About Arrow ECS
Translating outstanding industry
                                                                                                                                 Arrow ECS is an information technology distributor specialising in providing
knowledge into practical solutions                                               As the UK’s leading security
                                                                                 distributor, Arrow ECS can offer
                                                                                                                                 end-to-end IT infrastructure solutions including data storage, servers, enterprise
                                                                                                                                                                                                                                 Arrow ECS Security Solutions
                                                                                                                                 software, network security, unified communications and virtualisation. Working with
                                                                                 your customers the benefits of:


                                                                                                                                                                                                                                 Safeguarding data
With infrastructure-wide experience and specialist knowledge                                                                     our channel partners, we optimise the efficiency with which organisations can store,
in the security area, Arrow ECS can help your customers to                                                                       manage, protect and deploy their data, equipping them with secure access to
safeguard their business by controlling and protecting data at                   • Our Security Centre of Excellence             business-critical information any time, from any location, on any device.
every point.
                                                                                                                                 Our deep technical understanding is reinforced by strong business relationships and


                                                                                                                                                                                                                                 Securing business
                                                                                 • Partnerships with world-class security
We have market insight and the technical understanding to                          solution vendors                              continually monitoring rapidly changing IT markets for the latest product advances
draw together the different technology elements into solutions                                                                   and emerging technologies. Through close alliances with the world’s leading IT
that meet your customers’ escalating needs to address security                                                                   vendors, we deliver innovative solutions, complemented by an impressive portfolio of
and compliance issues.                                                           • A dedicated security team accredited to the
                                                                                   highest levels of certification               expert professional services and IT training.

                                                                                                                                 With over 25 successful years in the IT industry, we have the skills and experience to
Working with Arrow ECS, we can help organisations tackle
                                                                                                                                 support our channel partners from initial consultation, planning and design, through
security proactively and experience the business benefits that
come from good governance.
                                                                                       01623 500210                              engineering build to implementation. In doing so, we enable our partners to deliver
                                                                                       www.arrowecs.co.uk/security               even more value to increase their customers’ competitive edge.

                                                                                                                                 Arrow Enterprise Computing Solutions (ECS) is a business segment of Arrow
                                                                                       squotes@arrowecs.co.uk                    Electronics Inc. More details are available at www.arrowecs.co.uk



Arrow ECS Security Portfolio
 1   Security for the Desktop and Endpoint - protecting sensitive information from compromise
     and corruption when accessed and stored at the endpoint, even over portable devices




     Security for the Network - balancing ease of access to information with safeguarding the
2    integrity of confidential data shared across the network

                                                                  ©


                                                Secure Networks




                                                                                                                                 Head Office              London Office             Reading Office           Nottingham Office
                                                                                                                                 Nidderdale House         Fourth Floor              Building 1320            Security Centre
     Security for the Data Centre - ensuring data stored within the data centre for access by users
 3                                                                                                                               Beckwith Knowle          The Royal Exchange        Arlington Business       of Excellence
     is firmly under the control of the organisation                                                                             Otley Road               London                    Park                     Woodside House
                                                                                                                                 Harrogate                EC3V 3LN                  Theale, Reading          Osier Drive
                                                                                                                                 HG3 1SA                  Tel: 020 7786 3400        RG7 4SA                  Sherwood Park
                                                                                                                                                                                    Tel: 0118 971 1511
                                            ©


                       Secure Networks
                                                                                                                                 Tel: 01423 519000        Fax:020 7786 3444                                  Nottingham
                                                                                                                                 Fax:01423 519250                                   Fax:0118 971 1522        NG15 0DS
                                                                                                                                                                                                             Tel: 01623 500200
     Compliance for the Infrastructure - maintaining full compliance with legal obligations on
 4   creating and retaining data without increasing management overheads
                                                                                                                                                                                                             Fax:01623 500201



                      Secure Networks
                                        ©
                                                                                                                                        01623 500210
                                                                                                                                        www.arrowecs.co.uk/security

                                                                                                                                        squotes@arrowecs.co.uk
                                                                                                                                                                                                                                                   World-leading security portfolio
                                                                                                                                 Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.
!    Corporate data must be

