SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 3




         Arrow ECS IBM Security Solutions



         Safeguarding data
         Securing business




                                     World-leading security portfolio
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 1




      Translating outstanding industry
      knowledge into practical solutions                                    As the UK’s leading security
                                                                            distributor, Arrow ECS can offer
                                                                            your customers the benefits of:
      With infrastructure-wide experience and specialist knowledge
      in the security area, Arrow ECS can help your customers to
      safeguard their business by controlling and protecting data at        • Our Security Centre of Excellence
      every point.
                                                                            • Partnerships with world-class security
      We have market insight and the technical understanding to               solution vendor
      draw together the different technology elements into solutions
      that meet your customers’ escalating needs to address security
      and compliance issues.                                                • A dedicated security team accredited to the
                                                                              highest levels of certification

      Working with Arrow ECS, we can help organisations tackle
      security proactively and experience the business benefits that
      come from good governance.
                                                                                  0800 983 2525
                                                                                  www.arrowecs.co.uk/ibmsecurity

                                                                                  iquotes@arrowecs.co.uk

      IBM Product Security Portfolio
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 4




      The security landscape is changing dramatically
      The world is moving towards data centre centric and cloud computing, and this trend is
      changing the way that IT infrastructures are deployed. Whilst the benefits of this
      technology transition are well understood, it introduces a whole host of new risks and
      security considerations.

       !   Increasing user mobility and usage of smart phones,
           tablets and PDAs at the edge site has introduced
           new security risks with mobile users wanting to access                                                                                     Tivoli identity and            Encryption
                                                                                                                                                      Access Assurance
           centrally held data and applications anywhere, anytime.                                                                                                                                                   App
                                                                                                                                                      Tivoli Endpoint Manager        Endpoint Suite                   Se



       !   Business and personal use of technology will increasingly
           converge as users synchronise and run their work, social                                                                                                Head
           and educational lives through a single device opening up                                                                                                Office
           potential security loop holes.
                                                                                                                                                                                                      Rational AppScan



       !   High dependance on the Network coupled with                                                                                                                                                                   Q
           convergence of the Internet, Wide Area Network (WAN)                                                                                                                                         NAC
                                                                                                                                                                                                                         Q
                                                                                                          Authorised Third
           and Telecommunications services introduces new security,                                                                                                                 Wireless
                                                                                                            Party Access                                                           Networking
           performance, and management issues.
                                                                                                                                           Rational AppScan
                                                                                    Tivoli identity and
                                                                                    Access Assurance                                                                                                                Prove
                                                                                                          Authentication
                                                                                    Tivoli Endpoint Manager      Endpoint Suite                                                                                          F

                                                                                                                                  Policy
                                                                                                                                                                                                         NIPS
                                                                                                                                                                                                       IDP / IDS
                                                                                                                                                                                                        QRadar
                                                                                                              Rational AppScan                                                  Managed Firewall        QFlow
                                                                                                                                                                                        Firewall
                                                                       Customer / Public
                                                                         Cloud Access
                                                                         and Internet
                                                                                                                                                                                                         Email
                                                                                                                                                                                                        Filtering
                                                                                                                                                                                ISP Load
                                                                                                                                                                                Balancer


                                                                                                                                                       Internet /                                                        V


                                                                                                                                                         Cloud
                                                                          Mobile Workers
                                                                         and Small Offices

                                                                              Rational AppScan

                                                                                                                   Proventia Web Filter
                                                                                                                     Lotus Protector
                                                                                                                    Content and Web
                                                                                                                       Filtering                       WAN
                                                                                                                                                    Accelerator
                                                                                        Encryption                     Router
                                                                                                                                            Firewall Managed Firewall

                                                                                                                                 Rational AppScan
                                                   Tivoli Endpoint Manager              Endpoint Suite

                                                        Tivoli identity and
                                                        Access Assurance                 Authentication
                                                                                                                                                      1        Endpoint
                                                                                         SSL VPN
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 5




                                                                                                                            !       Corporate data must be
                                                                                                                                    segmented, encrypted,
                                                                                                                                    backed up and monitored
                                                             Archiving and
                                                                                                                                    to prevent corruption and
                                                              Traditional                                                           illegal access.
                                                             Tape Solution




                                                          Storage
                                                                                                                  3        Data Centre                                                          !     Consolidation into the data
                                                                                                                                                                                                      centre and virtualisation
                                                            Pool
                                                                                 Tivoli Key
                                                                                                       Guardium                                                                                       introduces risk due to
                                          Virtual Tape
                                          Library (VTL)
                                                                             Lifecycle Manager                    Tivoli Endpoint
                                                                                                                  Manager
                                                                                                                                              Encryption (Data and Applications)
                                                                                                                                                                                                      multiple applications and
                                                                                                                                                                                                      data being concentrated
                                                                                                                                                                                                      onto virtualised hardware
                                                                                                                            SA




