Security brochure 2012_ibm_v1_a4
-
Upload
arrow-ecs-uk -
Category
Technology
-
view
494 -
download
0
description
Transcript of Security brochure 2012_ibm_v1_a4
Arrow ECS IBM Security Solutions
Safeguarding dataSecuring business
World-leading security portfolio
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 3
With infrastructure-wide experience and specialist knowledgein the security area, Arrow ECS can help your customers tosafeguard their business by controlling and protecting data atevery point.
We have market insight and the technical understanding todraw together the different technology elements into solutionsthat meet your customers’ escalating needs to address securityand compliance issues.
Working with Arrow ECS, we can help organisations tacklesecurity proactively and experience the business benefits thatcome from good governance.
Translating outstanding industry knowledge into practical solutions As the UK’s leading security
distributor, Arrow ECS can offeryour customers the benefits of:
• Our Security Centre of Excellence
• Partnerships with world-class securitysolution vendor
• A dedicated security team accredited to thehighest levels of certification
IBM Product Security Portfolio
0800 983 2525www.arrowecs.co.uk/ibmsecurity
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 1
HeadOffice
Router
NAC
Firewall
Content and WebFiltering WAN
Accelerator
WirelessNetworking
Authorised ThirdParty Access
F
IDP / IDS
ISP LoadBalancer
Authentication
Policy
Endpoint Suite
EmailFiltering
V
Firewall
AppSe
1
Internet /Cloud
Customer / Public Cloud Accessand Internet
Mobile Workersand Small Offices
Endpoint
Endpoint Suite
Encryption
Endpoint Suite
Encryption
AuthenticationTivoli identity and Access Assurance
Tivoli Endpoint Manager
Tivoli identity and Access Assurance
Tivoli Endpoint Manager
Tivoli identity and Access Assurance
QRadarQFlow
NIPS
Tivoli Endpoint Manager
Rational AppScan
Proventia Web Filter
Prove
Lotus Protector
SSL VPN
Rational AppScan
Managed Firewall
Managed Firewall
Rational AppScan
Rational AppScan
Rational AppScan
The security landscape is changing dramaticallyThe world is moving towards data centre centric and cloud computing, and this trend ischanging the way that IT infrastructures are deployed. Whilst the benefits of thistechnology transition are well understood, it introduces a whole host of new risks andsecurity considerations.
Increasing user mobility and usage of smart phones,tablets and PDAs at the edge site has introduced new security risks with mobile users wanting to accesscentrally held data and applications anywhere, anytime.
Business and personal use of technology will increasinglyconverge as users synchronise and run their work, socialand educational lives through a single device opening uppotential security loop holes.
High dependance on the Network coupled withconvergence of the Internet, Wide Area Network (WAN) and Telecommunications services introduces new security,performance, and management issues.
!
!
!
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 4
N.O.C.
WANAccelerator
IDP / IDS
Load Balancer
SAN / NAS Fabric
WANAccelerator
StoragePool
Dashboard
Encryption (Data and Applications)
Endpoint Security (Host Servers)
Content Security (Host Servers)
Monitoring
Reporting
Global CompanySecurityPolicy
CoreRouter
NAC
NAC
RemoteSite
WebFiltering
IDS
ailring
ExternalSSL Access
SSLVPN
Router
Archiving andTraditional
Tape Solution
Virtual TapeLibrary (VTL)
ApplicationServers
ApplicationServers
2
3
4
Network
Compliance
Data Centre
EndpointSuite
Encryption
Tivoli KeyLifecycle Manager
Guardium
Guardium
QRadar VFlow
QRadarQFlow
QRadarQFlow
QRadar SIEMdarow
NIPS
PS
NIPS
Virtual Server Protection
Tivoli Endpoint Manager
Tivoli EndpointManager
Proventia Web Filter
Lotus Protector
WANAccelerator
Firewall
WANExternal
Webservers(FTP / WWW)
IntranetWebserver
DMZ 1
DMZ 2
Managed Firewall
al AppScan
Rational AppScan
Rational AppScan
Consolidation into the datacentre and virtualisationintroduces risk due tomultiple applications anddata being concentratedonto virtualised hardwareplatforms.
