Security brochure 2012_ibm_v1_a4

6
Arrow ECS IBM Security Solutions Safeguarding data Securing business World-leading security portfolio

description

 

Transcript of Security brochure 2012_ibm_v1_a4

Page 1: Security brochure 2012_ibm_v1_a4

Arrow ECS IBM Security Solutions

Safeguarding dataSecuring business

World-leading security portfolio

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 3

Page 2: Security brochure 2012_ibm_v1_a4

With infrastructure-wide experience and specialist knowledgein the security area, Arrow ECS can help your customers tosafeguard their business by controlling and protecting data atevery point.

We have market insight and the technical understanding todraw together the different technology elements into solutionsthat meet your customers’ escalating needs to address securityand compliance issues.

Working with Arrow ECS, we can help organisations tacklesecurity proactively and experience the business benefits thatcome from good governance.

Translating outstanding industry knowledge into practical solutions As the UK’s leading security

distributor, Arrow ECS can offeryour customers the benefits of:

• Our Security Centre of Excellence

• Partnerships with world-class securitysolution vendor

• A dedicated security team accredited to thehighest levels of certification

IBM Product Security Portfolio

0800 983 2525www.arrowecs.co.uk/ibmsecurity

[email protected]

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 1

Page 3: Security brochure 2012_ibm_v1_a4

HeadOffice

Router

NAC

Firewall

Content and WebFiltering WAN

Accelerator

WirelessNetworking

Authorised ThirdParty Access

F

IDP / IDS

ISP LoadBalancer

Authentication

Policy

Endpoint Suite

EmailFiltering

V

Firewall

AppSe

1

Internet /Cloud

Customer / Public Cloud Accessand Internet

Mobile Workersand Small Offices

Endpoint

Endpoint Suite

Encryption

Endpoint Suite

Encryption

AuthenticationTivoli identity and Access Assurance

Tivoli Endpoint Manager

Tivoli identity and Access Assurance

Tivoli Endpoint Manager

Tivoli identity and Access Assurance

QQ

QRadarQFlow

NIPS

Tivoli Endpoint Manager

Rational AppScan

Proventia Web Filter

Prove

Lotus Protector

SSL VPN

Rational AppScan

Managed Firewall

Managed Firewall

Rational AppScan

Rational AppScan

Rational AppScan

The security landscape is changing dramaticallyThe world is moving towards data centre centric and cloud computing, and this trend ischanging the way that IT infrastructures are deployed. Whilst the benefits of thistechnology transition are well understood, it introduces a whole host of new risks andsecurity considerations.

Increasing user mobility and usage of smart phones,tablets and PDAs at the edge site has introduced new security risks with mobile users wanting to accesscentrally held data and applications anywhere, anytime.

Business and personal use of technology will increasinglyconverge as users synchronise and run their work, socialand educational lives through a single device opening uppotential security loop holes.

High dependance on the Network coupled withconvergence of the Internet, Wide Area Network (WAN) and Telecommunications services introduces new security,performance, and management issues.

!

!

!

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 4

Page 4: Security brochure 2012_ibm_v1_a4

N.O.C.

WANAccelerator

IDP / IDS

Load Balancer

SAN / NAS Fabric

WANAccelerator

StoragePool

Dashboard

Encryption (Data and Applications)

Endpoint Security (Host Servers)

Content Security (Host Servers)

Monitoring

Reporting

Global CompanySecurityPolicy

CoreRouter

NAC

NAC

RemoteSite

WebFiltering

IDS

ailring

ExternalSSL Access

SSLVPN

Router

Archiving andTraditional

Tape Solution

Virtual TapeLibrary (VTL)

ApplicationServers

ApplicationServers

2

3

4

Network

Compliance

Data Centre

EndpointSuite

Encryption

Tivoli KeyLifecycle Manager

Guardium

Guardium

QRadar VFlow

QRadarQFlow

QRadarQFlow

QRadar SIEMdarow

NIPS

PS

NIPS

Virtual Server Protection

Tivoli Endpoint Manager

Tivoli EndpointManager

Proventia Web Filter

Lotus Protector

WANAccelerator

Firewall

WANExternal

Webservers(FTP / WWW)

IntranetWebserver

DMZ 1

DMZ 2

Managed Firewall

al AppScan

Rational AppScan

Rational AppScan

Consolidation into the datacentre and virtualisationintroduces risk due tomultiple applications anddata being concentratedonto virtualised hardwareplatforms.

