dcp securitystrategy datasheet - insight€¦ · security strategy overview companies are subject...

2
DATA CENTER PRACTICE 1.800.INSIGHT t INSIGHT.COM Security Strategy Overview Companies are subject to many physical and logical security threats that include viruses, spam, malware, and intrusions, that can come from internal or external sources. Companies are also subject to security breaches related to the lack of segregation of duties with internal staff. A Security Strategy views all components as a whole with an objective of designing a secure infrastructure that incorporates software, hardware, and policies and procedures that can help protect companies from malicious attack. A firm’s board of directors will often mandate security requirements that regulatory legislation, such as Sarbanes-Oxley, may supplement or supersede. Security Strategy Benefits • IT management has a fiduciary responsibility to safeguard assets and data under its control • Corporate management and boards often mandate security policies that IT must implement • Regulatory compliance often mandate security policies that IT must implement • Internal auditors test IT infrastructures, policies, and procedures to ensure adherence to corporate and regulatory compliance • Strong security is a component of overall corporate Risk Management that minimized financial, operational, and legal exposure Offerings • Operational Policy and Procedures Strategy Review • Logical Security Strategy Review • Physical Security Strategy Review OUR PROVEN METHODOLOGY Our process is based on industry best practices and is enhanced with years of experience working with our clients in the complex, high end IT solutions space. Our Methodology is a phased approach: Discover – Assess Develop – Client is Provided Solution Options Design – Architect Solution Deploy – Implement Solution Debrief – Review Solution Benefits Security Strategy

Upload: others

Post on 25-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DCP SecurityStrategy Datasheet - Insight€¦ · Security Strategy Overview Companies are subject to many physical and logical security threats that include viruses, spam, malware,

Data Center PraCtiCe

1 . 8 0 0 . i n S i G H t t i n S i G H t. C o m

Security Strategy OverviewCompanies are subject to many physical and logical security threats that include viruses, spam, malware, and intrusions, that can come from internal or external sources. Companies are also subject to security breaches related to the lack of segregation of duties with internal staff. A Security Strategy views all components as a whole with an objective of designing a secure infrastructure that incorporates software, hardware, and policies and procedures that can help protect companies from malicious attack. A firm’s board of directors will often mandate security requirements that regulatory legislation, such as Sarbanes-Oxley, may supplement or supersede.

Security Strategy Benefits •ITmanagementhasafiduciaryresponsibilitytosafeguardassetsanddataunder

its control •CorporatemanagementandboardsoftenmandatesecuritypoliciesthatITmust

implement •RegulatorycomplianceoftenmandatesecuritypoliciesthatITmustimplement •InternalauditorstestITinfrastructures,policies,andprocedurestoensure

adherence to corporate and regulatory compliance •StrongsecurityisacomponentofoverallcorporateRiskManagementthat

minimized financial, operational, and legal exposure

Offerings •OperationalPolicyandProceduresStrategyReview •LogicalSecurityStrategyReview •PhysicalSecurityStrategyReview

Our PrOven MethOdOlOgy

Our process is based on industry best practices and is enhanced with years of experience working with our clientsinthecomplex,highendITsolutions space.

OurMethodologyisaphasedapproach: •discover – Assess •develop–ClientisProvided

Solution Options •design – Architect Solution •deploy–ImplementSolution•debrief–ReviewSolutionBenefits

Security Strategy

Page 2: DCP SecurityStrategy Datasheet - Insight€¦ · Security Strategy Overview Companies are subject to many physical and logical security threats that include viruses, spam, malware,

ABOut InSIght

Insightisatechnologysolutionsprovider serving global and local clientsin190countries.Today,thousands of clients, including more than 80 percent of the Global Fortune500,relyonInsighttoacquire, implement and manage technology solutions to empower theirbusiness.Insightprovidessoftware and licensing services globally.Inaddition,weofferacomprehensive portfolio which also includes networking, hardware and value added services for our clients in North America and the U.K. We are aggressively expanding our global capabilities by introducing new offerings, including hardware and services, to meet emerging needs for our clients worldwide.

1 . 8 0 0 . i n S i G H t t i n S i G H t. C o m

Success StoriesFInAnce cOMPAnySummary SecurityPolicyDevelopmentchallenge Theclientrequiredacompletesetofdocumentationthatcouldbeusedto

guide and enforce security best practices in their environment.Insight Solution Insightdevelopedthecompletesetofsecuritypoliciesandprocedures

specifically aligned with the client’s business needs and organizational model.Wealsoworkedwiththeclient’sauditorsontheauditingprocess.Thisprovided a consistent security foundation for the client to securely deploy and developITsecurityfortheirITenvironment.

BIOtech cOMPAnySummary SecurityStrategyReviewchallenge Theclientwaslookingforareviewofitscurrentsecuritypracticestoensure

that they were aligned with industry best practices and to ensure that the implementation of new security solutions and services were going to provide themaximumROI.

Insight Solution Insightwasengagedtoreviewtheircurrentsecurityprogram;interviewkeyresourceswithintheITorganization;andprovideagapanalysisandopiniononhowtheorganizationcomparedagainstsimilarorganizations.Technical,process, organizational and business recommendations were provided to the client to help them enhance their security posture.

FInAncIAl ServIceS cOMPAnySummary SecurityStrategyDevelopmentchallenge Theclientrequiredexperiencedsecurityspecialiststohelpthemintegrateand

drive security across their organization to ensure optimum security integration.Insight Solution Insightprovidedtheexpertiseandknowledgeinsecuritytohelpdriveand

support security inside the client’s environment. We helped the client integrateasecuritysolution;establishedsecuritypolicies;andactedasatrusted advisor for the client to ensure that the security posture protects the business and its clients sensitive data.

InsightandtheInsightlogoareregisteredtrademarksofInsightDirectUSA,Inc.Allothertrademarks,registeredtrademarks,photos,logosandillustrationsarethepropertyoftheirrespectiveowners.©2010,InsightDirectUSA,Inc.Allrightsreserved.Updated8.10.10-10847

Fast Facts•CiscoGoldCertifiedPartner•HPPlatinumPartner•IBMPremierBusinessPartner•LenovoPremierBusinessPartner•MicrosoftGoldCertifiedPartner•SymantecPlatinumCorporatePartner•LifecycleManagementServices

•ISO9001:2008IntegrationLabs•2,500+technicalcertifications•ITManagementServiceswith24x7

Network Operations Center •432,000squarefootDistributionCenter•Quickproductprovisioningwithon-hand

and virtual inventories