Computacenter Presentation

Download Report

Transcript Computacenter Presentation

SAFEGUARD REVENUE & REPUTATION
WITH SMARTER, SHARPER IT SECURITY
COMPUTACENTER AND SECURITY
JUNE 2014
MARKET DRIVERS
- MORE RISKS, LESS TIME TO REACT
Data and devices are increasingly mobile which creates new security challenges across the business.
At the same time, threats are growing in variety, volume and velocity.
5,291
£950,000
NEW VULNERABILITIES EMERGED
INCLUDING 14 ZERO-DAY
VULNERABILITIES1
LOST BUSINESS AS A RESULT OF A
BREACH4
54%
9
25%
OF ORGANISATIONS HAD AT LEAST ONE
POTENTIAL DATA LOSS INCIDENT2
92% OF THE 100,000 INCIDENTS
IN THE VERIZON SECURITY
REPORT CAN BE DESCRIBED
BY 9 PATTERNS3
INCREASE IN IDENTIFIED MOBILE
VULNERABILITIES1
42% INCREASE IN TARGETED
ATTACKS1
1
2
2
© COMPUTACENTER 2014
Internet Security Threat Report 2013, Symantec
Check Point 2013 Security Report
3
4
Verizon 2014 data breach report
Ponemon UK data breach study
ALL CREATE NEW CHINKS IN
THE SECURITY ARMOUR
EXISTING ENTERPRISE SECURITY
- IS THERE A PROBLEM?
INCREASED VOLUME OF THREATS
18%
9
OUT OF
10
large organisations
experienced a security
breach in 20133
increase in the average financial
cost of a security incident in 20134
NEW ATTACKS USING MULTIPLE
ATTACK VECTORS
MOBILE WORKING RESULTS
IN “DATA EVERYWHERE”
DIFFICULT TO CORRELATE EVENTS
From denial of service attacks and virus infections to
device theft and fraud, the origins of security breaches
are increasing. And so too is the financial fallout.
3
4
3
2013 Information Security Breaches Survey, PWC and Infosecurity Europe
Global State of Information Security Survey 2014, PWC
© COMPUTACENTER 2014
CLOUD & VIRTUALISATION
REQUIREMENTS PRESENT NEW
SECURITY CHALLENGES
WHY CHANGE NOW
- TAKING DEFENSIVE ACTION
SECURE DATA WHILE IT TRAVERSES THE NETWORK
BLOCK UNAUTHORISED ACCESS TO APPLICATIONS, AS WELL AS SPAM, MALWARE AND OTHER ATTACKS
ENSURE REGULAR AND COMPREHENSIVE PATCH MANAGEMENT
ENABLE VISIBILITY ACROSS ALL DATACENTER ASSETS
WIPE LOST OR STOLEN MOBILE DEVICES
EDUCATE STAFF TO SOCIAL ENGINEERING ATTACKS
PREVENT LEAKAGE OF CUSTOMER AND FINANCIAL DATA
1
4
© COMPUTACENTER 2014
http://www.cisco.com/c/en/us/solutions/enterprise-networks/unified-access/cisco_global_work.html
NO CHANGE IS “NOT AN OPTION”
- NEW APPROACHES TO NEW CHALLENGES
LOW BUSINESS AND USER
CONFIDENCE IN EXISTING
SECURITY MEASURES
NEW ATTACKS
CAN BE CRIPPLING
CONSEQUENCE OF
BREACH NOW ALWAYS
BUSINESS IMPACTING
5
© COMPUTACENTER 2014
HUMAN INTELLIGENCE
NEEDS "HELP"
TECHNOLOGY AND
TOPOLOGY COMPLEXITY
CANNOT CONTINUE
CUSTOMER BENEFITS
- WHY SECURITY MATTERS
Computacenter’s security services and solutions enable customers to:
6
SECURE COLLABORATION WITH
CUSTOMERS, PARTNERS AND
SUPPLIERS
EMBRACE NEW BUSINESS AND IT
MODELS THAT SUPPORT
GREATER EFFICIENCY
SAFEGUARD COMPETITIVE ADVANTAGE
AND BRAND REPUTATION
REDUCE IT MANAGEMENT
COSTS AND COMPLEXITY
© COMPUTACENTER 2014
SUPPORT THE MOBILE
WORKFORCE AND THE WORKPLACE
ENSURE BUSINESS DATA IS
SECURE AND READILY AVAILABLE
HOW WE DELIVER
- OUR APPROACH
ADVISE
We advise organisations on existing and emerging security risks and how best to
mitigate them
DESIGN
Our accredited, vendor-agnostic team embraces a whole market view to design
strategies and architectures
TEST
Our Solutions Centre can be used to test new security tools to understand
the outcomes prior to making an investment decision
IMPLEMENT
We implement security platforms and processes that minimise cost and
complexity while maximising compliance and control
SUPPORT & MANAGE
We provide ongoing management and support to ensure security measures
can adapt to new threats, workstyles and IT consumption models
7
© COMPUTACENTER 2014
WHY US?
- WHY ARE WE DIFFERENT?
VIEW SECURITY ACROSS ENTIRE INFORMATION LIFECYCLE (NOT IN SILOS)
MULTI-VENDOR, MULTI-SOLUTION EXPERTISE
HELP IT SECURITY BUDGET GO FURTHER
SECURITY AND NETWORK ASSESSMENTS PINPOINT RISK TO EXPOSURE
CONSTANTLY EXPANDING SECURITY OFFERINGS TO ADDRESS EMERGING THREATS
T H E 5 E S S E N T I A L S O F C O M P U TA C E N T E R & S E C U R I T Y
1
2
3
4
5
SKILLS AND SOLUTIONS
SPAN THE ENTIRE
IT STACK
CERTIFICATIONS ACROSS A
WIDE RANGE OF SECURITY
SOLUTIONS
ADVISE ON SECURITY
IMPLICATIONS OF NEW
TECHNOLOGIES AND BUSINESS
MODELS (INCLUDING POC
FACILITIES TO TEST THEM)
HIGHEST ACCREDITATIONS
