SAFEGUARD REVENUE & REPUTATION WITH SMARTER, SHARPER IT SECURITY COMPUTACENTER AND SECURITY JUNE 2014.

Slides:



Advertisements
Similar presentations
Life Science Services and Solutions
Advertisements

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Customer Overview Aligning Technology evolution to Strategic Business Imperatives.
Unified Logs and Reporting for Hybrid Centralized Management
Viewpoint Consulting – Committed to your success.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Retail and Consumer Roadmap to Retailing in the Digital Era Strictly Private and Confidential 17 June 2015.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
Microsoft Premier Support for Partners Capitalize on cloud potential Receive and deliver end-to-end cloud support Ease customers’ transition to the cloud.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
[Name / Title] [Date] Effective Threat Protection Strategies.
Caspian Opportunities & Challenges Eugene Pradas VP, Global Voice Sales Europe April 2010.
Smart Buildings Srirangarajan Kadaba National Manager – Energy Edge Buildings Business Schneider Electric 21June 2010.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
4G-LTE: Enhancing Efficiency in Organizations. Factors Impacting Digitization Processes and Systems January Powerful Platforms and Devices Storage.
Vodafone Global Enterprise & Huawei
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Name, Title. Presentation Title Name, Job Title Global Digital Information Created and Shared (Posts, Pictures, Documents, Tweets) The Data Explosion.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
More Competitive, Lower Cost How Standardization Fuels Growth
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
© 2010 IBM Corporation Business Analytics software Business Analytics Editable Text Editable Text Editable Text.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Hosted Voice & Hosted Contact Center
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Chapter 1: Explore the Network
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
Introduction to Exterity
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
1 The government digital agenda aims to create digital services that are more efficient, convenient, secure and accessible than the manual services they.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Chapter 1: Explore the Network
Fourth Dimension Technologies
Instructor Materials Chapter 1: Explore the Network
| Data Connectors: Atlanta, GA
Transforming business
AT&T Premises-Based Firewall Enhanced SBS Solution
Cloud adoption NECOOST Advisory | June 2017.
CIM Modeling for E&U - (Short Version)
Growing comparative advantage through digital transformation
Real-time protection for web sites and web apps against ATTACKS
Chapter 1: Explore the Network
Consulting Services for IoT
Cisco Collaborative Professional Services
Securing the Threats of Tomorrow, Today.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

SAFEGUARD REVENUE & REPUTATION WITH SMARTER, SHARPER IT SECURITY COMPUTACENTER AND SECURITY JUNE 2014

© COMPUTACENTER 2014 MARKET DRIVERS - MORE RISKS, LESS TIME TO REACT 2 Data and devices are increasingly mobile which creates new security challenges across the business. At the same time, threats are growing in variety, volume and velocity. 3 Verizon 2014 data breach report 4 Ponemon UK data breach study 42% INCREASE IN TARGETED ATTACKS 1 NEW VULNERABILITIES EMERGED INCLUDING 14 ZERO-DAY VULNERABILITIES 1 5,291 LOST BUSINESS AS A RESULT OF A BREACH 4 £950,000 INCREASE IN IDENTIFIED MOBILE VULNERABILITIES 1 25% 92% OF THE 100,000 INCIDENTS IN THE VERIZON SECURITY REPORT CAN BE DESCRIBED BY 9 PATTERNS 3 9 OF ORGANISATIONS HAD AT LEAST ONE POTENTIAL DATA LOSS INCIDENT 2 54% ALL CREATE NEW CHINKS IN THE SECURITY ARMOUR 1 Internet Security Threat Report 2013, Symantec 2 Check Point 2013 Security Report

