Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram.

Slides:



Advertisements
Similar presentations
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Understanding secure data erasure and end-of-lifecycle IT asset management.
110801_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Business Continuity The Business of Keeping A Business Running John Dooly Senior Analyst CEMA Region Prague, Czech Republic.
110801_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Security Controls – What Works
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Building Your Cloud Sales Culture and Compensation Plan
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Capital TelePresence Financing & Messaging European Theatre For.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Maximize.
General Awareness Training
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Save.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Information Systems Security Computer System Life Cycle Security.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Get Quick.
110801_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
110130_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
120204_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _ 1 Ingram Micro.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Agenda Why Not? Discussion/Open Forum Why? Discussion/Open Forum Service Model Value Added Services Lifecycle Management Products Now Why Not?
Agenda PartStock Company Overview Service Model Value Added Services Lifecycle Management Products Why Choose PartStock?
121101_ 1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
COMPUTER HARDWARE REDEPLOYMENT AND DISPOSAL July 19, 2004.
Case Study: Recover Leased IT Assets. Background COMPANY is a large multinational offices services organization employing about 40,000 employees worldwide.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Securing E-Transaction 1/24.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
IT Jobs Positions available in the field of Information Technology.
Electronic Waste Recycling Necessary for a Green Future.
Migration to Cloud and Data Center Moves/ Consolidation Security & Asset Disposition Case Studies DCM 11.1 Thursday May 2, 9:45–10:45am, Palm H Cindy Miller,
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Security and Privacy in HRIS
Distributed Asset Management Making The Business Case
Grow Your Business with Cisco Capital!
E&O Risk Management: Meeting the Challenge of Change
BUSINESS CONTINUITY BY HUI ZHENG.
Workgroup Technology Partners
At Greentek Solutions, we provide customized solutions
Cyber Issues Facing Medical Practice Managers
IBM Global Financing IBM Asset Recovery Solutions
Capitalize on Your Business’s Technology
Presentation transcript:

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram Micro | Professional Services Ingram Micro IT Asset Disposition Secure, cost-effective, & environmentally responsible services to protect your assets John Redman Manager of Professional Services Operations September 13, 2013

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 2 Agenda ■ ■ Introduction to IM Link ■ ■ ITAD In the News ■ ■ The ITAD Landscape ■ ■ ITAD Best Practices ■ ■ Selling ITAD Services ■ ■ IM Link Resources

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 3 Professional Services – IM Link VAR  Resellers  MSP  Vendors service providers IM Reseller Partner Network  IM Vendors Partner Network  Staffing Partners IM Professional Services customers services Plan Implement Manage Support Benchmarking  Assessment  Planning  Strategy  Design Certification  Pre-Sales Tech Support Benchmarking  Installation  Configuration  Tuning  Testing  System Integration  H/W-S/W Upgrades  Application Development  S/W Customization  Migration Benchmarking  Administration  Asset Management  Systems Management  Performance Tuning  Production Control  Back-up and Archiving  Replication  Help Desk  Remote Infrastructure Management  Relocation Benchmarking  Warranty  Asset Disposition  Break-Fix  Hardware Support  Software Support  Business Recovery  Training/Certification  Recycling- Remarketing

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 4 In the news: Data breaches In 2012, the Identity Theft Resource Center (ITRC) documented 447 breaches in the United States, exposing 17,317,184 records. In the first half of 2013, there have so far been 255 incidents, exposing 6,207,297 records. In 2011, data breaches in the U.S. cost companies $ per compromised record. Companies in the computer software, IT and healthcare sectors accounted for 93 percent of the total number of identities stolen in Theft or loss was the most frequent cause, across all sectors, accounting for 34.3 percent, or approximately 18.5 million identities exposed in Through 2016, the financial impact of cybercrime will grow 10 percent per year due to the continuing discovery of new vulnerabilities. The average value of a lost laptop is $49,246 and the data breach costs represent 80 percent of the total cost of a lost laptop compared to two percent for replacing the computer. Encryption on average can reduce the cost of a lost laptop by more than $20,000. Data breaches are attracting greater public and government scrutiny California strengthened data breach notification requirements Secure and Fortify Electronic Data Act passed a House subcommittee in July 2011 Valuable Data on Devices

