SlideShare a Scribd company logo
Security Consolidation Survey 2014
Web | Mail | Endpoint | Server | Data Encryption | DLP
If you are facing an increasing volume of logs
from multiple sources, you are managing a flood
of information. Not only that, you still need to
analyze that data in order to find evidence of
security incidents, and make sure you stay
compliant with industry regulations.
To help our clients learn more about their
security environment we put together a tool that
examined how many security tools our clients
really used, and offered some recommendations
from our experts based on the results.
WHY WE DID IT
» Endpoint buyers
» ProSuite buyers
» Security buyers in retail verticals
» Security buyers in legal verticals
» IT managers
» Security decision makers
» PC and client software buyers
» Security buyers in education
» Security buyers in finance
» Security buyers in healthcare
» Networking buyers
TARGET AUDIENCE
Gross responses were reviewed and scrubbed if:
A. Answers for questions 1 through 9 were the same
B. All questions had the same answer
C. The same result was received for each completed
survey in rapid succession
D. A response for a required question was missing
DATA HANDLING
The Results
What are you using for endpoint virus?
We often encounter clients using Microsoft Forefront to
maximize their Enterprise Agreement. However, its
possible to realize a more robust endpoint security and
overall security posture by utilizing a comprehensive
solution from Trend Micro, Symantec, McAfee or
Sophos.
21%
39%
21%
5%
13%
1%
Endpoint Virus
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
8
If other, please specify
What are you using for mail gateway?
As Microsoft discontinued the TMG (Threat
Management Gateway) we are seeing significant
changes in this area. We anticipate continued changes
in the future, as more organizations adopt Office 365.
Our clients that have been using TMG are often looking
to existing security providers as well as networking
technologies to protect their messaging technologies.
Building upon the investment with the current endpoint
security solution provider is a strategic opportunity to
minimize costs and overhead.
0
2
4
6
8
10
If other, please specify
19%27%
17%
3% 26%
8%
Mail gateway
Trend Micro Symantec McAfee
Sophos Other Nothing
What are you using for WEB gateway?
Our clients that have been using TMG are often looking
to existing security providers as well as networking
technologies to protect their messaging technologies.
Building upon the investment with the current endpoint
security solution provider is a strategic opportunity to
minimize costs and overhead.
22%
21%
13%
5%
27%
12%
Web Gateway
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
8
If other, please specify
What technology are you using for intrusion prevention?
Intrusion Prevention services are being integrated
into UTM (Universal Threat Management) devices
as well as NGFW (Next Generation Firewall)
technologies.
16%
29%
13%
5%
21%
16%
Intrusion prevention
Trend Micro Symantec McAfee
Sophos Other Nothing
0
2
4
6
If other, please specify
What technology are you using for firewall?
We are seeing a significant movement from
legacy “layer 3’ firewalls to NGFW (Next
Generation Firewalls).
17%
21%13%
7%
37% 5%
FIREWALL
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
AVG
CheckPoint
Cisco
Custom
FortiGate
Fortinet
Juniper
Kaspersky
Microsoft
PaloAlto
PhysicalDevice
Sentinel
Sonicwall
Squid
TMG
Untangle
WatchGuard
If other, please specify
What are you using to encrypt data?
We are seeing concerns around some encryption
technologies. Organizations implementing an
encryption solution should be aware of potential
limitations when using Truecrypt and Bitlocker.
15%
28%
7%5%
19%
26%
Encrypt Data
Trend Micro Symantec McAfee
Sophos Other Nothing
0
1
2
3
4
5
6
If other, please specify
What are you using for data loss prevention?
Data Loss Prevention (DLP) is a significant
concern for our clients working to adhere to
compliance mandates like Payment Card Industry
(PCI) and Health Insurance Portability and
Accountability Act (HIPAA) etc.21%
30%
6%
3%
13%
27%
Data Loss Prevention
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
If other, please specify
What are you doing to protect your servers?
Standard endpoint protection is not an complete
security solution for servers. Servers should
utilize technology designed specifically for server
protection.19%
44%
10%
7%
12%
8%
Server Protection
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
If other, please specify
How are you managing mobile data?
Mobile consumerization is driving our clients to
protect both mobile devices as well as the data
residing on those devices. You must consider the
planning and policies in place, as there will be
policy differences between Bring Your Own
Device (BYOD), and corporate-issue device
environments.
21%
20%
4%
5%
16%
34%
Mobile Data
Trend Micro Symantec McAfee
Sophos Other Nothing
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
If other, please specify
How do you manage the logs from all these tools?
Real time log management is a core component
for corporate security as well as compliance
requirements, specifically around incident
management and incident response processes.
Logs Management
SIEM Solution Managed Solution
Open Source Nothing
Are you happy with your main security vendor?
If it’s not broken, don’t fix it. Right? We encourage
our clients to test their security architectures to
ensure they are well-designed and effective.
More simply, keep in mind our goal is to prevent
security incidents before they happen!
Are you happy?
Yes No
SUMMARY
1. Understand business and compliance drivers, and integrate these
requirements in to the technical specs when considering a security
solution.
2. Deploying technology without understanding the risks and sensitive
data repositories is not an effective solution.
3. A robust security architecture requires continued testing and
improvement to assess risks to critical systems, identify threats,
remediate risks, and protect business assets.
4. We see value in consolidating security technologies to fewer vendors.
Both from a cost savings perspective, and a daily operations
management perspective.
Based on the results of this tool, here are the 4 most important
things our clients should remember:
THANK YOU
With over 40 locations across the U.S. and Canada,
Softchoice is one of North America’s largest providers of IT
solutions and services. Our holistic approach to
technology includes solution design, implementation,
and managed services.

