Securing today s data centre
|
|
- Lester Dennis
- 8 years ago
- Views:
Transcription
1 white paper Securing today s data centre The intelligent use of data is core to achieving business success. There is, therefore, an indisputable need to safeguard the data centre, where most data in its various forms is processed and transited. This can be an onerous responsibility, and increasingly so with the continual evolution of business models and new technology, the proliferation of threats, and increased pressure around compliance. Traditional data centre approaches that worked before have no place in this new scheme of things. We need to use new technologies like virtualisation and cloud solutions, and establish the right ecosystem of controls, processes and policies. When properly crafted and applied to form a cohesive whole, and guided by a well thought-out information governance framework with a matching architecture, these approaches can offer robust protection for the modern data centre.
2 Contents Executive Summary 01 Data centre imperatives 01 Information governance framework 02 Security architecture 03 Layering 03
3 In this paper, Dimension Data provides insight on how to deal with this new challenge and lays out an approach for establishing a secure ecosystem of controls in the modern data centre. Data centre imperatives Digital information is the lifeblood of every modern organisation. Used properly, it can be transformed into knowledge for guiding strategy, making key business decisions and managing day-to-day operations. For data to be used in these ways, it has to be untainted, kept safe, and made available. This means that the data centre, the heart through which almost all data flows, has to be kept healthy and secure. Data centre today is vastly different from what it was, say, a decade ago. Firstly, the data centre has undergone a huge transformation. While the traditional big iron data centre was tasked with providing raw computing power, the new-generation data centre acts as a fast, agile and serviceoriented provider of IT utility. Furthermore, while the traditional data centre served mostly internal users, the new-generation one caters to a broader constituency comprising increasingly mobile employees, customers, suppliers, and business partners across the globe. This makes the responsibility of securing the data centre even more onerous. Many enterprises have consolidated their data centres in order to mitigate IT and process complexity, increase resource utilisation and efficiency, improve performance, and raise service levels and consistency all while trimming costs. Such consolidation centralises information in a smaller number of locations. While this makes the responsibility for keeping information secure more exacting as it should, it also gives organisations the opportunity to address in a proper manner, with the outcome being a sturdier overall IT posture. New technologies, too, impact in today s data centres. While virtualisation and cloud technologies help reduce costs, boost efficiencies, and speed up business operations, they also introduce new risks. For example, in a virtualised environment it can be difficult to separate or gain visibility into communication between virtual machines on the same host, or locate all critical servers to check if they have been properly patched and configured. The use of cloud offerings brings challenges around data sovereignty, and dependencies on service level agreements (SLAs) and controls outside of the company. In addition, the threat landscape is increasingly ominous. Hackers have evolved from hobbyists out to cause mischief, to professional criminals and for-hire outfits engaged by states and corporations eyeing sensitive information and commercial secrets. Hackers deploy very targeted attacks and have more advanced means than ever before. Digital information is the lifeblood of every modern organisation. Used properly, it can be transformed into knowledge for guiding strategy, making key business decisions and managing day-to-day operations. 04
4 Security architecture Security operation Governance Change Incident Configuration and asset Forensics investigation Event monitoring and Architecture principle & model N-tier architecture Application Application platforms Collaboration Access Internet facing web server Data warehouse Data encryption Server and endpoint Instant messaging Identity SSO Strategy Policy Service orientated architecture Antivirus & HIPS Server & endpoint Patch DLP Vulnerability Perimeter and infrastructure Wireless Authentication DLP Role & responsibility Risk Virtualised Network Virtualised F/W and IPS Network admission control Web gateway solutions Network antivirus Wireless DLP Legal & regulatory SaaS Private cloud Public cloud Hybrid cloud Virtualised IT platform Compliance Figure 1: The total secure data centre domain Information governance framework While most organisations understand the importance of keeping data secure, and compliance remain one of the most challenging disciplines to comprehend, implement and maintain. Security in a data centre is a very broad domain that requires an understanding of complex challenges. Without a proper information governance framework, many businesses are simply unaware of their risk exposure and could be vulnerable to operational, financial and reputational damage. Information governance ensures that information strategies support business objectives, manage risks appropriately, use organisational resources responsibly, and are consistent with applicable laws and regulations. For it to be effective, information governance needs to be real time and an integral subset of the overall corporate governance model. Board-level sponsorship is thus vital as this facilitates the assignment of roles, the division of responsibilities, and the allocation of ownership. Top IT, of course, must be included in the organisational sub-structure holding the mandate. Effective governance requires a framework to guide the development and maintenance of a comprehensive information architecture. This framework generally consists of: an information risk methodology a strategy explicitly linked with business and IT objectives a organisational structure a assessment strategy that evaluates the value of information that is protected and delivered policies that address each aspect of strategy, control and regulation standards for each control monitoring processes to ensure compliance and provide feedback continual evaluation and updating of policies, standards, procedures and risks Once the information governance framework has been constructed, it can be used as the basis for developing a architecture that supports the organisation s objectives. 05
