CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.

Slides:



Advertisements
Similar presentations
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Advertisements

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Security for Today’s Threat Landscape Kat Pelak 1.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Boost your network security with NETASQ Vulnerability Manager.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
(Geneva, Switzerland, September 2014)
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Identity Assurance Emory University Security Conference March 26, 2008.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
SAFEGUARD REVENUE & REPUTATION WITH SMARTER, SHARPER IT SECURITY COMPUTACENTER AND SECURITY JUNE 2014.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Cybersecurity as a Business Differentiator
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Physical Security Governance Model
Information Security – Current Challenges
| Data Connectors: Atlanta, GA
Cybersecurity - What’s Next? June 2017
Transforming business
AT&T Premises-Based Firewall Enhanced SBS Solution
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Securing Information Systems
Virtualization & Security real solutions
Availability of Enterprise File-Sharing Solution on Azure Extends its Protection to Office 365 “With Microsoft Azure, Axway MailGate provides a comprehensive.
Strong Security for Your Weak Link:
SMB practice development: Security play
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
SMB practice development: Security play
Secure once, run anywhere Simplify your security with Sophos
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
Powerful Partnerships with Industry Leaders
The MobileIron® Threat Detection difference:
Microsoft Data Insights Summit
Presentation transcript:

CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014

© COMPUTACENTER 2014 MARKET DRIVERS The variety and volume of security risks is escalating  42% increase in targeted attacks 1  5,291 new vulnerabilities emerged including 14 zero-day vulnerability 1  54% of organisations had at least one potential data loss incident 2  40% of data breaches caused by hackers 1  1 in every 291 s was infected by a virus 1  9 out of 10 large organisations experienced a security breach in MORE RISKS, LESS TIME TO REACT All create new chinks in the security armour

© COMPUTACENTER 2014 THE CHANGING LANDSCAPE The cost of security breaches:  In the UK alone security breaches cost £27 billion in losses in  18% increase in the average financial cost of a security incident in CURRENT CHALLENGES 3 It’s not just the quantity, but also the nature of attacks that’s evolving. Factors that could expose an organisation to new security threats include: Bring your own device Remote working policies Wireless LAN deployments Cloud computing and virtualisation adoption Greater collaboration and data sharing

© COMPUTACENTER 2014 EXISTING ENTERPRISE SECURITY  Organisations are in a state of constant flux  Continual interactions with customers, partners and employees – the human and a digital element are both vulnerable  Mobile working results in “ data everywhere ”  Personal and corporate devices are used to access systems and data  New attacks use multiple attack vectors  23% of security breaches are attributable to third party negligence 4  Vigilance only works if end-to-end CURRENT CHALLENGES 4 Breaches arise from unexpected sources, such as: VENDING MACHINES HEATING AND COOLING SUPPLIERS LIGHTING PRINTERS

© COMPUTACENTER 2014 TAKING ACTION IS NO LONGER OPTIONAL Organisations need to:  Secure data while it traverses the network – wireless or wired, public or private  Prevent unauthorised access to corporate applications  Block spam, malware, phishing attacks and malicious web domains  Ensure regular and comprehensive patch management  Wipe lost or stolen mobile devices – employee- and employer-owned  Educate staff to foil social engineering attacks  Prevent customer and financial data escaping from the cloud 5 WHY CHANGE NOW?

© COMPUTACENTER 2014 CUSTOMER BENEFITS  Drive closer collaboration with customers, partners and suppliers  Embrace new business and IT models  Encourage greater mobility in the workplace  Safeguard competitive advantage and brand reputation  Reduce IT management costs and complexity  Simplify regulatory compliance 6 WHY SECURITY MATTERS Computacenter and Cisco’s security services and solutions enable customers to:

© COMPUTACENTER 2014 HOW WE DELIVER  We advise organisations on existing and emerging security risks and how best to mitigate them  Our Cisco-accredited team designs strategies and architectures to fit individual business needs  Our Solutions Centre can be used to test new Cisco security tools to understand the outcomes prior to making an investment decision  We implement Cisco security platforms and processes that minimise cost and complexity while maximising compliance and control  We provide ongoing management and support to ensure security measures can adapt to new threats, workstyles and IT consumption models 7 COMPUTACENTER AND CISCO’S APPROACH ADVISE DESIGN TEST IMPLEMENT SUPPORT AND MANAGE Our services and solutions are: PRAGMATIC PROACTIVE PROVEN

© COMPUTACENTER 2014 WHY US?  Long-term partnership  Consultancy-led approach  End-to-end expertise  Independent advice  European capabilities  Proven methodologies  Right-fit not only-fit solutions 8 COMPUTACENTER AND CISCO TOGETHER Computacenter’s Cisco credentials  Enterprise Partner of the Year 2013 EMEAR  Gold Partner since 1998  Advanced Technology Partner  Master Managed Service Provider

© COMPUTACENTER 2014 HOW WE DELIVER  We tailor solutions to the way the business works across multiple sites, devices and interactions  We minimise the risk of breaches with Cisco’s industry-leading firewalls  We help organisations detect, monitor, isolate and block threats before they impact business operations  Secure the network  Protect the workplace  Defend the datacenter 9 OUR APPROACH

© COMPUTACENTER 2014 WHAT WE DELIVER Cisco Cyber Threat Defense Solution:  Provides greater visibility into threats  NetFlow generates network-wide security telemetry  Lancope StealthWatch System analyses data to detect threats and suspicious behavior  Cisco Identity Services Engine provides contextual information to determine intent and severity of threat  Cisco Sourcefire systems form a layered security defence to maximise protection throughout the security cycle 10 KEY CISCO SOLUTIONS

© COMPUTACENTER THANK YOU