The security landscape is changing dramatically                                                                                                                                                                                                                                                                      segmented, encrypted,
                                                                                                                                                                                                                                                                                                                     backed up and monitored                                                                              Breaking it down, making it secure
                                                                                                                                                                                                                                   Archiving and
                                                                                                                                                                                                                                                                                                                     to prevent corruption and
The world is moving towards data centre centric and cloud computing, and this trend is                                                                                                                                              Traditional                                                                      illegal access.                                                                                      New data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access,
                                                                                                                                                                                                                                   Tape Solution
                                                                                                                                                                                                                                                                                                                                                                                                                          the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive Corporate
changing the way that IT infrastructures are deployed. Whilst the benefits of this
                                                                                                                                                                                                                                                                                                                                                                                                                          Governance and Compliance strategy.
technology transition are well understood, it introduces a whole host of new risks and
security considerations.
                                                                                                                                                                                                                                 Storage
                                                                                                                                                                                                                                                                                        3      Data Centre                                                                           !      Consolidation into the data
                                                                                                                                                                                                                                                                                                                                                                                            centre and virtualisation
                                                                                                                                                                                                                                                                                                                                                                                                                          These four key areas must now be considered when developing a comprehensive network and data security strategy. Key
                                                                                                                                                                                                                                   Pool                                                                                                                                                                                   technology components can be combined to address the full spectrum of individual and collective security challenges in the
                                                                                                                                                                                                                                                                                                                                                                                            introduces risk due to        modern world.
!   Increasing user mobility and usage of smart phones,                                                                                                                                                          Virtual Tape
                                                                                                                                                                                                                 Library (VTL)
                                                                                                                                                                                                                                                                                                                    Encryption (Data and Applications)
                                                                                                                                                                                                                                                                                                                                                                                            multiple applications and
    tablets and PDAs at the edge site has introduced
                                                                                                                                                                                                                                                                                                                                                                                            data being concentrated
    new security risks with mobile users wanting to access                                                                                    Encryption
                                                                                                                                                                                                                                                                                                                                                                                            onto virtualised hardware        1     Security for the Desktop and Endpoint




                                                                                                                                                                                                                                                                                                SA
                                                                                                                                                                                                                                                                                                                                   Endpoint Security (Host Servers)




                                                                                                                                                                                                                                                                                                  N
    centrally held data and applications anywhere, anytime.




                                                                                                                                                                                                                                                                                                      /N
                                                                                                                                                                             Application




                                                                                                                                                                                                                                                                                                        AS
                                                                                                                                                                                                                                                                                                                                                                                            platforms.




                                                                                                                                                                                                                                                                                                           Fa
                                                                                                                                              Endpoint Suite                  Servers




                                                                                                                                                                                                                                                                                                             br
                                                                                                                                                                                                                                         Application




                                                                                                                                                                                                                                                                                                               ic
                                                                                                                                                                                                                                          Servers                                                                                                  Content Security (Host Servers)                                           • Safeguard data on the endpoint device                            • Separate work and personal activity
!   Business and personal use of technology will increasingly                                                                                                                                                                                                                                                                                                                                                                • Protect devices against theft and illegal access                 • Anti Virus, encryption, spyware and malware protection
    converge as users synchronise and run their work, social                                                                                                                                                                                                                                                                                                                                                                 • Authenticate and ID users                                        • Track stolen devices, disable data and file access
                                                                                                                                Head
    and educational lives through a single device opening up                                                                    Office
    potential security loop holes.                                                                                                                                          Core                                                    WAN
                                                                                                                                                                                                                                                             IDP / IDS
                                                                                                                                                                           Router                      NAC                       Accelerator                                                                                                                             Dashboard



!   High dependance on the Network coupled with
                                                                                                                                                                                                                                                       Load Balancer
                                                                                                                                                                                                                                                                                                                                                                               Monitoring                                    2     Security for the Network

    convergence of the Internet, Wide Area Network (WAN)
                                                                           Authorised Third                                                                                 NAC                                                                                                                                                                           N.O.C.                                                              • Deploy Firewalls to protect key access and exit points          • Filter emails for harmful and inappropriate content
    and Telecommunications services introduces new security,                                                                                 Wireless                                            WAN                                                                                                                                                                         Reporting
                                                                             Party Access                                                   Networking                                        Accelerator                                                                     DMZ 1                 Firewall                                                                                                                  • Encrypt data in transit across the Network                      • Filter, monitor and control website downloads and activity
    performance, and management issues.
                                                                                                                                                                                                                                                                                                                                                                                                                              • Deploy access authentication and intrusion detection
                                                                                                                                                                                                                         WAN                              Intranet
                                                                                                                                                                                                                                                         Webserver
                                                                                                                                                                                                                                                                                            DMZ 2

