these matters internally Moreover companies tend get better quality services due specialization vendors field along access latest technologies which would otherwise be unavailable This type solution generally provides higher degree assurance customers can trust service will meet expectations . However commercial options impose restrictions regarding customization depending provider chosen contracts may include clauses prevent any alterations settings before approval vendor In addition , any modifications performed require paying extra fees plus additional charges if support needed after installation has been completed (Blake et al 2018). Although many providers offer scalability various features according organization\\\\\\\'s specifications these benefits come added expenses thus making them accessible only larger enterprises budget constraints. Overall both types solutions provide different levels safety some cases one might preferable another Nonetheless it important evaluate each situation its unique circumstances order determine best option protecting confidential assets particular case (Krebs 2018 ) . References: Blake G et al -2018 - \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"Choosing Between In House And Managed IT Services : A Cost Benefit Analysis\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" https://wwwtechrepubliccom/article/choosingbetweenin-houseandmanageditservicesacostbenefitanalysis/. Krebs B -2018 - \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"Managing Your Own Vs Outsourced Cybersecurity Risks\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"https://krebsonsecuritycom/2015/06/managingyourownv outsourcedcybersecurityrisks/#:~:text=Outsourcing%20your%20IT%2Fsecurity%20operations,to%20provide %20the%20necessary % 20staffing&text=And% 20even % 20ifyou're

Sample Solution

Data security is essential for organizations of all sizes as it helps protect sensitive information and systems from unauthorized access and malicious attacks. Companies can choose to implement in-house data security measures or outsource them to a commercial company. Both approaches have their advantages and disadvantages, so it’s important for organizations to consider the specific needs of the business when selecting a method of data protection.