                                                                                                                                                             Endpoint Security (Host Servers)
                                                                                                                              N
                                                                                                                                /N



        Application
                                                                                                                                    AS


                                                          Rational AppScan
                                                                                                                                                                                                      platforms.
                                                                                                                                     Fa


         Servers
                                                                                                                                       br


                                                                   Application
                                                                                                                                         ic


                                                                    Servers                                                                                                  Content Security (Host Servers)


                   Rational AppScan

                                                                                                                                              QRadar VFlow
                                                                  NIPS
                                                                                       IDP / IDS
                                                             WAN
al AppScan                     NAC                        Accelerator                                                                                                                               Dashboard
                       Core                                                                                                                                                                                    Guardium
                      Router        WAN                                                                              Managed Firewall
                                 Accelerator                                                                                                                                                             Monitoring
             QRadar
             QFlow                                                               Load Balancer

                                                                                                                                          Virtual Server Protection
                                                                                                                                                                                    N.O.C.
                                                                                                                                                                                                       Reporting
                                                                                                        DMZ 1                 Firewall


                                                  WAN                                Intranet
                                                                                    Webserver
                                                                                                                      DMZ 2
       Proventia Web Filter
                                                                                                    External
              Web
                                                                                                   Webservers
            Filtering
                                                                                                  (FTP / WWW)                                         Global
                                                                                         WAN                                                          Company

                                                                                                                                                                                                !
PS                                                                                    Accelerator                                                     Security
 IDS
                                      External
                                                                                                                                                      Policy                                         Corporate governence and
                                     SSL Access                                                          QRadar
dar                                                       QRadar SIEM
                                                                                                         QFlow                                                                                       risk management is now a
ow
                                                                                                         Router                                                                                      major consideration in
                               2         Network                                                                                                                                                     network security planning.
                                                                                                                NAC NIPS


                   Lotus Protector                                                     Remote
ail                                                                                     Site
ring
                                                                                     Encryption
             SSL
             VPN
                                                                                     Endpoint
                                                                                     Suite
                                                                                     Tivoli Endpoint Manager




                                                                                                                                Key Technologies
                                                   4         Compliance                                                         Data and Application Security                                                         Content Security

                                                                                                                                • Encryption                                                                          • Email Filtering
                                                                                                                                • Data Loss Prevention (DLP)                                                          • Web Filtering
                                                                                                                                • Application Control
                                                                                                                                • Alerts
                                                                                                                                • Vulnerability Testing

                                                                                                                                Performance and Infrastructure

                                                                                                                                • Load Balancing
                                                                                                                                • WAN Acceleration


                                                                                                                                                     www.arrowecs.co.uk/ibmsecurity
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 6




            Breaking it down, making it secure
            New data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access,
            the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive Corporate
            Governance and Compliance strategy.

            These four key areas must now be considered when developing a comprehensive network and data security strategy. Key
            technology components can be combined to address the full spectrum of individual and collective security challenges in the
            modern world.


               1     Security for the Desktop and Endpoint

               • Safeguard data on the endpoint device                            • Separate work and personal activity
               • Protect devices against theft and illegal access                 • Anti Virus, encryption, spyware and malware protection
               • Authenticate and ID users                                        • Track stolen devices, disable data and file access




               2     Security for the Network

                • Deploy Firewalls to protect key access and exit points          • Filter emails for harmful and inappropriate content
                • Encrypt data in transit across the Network                      • Filter, monitor and control website downloads and activity
                • Deploy access authentication and intrusion detection




               3     Security for the Data Centre

                • Deploy dedicated Firewalls to protect key assets                • Apply access and authentication controls at all levels
                • Create DMZ and restricted areas                                 • Deploy intrusion protection and alerts
                • Separate and encrypt business critical data                     • Filter and control inbound / outbound content




               4     Compliance for the Infrastructure

                • Implement audit and tracking controls                           • Sarbanes-Oxley (SOX) and Payment Card Industry (PCI)
                • Backup and recovery                                             • Login and access procedures
                • Resilience and data protection                                  • Reporting, visibility, tracking and accountability




                   Network Security                                  Endpoint Security                              Compliance

