security solutions - dimension data documents/security... · security solutions today, your...

8
Security Solutions

Upload: nguyennga

Post on 13-Mar-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

Page 2: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

Today, your business doesn’t just rely on IT, it’s dependent on secure IT. Against the backdrop of a constantly evolving security threat landscape, increased demands around compliance and the potentially devastating impact of a security breach, are you facing significant pressure from the business to keep a number of balls in the air?

The stakes are high; in the event of a security breach, the organisation could be exposed to financial and reputational damage, while non-compliance with legal and other standards alone can result in steep penalties and even criminal liability. While most organisations appreciate the importance of ensuring that data is treated with confidentiality, integrity and prescribed availability, IT security and compliance is one of the most challenging organisational disciplines to understand, implement and maintain. Without an information security regime tailored to specific corporate governance requirements, it’s nearly impossible to know your risk exposure.

Much of the pressure lands on the IT team. You need to have the right security policies, processes, architecture and expertise in place if you’re to maintain a robust and reliable security posture and report risk status back to the business in a standard, understandable language. Even if you’re conducting regular assessments and collecting vulnerability data, have you got the tools and resources to turn this data into actionable intelligence and can you create reporting that’s aligned to business priorities?

In the current economic climate particularly, doing ‘more with less’ is the name of the game. Budgets are cut and expert resources are limited, but the security demands from the business are higher than ever. Cost management is driving the consolidation of suppliers and technologies as organisations look to trim the number of business partners they deal with and the number of technologies they manage. But the security technology market is very fragmented, and there are typically a large number of security hardware and software products installed in an IT estate. How do you rationalise your vendor suite without opening up gaps in your security profile?

While most organisations appreciate the importance of ensuring that data is treated with confidentiality, integrity and prescribed availability, IT security and compliance is one of the most challenging organisational disciplines to understand, implement and maintain.

Alongside all of this, the pace of innovation continues unabated and business needs to keep up to remain competitive. IT needs to chart actionable roadmaps to support the multiple devices of an increasingly mobile and geographically dispersed workforce − and enable greater numbers of third-party connections − all without exposing the organisation to risk. As with mobility, security is a key area of consideration for organisations on their journey towards virtualisation, as well as private or public cloud environments. Do you have the extensive internal competency and skills resources that you need to get this right?

Page 3: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

Our multi-vendor technology and support portfolio enables clients to determine threats and align corporate resources to address security shortcomings, simplify management, increase visibility and plan for evolving threats.

Security Solutions

Page 4: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

Dimension Data’s Security Solutions

If these challenges sound familiar, Dimension Data can assist you. Our comprehensive portfolio of security solutions offers you the visibility, awareness and protection you need to be confident that all your security needs are being met.

Regulatory compliance and risk management can be a minefield to navigate. Organisations need a partner with a deep and thorough understanding of the global security landscape, one that’s conversant with the latest regulatory developments and imperatives. We specialise in creating pragmatic, cost-effective and strategic security assessment engagements to help our clients achieve sound governance, risk management and compliance. Our multi-vendor technology portfolio enables us to help clients determine and remediate threats and align corporate resources to address security shortcomings, simplify management, increase visibility and plan for evolving threats. With a full view of your current IT security risk profile, you can make informed decisions about both immediate priorities and strategic business plans to improve security, determine return on investment and manage risk, and – crucially – you’ll be able to report this back to the business in a meaningful way.

Security isn’t something that organisations can afford to get wrong, yet it can cost a lot to get right if you’re on your own. Dimension Data’s security team is well placed to support you technologically and geographically, especially when considering the trend towards supplier and technology consolidation. We’re not a vendor, which means that we can support many technologies rather than being tied to one. That said, our relationships with prominent security vendors are solid and longstanding. This allows us to negotiate and leverage more cost-effective commercial terms − savings which we can pass on to you. Similarly, by partnering with Dimension Data, you’ll get cost-effective access to otherwise scarce and notoriously expensive security resources, while our comprehensive managed and outsourced security services also give you the option to replace capital outlays with more affordable opex commercial constructs.

