CLOUD ANALYTICS: GIVING YOU THE WINNING HAND

Similar documents
SECURITY SERVICES SECURITY

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

DIGITAL TRUST Making digital work by making digital secure

DATACENTER SERVICES DATACENTER

COMPUTACENTER AND CITRIX TOGETHER

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Sage Data Security Services Directory

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

CipherCloud CASB+ Connector for ServiceNow

General Data Protection Regulation (GDPR) The impact of doing business in Asia

What is Penetration Testing?

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Data Protection and GDPR

Cloud Services. Infrastructure-as-a-Service

Co-creation for Success

Avanade Zerouno : Cloud Experience. Version 1.0 May 16, 2017 Author(s): Ivan Loreti

Vulnerability Management. June Risk Advisory

INTELLIGENCE DRIVEN GRC FOR SECURITY

Six Sigma in the datacenter drives a zero-defects culture

Supporting the Cloud Transformation of Agencies across the Public Sector

Choosing the Right Security Assessment

TRACKVIA SECURITY OVERVIEW

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

CISO View: Top 4 Major Imperatives for Enterprise Defense

Automating the Top 20 CIS Critical Security Controls

An ICS Whitepaper Choosing the Right Security Assessment

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Best Practices in Securing a Multicloud World

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Data Sheet The PCI DSS

BHConsulting. Your trusted cybersecurity partner

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

New Zealand Government IBM Infrastructure as a Service

The Business Case for Network Segmentation

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Network Visibility and Segmentation

The Windstream Enterprise Advantage for Banking

Asset Management conference 2016

BT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute

AKAMAI CLOUD SECURITY SOLUTIONS

Reinvent Your 2013 Security Management Strategy

GETTING STARTED FOR ADMINISTRATORS YOUR GUIDE TO OBJECTIVE CONNECT

SYMANTEC DATA CENTER SECURITY

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

falanx Cyber ISO 27001: How and why your organisation should get certified

WEBMETHODS AGILITY FOR THE DIGITAL ENTERPRISE WEBMETHODS. What you can expect from webmethods

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

VMware Cloud Operations Management Technology Consulting Services

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

ISE Central Executive Forum and Awards 2012

Perfect Balance of Public and Private Cloud

Data Security: Public Contracts and the Cloud

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

Micro Focus Partner Program. For Resellers

DELIVERING SIMPLIFIED CYBER SECURITY JOURNEYS

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

ALIENVAULT USM FOR AWS SOLUTION GUIDE

SIEMLESS THREAT DETECTION FOR AWS

Intermedia s Private Cloud Exchange

Achieving effective risk management and continuous compliance with Deloitte and SAP

SALMON MANAGED SERVICES WE DO THE HEAVY LIFTING, LEAVING YOU TIME TO TRADE

Security and Privacy Governance Program Guidelines

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

EU General Data Protection Regulation (GDPR) Achieving compliance

Cybersecurity in Higher Ed

Microsoft Azure Security, Privacy, & Compliance

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial

Staffordshire University

New Zealand Government IbM Infrastructure as a service

Run the business. Not the risks.

External Supplier Control Obligations. Cyber Security

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Enabling Security Controls, Supporting Business Results

WEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

The Role of the Data Protection Officer

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

OpenText Buys Guidance Software

Ian Speller CISM PCIP MBCS. Head of Corporate Security at Sopra Steria

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

Virtual Machine Encryption Security & Compliance in the Cloud

Delivering the Digital Institution

Power Management Solutions Maximise the reliability and efficiency of your power critical facility

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

A guide to understanding the implications of GDPR on print and document management

Microsoft 365 Business FAQs

Big data privacy in Australia

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Enabling efficiency through Data Governance: a phased approach

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Transcription:

CLOUD ANALYTICS: GIVING YOU THE WINNING HAND Computacenter s shadow IT analysis helps online gaming company protect its key assets and build user-centric service offerings

IMPROVING EFFICIENCY & COLLABORATION WITH CLOUD SERVICES The cloud has enabled users and business units to get the IT resources they need when they need them. From storage capacity and development platforms to processing power and apps, IT resources are steadily and stealthily being amassed outside the control of the CIO and the protection of the corporate firewall. These shadow IT environments can result in data breaches and business risks that cost both in terms of revenue and reputation. For heavily regulated industries, such as betting and banking, such risks can make or break a business. To ensure its operations and customers - were not being compromised by the use of high-risk cloud services, one of the world s top online gaming companies turned to Computacenter for help. As the organisation s security director explains: Keeping our website up is important, but so too is keeping it safe for our thousands of customers. We have a duty to protect their data, and it s an obligation we take very seriously. The company has embraced a number of cloud services to improve efficiency and collaboration. We need to balance user expectations and our desire to be the best in the industry with good governance, robust security and service offerings that are current and relevant, comments the security director. 2