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 5 Data Breaches and Disposal in the News 5

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 6  Dominated by small, regional firms, undercapitalized with very little infrastructure  Recent industry consolidation  Historically, very little regulatory oversight and minimal standards and certifications still exist  Sub-contracting and Out-Sourcing remains rampant, even by the OEM’s The Current ITAD Landscape 6

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 7 Ensure your ITAD Vendor has obtained and maintains industry certifications ITAD Industry Standards 7

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 8 1.Ensure data destruction occurs onsite at your location Destroy data before shipping assets offsite Produce verification of data destruction before shipment Avoid vendors who use third party shippers 2.Employ an electronic tracking system Eliminate human error element with electronic tracking system Track each piece of equipment from pick-up to disposition Validate confirmation of the drive wipe before shipment 3.Data wiping is for trained professionals Help establish stronger procedures & controls Eliminate cost of training employees & managing ITAD process Must be bonded, insured vendors with proven track records 4.Remember overlooked devices Copiers, smart phones, fax machines, printers, scanners and USB drives can all hold sensitive information ITAD Best Practices

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 9 4.Refurbish & recycle Know what happens to your IT equipment downstream Commit to a 100% no landfill policy Refurbish & resell all viable equipment to extend lifecycle Partner with a vendor that can process e-waste in-house 5.Maximize your profit Negotiate an upfront purchase deal with a qualified vendor Avoid consignment models that result in eroded value of equipment & service fees 6.Risk reduction Do not simply reply on corporate policies/edicts “We are 100% encrypted.” “We wipe all data bearing assets ourselves.” “We use our install vendor to verify encryption or wipe the hard drives.” Do not rely on non-ITAD vendors and/or internal resources who are typically already strained More ITAD Best Practices

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 10 Profitability Potential 100 “Owned” laptops to dispose 10 ITAD MSRP (per device) $35.00 Total Sales (100 devices) $3, Partner Cost (per device) $20.50 Total Cost (100 devices) $2, Partner Profit$1, (41% GM) Other Considerations: Residual Values Civil Penalties Bad PR Damaged Customer Relationships Future Liabilities Uplift charges for onsite data sanitization

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 11 Account Qualification Questions General Inquiry  Purchase or lease new IT hardware?  How Often does IT refresh occur?  # of desktop PCs (“DT”) | # of laptop PCs (“LT) | # of tablets or smart phones  Are data bearing assets encrypted?  Is there a policy and/or process in place for asset disposal For those with an ITAD Program in Place…  Is your ITAD provider R2 or e-Steward certified? What other certifications do they possess?  Does your ITAD program produce positive or negative cash flow?  Who performs wiping of assets – internal employee or external vendor?  Does your ITAD provider purchase assets outright, or sell them on consignment over time?  What kind of historical and financial reporting is available regarding previously disposed of assets?  Does your ITAD vendor provide timely, accurate and auditable reporting, such as ROI, certificates of data destruction and physical destruction/recycling?  How does your current ITAD vendor handle IT asset recycling for older assets and assets such as CRT monitors, batteries, etc that require EPA complaint recycling? In-house or Downstream vendors?

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 12

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 13 Questions?

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 14 Ingram Micro Professional Services IM Link IM brokered solution provider network Standard hourly rates for labor services IT Staffing Services Permanent or temporary positions Flexible Staff Augmentation Solutions IT Asset Disposition Services Secure and responsible disposal Removes liability for information SCORE Professional Services Category and Vendor Specific Services SKU’d and Customizable SOW’s Ingram Micro Training Academy Classroom or Online – guaranteed to run Can be resold to end users 3rd Party Warranty Services Private label product protection Variety of Coverage Options Remote System Admin Services Save a truck roll Outsource support and development System Integration Services Compliment Cloud Services sales Customizable to end-user environments

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. 15 For submitting requests through IM Link… Sales and Support Assistance… | (800) x67247 | x66686 | x66492 To become an IM Link Service Provider… | (800) ext | (800) Follow us: Ingram Micro Professional | Getting Linked Up with IM Link

Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.