DIGITAL TRUST Making digital work by making digital secure

Similar documents
SECURITY SERVICES SECURITY

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

CLOUD ANALYTICS: GIVING YOU THE WINNING HAND

COMPUTACENTER AND CITRIX TOGETHER

DATACENTER SERVICES DATACENTER

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Best Practices in Securing a Multicloud World

Perfect Balance of Public and Private Cloud

Run the business. Not the risks.

Understanding the Changing Cybersecurity Problem

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

Keeping the lid on storage

CA Security Management

EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation

A new approach to Cyber Security

SECURING THE UK S DIGITAL PROSPERITY. Enabling the joint delivery of the National Cyber Security Strategy's objectives

HOSTED SECURITY SERVICES

Securing Digital Transformation

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Security by Default: Enabling Transformation Through Cyber Resilience

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

AKAMAI CLOUD SECURITY SOLUTIONS

Preparing your network for the next wave of innovation

Security Awareness Training Courses

Security-as-a-Service: The Future of Security Management

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

CYBER RESILIENCE & INCIDENT RESPONSE

Background FAST FACTS

Security in India: Enabling a New Connected Era

to Enhance Your Cyber Security Needs

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Managed Endpoint Defense

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Securing Your Digital Transformation

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

The Modern SOC and NOC

Securing Your Most Sensitive Data

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

THE POWER OF TECH-SAVVY BOARDS:

Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and inf

Microsoft 365 Business FAQs

Cybersecurity. Securely enabling transformation and change

Enhance Your Cyber Risk Awareness and Readiness. Singtel Business

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

AT&T Endpoint Security

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Position Title: IT Security Specialist

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

R E P O R T. Cybersecurity in healthcare: The diagnosis. 1 Report Security in Healthcare: The diagnosis

Sales Presentation Case 2018 Dell EMC

THE ACCENTURE CYBER DEFENSE SOLUTION

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Make security part of your client systems refresh

ABB Ability Cyber Security Services Protection against cyber threats takes ability

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

External Supplier Control Obligations. Cyber Security

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

Security

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Cyber Security. Building and assuring defence in depth

Cisco Start. IT solutions designed to propel your business

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Achieving End-to-End Security in the Internet of Things (IoT)

Securing intelligent networks: a guide for CISO and CIOs

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

THE ESSENTIAL GUIDE TO CYBER SECURITY FOR OFFSITE EVENTS

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Optimisation drives digital transformation

THALES DATA THREAT REPORT

Modern Database Architectures Demand Modern Data Security Measures

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Cyber Security Strategy

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

GUIDE. Navigating the General Data Protection Regulation Mini Guide

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Building Resilience in a Digital Enterprise

Powering Resilience. Keep your business on 24/7. Proposition series September 2017

IT risks and controls

Leading our discussion today

An ICS Whitepaper Choosing the Right Security Assessment

PREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation

Transforming Security Part 2: From the Device to the Data Center

Transcription:

Making digital work by making digital secure

MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots infect tens of thousands of IoT devices, customer data is traded on the black market, there are stories of new cyber attacks almost daily and Ransomware is a constant threat to UK business. According to a survey by IPSOS Mori* for the Department for Culture & Media & Sport, nearly half of all companies in the UK have experienced at least one cyber security breach or attack in the last 12 months. The threat from cyber-crime is ever- present and ever-growing, due to a number of factors. THE CHALLENGES ARE COMPLEX: Cybercriminals now work in an increasingly professional manner. They have the resources and technology required to develop highly personalised and targeted attacks capable hiding undetected on company networks for months harvesting sensitive data. Improvements in network connectivity to support user mobility and the increasing use of new remote working technologies has resulted in a larger number of end user devices and data entry points, creating many more targets for cyber attacks. As organisations embrace digitisation, mobility, cloud and changing use behaviour it can be challenging for them to upgrade their cyber defence capabilities to address the security challenges these new technologies bring. This can not only reduce the benefits of a new technology but also increases the chances of a successful cyber attack, potentially impacting an organisation s brand, reputation and even their balance sheet. The cyber security skills shortage means organisations often don t have the resource they need to defend themselves against these attacks. Many organisations lack the resource to proactively identify the first signs of an attack or to continually review and update their cyber defence systems, as they spend all their time firefighting. Many organisations are having to focus their security resources on information management and data security to meet the compliance provisions within the new European General Data Protection Regulation (GDPR).