More Related Content

What's hot

Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
Marc Musgrove
 
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
accenture
 
Guidewire PaaS
Guidewire PaaSGuidewire PaaS
Guidewire PaaS
dipak sahoo
 
What is the Social Graph?
What is the Social Graph?What is the Social Graph?
What is the Social Graph?
Isidore Gotto
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Amazon Web Services
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
SilverlineCRM
 
Unlocking the Power of RegTech
Unlocking the Power of RegTechUnlocking the Power of RegTech
Unlocking the Power of RegTech
accenture
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
accenture
 
Boost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI BusinessBoost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI Business
accenture
 
Data Driven Communities in the United States
Data Driven Communities in the United StatesData Driven Communities in the United States
Data Driven Communities in the United States
accenture
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
Aegify Inc.
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
CHRIS CLIFFORD
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
accenture
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
MongoDB
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
Peak 10
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
Dr. Aloknath De
 
Technology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SASTechnology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SAS
accenture
 
Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
Accenture Technology
 

What's hot (20)

Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
Everyone's a Screenager. Now what? Five trends from the 2015 Digital Consumer...
 
Guidewire PaaS
Guidewire PaaSGuidewire PaaS
Guidewire PaaS
 
What is the Social Graph?
What is the Social Graph?What is the Social Graph?
What is the Social Graph?
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
HEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITYHEALTHCARE, THE CLOUD, AND ITS SECURITY
HEALTHCARE, THE CLOUD, AND ITS SECURITY
 
Unlocking the Power of RegTech
Unlocking the Power of RegTechUnlocking the Power of RegTech
Unlocking the Power of RegTech
 
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
The New Energy Consumer: What Promises Do Blockchain Technologies Offer Energ...
 
Boost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI BusinessBoost your AIQ: Transforming to an AI Business
Boost your AIQ: Transforming to an AI Business
 
Data Driven Communities in the United States
Data Driven Communities in the United StatesData Driven Communities in the United States
Data Driven Communities in the United States
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Cybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insuranceCybersecurity at a premium: The state of cyber resilience in insurance
Cybersecurity at a premium: The state of cyber resilience in insurance
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
 
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoiceTOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of Choice
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
Technology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SASTechnology Vision 2020: The Analytics Angle with SAS
Technology Vision 2020: The Analytics Angle with SAS
 
Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020Accenture Labs Innovation Stories 2020
Accenture Labs Innovation Stories 2020
 

Similar to Softchoice Security Consolidation Survey Results

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
Jose R
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
BurCom Consulting Ltd.
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
BurCom Consulting Ltd.
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
TestingXperts
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
Conor Bronsdon
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
RapidValue
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
Satya Harish
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
harman041
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
Comarch_Services
 

Similar to Softchoice Security Consolidation Survey Results (20)

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
G01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protectionG01.2012 magic quadrant for endpoint protection
G01.2012 magic quadrant for endpoint protection
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 

More from Softchoice Corporation

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
Softchoice Corporation
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
Softchoice Corporation
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
Softchoice Corporation
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
Softchoice Corporation
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
Softchoice Corporation
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
Softchoice Corporation
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
Softchoice Corporation
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice Corporation
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
Softchoice Corporation
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
Softchoice Corporation
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Softchoice Corporation
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Corporation
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
Softchoice Corporation
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Softchoice Corporation
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice Corporation
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
Softchoice Corporation
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
Softchoice Corporation
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Corporation
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
Softchoice Corporation
 

More from Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Azure cloud governance deck
Azure cloud governance deckAzure cloud governance deck
Azure cloud governance deck
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Enabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research StudyEnabling Innovation: A 2017 Softchoice Research Study
Enabling Innovation: A 2017 Softchoice Research Study
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Effective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) WebinarEffective Management of Azure through Operations Management Suite (OMS) Webinar
Effective Management of Azure through Operations Management Suite (OMS) Webinar
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