5 Security architecture Security architecture should link business and IT objectives, limit the impact of adverse events, and provide the right information for compliance requirements. In addition, it should strike a balance between optimal technical controls and operational expenses, as well as take into account the existing IT infrastructure and deployment models. The development of such an architecture is a multi-phase endeavour. The first step is to gain an understanding of the organisation s business strategy for, say, the next three years. What the organisation aims to do or become has an influence on the architecture. For example, if the plan is to expand the business geographically or make additions to the application deployment model, this will impact not just the IT architecture in the data centre but also its. The current state of the data centre is then determined. The best way to do this is to gather and analyse information on the network and devices to identify vulnerabilities related to the internetwork operating system, and network and device configuration. Such vulnerability assessments are usually conducted manually by specialists, either from within the organisation or from a third party that can provide the proverbial extra pair of hands and eyes. This assessment should include penetration tests, and internal and external audits of policy and controls compliance. A similar assessment of the infrastructure then follows, covering the network, systems, end points, applications, and compliance, policies and rules. The evaluation of the current state of the data centre and of the infrastructure will reveal areas where the effectiveness of measures can be improved. These gaps need to be filled using the necessary solutions and technologies, and changes to the existing IT infrastructure and deployment models may be required. Using the improved architecture as a base, the business can then map out the actions and projects that will eventually align its business strategy with its IT master plan. Technology: layering controls As previously mentioned, organisations can no longer depend on traditional approaches to secure their data centres. Other than physical protection, these approaches focus mostly on protection at the network perimeter. This method has one major flaw: once the network has been breached, intruders have relatively easy access to systems and data within the network. Network perimeter defences also fail to counter threats from internal sources. To defend corporate systems and data assets in today s data centres, organisations need a strategy that encompasses all the components of their IT environment, from the network to the perimeter, data, applications, servers and end points, thus minimising and managing all the weak points and vulnerabilities that expose the organisation to risk. Data centre Physical Figure 2: Layered defence Field level Obviously no single technology can protect against all threats. Multiple technologies have to be deployed. These technologies are most effective when applied as layers. This way, should one defensive layer be breached, the other layers continue to provide. A multi-layered strategy for today s data centre should include elements for protecting the infrastructure (corporate network, servers and end points) and applications, with an additional layer comprising operations. Application Access level Network Encryption 06
6 Infrastructure protection A layered strategy for data centre starts at the first line of defence the network layer. Almost all physical devices in today s business environment have an IP address and are connected to a network. Most attacks happen at the network level, and those that do turn into breaches eventually touch the network at some point. A cohesive network strategy should incorporate several distinct technologies that together protect the entire network fabric, making it resilient. These technologies include those for traffic monitoring and access control, intrusion prevention (including wireless), zero-day attack prevention, Web gateways, and end-point protection. At the server level, protective technologies include those for malware protection, host intrusion prevention, and data loss prevention. Complementing these are application control software for blocking unauthorised applications and code on servers and other assets, and for whitelisting users who are authorised to make configuration and other changes. As with all software, it s very important that these be updated with the latest patches. Default user accounts created during a server installation must be deleted. Unused modules and application extensions, and unnecessary services also need to be removed so as to minimise the number of open ports. Servers containing sensitive data should be further shielded by being isolated in dedicated, secure segments of the corporate network, with access to these segments controlled via tiered firewalls. As for end point, many of today s workers access the intranet from outside the office environment, sometimes through their own personal handheld devices. Together with the proliferation of portable media, this increases the risk of infection. To minimise this risk, end points can be secured using solutions for malware protection, access control and identity verification. Application layer Many organisations use a mix of opensource, internally developed applications and commercially available applications. Some of these may not have been written to strict secure code guidelines or not secured on a life cycle basis, making them vulnerable. The need to keep applications secure has become more critical as more organisations transact and engage customers, partners and even regulators over the internet and are expected to keep the related data safe. Having a dedicated web server for internetfacing applications and storing the data in a protected data warehouse can help ensure this. To ensure that only authorised users are allowed to access and use applications, organisations should have, at the minimum, identity and single sign-on technologies. Complementary solutions include encryption software and gateways for applications such as . Many organisations use a mix of opensource, internally developed applications and commercially available applications. 07