We understand that security should support – not hold back – the aspirations of your business and give you the agility to harness new technologies and computing models. Our breadth of technology expertise extends beyond security into networking, converged communications, data centres, Microsoft technologies and contact centres. This means we’re able to deliver security not just in the traditional areas of the perimeter, server and client, but throughout the entirety of your IT infrastructure, including switching and routing, the data centre, video, virtualised environments and into the cloud. In addition, to meet the needs of an increasingly mobile workforce, we have extended our security solutions to cater for non-traditional mobile devices, such as tablets and smartphones.

Organisations need a partner with a deep and thorough understanding of the

global security landscape, one that’s conversant with the latest regulatory

developments and imperatives.

Page 5: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

5. O

pera

tions

man

agem

ent

3. Architectu

re

4. Solutions

2. Planning

1. Assessment

• Governance Risk and Compliance Assessment

• Technology Lifecycle Management Assessment for Security

• Firewall Assurance Assessment

• Regional Security Assessments

• Penetration Testing

• Gap Analysis

• Workshops

• Evaluations

• Proof of Concept

• Policies and Procedures

• Design

• Network Segmentation

• Build

• Intergration

• Implementation

• Maintenance

• Support

• Multi-Vendor Support Aggregation

• Managed Secure Infrastructure Services

• Managed Vulnerability

Client

Security Solutions value proposition

Risk mitigation

Cost control

Secure agility

Security management

Compliance, governance

Multi - vendor aggregation

Page 6: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

Security Solutions

Our clients benefit from a dedicated security practice and structure, comprising over 500 global security specialists, architects, consultants and engineers.

Why Dimension Data? • When it comes to security; integrity,

experience and expertise count for everything. Our clients benefit from a dedicated security practice and structure, comprising over 500 global security specialists, architects, consultants and engineers and the experience of over 15,000 successful security engagements in more than 51 countries across the world.

• With Dimension Data, you’re working with professionals who are certified to the highest levels across multiple vendors and technologies so you don’t have to recruit, train and retain these skills in-house. Augment your skills requirements with security experts who have been designing, deploying, integrating, supporting and managing security technology for almost 20 years.

• Our key global security partners – Cisco, McAfee, Blue Coat, Fortinet, Check Point and RSA – have been selected on the basis of their excellence in individual niches and the fact that when combined, they provide you with unrivalled coverage to meet all your IT security needs. The strength and size of our relationships with them enables us to negotiate the most competitive and flexible commercial terms for our clients.

• However complex or geographically dispersed your security environment, Dimension Data’s multi-vendor support capability gives you a single point of accountability and a single contract to manage all your support requirements.

• Our global footprint and multinational capabilities means that we can provide organisations with standardised and cost efficient procurement and logistics processes. In addition to our own presence in 51 countries – we also work with a network of trusted Preferred Partners;

• Our lifecycle approach to security projects means we can help clients from assessment through planning, architecture, technology implementation and on-going management. This assists our clients to architect, build, implement, integrate and maintain the correct policy, process and architecture to enable true security capability for a robust, reliable security posture

Page 7: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

CS / DDMS-1251 / 01/13 © Copyright Dimension Data 2013

A standardised, streamlined log format has contributed to a significant increase in security reporting efficiency and accuracy, and the organisation can now provide executive level reports to management, on demand.

Success stories

A global financial services organisation harnesses the security and collaboration benefits of an enterprise-wide governance, risk and compliance platform

With an audit looming, the security and risk management department of a global financial services organisation needed a solution to demonstrate improvement in its processes and visibility around vulnerability and threat management. In a highly complex and dynamic IT environment, our client faced many challenges when trying to effectively measure its overall security posture, monitor security levels and manage remediation tasks over time.

