accelerate your ambition Chris Jenkins

Similar documents
SECURITY SERVICES SECURITY

AT&T Endpoint Security

Maximum Security with Minimum Impact : Going Beyond Next Gen

Securing Your Digital Transformation

Windows Server 2012/R2 Overview

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

with Advanced Protection

Enterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours.

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Preparing your network for the next wave of innovation

Optimisation drives digital transformation

TechValidate Survey Report: SaaS Application Trends and Challenges

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Enabling Security Controls, Supporting Business Results

ConnectWise Automate. What is ConnectWise Automate?

Why Enterprises Need to Optimize Their Data Centers

CHARTING THE FUTURE OF SOFTWARE DEFINED NETWORKING

HOSTED SECURITY SERVICES

Micro Focus Partner Program. For Resellers

DXC Technology and VMware: Innovation that Transforms

Why Converged Infrastructure?

Security by Default: Enabling Transformation Through Cyber Resilience

The Windstream Enterprise Advantage for Banking

Transforming IT: From Silos To Services

A new approach to Cyber Security

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Sichere Applikations- dienste

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Continuous protection to reduce risk and maintain production availability

Vision of the Software Defined Data Center (SDDC)

Securing a Dynamic Infrastructure. IT Virtualization new challenges

THE ACCENTURE CYBER DEFENSE SOLUTION

Cloud Services. Infrastructure-as-a-Service

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

AKAMAI CLOUD SECURITY SOLUTIONS

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Enterprise & Cloud Security

A Simple Guide to Understanding EDR

EMBARKING ON A DIGITAL TRANSFORMATION JOURNEY

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Traditional Security Solutions Have Reached Their Limit

MODERNIZE INFRASTRUCTURE

Security-as-a-Service: The Future of Security Management

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Uptime and Proactive Support Services

Customer Case Studies on Accelerating Their Path to Hybrid Cloud

How to Evaluate a Next Generation Mobile Platform

I D C T E C H N O L O G Y S P O T L I G H T

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Service Provider Consulting

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Reducing the Cost of Incident Response

IBM smarter Business Resilience in the Cloud

DIGITAL TRUST Making digital work by making digital secure

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

SIEMLESS THREAT DETECTION FOR AWS

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Accelerate Your Cloud Journey

Ransomware piercing the anti-virus bubble

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Sales Presentation Case 2018 Dell EMC

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

deep (i) the most advanced solution for managed security services

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

Modern Database Architectures Demand Modern Data Security Measures

to Enhance Your Cyber Security Needs

Technology Lifecycle Management Assessment. Know your network - achieve business agility

STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO

Exploring The Essentials. Cloud Computing: Emerging Trends, Disruptions and Business Outcomes for Financial Services (Melbourne)

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

WEBMETHODS AGILITY FOR THE DIGITAL ENTERPRISE WEBMETHODS. What you can expect from webmethods

NETWORK SECURITY STORMSHIELD. Unified Threat Management Solutions and Next- Generation Firewalls

Build application-centric data centers to meet modern business user needs

How unified backup and cloud enable your digital transformation success

The Oracle Trust Fabric Securing the Cloud Journey

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO

The SD-WAN security guide

Cyber Threat XChange: A New Approach to Managing Security

Cisco Self Defending Network

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

WHITE PAPER. Applying Software-Defined Security to the Branch Office

IBM Future of Work Forum

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

CYBER SOLUTIONS & THREAT INTELLIGENCE

IBM Security Network Protection Solutions

Best Practices in Securing a Multicloud World

Logicalis What we do

Leading our discussion today

Make security part of your client systems refresh

Background FAST FACTS

Cisco Firepower NGFW. Anticipate, block, and respond to threats

5 Challenges for Public Sector Data Centre Modernisation. And how to address them

Transcription:

accelerate your ambition Chris Jenkins

Changing landscape of the Security Industry Chris Jenkins European GM Security Dimension Data

Business relationships Geographic footprint Revenue USD 700+m 1 NTT security company Client trust number #1 partner Cisco, Blue Coat, Checkpoint 31/32 > 550 skilled security resources Services-led with product pull-through Growth CAGR 5 years 31% Business outcomes

Today s business environment

Lower cost Improve agility and performance Reduce risk Improve experience for our customers Economically sustainable Increase competitiveness and grow revenue Compliance Keeping pace with the bad guys Managing complexity User demands/ mobility Aging Security platforms Existing Security not delivering

Transform Innovation Dis-intermediate Change Reputation Strategic Collaboration Disruption Cloud Intelligent Elastic networks Trust Bendable traffic Design Platform Data diplomacy Consolidation

The changing IT landscape From Corporate owned Email / Web Data centres Applications To BYOD Social media Cloud Mobile apps 79% Companies recorded a breach, 112% Growth in mobile malware 2013-2014 14% of organisations had malware enter the corporate network through social media/web apps 5-10 times more cloud services being used than are known by IT Outcome security controls need to change 92% of top 500 Android apps carry security/privacy risks

Incidents will happen How will you respond?

FY15 Security evolves

1 Incident prevention evolves to incident remediation From a no trust model to trust the ecosystem model Companies will conduct regular IT security fire drills, employees will become an extra layer of security protection Single panel management of Security platforms to identify, protect and remediate incidents

2 Managed security services move front and centre From adhoc vulnerability tests to proactive attack vector identification Reactive response to a 24/7 continuous monitoring and managed security environment MSS market will continue to consolidate as the client looks for a full lifecycle approach to security

3 Security gets cloudy From CAPEX to OPEX through to Utility models drive the need for new consumption models for security Commodity security controls have already moved to the cloud content security Security will follow the user, the application and the data this will drive security to the cloud

4 Clients drive the move to Security platforms 2015 From point products onsite to a virtualised hybrid (public / private cloud) model platform security controls move to software Provides scalability for controls security becomes part of everything a client does Market will consolidate BUT the startup market will become more active

5 Endpoint security back in vogue Moving from anti-virus and MDM to a workspace for Tomorrow a fully integrated trusted environment regardless of where the user and device are. Applications provide continuous security monitoring of the ecosystem

Delivering intelligence! 16 Security Operation Centres and 7 R&D centres 250,000 detection rules 1,300 security experts and researchers working globally 6,898 customers worldwide Security 150m attacks detected and defended each year 139,963 devices monitored, managed, secured 3.5 trn logs analysed annually

Global research and development capability Global threat intelligence report and threat intelligent feed Packaged together with RTA and managed MSSP service Sold together with IT outsourcing contracts as threat intelligence feeds

Christopher.Jenkins@dimensiondata.com END