                   • Firewalls                                       • Authentication and Tokens                    • Monitoring and Data Capture
                   • Intrusion Detection Prevention /                • Single Sign-On                               • Policy Management
                     System (IDP / IDS)                              • Secure Sockets Layer Virtual Private         • Dashboards
                   • Wi-Fi                                             Network (SSL VPN)                            • Reporting Tools
                   • Network Access Control (NAC)                    • Endpoint Suite (Anti Virus, Spyware,         • Log Correlation
                                                                       Malware, etc)
                                                                     • Rational AppScan




ty
Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 2




                 About Arrow ECS
                 Arrow ECS is an information technology distributor specialising in providing
                 end-to-end IT infrastructure solutions including data storage, servers, enterprise
                 software, network security, unified communications and virtualisation. Working with
                 our channel partners, we optimise the efficiency with which organisations can store,
                 manage, protect and deploy their data, equipping them with secure access to
                 business-critical information any time, from any location, on any device.

                 Our deep technical understanding is reinforced by strong business relationships and
                 continually monitoring rapidly changing IT markets for the latest product advances
                 and emerging technologies. Through close alliances with the world’s leading IT
                 vendors, we deliver innovative solutions, complemented by an impressive portfolio of
                 expert professional services and IT training.

                 With over 25 successful years in the IT industry, we have the skills and experience to
                 support our channel partners from initial consultation, planning and design, through
                 engineering build to implementation. In doing so, we enable our partners to deliver
                 even more value to increase their customers’ competitive edge.

                 Arrow Enterprise Computing Solutions (ECS) is a business segment of Arrow
                 Electronics Inc. More details are available at www.arrowecs.co.uk




                 Head Office              London Office             Reading Office           Nottingham Office
                 Nidderdale House         Fourth Floor              Building 1320            Security Centre
                 Beckwith Knowle          The Royal Exchange        Arlington Business       of Excellence
                 Otley Road               London                    Park                     Woodside House
                 Harrogate                EC3V 3LN                  Theale, Reading          Osier Drive
                 HG3 1SA                  Tel: 020 7786 3400        RG7 4SA                  Sherwood Park
                 Tel: 01423 519000        Fax:020 7786 3444         Tel: 0118 971 1511       Nottingham
                 Fax:01423 519250                                   Fax:0118 971 1522        NG15 0DS
                                                                                             Tel: 01623 500200
                                                                                             Fax:01623 500201


                        0800 983 2525
                        www.arrowecs.co.uk/ibmsecurity

                        iquotes@arrowecs.co.uk


                 Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.

Más contenido relacionado

La actualidad más candente

Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterpriseframeworksem
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wirelessInterop
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete SecurityCTI Group
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochureguillaumepays
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 

La actualidad más candente (20)

Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 
Bi cloud saa_s
Bi cloud saa_sBi cloud saa_s
Bi cloud saa_s
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
C2MS
C2MSC2MS
C2MS
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Whitepaper: Connected Office Enterprise
Whitepaper: Connected Office EnterpriseWhitepaper: Connected Office Enterprise
Whitepaper: Connected Office Enterprise
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Bridging the wired wireless
Bridging the wired wirelessBridging the wired wireless
Bridging the wired wireless
 
Sophos Complete Security
Sophos Complete SecuritySophos Complete Security
Sophos Complete Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 

Destacado

Application HA in Virtual Environments
Application HA in Virtual EnvironmentsApplication HA in Virtual Environments
Application HA in Virtual EnvironmentsArrow ECS UK
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Sims schedule
Sims scheduleSims schedule
Sims scheduleDom9533
 
DigiTXT: eBooks, iPods and Early Elementary
DigiTXT: eBooks, iPods and Early ElementaryDigiTXT: eBooks, iPods and Early Elementary
DigiTXT: eBooks, iPods and Early ElementaryCenter for Literacy
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCAlejandro Videla
 
Creating a sample_library_brief_updated_14.02.12
Creating a sample_library_brief_updated_14.02.12Creating a sample_library_brief_updated_14.02.12
Creating a sample_library_brief_updated_14.02.12Dom9533
 
Ibm security overview bp enablement 22 feb-2012 v harper
Ibm security overview bp enablement 22 feb-2012 v harperIbm security overview bp enablement 22 feb-2012 v harper
Ibm security overview bp enablement 22 feb-2012 v harperArrow ECS UK
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Alcatel Lucent- Change The Conversation
Alcatel Lucent- Change The ConversationAlcatel Lucent- Change The Conversation
Alcatel Lucent- Change The ConversationArrow ECS UK
 

Destacado (12)

Application HA in Virtual Environments
Application HA in Virtual EnvironmentsApplication HA in Virtual Environments
Application HA in Virtual Environments
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Sims schedule
Sims scheduleSims schedule
Sims schedule
 
