Download presentation
Presentation is loading. Please wait.
Published byRandolf Carr Modified over 8 years ago
1
SAFEGUARD REVENUE & REPUTATION WITH SMARTER, SHARPER IT SECURITY COMPUTACENTER AND SECURITY JUNE 2014
2
© COMPUTACENTER 2014 MARKET DRIVERS - MORE RISKS, LESS TIME TO REACT 2 Data and devices are increasingly mobile which creates new security challenges across the business. At the same time, threats are growing in variety, volume and velocity. 3 Verizon 2014 data breach report 4 Ponemon UK data breach study 42% INCREASE IN TARGETED ATTACKS 1 NEW VULNERABILITIES EMERGED INCLUDING 14 ZERO-DAY VULNERABILITIES 1 5,291 LOST BUSINESS AS A RESULT OF A BREACH 4 £950,000 INCREASE IN IDENTIFIED MOBILE VULNERABILITIES 1 25% 92% OF THE 100,000 INCIDENTS IN THE VERIZON SECURITY REPORT CAN BE DESCRIBED BY 9 PATTERNS 3 9 OF ORGANISATIONS HAD AT LEAST ONE POTENTIAL DATA LOSS INCIDENT 2 54% ALL CREATE NEW CHINKS IN THE SECURITY ARMOUR 1 Internet Security Threat Report 2013, Symantec 2 Check Point 2013 Security Report
3
© COMPUTACENTER 2014 - IS THERE A PROBLEM? EXISTING ENTERPRISE SECURITY 3 3 2013 Information Security Breaches Survey, PWC and Infosecurity Europe 4 Global State of Information Security Survey 2014, PWC large organisations experienced a security breach in 2013 3 9 OUT OF 10 INCREASED VOLUME OF THREATS NEW ATTACKS USING MULTIPLE ATTACK VECTORS MOBILE WORKING RESULTS IN “DATA EVERYWHERE” DIFFICULT TO CORRELATE EVENTS CLOUD & VIRTUALISATION REQUIREMENTS PRESENT NEW SECURITY CHALLENGES From denial of service attacks and virus infections to device theft and fraud, the origins of security breaches are increasing. And so too is the financial fallout. increase in the average financial cost of a security incident in 2013 4 18 %
4
© COMPUTACENTER 2014 WHY CHANGE NOW 4 - TAKING DEFENSIVE ACTION 1 http://www.cisco.com/c/en/us/solutions/enterprise-networks/unified-access/cisco_global_work.html SECURE DATA WHILE IT TRAVERSES THE NETWORK BLOCK UNAUTHORISED ACCESS TO APPLICATIONS, AS WELL AS SPAM, MALWARE AND OTHER ATTACKS ENSURE REGULAR AND COMPREHENSIVE PATCH MANAGEMENT VISIBILITY ACROSS ALL DATACENTER ASSETS ENABLE WIPE LOST OR STOLEN MOBILE DEVICES EDUCATE STAFF TO SOCIAL ENGINEERING ATTACKS PREVENT LEAKAGE OF CUSTOMER AND FINANCIAL DATA
5
© COMPUTACENTER 2014 NO CHANGE IS “NOT AN OPTION” - NEW APPROACHES TO NEW CHALLENGES 5 LOW BUSINESS AND USER CONFIDENCE IN EXISTING SECURITY MEASURES NEW ATTACKS CAN BE CRIPPLING CONSEQUENCE OF BREACH NOW ALWAYS BUSINESS IMPACTING TECHNOLOGY AND TOPOLOGY COMPLEXITY CANNOT CONTINUE HUMAN INTELLIGENCE NEEDS "HELP"
6
© COMPUTACENTER 2014 CUSTOMER BENEFITS 6 - WHY SECURITY MATTERS Computacenter’s security services and solutions enable customers to: REDUCE IT MANAGEMENT COSTS AND COMPLEXITY ENSURE BUSINESS DATA IS SECURE AND READILY AVAILABLE SAFEGUARD COMPETITIVE ADVANTAGE AND BRAND REPUTATION SECURE COLLABORATION WITH CUSTOMERS, PARTNERS AND SUPPLIERS EMBRACE NEW BUSINESS AND IT MODELS THAT SUPPORT GREATER EFFICIENCY SUPPORT THE MOBILE WORKFORCE AND THE WORKPLACE
7
© COMPUTACENTER 2014 HOW WE DELIVER 7 - OUR APPROACH ADVISE We advise organisations on existing and emerging security risks and how best to mitigate them DESIGN Our accredited, vendor-agnostic team embraces a whole market view to design strategies and architectures TEST Our Solutions Centre can be used to test new security tools to understand the outcomes prior to making an investment decision IMPLEMENT We implement security platforms and processes that minimise cost and complexity while maximising compliance and control SUPPORT & MANAGE We provide ongoing management and support to ensure security measures can adapt to new threats, workstyles and IT consumption models
8
© COMPUTACENTER 2014 WHY US? 8 - WHY ARE WE DIFFERENT? VIEW SECURITY ACROSS ENTIRE INFORMATION LIFECYCLE (NOT IN SILOS) MULTI-VENDOR, MULTI-SOLUTION EXPERTISE HELP IT SECURITY BUDGET GO FURTHER SECURITY AND NETWORK ASSESSMENTS PINPOINT RISK TO EXPOSURE CONSTANTLY EXPANDING SECURITY OFFERINGS TO ADDRESS EMERGING THREATS THE 5 ESSENTIALS OF COMPUTACENTER & SECURITY SKILLS AND SOLUTIONS SPAN THE ENTIRE IT STACK 1 CERTIFICATIONS ACROSS A WIDE RANGE OF SECURITY SOLUTIONS 2 UNIQUE INSIGHT INTO EMERGING SECURITY RISKS, THROUGH MANAGEMENT OF 1000s of DEVICES AND EVENTS EACH MONTH 5 HIGHEST ACCREDITATIONS WITH LEADING VENDORS 4 ADVISE ON SECURITY IMPLICATIONS OF NEW TECHNOLOGIES AND BUSINESS MODELS (INCLUDING POC FACILITIES TO TEST THEM) 3