7 Security operations and For a architecture and technologies to be effective, they need to be supported by the people who operate and manage these tools. Security operations encompass risk and vulnerability assessment, incident and remediation, change, event monitoring, forensic investigation of attempts and intrusions, and asset and configuration. When reinforced by the right policies, procedures and processes, and managed in a cohesive and co-ordinated manner, these services can give the organisation a full view of its current risk, enabling it to make informed decisions about both its immediate priorities and future plans to improve and manage risk. However, more often than not, such big picture of operations is lacking in today s organisations. The reasons for this include a lack of IT staff with the requisite skills, disproportionate attention paid to operational tasks such as patch and firewall rule changes, having too many diverse technologies to manage, and being fixated by technology but not its operational. Another reason is not having the tools necessary for providing the services. Together, these three layers provide a protective shield for the data centre, keeping the information belonging to the organisation, its employees, its customers and its business partners confidential, uncorrupted and available. Conclusion The way businesses use data will contribute to their success in the marketplace. The consequent responsibility to secure the data centre can be burdensome but this burden can be lightened through the use of the correct technologies within a sound ecosystem. Elegantly deployed and crafted, and guided by a considered information governance framework and matching architecture, these technologies and ecosystem can shield the modern data centre from threats. Dimension Data is a global systems integrator that helps clients to create, integrate and manage their infrastructure in a way that supports their business goals. We offer a broad portfolio of services coupled with proven technologies from a select group of innovative partners including Blue Coat, Check Point, Cisco, F5, McAfee and AirWatch. Our professionals are recognised for their depth of expertise and passionate client delivery. They re globally connected to bring you the best solutions for your needs, delivered anywhere in the world. CS / DDMS-1432 / 11/13 Copyright Dimension Data
8 Middle East & Africa Asia Australia Europe Americas Algeria Angola Botswana Congo Burundi Democratic Republic of the Congo Gabon Ghana Kenya Malawi Mauritius Morocco Mozambique Namibia Nigeria Oman Rwanda Saudi Arabia South Africa Tanzania Uganda United Arab Emirates Zambia China Hong Kong India Indonesia Japan Korea Malaysia New Zealand Philippines Singapore Taiwan Thailand Vietnam Australian Capital Territory New South Wales Queensland South Australia Victoria Western Australia Belgium Czech Republic France Germany Italy Luxembourg Netherlands Spain Switzerland United Kingdom Brazil Canada Chile Mexico United States For contact details in your region please visit
Governance, Risk and Compliance Assessment
Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could
More informationSecurity Assessment and Compliance Services
Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact
More informationbest practice guide The Three Pillars of a Secure Hybrid Cloud Environment
best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment Introduction How sound risk management, transparency
More informationHow do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?
As the world becomes a more competitive place, businesses need to respond at lightning speed to take advantage of new opportunities or avoid risks. To enable this, the data centre needs to be a dynamic
More informationHybrid Wide-Area Network Application-centric, agile and end-to-end
Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically
More informationIP Trading Solutions
In many mature financial organisations, middle-and back-office functions already collaborate via high-quality, well-integrated voice and video traffic. Their trading floors, on the other hand, still operate
More informationFour steps to improving cloud security and compliance
white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and
More informationFlexible Cloud Services to Compete
white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of
More informationCloud Services for Microsoft
The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation
More informationContact Centre Integration Assessment
Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery
More informationWe d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please
latest thinking We d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please Enabling enterprise mobility with Microsoft System Center and cloud Enterprise mobility is no longer the domain
More informationCloud Readiness Consulting Services
Cloud Readiness Consulting Services Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping
More informationDimension Data s Uptime Support Service
Dimension Data s Uptime Support Service As more technology enters the world, and is introduced into organisations, the typical IT environment increases in complexity. Businesses require higher levels of
More informationIt s critical to be able to correlate threats pre-emptively and respond to them immediately.
Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,
More informationSoftware-as-a-service Delivery: The Build vs. Buy Decision
white paper Software-as-a-service Delivery: The Build vs. Buy Decision Introduction In order to deliver software on-demand, companies must either build and manage an infrastructure capable of supporting
More informationSecurity Solutions Much of the pressure lands on the IT team. mobile and geographically dispersed workforce conducting regular assessments turn this
Security Solutions Today, your business doesn t just rely on IT, it s dependent on secure IT. Against the backdrop of a constantly evolving security threat landscape, increased demands around compliance
More informationI can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry
1 I can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry 2 Contents 01 Investing in an anytime, anywhere, connected workforce 02 On-premise, hybrid,
More informationDimension Data s Uptime Maintenance Service
Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are
More informationCloud Readiness Workshop
Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping costs down. In addition, for many
More informationopinion piece IT Security and Compliance: They can Live Happily Ever After
opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT
More informationDesktop Virtualisation Solutions. Adapting to a new reality in client computing
Desktop Virtualisation Solutions Adapting to a new reality in client computing Adapting to a new reality Businesses today are increasingly realising not only the inevitability of consumer-owned, mobile
More informationopinion piece Eight Simple Steps to Effective Software Asset Management
opinion piece Eight Simple Steps to Effective Software Asset Management Contents Step 1: Collate your licence agreements 01 Step 2: Determine your actual licence position 01 Step 3: Understand your existing
More informationHow To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
More informationSustainable Solutions. Switch to future thinking
Switch to future thinking Increased global competition, rapid advances in technology, risks from natural disasters, resource shortages today s business leaders must adapt to operating in a changing world,
More informationbest practice guide How to measure the real ROI of virtualisation
best practice guide How to measure the real ROI of virtualisation In the face of a global economic crisis, the CFO is often found at the helm of the company. This is because IT spending constitutes a significant
More informationBig Gets Bigger, Smaller Gets Smaller
latest thinking Big Gets Bigger, Smaller Gets Smaller The data centre market is entering a period of unprecedented transition. With this shift comes a number of significant and perhaps surprising changes.
More informationbest practice guide BYO-What? 6 Lessons Learnt in Making Mobility Work
best practice guide BYO-What? 6 Lessons Learnt in Making Mobility Work Businesses are immersed in an era of mobility. Whether it s connecting workers on the road, developing work-from-home policies, or
More informationbest practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business
best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business With a global economy that remains under pressure, organisations around the world are looking for reliable
More information3D Workspace: a new dimension to your desktop
3D Workspace: a new dimension to your desktop The desktop management landscape has changed As the world of work changes, so do the mechanics of IT management and delivery. Technology advances like virtualised
More informationbest practice guide Software-as-a-service Operations: Step-by-Step Best Practices
best practice guide Software-as-a-service Operations: Step-by-Step Best Practices Introduction Faced with intensifying competition, as well as a desire for more stable revenue streams and stronger customer
More informationopinion piece Cloud Computing The journey begins
opinion piece Cloud Computing The journey begins Many CIOs view cloud computing as their salvation in the current economic downturn, as it promises to deliver IT services to subscribers at a lower cost.
More informationManaged Secure Infrastructure Service
Managed Secure Infrastructure Service A constantly evolving security threat landscape, increased pressure around compliance and the potentially devastating impact of a security breach means that businesses
More informationManaged Service for Visual Communications
Managed Service for Visual Communications Managed Service for Visual Communications Videoconferencing can have multiple benefits in your organisation. It can help your employees be more productive and
More informationopinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail
More informationbest practice guide Moving Exchange to the Cloud: 5 Really Practical Best Practices
best practice guide Moving Exchange to the Cloud: 5 Really Practical Best Practices To successfully replicate your environment, you need a thorough understanding of what it comprises and how it s used.
More informationopinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment
opinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment New approaches and skills are required to effectively manage the increased volume and complexity of relationships
More informationbest practice guide Rise Above Unreliable Videoconferencing
best practice guide Rise Above Unreliable Videoconferencing It s no secret that videoconferencing can have a positive impact on employee productivity, business agility, time-to-market, collaboration and
More informationPrivate Cloud for Every Organization
white paper Private Cloud for Every Organization Leveraging the community cloud As more organizations today seek to gain benefit from the flexibility and scalability of cloud environments, many struggle
More informationApplication Security No Longer a Pipe Dream
opinion piece opinion piece Application Security No Longer a Pipe Dream Application Security No Longer a Pipe Dream Security professionals who find themselves struggling to chart a course through the application
More informationEnsure Optimal Infrastructure Support for Mobility
white paper Ensure Optimal Infrastructure Support for Mobility The technology industry has reached a watershed moment. Today, the enterprise is on the move as employee adoption of mobile devices, like
More informationINSITE. Dimension Data s monitoring offering
Dimension Data s offering What s on your mind? Is your infrastructure management strategy optimal? Are you achieving optimum ROI on your infrastructure management investment? Are you employing the latest
More informationBurning Dollars Top Five Trends in US Telecom Spend
white paper Burning Dollars Top Five Trends in US Telecom Spend Telecom costs are among the largest operating expenses for organizations worldwide. Yet, they re often the most inconsistently managed. So
More informationProcurement and Logistics Service. Overcoming the challenges and complexities of international business
Procurement and Logistics Service Overcoming the challenges and complexities of international business There are massive benefits in expanding your organisation into new international territories. You
More informationSecure Mobility Survey Report. A critical gap exists between the enterprise mobility vision and real-world implementations
Secure Mobility Survey Report A critical gap exists between the enterprise mobility vision and real-world implementations introduction Enterprise mobility and trends like bring your own device (BYOD) aren
More informationConsulting and Professional Services. Strategic, architectural, operational and implementation expertise
Consulting and Professional Services Strategic, architectural, operational and implementation expertise How do you ensure the seamless integration of new and existing technologies and services not just
More informationSecurity Consulting. Services Overview
Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in
More informationopinion piece Security Consolidation and Optimisation
opinion piece Security Consolidation and Optimisation Are you maximising the return on your IT assets? Given the proliferation of security applications designed to combat IT breaches, you, like many organisations
More information3 Steps to Transform your Business with Next-Generation Networking
e-guide The Wireless Revolution 3 Steps to Transform your Business with Next-Generation Networking Welcome to the era of the Wireless Revolution! With easy access to technology, setting up a wireless network
More informationUnderstanding the 12 Requirements of PCI DSS
opinion piece Understanding the 12 Requirements of PCI DSS Practical steps to achieve and maintain compliance Regardless of whether you are a retailer, service provider or a bank, if you process any form
More informationTop 5 IT security trends to watch in 2015
What does 2015 hold in store from an IT security perspective? Read on as Dimension Data experts discuss the top trends to watch and their expected impact on business. Introduction The security industry
More informationAdvanced Infrastructure
Your infrastructure is the backbone of your business The Information Economy, the Digital Age, the Virtual Generation and online replacing in-line is a reality and forms part of our daily lives. Each of
More informationopinion piece Consolidation Drives Network Performance 6 Feet Under
opinion piece Consolidation Drives Network Performance 6 Feet Under Contents Consolidation drives network performance 6 feet under 01 Centralisation, consolidation and virtualisation... is there a universal
More informationPerformance Optimisation
Performance Optimisation What could a 50% improvement in network performance mean to your business? At its most simple, performance optimisation is the addition of technology to a network, in order to
More informationCloud Security: Developing a Secure Cloud Approach
white paper Cloud Security: Developing a Secure Cloud Approach Critical questions you should ask your cloud provider Businesses are facing IT and data management challenges unlike those they ve ever experienced.