                                                                           Authentication                                                                                                                                                                                 External
                                                                                                                                                                                    Web
                                                                                 Endpoint Suite                                                                                                                                                                          Webservers
                                                                                                                                                                                  Filtering

                                                                                                                                                                                                                                                                                                                                                                                                                             3
                                                                                                                                                                                                                                                                        (FTP / WWW)                                         Global
                                                                                                  Policy                                                                                                                                                      WAN                                                           Company                                                                                                Security for the Data Centre
                                                                                                                                                               IDP / IDS
                                                                                                                                                                                                             External
                                                                                                                                                                                                            SSL Access
                                                                                                                                                                                                                                                           Accelerator                                                      Security
                                                                                                                                                                                                                                                                                                                            Policy                                                   !      Corporate governence and
                                                                                                                                                                                                                                                                                                                                                                                            risk management is now a          • Deploy dedicated Firewalls to protect key assets                • Apply access and authentication controls at all levels
                                                                                                                                                Firewall                                                                                                                       Router                                                                                                       major consideration in            • Create DMZ and restricted areas                                 • Deploy intrusion protection and alerts
                                               Customer / Public
                                                                                                                                                                                                      2         Network                                                                                                                                                                     network security planning.
                                                                                                                                                                                                                                                                                      NAC
                                                 Cloud Access                                                                                                                                                                                                                                                                                                                                                                 • Separate and encrypt business critical data                     • Filter and control inbound / outbound content
                                                 and Internet                                                                                                                                                                                                Remote
                                                                                                                                                                Email                                                                                         Site
                                                                                                                                                               Filtering
                                                                                                                                         ISP Load



                                                                                                                      Internet /
                                                                                                                                         Balancer
                                                                                                                                                                                    SSL
                                                                                                                                                                                    VPN
                                                                                                                                                                                                                                                           Encryption
                                                                                                                                                                                                                                                                                                                                                                                                                             4     Compliance for the Infrastructure
                                                                                                                                                                                                                                                           Endpoint
                                                                                                                                                                                                                                                                                                                                                                                                                              • Implement audit and tracking controls                           • Sarbanes-Oxley (SOX) and Payment Card Industry (PCI)
                                                                                                                        Cloud
                                                                                                                                                                                                                                                           Suite

                                                                                                                                                                                                                                                                                                                                                                                                                              • Backup and recovery                                             • Login and access procedures
                                                  Mobile Workers                                                                                                                                                                                                                                                                                                                                                              • Resilience and data protection                                  • Reporting, visibility, tracking and accountability

                                                                                                                                                                                                                                                                                                                    Key Technologies
                                                 and Small Offices




                                                                                    Content and Web
                                                                                                                                                                                                                          4         Compliance                                                                      Data and Application Security                                                    Content Security            Network Security                                  Endpoint Security                              Compliance
                                                                                       Filtering                     WAN
                                                                                                                  Accelerator                                                                                                                                                                                       • Encryption                                                                     • Email Filtering           • Firewalls                                       • Authentication and Tokens                    • Monitoring and Data Capture
                                                          Encryption
                                                                                                           Firewall                                                                                                                                                                                                 • Data Loss Prevention (DLP)                                                     • Web Filtering             • Intrusion Detection Prevention /                • Single Sign-On                               • Policy Management
                                                          Endpoint Suite
                                                                                                  Router                                                                                                                                                                                                            • Application Control                                                                                          System (IDP / IDS)                              • Secure Sockets Layer Virtual Private         • Dashboards
                                                                                                                                                                                                                                                                                                                    • Alerts                                                                                                     • Wi-Fi                                             Network (SSL VPN)                            • Reporting Tools
                                                          Authentication
                                                                                                                      1     Endpoint
                                                                                                                                                                                                                                                                                                                    Performance and Infrastructure
                                                                                                                                                                                                                                                                                                                                                                                                                                 • Network Access Control (NAC)                    • Endpoint Suite (Anti Virus, Spyware,
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     Malware, etc)
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • Log Correlation