Dimension Data built a scalable, open platform that provides effective workflow automation between all stakeholders. This platform supports an efficient, collaborative, enterprise-wide governance, risk and compliance programme that can adapt to future requirements.

With workflow automation between all stakeholders and teams, there’s now full control, visibility and accountability across the security vulnerability lifecycle, from detection through to resolution. What’s more, with such an easy-to-use, effective solution, all stakeholders are invested in collaborating to keep the environment free from vulnerabilities and remain compliant, which improves the security posture of the whole organisation.

A U.S. based healthcare organisation’s security operations are in a safe pair of hands

Burdened by legacy security infrastructure and with a central IT security team that comprised just four individuals, a leading US healthcare organisation saw value in upgrading its security infrastructure and exploring avenues to more effectively and efficiently manage its security posture, without falling foul of regulatory imperatives or opening the business up to risk.

The organisation turned to Dimension Data for insights and support in charting its journey forward. Our recommendations were two-fold: consolidate and upgrade the organisation’s underlying security infrastructure and build more intelligence into the central security operations centre.

Following our implementation of a new security architecture our client’s ability to filter, analyse and respond to security events in real-time has improved significantly. Where the security team used to handle up to 40 million security events per day, the number has now been reduced to 2 million. A standardised, streamlined log format has contributed to a significant increase in security reporting efficiency and accuracy, and the organisation can now provide executive level reports to management, on demand. In addition, they’re able to quickly gain a view of security metrics and trends, and understand the network in terms of protocol and usage. Today, trend analysis and compliance reporting are both excellent.

A global leader in airline catering and the management of in-flight service enhances security and operations

With outdated security infrastructure, underperforming IT equipment and high maintenance costs, a leading provider of airline catering and in-flight services needed an improved IT environment to manage day-to-day operations. The organisation enlisted the expertise and services of Dimension Data to establish a more up-to-date, efficient and secure IT environment which cost less to manage and maintain and complied with industry standards.

Dimension Data deployed its Managed Secure Infrastructure Service and provided security consulting and project management services to the client. After performing a gap analysis on the existing security infrastructure, we re-architected the client’s firewall infrastructure. In addition, we also provided security monitoring and incident response, which helped free our client’s resources to focus on more strategic tasks. With the new solution, the client can now enjoy a more secure and cost-effective IT infrastructure. It’s also been able to reap the operational benefits of lower total cost of ownership, SLA mandated incident response and continuous monitoring for security assurance.

Security Solutions

Page 8: Security Solutions - Dimension Data Documents/Security... · Security Solutions Today, your business doesn’t just rely ... • Technology Lifecycle Management Assessment for Security

For contact details in your region please visit www.dimensiondata.com/globalpresence

MIDDLE EAST & AFRICA

ALGERIA · ANGOLA BOTSWANA · CONGO · BURUNDI

DEMOCRATIC REPUBLIC OF THE CONGO GABON · GHANA · KENYA

MALAWI · MAURITIUS · MOROCCO MOZAMBIQUE · NAMIBIA · NIGERIA

RWANDA · SAUDI ARABIA SOUTH AFRICA

TANZANIA · UGANDA UNITED ARAB EMIRATES · ZAMBIA

ASIA

CHINA · HONG KONG INDIA · INDONESIA · JAPAN

KOREA · MALAYSIA NEW ZEALAND · PHILIPPINES

SINGAPORE · TAIWAN THAILAND · VIETNAM

AUSTRALIA

AUSTRALIAN CAPITAL TERRITORY NEW SOUTH WALES · QUEENSLAND

SOUTH AUSTRALIA · VICTORIA WESTERN AUSTRALIA

EUROPE

BELGIUM · CZECH REPUBLIC FRANCE · GERMANY

ITALY · LUXEMBOURG NETHERLANDS · SPAIN

SWITZERLAND · UNITED KINGDOM

AMERICAS

BRAZIL · CANADA · CHILE MEXICO · UNITED STATES

www.dimensiondata.com