Data Center PraCtiCe
1 . 8 0 0 . i n S i G H t t i n S i G H t. C o m
Security Strategy OverviewCompanies are subject to many physical and logical security threats that include viruses, spam, malware, and intrusions, that can come from internal or external sources. Companies are also subject to security breaches related to the lack of segregation of duties with internal staff. A Security Strategy views all components as a whole with an objective of designing a secure infrastructure that incorporates software, hardware, and policies and procedures that can help protect companies from malicious attack. A firm’s board of directors will often mandate security requirements that regulatory legislation, such as Sarbanes-Oxley, may supplement or supersede.
Security Strategy Benefits •ITmanagementhasafiduciaryresponsibilitytosafeguardassetsanddataunder
its control •CorporatemanagementandboardsoftenmandatesecuritypoliciesthatITmust
implement •RegulatorycomplianceoftenmandatesecuritypoliciesthatITmustimplement •InternalauditorstestITinfrastructures,policies,andprocedurestoensure
adherence to corporate and regulatory compliance •StrongsecurityisacomponentofoverallcorporateRiskManagementthat
minimized financial, operational, and legal exposure
Offerings •OperationalPolicyandProceduresStrategyReview •LogicalSecurityStrategyReview •PhysicalSecurityStrategyReview
Our PrOven MethOdOlOgy
Our process is based on industry best practices and is enhanced with years of experience working with our clientsinthecomplex,highendITsolutions space.
OurMethodologyisaphasedapproach: •discover – Assess •develop–ClientisProvided
Solution Options •design – Architect Solution •deploy–ImplementSolution•debrief–ReviewSolutionBenefits
Security Strategy
ABOut InSIght
Insightisatechnologysolutionsprovider serving global and local clientsin190countries.Today,thousands of clients, including more than 80 percent of the Global Fortune500,relyonInsighttoacquire, implement and manage technology solutions to empower theirbusiness.Insightprovidessoftware and licensing services globally.Inaddition,weofferacomprehensive portfolio which also includes networking, hardware and value added services for our clients in North America and the U.K. We are aggressively expanding our global capabilities by introducing new offerings, including hardware and services, to meet emerging needs for our clients worldwide.
1 . 8 0 0 . i n S i G H t t i n S i G H t. C o m
Success StoriesFInAnce cOMPAnySummary SecurityPolicyDevelopmentchallenge Theclientrequiredacompletesetofdocumentationthatcouldbeusedto
guide and enforce security best practices in their environment.Insight Solution Insightdevelopedthecompletesetofsecuritypoliciesandprocedures
specifically aligned with the client’s business needs and organizational model.Wealsoworkedwiththeclient’sauditorsontheauditingprocess.Thisprovided a consistent security foundation for the client to securely deploy and developITsecurityfortheirITenvironment.
BIOtech cOMPAnySummary SecurityStrategyReviewchallenge Theclientwaslookingforareviewofitscurrentsecuritypracticestoensure
that they were aligned with industry best practices and to ensure that the implementation of new security solutions and services were going to provide themaximumROI.
Insight Solution Insightwasengagedtoreviewtheircurrentsecurityprogram;interviewkeyresourceswithintheITorganization;andprovideagapanalysisandopiniononhowtheorganizationcomparedagainstsimilarorganizations.Technical,process, organizational and business recommendations were provided to the client to help them enhance their security posture.
FInAncIAl ServIceS cOMPAnySummary SecurityStrategyDevelopmentchallenge Theclientrequiredexperiencedsecurityspecialiststohelpthemintegrateand
drive security across their organization to ensure optimum security integration.Insight Solution Insightprovidedtheexpertiseandknowledgeinsecuritytohelpdriveand
support security inside the client’s environment. We helped the client integrateasecuritysolution;establishedsecuritypolicies;andactedasatrusted advisor for the client to ensure that the security posture protects the business and its clients sensitive data.
InsightandtheInsightlogoareregisteredtrademarksofInsightDirectUSA,Inc.Allothertrademarks,registeredtrademarks,photos,logosandillustrationsarethepropertyoftheirrespectiveowners.©2010,InsightDirectUSA,Inc.Allrightsreserved.Updated8.10.10-10847
Fast Facts•CiscoGoldCertifiedPartner•HPPlatinumPartner•IBMPremierBusinessPartner•LenovoPremierBusinessPartner•MicrosoftGoldCertifiedPartner•SymantecPlatinumCorporatePartner•LifecycleManagementServices
•ISO9001:2008IntegrationLabs•2,500+technicalcertifications•ITManagementServiceswith24x7
Network Operations Center •432,000squarefootDistributionCenter•Quickproductprovisioningwithon-hand
and virtual inventories