                                                          SSL VPN

                                                                                                                                                                                                                                                                                                                    • Load Balancing
                                                                                                                                                                                                                                                                                                                    • WAN Acceleration                                                                                                                      “IT infrastructures are changing and driving a rethink of data security deployment.
                                                                                                                                                                                                                                                                                                                                                                                                                                                            Arrow ECS security solutions can help organisations tackle security proactively and
                                                                                                                                                                                                                                                                                                                                                                                                                                                            experience the business benefits that come from good governance.”
                                                                                                                                                                                                                                                                                                                                         www.arrowecs.co.uk/security                                                                                                                        Nick Bannister, Divisional Director Security Solutions, Arrow ECS

Arrow ecs security_brochure_2012

  • 1.
    About Arrow ECS Translatingoutstanding industry Arrow ECS is an information technology distributor specialising in providing knowledge into practical solutions As the UK’s leading security distributor, Arrow ECS can offer end-to-end IT infrastructure solutions including data storage, servers, enterprise Arrow ECS Security Solutions software, network security, unified communications and virtualisation. Working with your customers the benefits of: Safeguarding data With infrastructure-wide experience and specialist knowledge our channel partners, we optimise the efficiency with which organisations can store, in the security area, Arrow ECS can help your customers to manage, protect and deploy their data, equipping them with secure access to safeguard their business by controlling and protecting data at • Our Security Centre of Excellence business-critical information any time, from any location, on any device. every point. Our deep technical understanding is reinforced by strong business relationships and Securing business • Partnerships with world-class security We have market insight and the technical understanding to solution vendors continually monitoring rapidly changing IT markets for the latest product advances draw together the different technology elements into solutions and emerging technologies. Through close alliances with the world’s leading IT that meet your customers’ escalating needs to address security vendors, we deliver innovative solutions, complemented by an impressive portfolio of and compliance issues. • A dedicated security team accredited to the highest levels of certification expert professional services and IT training. With over 25 successful years in the IT industry, we have the skills and experience to Working with Arrow ECS, we can help organisations tackle support our channel partners from initial consultation, planning and design, through security proactively and experience the business benefits that come from good governance. 01623 500210 engineering build to implementation. In doing so, we enable our partners to deliver www.arrowecs.co.uk/security even more value to increase their customers’ competitive edge. Arrow Enterprise Computing Solutions (ECS) is a business segment of Arrow squotes@arrowecs.co.uk Electronics Inc. More details are available at www.arrowecs.co.uk Arrow ECS Security Portfolio 1 Security for the Desktop and Endpoint - protecting sensitive information from compromise and corruption when accessed and stored at the endpoint, even over portable devices Security for the Network - balancing ease of access to information with safeguarding the 2 integrity of confidential data shared across the network © Secure Networks Head Office London Office Reading Office Nottingham Office Nidderdale House Fourth Floor Building 1320 Security Centre Security for the Data Centre - ensuring data stored within the data centre for access by users 3 Beckwith Knowle The Royal Exchange Arlington Business of Excellence is firmly under the control of the organisation Otley Road London Park Woodside House Harrogate EC3V 3LN Theale, Reading Osier Drive HG3 1SA Tel: 020 7786 3400 RG7 4SA Sherwood Park Tel: 0118 971 1511 © Secure Networks Tel: 01423 519000 Fax:020 7786 3444 Nottingham Fax:01423 519250 Fax:0118 971 1522 NG15 0DS Tel: 01623 500200 Compliance for the Infrastructure - maintaining full compliance with legal obligations on 4 creating and retaining data without increasing management overheads Fax:01623 500201 Secure Networks © 01623 500210 www.arrowecs.co.uk/security squotes@arrowecs.co.uk World-leading security portfolio Copyright ©2012 Arrow ECS. All rights reserved. Company registered number 3952678.