MARKET DRIVERS AND CHALLENGES A secure IT estate is critical for successful digitisation 3

CUSTOMER CHALLENGES CREATE TRUST BENEFIT FROM DIGITALISATION WITHOUT THE SECURITY RISK Computacenter helps organisations take advantage of digitalisation and innovative new technologies while managing security risks. From mobile working and cloud computing to big data and IoT, we help establish processes and introduce solutions that protect against threats. We don t view IT security as a hindrance or a headache, but as an opportunity to build employee trust in the IT department. Whether an organisation is facing a security skills shortage, struggling to educate employees on secure processes, or over whelmed by the challenges of GDPR-compliance, we can help. As one of Europe s preferred IT providers, we offer expertise in all areas of IT from the desktop, to networks and the cloud so when it comes to security we can provide holistic, integrated solutions covering all aspects from design, build and integration through to management. 4

OUR PROPOSITION SINGLE SOURCE SECURITY SECURING DIGITAL SERVICES END-TO-END Because we manage all aspects of our customers IT, we understand that security is not as effective when it is operated in isolation. So as part of our mission to Make Digital Work for our customers we have developed a comprehensive IT security portfolio that com pliments, and integrates to, the other aspects of the new digitised workplace, safeguarding against increasing threat levels, while building trust within our customers and for our partners. We have brought together all the elements that we believe enable us to deliver an effective digital business strategy for our customers. Digital Trust is our comprehensive proposition for IT security, delivered to support the modern digital enterprise. It is supported by our Digital Me proposition, which helps organisations design and build a digital workplace that is truly tailored to individual employee needs, and underpinned by our Digital Power proposition that incorporates infrastructure and cloud management, information and data management and hybrid cloud services. With its integrated, holistic portfolio of service offerings, Computacenter is a one-stop-shop for secure IT. We can supply, design, build, integrate and manage an organisation s security and offer a single source for related services and solutions so there s no need to juggle multiple suppliers. As a secure IT provider, we ensure that our services meet stringent security requirements, in fact we secure our customers using a segregated instance of the same Cyber Defence Center and Information Security Management capabilities that we use to protect ourselves. MAKING DIGITAL WORK 5

OUR APPROACH SECURITY 6

OUR APPROACH DIGITAL TRUST SECURITY FOR THE DIGITAL ERA Digital and mobile working practices are now commonplace: employees work from home and connect to company networks whilst on the move; they use cloud services to exchange documents, organise their time using apps and communicate via social media. While these new processes increase productivity, they also create more targets for cyber attacks. No business now or in the future can be 100 per cent safe from cyber attacks, but they can improve their defences. In the digital era, communication with partners, suppliers and customers is more integrated. This enhanced connectivity adds to an organisation s vulnerability; if one party is breached, the others may be compromised. Computacenter s cyber security solutions are designed to cope with this level of integration, and ensure security and trust for all networked parties. Using security frameworks that combine preventative, detective and reactive solutions, we make it as difficult as possible for attackers to embed themselves in corporate networks or steal data. At Computacenter, we believe security should not be an after thought, but seamlessly integrated into the design and implementation of every system and every application. We believe security solutions work best when directly and seamlessly integrated into all applications and systems. Computacenter takes a best integrated approach to ensure that the security components we use are the most suited to the existing infrastructure. From the datacenter and the cloud to the network and the end user device, we create a secure working environment in which employees can achieve their full potential and organisations can achieve their digital ambitions. Our solutions contribute much more than just secure IT they help to create trust, safeguard business operations and our solutions could help organisations reduce operating costs and improve service quality, all while helping to protect their data and people. This is the essence of our Digital Trust proposition, to protect the business, its employees and its customers on a daily basis. 7