More informationDimension Data helps Unilever boost global collaboration and hit sustainability goals with innovative Videoconferencing-as-a-Service
Global Manufacturing Dimension Data helps boost global collaboration and hit sustainability goals with innovative Videoconferencing-as-a-Service As part of the Sustainable Living Plan, we re on a mission
More informationwhite paper Technology Internet Protocol Lays a Path to Flexibility and Cost Reduction
white paper Technology Internet Protocol Lays a Path to Flexibility and Cost Reduction Executive summary Contact centres historically conservative in their technology approach are being forced to make
More informationTelephony Telephony a platform to connect, communicate and collaborate with confidence
Telephony a platform to connect, communicate and collaborate with confidence Your business needs reliable, flexible and secure communication tools to interact with your employees, customers and business
More informationThe Future of Unified Communications & Collaboration India highlights. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration India highlights Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in India is behind the global trend, but firms
More informationStrategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary
Strategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary Key findings from a major global Dimension Data and Ovum study highlights Create a UCC strategy
More informationContact Centre-as-a-Service a compelling suite of best-in-class contact centre functionality, delivered via the cloud.
Contact Centre-as-a-Service a compelling suite of best-in-class contact centre functionality, delivered via the cloud. Brought to you by Dimension Data Wholly-owned subsidiary of the USD 100 billion NTT
More informationwhite paper Strategy and Development: The Expanding Role of the Contact Centre
white paper Strategy and Development: The Expanding Role of the Contact Centre white paper The Expanding Role of the Contact Centre Executive summary Contact centres are assuming a more prominent role
More informationMaintaining the Balance Between User Experience and Security
white paper Maintaining the Balance Between User Experience and Security Organisations are seeing a growing preference among employees for using their personal smartphones and tablets for business. Accelerating
More informationThe Future of Unified Communications & Collaboration Canada. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration Canada Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in Canada mirrors global trends, but is more advanced in
More information7 Demands Enterprises Must Make from Cloud Providers
7 Demands Enterprises Must Make from Cloud Providers When choosing a provider for your enterprise cloud, there is plenty to consider. How do you know a provider is actually enterprise-ready, despite their
More informationThe Future of Unified Communications & Collaboration South Africa. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration South Africa Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in South Africa is ahead of the global curve, with
More informationbest practice guide Network Management How to Lose the Frustration, Not the Control
best practice guide Network Management How to Lose the Frustration, Not the Control best practice guide Network Management How to Lose the Frustration, Not the Control So much of your organisation s success
More informationwhite paper Ten Steps to Turn Visual Communications Technology into Real Business Value
white paper Ten Steps to Turn Visual Communications Technology into Real Business Value Organisations around the globe are continuing to seek out new and more cost-effective ways of communicating and collaborating.
More informationDimension Data Cloud Services
Cloud Services Cloud Services Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business landscape, increasing
More informationTop 5 data centre trends to watch in 2015
Top 5 data centre trends to watch in 2015 What does 2015 hold in store for data centre professionals? Read as Dimension Data experts discuss the top trends to watch and their expected impact on business.
More informationData Centre Relocation
opinion piece Data Centre Relocation Not just two guys and a truck Contents Foreword 01 Planning relocation: Everyone is a stakeholder 01 Logic, then physics 02 Prepare the target site 03 Execution: scheduling
More informationThe Future of Unified Communications & Collaboration France. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration France Key findings from a major global Dimension Data and Ovum study highlights UCC infrastructure uptake in France is very advanced, but the French
More informationThe Future of Unified Communications & Collaboration Netherlands. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration Netherlands Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in the Netherlands mirrors global trends, with some
More informationEMEA BENEFITS BENCHMARKING OFFERING
EMEA BENEFITS BENCHMARKING OFFERING COVERED COUNTRIES SWEDEN FINLAND NORWAY ESTONIA R U S S I A DENMARK LITHUANIA LATVIA IRELAND PORTUGAL U. K. NETHERLANDS POLAND BELARUS GERMANY BELGIUM CZECH REP. UKRAINE
More informationDSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace
DSV Air & Sea, Inc. Aerospace Sector DSV Air & Sea, Inc. Aerospace Introduction to DSV DSV is a global supplier of transport and logistics services. We have offices in more than 70 countries and an international
More informationSustainable Data Centre