Keeping our website up is important, but so too is keeping it safe for our thousands of customers. WHY ANALYSING CLOUD SHADOW IT SOURCES MATTERS FOR THE CIO FOR THE BUSINESS FOR THE USER Better understand the business by evaluating user analytics to drive the IT service catalogue and future strategy Identify cloud risks and security concerns before they impact the business Protect company data and assets across geographical boundaries and within regulatory frameworks Gain visibility and insights to control costs and cloud sprawl Proactively manage user productivity across multiple cloud services Collaborate more closely with the IT team to identify new service opportunities Enable the future service catalogue based on actual user s requirements Driving the right tools for the right user personas Provide user protection of sensitive data including PCI DSS, HIPAA and HITECH, FISMA, and GLBA 3

4 Computacenter s Shadow IT Analysis service enabled us to undertake a comprehensive evaluation that would not have been possible using our own resources.

LIFTING THE LID ON CLOUD CONSUMPTION With the company bound by different regulations in every territory that it operates as well as international standards, such as PCI, customer data protection is fundamental to its future success. We wanted to understand the journey of our core enterprise data, and ensure that it was not being shared or stored via high-risk cloud-based sites, explains the security director. By partnering with Computacenter, the online gaming company was able to identify which members of staff were using which cloud services and how much data was being transferred. Computacenter s Shadow IT Analysis service enabled us to undertake a comprehensive evaluation that would have not been possible using our own resources, affirms the security director. Although the analysis confirmed that no business processes had been migrated wholesale to the cloud, it did reveal that more than 1,000 cloud services were being used across the company and that more than 40 of them were deemed high risk. HOW COMPUTACENTER CAN HELP Computacenter s Shadow IT Analysis service enables organisations to see what cloud resources are being consumed by which user groups, together with potential risks and opportunities for the business. Part of Computacenter s suite of Cloud Advisory Services, the Shadow IT Analysis enables organisations to balance user choice with corporate control. The analysis, which can be delivered as an ongoing managed service or a single engagement, covers both infrastructure and workplace cloud services. With more than 30 years IT experience, we help put the findings of the analysis into context for users, the business and the CIO. 5

The company, which processes seven million online transactions every day, has also embarked on an education programme to help its staff better understand the risks of using unauthorised cloud services. UNMASKING HIDDEN SECURITY RISKS Computacenter s Shadow IT Analysis has given us the visibility we need to take action to safeguard our business and customers, comments the security director. It helped us put the findings in context for our business, and make recommendations around acceptable use of corporate data. The analysis, which spanned more than 10,000 cloud providers including infrastructure, software and platform as a service resources, was conducted over a two-week period with no disruption to users or IT operations. Concrete data on security risks is like gold dust. Computacenter s Shadow IT Analysis has revealed unknown risks that could have jeopardised our business. We can now add extra layers of protection to safeguard corporate and customer data, concludes the security director. 6

HOW DO I GAIN INSIGHT? We offer a free seven-day proof of value report on your cloud usage As part of an annual subscription, we deliver a comprehensive and easy-to-use dashboard that displays daily updates to data All data, which is secured via a firewall, can be quickly and easily analysed to provide additional insight The technology that underpins Computacenter s Shadow IT Discovery service has been used by 200 enterprise customers to analyse the cloud consumption of more than 10 million users We also provide add-on services, such as Office365 and ServiceNow data loss protection, together with a full range of network and security solution offerings By 2018, controlled shadow IT will contribute up to 30% of IT operations activities, up from 15% in 2014. Gartner, 2015 GET IN TOUCH To find out more about how Computacenter can help safeguard your business and customers, please contact your Account Manager, or call us on 01707 631000. computacenter.com/datacenter 7

Enabling users and their business Computacenter is Europe s leading independent provider of IT infrastructure services, enabling users and their business. We advise organisations on IT strategy, implement the most appropriate technology, optimise its performance, and manage our customers infrastructures. In doing this we help CIOs and IT departments in enterprise and corporate organisations maximise productivity and the business value of IT for internal and external users. Computacenter (UK) Ltd Hatfield Avenue, Hatfield, Hertfordshire AL10 9TW, United Kingdom computacenter.com +44 (0)1707 631000