© COMPUTACENTER IS THERE A PROBLEM? EXISTING ENTERPRISE SECURITY Information Security Breaches Survey, PWC and Infosecurity Europe 4 Global State of Information Security Survey 2014, PWC large organisations experienced a security breach in OUT OF 10 INCREASED VOLUME OF THREATS NEW ATTACKS USING MULTIPLE ATTACK VECTORS MOBILE WORKING RESULTS IN “DATA EVERYWHERE” DIFFICULT TO CORRELATE EVENTS CLOUD & VIRTUALISATION REQUIREMENTS PRESENT NEW SECURITY CHALLENGES From denial of service attacks and virus infections to device theft and fraud, the origins of security breaches are increasing. And so too is the financial fallout. increase in the average financial cost of a security incident in %

© COMPUTACENTER 2014 WHY CHANGE NOW 4 - TAKING DEFENSIVE ACTION 1 SECURE DATA WHILE IT TRAVERSES THE NETWORK BLOCK UNAUTHORISED ACCESS TO APPLICATIONS, AS WELL AS SPAM, MALWARE AND OTHER ATTACKS ENSURE REGULAR AND COMPREHENSIVE PATCH MANAGEMENT VISIBILITY ACROSS ALL DATACENTER ASSETS ENABLE WIPE LOST OR STOLEN MOBILE DEVICES EDUCATE STAFF TO SOCIAL ENGINEERING ATTACKS PREVENT LEAKAGE OF CUSTOMER AND FINANCIAL DATA

© COMPUTACENTER 2014 NO CHANGE IS “NOT AN OPTION” - NEW APPROACHES TO NEW CHALLENGES 5 LOW BUSINESS AND USER CONFIDENCE IN EXISTING SECURITY MEASURES NEW ATTACKS CAN BE CRIPPLING CONSEQUENCE OF BREACH NOW ALWAYS BUSINESS IMPACTING TECHNOLOGY AND TOPOLOGY COMPLEXITY CANNOT CONTINUE HUMAN INTELLIGENCE NEEDS "HELP"

© COMPUTACENTER 2014 CUSTOMER BENEFITS 6 - WHY SECURITY MATTERS Computacenter’s security services and solutions enable customers to: REDUCE IT MANAGEMENT COSTS AND COMPLEXITY ENSURE BUSINESS DATA IS SECURE AND READILY AVAILABLE SAFEGUARD COMPETITIVE ADVANTAGE AND BRAND REPUTATION SECURE COLLABORATION WITH CUSTOMERS, PARTNERS AND SUPPLIERS EMBRACE NEW BUSINESS AND IT MODELS THAT SUPPORT GREATER EFFICIENCY SUPPORT THE MOBILE WORKFORCE AND THE WORKPLACE

© COMPUTACENTER 2014 HOW WE DELIVER 7 - OUR APPROACH ADVISE We advise organisations on existing and emerging security risks and how best to mitigate them DESIGN Our accredited, vendor-agnostic team embraces a whole market view to design strategies and architectures TEST Our Solutions Centre can be used to test new security tools to understand the outcomes prior to making an investment decision IMPLEMENT We implement security platforms and processes that minimise cost and complexity while maximising compliance and control SUPPORT & MANAGE We provide ongoing management and support to ensure security measures can adapt to new threats, workstyles and IT consumption models

© COMPUTACENTER 2014 WHY US? 8 - WHY ARE WE DIFFERENT? VIEW SECURITY ACROSS ENTIRE INFORMATION LIFECYCLE (NOT IN SILOS) MULTI-VENDOR, MULTI-SOLUTION EXPERTISE HELP IT SECURITY BUDGET GO FURTHER SECURITY AND NETWORK ASSESSMENTS PINPOINT RISK TO EXPOSURE CONSTANTLY EXPANDING SECURITY OFFERINGS TO ADDRESS EMERGING THREATS THE 5 ESSENTIALS OF COMPUTACENTER & SECURITY SKILLS AND SOLUTIONS SPAN THE ENTIRE IT STACK 1 CERTIFICATIONS ACROSS A WIDE RANGE OF SECURITY SOLUTIONS 2 UNIQUE INSIGHT INTO EMERGING SECURITY RISKS, THROUGH MANAGEMENT OF 1000s of DEVICES AND EVENTS EACH MONTH 5 HIGHEST ACCREDITATIONS WITH LEADING VENDORS 4 ADVISE ON SECURITY IMPLICATIONS OF NEW TECHNOLOGIES AND BUSINESS MODELS (INCLUDING POC FACILITIES TO TEST THEM) 3