Corporate governence and risk management is now a major consideration innetwork security planning.

Key Technologies

www.arrowecs.co.uk/ibmsecurity

!

!

Corporate data must besegmented, encrypted,backed up and monitored to prevent corruption andillegal access.

Data and Application Security

• Encryption• Data Loss Prevention (DLP) • Application Control• Alerts• Vulnerability Testing

!

Performance and Infrastructure

• Load Balancing• WAN Acceleration

Content Security

• Email Filtering • Web Filtering

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 5

Page 5: Security brochure 2012_ibm_v1_a4

Breaking it down, making it secureNew data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access, the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive CorporateGovernance and Compliance strategy.

These four key areas must now be considered when developing a comprehensive network and data security strategy. Keytechnology components can be combined to address the full spectrum of individual and collective security challenges in the modern world.

ty

2

3

4

• Safeguard data on the endpoint device • Protect devices against theft and illegal access• Authenticate and ID users

• Separate work and personal activity• Anti Virus, encryption, spyware and malware protection• Track stolen devices, disable data and file access

• Deploy dedicated Firewalls to protect key assets• Create DMZ and restricted areas• Separate and encrypt business critical data

• Apply access and authentication controls at all levels• Deploy intrusion protection and alerts• Filter and control inbound / outbound content

• Deploy Firewalls to protect key access and exit points • Encrypt data in transit across the Network• Deploy access authentication and intrusion detection

• Filter emails for harmful and inappropriate content• Filter, monitor and control website downloads and activity

• Implement audit and tracking controls• Backup and recovery• Resilience and data protection

• Sarbanes-Oxley (SOX) and Payment Card Industry (PCI)• Login and access procedures• Reporting, visibility, tracking and accountability

1 Security for the Desktop and Endpoint

Security for the Network

Security for the Data Centre

Compliance for the Infrastructure

Network Security

• Firewalls• Intrusion Detection Prevention /System (IDP / IDS)

• Wi-Fi• Network Access Control (NAC)

Endpoint Security

• Authentication and Tokens• Single Sign-On• Secure Sockets Layer Virtual PrivateNetwork (SSL VPN)

• Endpoint Suite (Anti Virus, Spyware,Malware, etc)

• Rational AppScan

Compliance

• Monitoring and Data Capture• Policy Management• Dashboards• Reporting Tools• Log Correlation

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 6

Page 6: Security brochure 2012_ibm_v1_a4

Arrow ECS is an information technology distributor specialising in providing end-to-end IT infrastructure solutions including data storage, servers, enterprisesoftware, network security, unified communications and virtualisation. Working withour channel partners, we optimise the efficiency with which organisations can store,manage, protect and deploy their data, equipping them with secure access tobusiness-critical information any time, from any location, on any device.

Our deep technical understanding is reinforced by strong business relationships andcontinually monitoring rapidly changing IT markets for the latest product advancesand emerging technologies. Through close alliances with the world’s leading ITvendors, we deliver innovative solutions, complemented by an impressive portfolio ofexpert professional services and IT training.

With over 25 successful years in the IT industry, we have the skills and experience tosupport our channel partners from initial consultation, planning and design, throughengineering build to implementation. In doing so, we enable our partners to delivereven more value to increase their customers’ competitive edge.

Arrow Enterprise Computing Solutions (ECS) is a business segment of ArrowElectronics Inc. More details are available at www.arrowecs.co.uk

About Arrow ECS

0800 983 2525

Head OfficeNidderdale HouseBeckwith KnowleOtley RoadHarrogateHG3 1SATel: 01423 519000Fax:01423 519250

London OfficeFourth FloorThe Royal ExchangeLondonEC3V 3LNTel: 020 7786 3400Fax:020 7786 3444

Reading OfficeBuilding 1320Arlington BusinessParkTheale, ReadingRG7 4SATel: 0118 971 1511Fax:0118 971 1522

Nottingham OfficeSecurity Centreof ExcellenceWoodside HouseOsier Drive Sherwood Park NottinghamNG15 0DS Tel: 01623 500200 Fax:01623 500201

Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.

www.arrowecs.co.uk/ibmsecurity

[email protected]

Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 2