WITH LEADING VENDORS
UNIQUE INSIGHT INTO EMERGING
SECURITY RISKS, THROUGH
MANAGEMENT OF 1000s of
DEVICES AND EVENTS
EACH MONTH
8
© COMPUTACENTER 2014
WHAT WE DELIVER
- OUR SERVICES
Computacenter takes a holistic approach to security that redefines the traditional approach. We
view security across the organisation, helping customers to deliver a balanced and cohesive
security strategy.
We secure information at the endpoint, application, network and infrastructure
layer using a range of technologies, tools and tactics.
9
© COMPUTACENTER 2014
COMPUTACENTER IN ACTION
- WHERE WE HAVE DELIVERED
AEGON IMPROVES THE
EFFICIENCY OF ITS
SALES OPERATION
WITH MOBILITY
SOLUTION
Challenge: The efficiency and flexibility of AEGON's sales force is key to the future
success of the business. With its sales teams increasingly working away from the office,
AEGON needed to ensure quick and easy access to key applications from remote
locations. This need to increase mobility, however, had to be balanced with security,
which is essential for maintaining regulatory compliance and reducing risk.
Solution: A secure and effective remote access solution has been created using a
virtual private network, two-factor user recognition and personal laptop firewalls. As a
result, sales staff can now access the AEGON network using 3G, Wi-Fi or broadband
connections. To ensure the availability of the new solution, Computacenter is providing
ongoing support and management.
Results: By increasing the mobility of its sales force, AEGON has enabled the team to
spend more time selling and meet their targets, which are essential for sustaining
growth and profitability. At the same time AEGON has been able to minimise security
risks and continues to comply with key regulations.
10
© COMPUTACENTER 2014
COMPUTACENTER IN ACTION
- WHERE WE HAVE DELIVERED
OTHER
REFERENCES
INCLUDE:
Please do not leave this
slide with customers –
most of these are
INTERNAL references
only
11
© COMPUTACENTER 2014
APENDICES
Useful reference documents
NETWORKING, SECURITY & UC ON A PAGE
Solutions
Network
Infrastructure
Capabilities
End-to-End
End-to-End
Services
Services
Industry
Industry
Technologies
Technologies
Unified
Communications
Security
Core Networking
Firewall Solutions
IP Communications
Virtual Private Networks (VPN)
Authentication
Business Video
Datacenter Networking
End Point Security
Digital Media Signage
Wireless LAN
Data Loss Prevention
Enterprise Voice
Structured Cabling
Network Access Control
Instant Messaging
Advise
Design
• Strategic updates
• Assessments
• Transformative
networking
• Architectural roadmap
• Advanced consultancy
• ROI/TCO
Routing & Switching
NAC
Test
SDN
Storage Networking
Implement
• Solution testing
• Proof of concept
• Benefits realisation
Intrusion Prevention (IPS)
IPv6
Mobility
BYOD
Support & Manage
• Procurement
• Staging
• Deployment
• Transformation
Firewalls
Authentication
• Operational support
• Asset disposal (RDC)
• Field engineering
• Maintenance
Network Virtualisation
Unified Communications
Strategic
Strategic
Partners
Partners
Flexible
Flexible
Commercials
Commercials
13
Fixed
FixedOutcome
Outcome
© COMPUTACENTER 2014
Resources
ResourcesononDemand
Demand
Pay
PayPer
PerUse
Use
Financing/Leasing
Financing/Leasin
g
Project
Projec
t
Solutions
PHYSICAL INFRASTRUCTURE ON A PAGE
Structured Cabling
Installation
Interactive Facilities
Power Monitoring
Managed Cabling
Wireless
Power Optimisation
Real-time Infrastructure & Port Usage
IP Physical Security
Environmental Monitoring
Advise
Capabilities
End-to-End
End-to-End
Services
Services
Industry
Technologies
Industry
Technologies
Strategic
Partners
Strategic
Energy Optimisation
Intelligent Buildings
•Assessments
•Strategic Roadmap
• Health Check
Fibre Optics
Copper
Design
• Infrastructure Design
•DC Design
•CAD Design
LED Lighting
Implement
• Procurement
• Delivery
• Installation
Converged IP Devices
Video Analytics
Test
Support & Manage
• Solution Test
• Warranty
• Handover Documents
PUE
Meeting Booking Systems
Access Control
•Maintenance
•Training
•Management
Smart Boards
ITIL
Partners
Flexible
Flexible
Commercials
Commercials
14
Fixed
Outcome
Projects
© COMPUTACENTER 2014
Resources onResources on Demand
Fixed Outcome
Demand
Financing/Leasin
Pay Per
Use
g
Financing/Leasing
Capacity On Demand
Project
Pay
Per Use