9
© COMPUTACENTER 2014 WHAT WE DELIVER 9 - OUR SERVICES Computacenter takes a holistic approach to security that redefines the traditional approach. We view security across the organisation, helping customers to deliver a balanced and cohesive security strategy. We secure information at the endpoint, application, network and infrastructure layer using a range of technologies, tools and tactics.
10
© COMPUTACENTER 2014 COMPUTACENTER IN ACTION 10 - WHERE WE HAVE DELIVERED AEGON IMPROVES THE EFFICIENCY OF ITS SALES OPERATION WITH MOBILITY SOLUTION Challenge: The efficiency and flexibility of AEGON's sales force is key to the future success of the business. With its sales teams increasingly working away from the office, AEGON needed to ensure quick and easy access to key applications from remote locations. This need to increase mobility, however, had to be balanced with security, which is essential for maintaining regulatory compliance and reducing risk. Solution: A secure and effective remote access solution has been created using a virtual private network, two-factor user recognition and personal laptop firewalls. As a result, sales staff can now access the AEGON network using 3G, Wi-Fi or broadband connections. To ensure the availability of the new solution, Computacenter is providing ongoing support and management. Results: By increasing the mobility of its sales force, AEGON has enabled the team to spend more time selling and meet their targets, which are essential for sustaining growth and profitability. At the same time AEGON has been able to minimise security risks and continues to comply with key regulations.
11
© COMPUTACENTER 2014 COMPUTACENTER IN ACTION 11 - WHERE WE HAVE DELIVERED OTHER REFERENCES INCLUDE: Please do not leave this slide with customers – most of these are INTERNAL references only
12
APENDICES Useful reference documents
13
© COMPUTACENTER 2014 NETWORKING, SECURITY & UC ON A PAGE Network Infrastructure Datacenter Networking Wireless LAN Structured Cabling Core Networking Virtual Private Networks (VPN) Security End Point Security Data Loss Prevention Network Access Control Firewall Solutions Authentication Unified Communications Digital Media Signage Enterprise Voice Instant Messaging IP Communications Business Video Solutions Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials AdviseDesignTestImplementSupport & Manage Strategic updates Assessments Transformative networking Architectural roadmap Advanced consultancy ROI/TCO Solution testing Proof of concept Benefits realisation Procurement Staging Deployment Transformation Operational support Asset disposal (RDC) Field engineering Maintenance Mobility FirewallsSDN Storage Networking Routing & Switching IPv6 Network Virtualisation BYOD Intrusion Prevention (IPS) Unified CommunicationsNACAuthentication Fixed OutcomeResources on DemandPay Per UseFinancing/LeasingProject 13 © COMPUTACENTER 2014 Fixed Outcome Resources on Demand Pay Per Use Financing/Leasin g Projec t Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials
14
© COMPUTACENTER 2014 Structured Cabling Real-time Infrastructure & Port Usage Installation Managed Cabling Intelligent Buildings IP Physical Security Interactive Facilities Wireless Energy Optimisation Environmental Monitoring Power Monitoring Power Optimisation Solutions Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials AdviseDesignImplementTestSupport & Manage Assessments Strategic Roadmap Health Check Infrastructure Design DC Design CAD Design Procurement Delivery Installation Solution Test Warranty Handover Documents Maintenance Training Management Access Control Smart Boards Converged IP Devices LED Lighting Fibre Optics Video Analytics ITIL Meeting Booking Systems Copper PUE Fixed OutcomeResources on DemandPay Per UseFinancing/LeasingProject 14 © COMPUTACENTER 2014 Projects Resources on Demand Fixed OutcomeFinancing/Leasin g Pay Per Use Capabilities End-to-End Services Industry Technologies Strategic Partners Flexible Commercials Capacity On Demand PHYSICAL INFRASTRUCTURE ON A PAGE
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.