white paper Sustainable Data Centre Tackling the Ever-rising Data Centre Energy Costs Why Only Do Half the Job? By Kari Baden Managing Director, Dimension Data Advanced Infrastructure A whitepaper on tackling
More informationThe Future of Unified Communications & Collaboration United Kingdom. Key findings from a major global Dimension Data and Ovum study
The Future of Unified Communications & Collaboration United Kingdom Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in the UK mirrors global trends, but is more advanced
More informationDimension Data Hosted Private Compute-as-a-Service
Dimension Data Hosted Private Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are changing the business
More informationHIPAA security rules of engagement
healthcare HIPAA security rules of engagement The use of health information technology continues to expand in healthcare. Healthcare organizations are using web-based applications and other portals that
More information360 o View of. Global Immigration
360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked
More informationwhite paper Building Sustainability into Your Supply Chain Through e-procurement
white paper Building Sustainability into Your Supply Chain Through e-procurement Sustainability has become a critical component in corporate and government sourcing strategies. This is because one of the
More informationbest practice guide 8 Considerations for an Energy-efficient Data Centre
best practice guide 8 Considerations for an Energy-efficient Data Centre Traditional data centres are renowned for being among the most power-hungry ICT assets a business can own. In recent years, CIOs
More informationopinion piece Compliance in the Payment Card Industry
opinion piece Compliance in the Payment Card Industry Contents Introduction 01 Requirement of the PCI DSS 01 PCI DSS regulations Level of PCI compliance 03 Steps to achieving and maintaining PCI DSS Compliance
More informationWorkforce Optimisation
white paper Workforce Optimisation Making Workforce Optimisation Your Handbook to Effective Operations Executive summary Contact centre operations are becoming increasingly complicated. The development
More informationOvercoming the Challenges and Complexities of doing International Business
Overcoming the Challenges and Complexities of doing International Business The international business landscape In today s global economic landscape, business needs have evolved to rely heavily on international
More informationIs the future of networking software defined?
white paper Is the future of networking software defined? A Dimension Data perspective Software-defined networking (SDN) has become a much-hyped and misunderstood technology shift, with many vendors delivering
More informationE-Seminar. Financial Management Internet Business Solution Seminar
E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7
More informationIT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
More informationSybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical
More informationMAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO
MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),
More informationCisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
More informationIntroducing GlobalStar Travel Management
Introducing GlobalStar Travel Management GlobalStar is a worldwide travel management company owned and managed by local entrepreneurs. In total over 80 market leading enterprises, representing over US$13
More informationManaged Security Services
Managed Security Services Now more than ever, security needs to be high on the corporate agenda. Advanced persistent threats continue to proliferate, originating from anywhere across the globe. Recent,
More informationThe Future Of Unified Communications and Collaboration is Managed. Key findings from a major global Dimension Data and Ovum study
The Future Of Unified Communications and Collaboration is Managed Key findings from a major global Dimension Data and Ovum study The Future Of Unified Communications and Collaboration is Managed why now?
More informationInformation Technology in Natural Resource Organisations
white paper Information Technology in Natural Resource Organisations A look into the future Executive summary Key take-outs from this paper 1. We identify 14 key trends taking shape in the Natural Resource
More informationThe big pay turnaround: Eurozone recovering, emerging markets falter in 2015
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in
More informationEnterprise, Meet Cloud: Mapping a Safe Passage to Enterprise Cloud Adoption
white paper Enterprise, Meet Cloud: Mapping a Safe Passage to Enterprise Cloud Adoption New horizons Vast new reserves of computing, available instantly and for a small monthly outlay: cloud computing
More informationGlobal Dynamism Index (GDI) 2013 summary report. Model developed by the Economist Intelligence Unit (EIU)
Global Dynamism Index (GDI) 2013 summary report Model developed by the Economist Intelligence Unit (EIU) What is the Global Dynamism Index (GDI)? the GDI assesses the dynamism of 60 of the world's largest
More informationChart 1: Zambia's Major Trading Partners (Exports + Imports) Q4 2008 - Q4 2009. Switzernd RSA Congo DR China UAE Kuwait UK Zimbabwe India Egypt Other
Bank of Zambia us $ Million 1. INTRODUCTION This report shows Zambia s direction of merchandise trade for the fourth quarter of 2009 compared with the corresponding quarter in 2008. Revised 1 statistics,
More informationThe face of consistent global performance
Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls
More informationNNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
More information