OUR PORTFOLIO 8 OUR PORTFOLIO USE OUR EXPERTISE TO SECURE YOUR IT INFORMATION SECURITY MANAGEMENT Computacenter assists organisations to deliver information security governance to ISO 27001 standards, helping to integrate regulatory requirements into a comprehensive framework. We can implement tooling solutions to measure compliance and effectively mange risks at the push of a button. As well as safeguarding against threats, we can also help organisations prepare for compliance with GDPR and other regulations. All of our managed security services include the support of an Information Security Manager allocated to ensure effective delivery of security management is achieved through contractual compliance to customer security policy. CYBER DEFENCE SERVICES We identify and pre-empt cyber attacks by helping organisations to detect early and to learn from successful attack patterns. By bringing together information from multiple sources, including data loss prevention solutions, network forensics technologies, next generation firewalls and malware protection systems, we empower security operations personnel to predict and prevent future attacks. We also use security analytics, SIEM and Vulnerability Scanning to reveal abnormal user behaviour, so compromised end-points or credentials can be more easily detected. IDENTITY & ACCESS MANAGEMENT The number of digital identities within a company increases with digitalisation. Every employee, device and system attached to the corporate network needs individual authorisation and authentication management. Our identity and access management solutions help organisations simplify these processes and implement strong governance controls. We also offer a range of solutions for privileged account management, helping organisations discover, protect and control the user accounts that are often exploited by external attackers and malicious insiders. ENDPOINT SECURITY We deploy and manage the security controls and software on an endpoint (device or server) to keep it secure and protected from malware attack. We also offer antivirus, patch management and encryption, port and device control, and mobile security management. Computacenter s advanced endpoint security solutions, such as application isolation, exploit mitigation and client behavioural analysis will strengthen traditional endpoint security. INFRASTRUCTURE SECURITY The IT infrastructure is the digital backbone of the company, and must be protected from attacks focused on the network and the data center, and increasingly, the cloud. Our portfolio therefore includes firewall management, intrusion detection / prevention systems, VPN solutions, application delivery controllers, web and e-mail security, cloud security, IPAM and DNS security. From these diverse building blocks, Computacenter can design and implement comprehensive security architectures suitable for any hybrid environment.

OUR PORTFOLIO DELIVERY/SOLUTION METHODOLOGY/APPROACH CUSTOMER BENEFITS INFORMATION SECURITY MANAGEMENT CYBER DEFENCE IDENTITY & ACCESS MANAGEMENT ENDPOINT SECURITY INFRASTRUCTURE SECURITY INDUSTRIAL IT OFFICE IT ADVISE & CONSULT DESIGN & MIGRATE SUPPORT & MANAGE Cohesive and holistic security approach Security that enables the business Managing provider / solution complexity Evolving security solutions for a complex dynamic digital world Protection of data, identity and devices 9

VALUE PROPOSITION MASTERING BUSINESS SECURITY BOOST PRODUCTIVITY AND COMPETITIVE ADVANTAGE Our comprehensive portfolio of security solutions covers every area of business from datacenters, cloud services and networks, to individual client devices. This safeguards the business and builds trust in all stakeholder and target groups: FOR THE CIO FOR THE USER FOR THE BUSINESS FOR THE CUSTOMER Prioritises future investments and helps ensure a greater return from existing IT assets Simplifies the adoption of new technologies Reduces cost and complexity Helps ensure internal resources are put to best use Reduces user downtime and disruption Safeguards mobile and remote working Encourages greater user accountability Minimises the impact on revenue and reputation Aids compliance with internal policy, industry regulation and legislation Improves integrity of customer and corporate data Customers and users can have confidence that their data is protected and secured Safeguards reputation with stakeholders and customers 10

TEN REASONS TO WORK WITH COMPUTACENTER TEN REASONS TO WORK WITH COMPUTACENTER 01 02 03 04 We are a one-stop-shop for secure IT, providing a single port of call for all services and solutions so organisations don t have to engage multiple suppliers. As an independent IT service provider, we help organisations select the solutions and technologies that best meet their specific needs and goals. We have more than 40 years experience in enterprise IT, more than 20 years experience in information security and in excess of 150 proven security experts. We understand the IT infrastructure and offer pragmatic, down-to-earth solutions that integrate seamlessly with existing investments. Our extensive security portfolio has been developed around the concept of the best integrated solution, helping to ensure that the security components we use, and the service we offer, will integrate seamlessly. 05 06 07 08 09 We combine our security offerings with a comprehensive expert knowledge of all other areas of IT, from the datacenter to the network to the end user. Computacenter s customers include the majority of the FTSE100 and include many multinational corporations. Our solutions will compliment and input to existing compliance frameworks, so we can help organisations to keep track of all current regulatory requirements. We have confidence in our solutions because we use them to protect our own IT, and to secure our own users data. We help organisations meet employees expectations for a modern mobile workplace, securing the latest devices and enabling secure flexible working models. We can help organisations stand out from the competition when recruiting new talent. 10 In keeping with our Making Digital Work philosophy, we see IT security as a catalyst for organisations to derive the greatest benefit from IT trends such as digitalisation, cloud computing, big data and IoT. 11

Enabling users and their business Computacenter is a leading independent provider of IT infrastructure services, enabling users and their business. We advise organisations on IT strategy, implement the most appropriate technology, optimise its performance, and manage our customers infrastructures. In doing this we help CIOs and IT departments in enterprise and corporate organisations maximise productivity and the business value of IT for internal and external users. Computacenter (UK) Ltd Hatfield Avenue, Hatfield, Hertfordshire AL10 9TW, United Kingdom computacenter.com +44 (0)1707 631000