Softchoice Security Consolidation Survey Results

  • 1. Security Consolidation Survey 2014 Web | Mail | Endpoint | Server | Data Encryption | DLP
  • 2. If you are facing an increasing volume of logs from multiple sources, you are managing a flood of information. Not only that, you still need to analyze that data in order to find evidence of security incidents, and make sure you stay compliant with industry regulations. To help our clients learn more about their security environment we put together a tool that examined how many security tools our clients really used, and offered some recommendations from our experts based on the results. WHY WE DID IT
  • 3. » Endpoint buyers » ProSuite buyers » Security buyers in retail verticals » Security buyers in legal verticals » IT managers » Security decision makers » PC and client software buyers » Security buyers in education » Security buyers in finance » Security buyers in healthcare » Networking buyers TARGET AUDIENCE
  • 4. Gross responses were reviewed and scrubbed if: A. Answers for questions 1 through 9 were the same B. All questions had the same answer C. The same result was received for each completed survey in rapid succession D. A response for a required question was missing DATA HANDLING
  • 6. What are you using for endpoint virus? We often encounter clients using Microsoft Forefront to maximize their Enterprise Agreement. However, its possible to realize a more robust endpoint security and overall security posture by utilizing a comprehensive solution from Trend Micro, Symantec, McAfee or Sophos. 21% 39% 21% 5% 13% 1% Endpoint Virus Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 8 If other, please specify
  • 7. What are you using for mail gateway? As Microsoft discontinued the TMG (Threat Management Gateway) we are seeing significant changes in this area. We anticipate continued changes in the future, as more organizations adopt Office 365. Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead. 0 2 4 6 8 10 If other, please specify 19%27% 17% 3% 26% 8% Mail gateway Trend Micro Symantec McAfee Sophos Other Nothing
  • 8. What are you using for WEB gateway? Our clients that have been using TMG are often looking to existing security providers as well as networking technologies to protect their messaging technologies. Building upon the investment with the current endpoint security solution provider is a strategic opportunity to minimize costs and overhead. 22% 21% 13% 5% 27% 12% Web Gateway Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 8 If other, please specify
  • 9. What technology are you using for intrusion prevention? Intrusion Prevention services are being integrated into UTM (Universal Threat Management) devices as well as NGFW (Next Generation Firewall) technologies. 16% 29% 13% 5% 21% 16% Intrusion prevention Trend Micro Symantec McAfee Sophos Other Nothing 0 2 4 6 If other, please specify
  • 10. What technology are you using for firewall? We are seeing a significant movement from legacy “layer 3’ firewalls to NGFW (Next Generation Firewalls). 17% 21%13% 7% 37% 5% FIREWALL Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 AVG CheckPoint Cisco Custom FortiGate Fortinet Juniper Kaspersky Microsoft PaloAlto PhysicalDevice Sentinel Sonicwall Squid TMG Untangle WatchGuard If other, please specify
  • 11. What are you using to encrypt data? We are seeing concerns around some encryption technologies. Organizations implementing an encryption solution should be aware of potential limitations when using Truecrypt and Bitlocker. 15% 28% 7%5% 19% 26% Encrypt Data Trend Micro Symantec McAfee Sophos Other Nothing 0 1 2 3 4 5 6 If other, please specify
  • 12. What are you using for data loss prevention? Data Loss Prevention (DLP) is a significant concern for our clients working to adhere to compliance mandates like Payment Card Industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA) etc.21% 30% 6% 3% 13% 27% Data Loss Prevention Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 If other, please specify
  • 13. What are you doing to protect your servers? Standard endpoint protection is not an complete security solution for servers. Servers should utilize technology designed specifically for server protection.19% 44% 10% 7% 12% 8% Server Protection Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 If other, please specify
  • 14. How are you managing mobile data? Mobile consumerization is driving our clients to protect both mobile devices as well as the data residing on those devices. You must consider the planning and policies in place, as there will be policy differences between Bring Your Own Device (BYOD), and corporate-issue device environments. 21% 20% 4% 5% 16% 34% Mobile Data Trend Micro Symantec McAfee Sophos Other Nothing 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 If other, please specify
  • 15. How do you manage the logs from all these tools? Real time log management is a core component for corporate security as well as compliance requirements, specifically around incident management and incident response processes. Logs Management SIEM Solution Managed Solution Open Source Nothing
  • 16. Are you happy with your main security vendor? If it’s not broken, don’t fix it. Right? We encourage our clients to test their security architectures to ensure they are well-designed and effective. More simply, keep in mind our goal is to prevent security incidents before they happen! Are you happy? Yes No
  • 17. SUMMARY 1. Understand business and compliance drivers, and integrate these requirements in to the technical specs when considering a security solution. 2. Deploying technology without understanding the risks and sensitive data repositories is not an effective solution. 3. A robust security architecture requires continued testing and improvement to assess risks to critical systems, identify threats, remediate risks, and protect business assets. 4. We see value in consolidating security technologies to fewer vendors. Both from a cost savings perspective, and a daily operations management perspective. Based on the results of this tool, here are the 4 most important things our clients should remember:
  • 18. THANK YOU With over 40 locations across the U.S. and Canada, Softchoice is one of North America’s largest providers of IT solutions and services. Our holistic approach to technology includes solution design, implementation, and managed services.