DigiTXT: eBooks, iPods and Early Elementary
DigiTXT: eBooks, iPods and Early ElementaryDigiTXT: eBooks, iPods and Early Elementary
DigiTXT: eBooks, iPods and Early Elementary
 
Guia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOCGuia argentina de tratamiento de la EPOC
Guia argentina de tratamiento de la EPOC
 
Creating a sample_library_brief_updated_14.02.12
Creating a sample_library_brief_updated_14.02.12Creating a sample_library_brief_updated_14.02.12
Creating a sample_library_brief_updated_14.02.12
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Ibm security overview bp enablement 22 feb-2012 v harper
Ibm security overview bp enablement 22 feb-2012 v harperIbm security overview bp enablement 22 feb-2012 v harper
Ibm security overview bp enablement 22 feb-2012 v harper
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Alcatel Lucent- Change The Conversation
Alcatel Lucent- Change The ConversationAlcatel Lucent- Change The Conversation
Alcatel Lucent- Change The Conversation
 
Media news
Media newsMedia news
Media news
 

Similar a Security brochure 2012_ibm_v1_a4

Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ECS UK
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAdvantec Distribution
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAltaware, Inc.
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]Sharpe Smith
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 

Similar a Security brochure 2012_ibm_v1_a4 (20)

Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Air defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheetAir defense services_platform_8.0_spec_sheet
Air defense services_platform_8.0_spec_sheet
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 

Más de Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

Más de Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Security brochure 2012_ibm_v1_a4