© COMPUTACENTER 2014 WHAT WE DELIVER 9 - OUR SERVICES Computacenter takes a holistic approach to security that redefines the traditional approach. We view security across the organisation, helping customers to deliver a balanced and cohesive security strategy. We secure information at the endpoint, application, network and infrastructure layer using a range of technologies, tools and tactics.

© COMPUTACENTER 2014 COMPUTACENTER IN ACTION 10 - WHERE WE HAVE DELIVERED AEGON IMPROVES THE EFFICIENCY OF ITS SALES OPERATION WITH MOBILITY SOLUTION Challenge: The efficiency and flexibility of AEGON's sales force is key to the future success of the business. With its sales teams increasingly working away from the office, AEGON needed to ensure quick and easy access to key applications from remote locations. This need to increase mobility, however, had to be balanced with security, which is essential for maintaining regulatory compliance and reducing risk. Solution: A secure and effective remote access solution has been created using a virtual private network, two-factor user recognition and personal laptop firewalls. As a result, sales staff can now access the AEGON network using 3G, Wi-Fi or broadband connections. To ensure the availability of the new solution, Computacenter is providing ongoing support and management. Results: By increasing the mobility of its sales force, AEGON has enabled the team to spend more time selling and meet their targets, which are essential for sustaining growth and profitability. At the same time AEGON has been able to minimise security risks and continues to comply with key regulations.

© COMPUTACENTER 2014 COMPUTACENTER IN ACTION 11 - WHERE WE HAVE DELIVERED OTHER REFERENCES INCLUDE: Please do not leave this slide with customers – most of these are INTERNAL references only

APENDICES Useful reference documents

© COMPUTACENTER 2014 NETWORKING, SECURITY & UC ON A PAGE Network Infrastructure Datacenter Networking Wireless LAN Structured Cabling Core Networking Virtual Private Networks (VPN) Security End Point Security Data Loss Prevention Network Access Control Firewall Solutions Authentication Unified Communications Digital Media Signage Enterprise Voice Instant Messaging IP Communications Business Video Solutions Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials AdviseDesignTestImplementSupport & Manage Strategic updates Assessments Transformative networking Architectural roadmap Advanced consultancy ROI/TCO Solution testing Proof of concept Benefits realisation Procurement Staging Deployment Transformation Operational support Asset disposal (RDC) Field engineering Maintenance Mobility FirewallsSDN Storage Networking Routing & Switching IPv6 Network Virtualisation BYOD Intrusion Prevention (IPS) Unified CommunicationsNACAuthentication Fixed OutcomeResources on DemandPay Per UseFinancing/LeasingProject 13 © COMPUTACENTER 2014 Fixed Outcome Resources on Demand Pay Per Use Financing/Leasin g Projec t Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials

© COMPUTACENTER 2014 Structured Cabling Real-time Infrastructure & Port Usage Installation Managed Cabling Intelligent Buildings IP Physical Security Interactive Facilities Wireless Energy Optimisation Environmental Monitoring Power Monitoring Power Optimisation Solutions Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials AdviseDesignImplementTestSupport & Manage Assessments Strategic Roadmap Health Check Infrastructure Design DC Design CAD Design Procurement Delivery Installation Solution Test Warranty Handover Documents Maintenance Training Management Access Control Smart Boards Converged IP Devices LED Lighting Fibre Optics Video Analytics ITIL Meeting Booking Systems Copper PUE Fixed OutcomeResources on DemandPay Per UseFinancing/LeasingProject 14 © COMPUTACENTER 2014 Projects Resources on Demand Fixed OutcomeFinancing/Leasin g Pay Per Use Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials Capacity On Demand PHYSICAL INFRASTRUCTURE ON A PAGE