  • 2.
    ! Corporate data must be The security landscape is changing dramatically segmented, encrypted, backed up and monitored Breaking it down, making it secure Archiving and to prevent corruption and The world is moving towards data centre centric and cloud computing, and this trend is Traditional illegal access. New data centre centric and cloud infrastructures can be broken down into the four key areas of Endpoint devices and access, Tape Solution the Network including Internet/WAN, the Core Data Centre and finally across all of these the need for a comprehensive Corporate changing the way that IT infrastructures are deployed. Whilst the benefits of this Governance and Compliance strategy. technology transition are well understood, it introduces a whole host of new risks and security considerations. Storage 3 Data Centre ! Consolidation into the data centre and virtualisation These four key areas must now be considered when developing a comprehensive network and data security strategy. Key Pool technology components can be combined to address the full spectrum of individual and collective security challenges in the introduces risk due to modern world. ! Increasing user mobility and usage of smart phones, Virtual Tape Library (VTL) Encryption (Data and Applications) multiple applications and tablets and PDAs at the edge site has introduced data being concentrated new security risks with mobile users wanting to access Encryption onto virtualised hardware 1 Security for the Desktop and Endpoint SA Endpoint Security (Host Servers) N centrally held data and applications anywhere, anytime. /N Application AS platforms. Fa Endpoint Suite Servers br Application ic Servers Content Security (Host Servers) • Safeguard data on the endpoint device • Separate work and personal activity ! Business and personal use of technology will increasingly • Protect devices against theft and illegal access • Anti Virus, encryption, spyware and malware protection converge as users synchronise and run their work, social • Authenticate and ID users • Track stolen devices, disable data and file access Head and educational lives through a single device opening up Office potential security loop holes. Core WAN IDP / IDS Router NAC Accelerator Dashboard ! High dependance on the Network coupled with Load Balancer Monitoring 2 Security for the Network convergence of the Internet, Wide Area Network (WAN) Authorised Third NAC N.O.C. • Deploy Firewalls to protect key access and exit points • Filter emails for harmful and inappropriate content and Telecommunications services introduces new security, Wireless WAN Reporting Party Access Networking Accelerator DMZ 1 Firewall • Encrypt data in transit across the Network • Filter, monitor and control website downloads and activity performance, and management issues. • Deploy access authentication and intrusion detection WAN Intranet Webserver DMZ 2 Authentication External Web Endpoint Suite Webservers Filtering 3 (FTP / WWW) Global Policy WAN Company Security for the Data Centre IDP / IDS External SSL Access Accelerator Security Policy ! Corporate governence and risk management is now a • Deploy dedicated Firewalls to protect key assets • Apply access and authentication controls at all levels Firewall Router major consideration in • Create DMZ and restricted areas • Deploy intrusion protection and alerts Customer / Public 2 Network network security planning. NAC Cloud Access • Separate and encrypt business critical data • Filter and control inbound / outbound content and Internet Remote Email Site Filtering ISP Load Internet / Balancer SSL VPN Encryption 4 Compliance for the Infrastructure Endpoint • Implement audit and tracking controls • Sarbanes-Oxley (SOX) and Payment Card Industry (PCI) Cloud Suite • Backup and recovery • Login and access procedures Mobile Workers • Resilience and data protection • Reporting, visibility, tracking and accountability Key Technologies and Small Offices Content and Web 4 Compliance Data and Application Security Content Security Network Security Endpoint Security Compliance Filtering WAN Accelerator • Encryption • Email Filtering • Firewalls • Authentication and Tokens • Monitoring and Data Capture Encryption Firewall • Data Loss Prevention (DLP) • Web Filtering • Intrusion Detection Prevention / • Single Sign-On • Policy Management Endpoint Suite Router • Application Control System (IDP / IDS) • Secure Sockets Layer Virtual Private • Dashboards • Alerts • Wi-Fi Network (SSL VPN) • Reporting Tools Authentication 1 Endpoint Performance and Infrastructure • Network Access Control (NAC) • Endpoint Suite (Anti Virus, Spyware, Malware, etc) • Log Correlation SSL VPN • Load Balancing • WAN Acceleration “IT infrastructures are changing and driving a rethink of data security deployment. Arrow ECS security solutions can help organisations tackle security proactively and experience the business benefits that come from good governance.” www.arrowecs.co.uk/security Nick Bannister, Divisional Director Security Solutions, Arrow ECS