  • 1. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 3 Arrow ECS IBM Security Solutions Safeguarding data Securing business World-leading security portfolio
  • 2. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 1 Translating outstanding industry knowledge into practical solutions As the UK’s leading security distributor, Arrow ECS can offer your customers the benefits of: With infrastructure-wide experience and specialist knowledge in the security area, Arrow ECS can help your customers to safeguard their business by controlling and protecting data at • Our Security Centre of Excellence every point. • Partnerships with world-class security We have market insight and the technical understanding to solution vendor draw together the different technology elements into solutions that meet your customers’ escalating needs to address security and compliance issues. • A dedicated security team accredited to the highest levels of certification Working with Arrow ECS, we can help organisations tackle security proactively and experience the business benefits that come from good governance. 0800 983 2525 www.arrowecs.co.uk/ibmsecurity iquotes@arrowecs.co.uk IBM Product Security Portfolio
  • 3. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 4 The security landscape is changing dramatically The world is moving towards data centre centric and cloud computing, and this trend is changing the way that IT infrastructures are deployed. Whilst the benefits of this technology transition are well understood, it introduces a whole host of new risks and security considerations. ! Increasing user mobility and usage of smart phones, tablets and PDAs at the edge site has introduced new security risks with mobile users wanting to access Tivoli identity and Encryption Access Assurance centrally held data and applications anywhere, anytime. App Tivoli Endpoint Manager Endpoint Suite Se ! Business and personal use of technology will increasingly converge as users synchronise and run their work, social Head and educational lives through a single device opening up Office potential security loop holes. Rational AppScan ! High dependance on the Network coupled with Q convergence of the Internet, Wide Area Network (WAN) NAC Q Authorised Third and Telecommunications services introduces new security, Wireless Party Access Networking performance, and management issues. Rational AppScan Tivoli identity and Access Assurance Prove Authentication Tivoli Endpoint Manager Endpoint Suite F Policy NIPS IDP / IDS QRadar Rational AppScan Managed Firewall QFlow Firewall Customer / Public Cloud Access and Internet Email Filtering ISP Load Balancer Internet / V Cloud Mobile Workers and Small Offices Rational AppScan Proventia Web Filter Lotus Protector Content and Web Filtering WAN Accelerator Encryption Router Firewall Managed Firewall Rational AppScan Tivoli Endpoint Manager Endpoint Suite Tivoli identity and Access Assurance Authentication 1 Endpoint SSL VPN
  • 4. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 5 ! Corporate data must be segmented, encrypted, backed up and monitored Archiving and to prevent corruption and Traditional illegal access. Tape Solution Storage 3 Data Centre ! Consolidation into the data centre and virtualisation Pool Tivoli Key Guardium introduces risk due to Virtual Tape Library (VTL) Lifecycle Manager Tivoli Endpoint Manager Encryption (Data and Applications) multiple applications and data being concentrated onto virtualised hardware SA Endpoint Security (Host Servers) N /N Application AS Rational AppScan platforms. Fa Servers br Application ic Servers Content Security (Host Servers) Rational AppScan QRadar VFlow NIPS IDP / IDS WAN al AppScan NAC Accelerator Dashboard Core Guardium Router WAN Managed Firewall Accelerator Monitoring QRadar QFlow Load Balancer Virtual Server Protection N.O.C. Reporting DMZ 1 Firewall WAN Intranet Webserver DMZ 2 Proventia Web Filter External Web Webservers Filtering (FTP / WWW) Global WAN Company ! PS Accelerator Security IDS External Policy Corporate governence and SSL Access QRadar dar QRadar SIEM QFlow risk management is now a ow Router major consideration in 2 Network network security planning. NAC NIPS Lotus Protector Remote ail Site ring Encryption SSL VPN Endpoint Suite Tivoli Endpoint Manager Key Technologies 4 Compliance Data and Application Security Content Security • Encryption • Email Filtering • Data Loss Prevention (DLP) • Web Filtering • Application Control • Alerts • Vulnerability Testing Performance and Infrastructure • Load Balancing • WAN Acceleration www.arrowecs.co.uk/ibmsecurity
  • 5. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 6 Breaking it down, making it secure New data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access, the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive Corporate Governance and Compliance strategy. These four key areas must now be considered when developing a comprehensive network and data security strategy. Key technology components can be combined to address the full spectrum of individual and collective security challenges in the modern world. 1 Security for the Desktop and Endpoint • Safeguard data on the endpoint device • Separate work and personal activity • Protect devices against theft and illegal access • Anti Virus, encryption, spyware and malware protection • Authenticate and ID users • Track stolen devices, disable data and file access 2 Security for the Network • Deploy Firewalls to protect key access and exit points • Filter emails for harmful and inappropriate content • Encrypt data in transit across the Network • Filter, monitor and control website downloads and activity • Deploy access authentication and intrusion detection 3 Security for the Data Centre • Deploy dedicated Firewalls to protect key assets • Apply access and authentication controls at all levels • Create DMZ and restricted areas • Deploy intrusion protection and alerts • Separate and encrypt business critical data • Filter and control inbound / outbound content 4 Compliance for the Infrastructure • Implement audit and tracking controls • Sarbanes-Oxley (SOX) and Payment Card Industry (PCI) • Backup and recovery • Login and access procedures • Resilience and data protection • Reporting, visibility, tracking and accountability Network Security Endpoint Security Compliance • Firewalls • Authentication and Tokens • Monitoring and Data Capture • Intrusion Detection Prevention / • Single Sign-On • Policy Management System (IDP / IDS) • Secure Sockets Layer Virtual Private • Dashboards • Wi-Fi Network (SSL VPN) • Reporting Tools • Network Access Control (NAC) • Endpoint Suite (Anti Virus, Spyware, • Log Correlation Malware, etc) • Rational AppScan ty
  • 6. Security_Brochure_2012_IBM_v1_DNS_training_v20 aw 21/02/2012 15:22 Page 2 About Arrow ECS Arrow ECS is an information technology distributor specialising in providing end-to-end IT infrastructure solutions including data storage, servers, enterprise software, network security, unified communications and virtualisation. Working with our channel partners, we optimise the efficiency with which organisations can store, manage, protect and deploy their data, equipping them with secure access to business-critical information any time, from any location, on any device. Our deep technical understanding is reinforced by strong business relationships and continually monitoring rapidly changing IT markets for the latest product advances and emerging technologies. Through close alliances with the world’s leading IT vendors, we deliver innovative solutions, complemented by an impressive portfolio of expert professional services and IT training. With over 25 successful years in the IT industry, we have the skills and experience to support our channel partners from initial consultation, planning and design, through engineering build to implementation. In doing so, we enable our partners to deliver even more value to increase their customers’ competitive edge. Arrow Enterprise Computing Solutions (ECS) is a business segment of Arrow Electronics Inc. More details are available at www.arrowecs.co.uk Head Office London Office Reading Office Nottingham Office Nidderdale House Fourth Floor Building 1320 Security Centre Beckwith Knowle The Royal Exchange Arlington Business of Excellence Otley Road London Park Woodside House Harrogate EC3V 3LN Theale, Reading Osier Drive HG3 1SA Tel: 020 7786 3400 RG7 4SA Sherwood Park Tel: 01423 519000 Fax:020 7786 3444 Tel: 0118 971 1511 Nottingham Fax:01423 519250 Fax:0118 971 1522 NG15 0DS Tel: 01623 500200 Fax:01623 500201 0800 983 2525 www.arrowecs.co.uk/ibmsecurity iquotes@arrowecs.co.uk Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.