Corporate governence and risk management is now a major consideration innetwork security planning.
Key Technologies
www.arrowecs.co.uk/ibmsecurity
!
!
Corporate data must besegmented, encrypted,backed up and monitored to prevent corruption andillegal access.
Data and Application Security
• Encryption• Data Loss Prevention (DLP) • Application Control• Alerts• Vulnerability Testing
!
Performance and Infrastructure
• Load Balancing• WAN Acceleration
Content Security
• Email Filtering • Web Filtering
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 5
Breaking it down, making it secureNew data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access, the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive CorporateGovernance and Compliance strategy.
These four key areas must now be considered when developing a comprehensive network and data security strategy. Keytechnology components can be combined to address the full spectrum of individual and collective security challenges in the modern world.
ty
2
3
4
• Safeguard data on the endpoint device • Protect devices against theft and illegal access• Authenticate and ID users
• Separate work and personal activity• Anti Virus, encryption, spyware and malware protection• Track stolen devices, disable data and file access
• Deploy dedicated Firewalls to protect key assets• Create DMZ and restricted areas• Separate and encrypt business critical data
• Apply access and authentication controls at all levels• Deploy intrusion protection and alerts• Filter and control inbound / outbound content
• Deploy Firewalls to protect key access and exit points • Encrypt data in transit across the Network• Deploy access authentication and intrusion detection
• Filter emails for harmful and inappropriate content• Filter, monitor and control website downloads and activity
• Implement audit and tracking controls• Backup and recovery• Resilience and data protection
• Sarbanes-Oxley (SOX) and Payment Card Industry (PCI)• Login and access procedures• Reporting, visibility, tracking and accountability
1 Security for the Desktop and Endpoint
Security for the Network
Security for the Data Centre
Compliance for the Infrastructure
Network Security
• Firewalls• Intrusion Detection Prevention /System (IDP / IDS)
• Wi-Fi• Network Access Control (NAC)
Endpoint Security
• Authentication and Tokens• Single Sign-On• Secure Sockets Layer Virtual PrivateNetwork (SSL VPN)
• Endpoint Suite (Anti Virus, Spyware,Malware, etc)
• Rational AppScan
Compliance
• Monitoring and Data Capture• Policy Management• Dashboards• Reporting Tools• Log Correlation
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 6
Arrow ECS is an information technology distributor specialising in providing end-to-end IT infrastructure solutions including data storage, servers, enterprisesoftware, network security, unified communications and virtualisation. Working withour channel partners, we optimise the efficiency with which organisations can store,manage, protect and deploy their data, equipping them with secure access tobusiness-critical information any time, from any location, on any device.
Our deep technical understanding is reinforced by strong business relationships andcontinually monitoring rapidly changing IT markets for the latest product advancesand emerging technologies. Through close alliances with the world’s leading ITvendors, we deliver innovative solutions, complemented by an impressive portfolio ofexpert professional services and IT training.
With over 25 successful years in the IT industry, we have the skills and experience tosupport our channel partners from initial consultation, planning and design, throughengineering build to implementation. In doing so, we enable our partners to delivereven more value to increase their customers’ competitive edge.
Arrow Enterprise Computing Solutions (ECS) is a business segment of ArrowElectronics Inc. More details are available at www.arrowecs.co.uk
About Arrow ECS
0800 983 2525
Head OfficeNidderdale HouseBeckwith KnowleOtley RoadHarrogateHG3 1SATel: 01423 519000Fax:01423 519250
London OfficeFourth FloorThe Royal ExchangeLondonEC3V 3LNTel: 020 7786 3400Fax:020 7786 3444
Reading OfficeBuilding 1320Arlington BusinessParkTheale, ReadingRG7 4SATel: 0118 971 1511Fax:0118 971 1522
Nottingham OfficeSecurity Centreof ExcellenceWoodside HouseOsier Drive Sherwood Park NottinghamNG15 0DS Tel: 01623 500200 Fax:01623 500201
Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.
www.arrowecs.co.uk/ibmsecurity
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 2